Volume 16,Issue 10,2005 Table of Contents

Other Issues:  
  
Contents

  • Approximate-Backbone Guided Fast Ant Algorithms to QAP
  • ZOU Peng,ZHOU Zhi,CHEN Guo-Liang,JIANG He and GU Jun
  • 2005,16(10):1691-1698 [Abstract(3327)]  [View PDF(3383)549.96 K]
  • A Practical Algorithm for Haplotyping by Maximum Parsimony
  • ZHANG Qiang-Feng,CHE Hao-Yang,CHEN Guo-Liang and SUN Guang-Zhong
  • 2005,16(10):1699-1707 [Abstract(2780)]  [View PDF(2652)588.96 K]
  • Effective Synchronization Removal in Concurrent Java Programs
  • WU Ping,CHEN Yi-Yun and ZHANG Jian
  • 2005,16(10):1708-1716 [Abstract(2905)]  [View PDF(3303)487.16 K]
  • An Extended Resources Model Based on Distributed Cognition Theory
  • WANG Chang-Qing,DENG Chang-Zhi,MA Cui-Xia,HUA Qing-Yi and DAI Guo-Zhong
  • 2005,16(10):1717-1725 [Abstract(2890)]  [View PDF(3198)1.29 M]
  • A Real-Time Dynamic Voltage Scaling Algorithm Based on Syntax Tree for Low Power
  • YI Hui-Zhan,CHEN Juan,YANG Xue-Jun and LIU Zhe
  • 2005,16(10):1726-1734 [Abstract(2778)]  [View PDF(3497)541.03 K]
  • Event Constraint Based Software Process Validation
  • GU Qing and CHEN Dao-Xu
  • 2005,16(10):1735-1742 [Abstract(2837)]  [View PDF(2727)541.03 K]
  • A Formal Method for Analyzing Electronic Commerce Protocols
  • QING Si-Han
  • 2005,16(10):1757-1765 [Abstract(2667)]  [View PDF(2920)412.54 K]
  • A Minimum Delay Spanning Tree Algorithm for the Application-Layer Multicast
  • CAO Jia and LU Shi-Wen
  • 2005,16(10):1766-1773 [Abstract(3308)]  [View PDF(4477)368.00 K]
  • A Generic Audit Policy Model on Multilevel Secure DBMS
  • HE Yong-Zhong,LI Lan and FENG Deng-Guo
  • 2005,16(10):1774-1783 [Abstract(2905)]  [View PDF(2818)524.99 K]
  • Extending the Theory of Strand Spaces
  • SHEN Hai-Feng,XUE Rui,HUANG He-Yan and CHEN Zhao-Xiong
  • 2005,16(10):1784-1789 [Abstract(2874)]  [View PDF(3169)488.57 K]
  • P2P-Oriented Secure Reliable Storage System
  • CHEN Ming,YANG Guang-Wen,LIU Xue-Zheng,SHI Shu-Ming and WANG Ding-Xing
  • 2005,16(10):1790-1797 [Abstract(2959)]  [View PDF(3229)332.04 K]
  • A Multiplicative Watermark Detection Algorithm for Digital Images in the DCT Domains
  • SUN Zhong-Wei and FENG Deng-Guo
  • 2005,16(10):1798-1804 [Abstract(3056)]  [View PDF(3828)496.95 K]
  • An Electronic Voting Scheme
  • LI Yan-Jiang,MA Chuan-Gui and HUANG Liu-Sheng
  • 2005,16(10):1805-1810 [Abstract(2747)]  [View PDF(3410)297.62 K]
  • A Study of Online Financial Trading Confirmation Scheme
  • CHEN Shun,YAO Qian and XIE Li
  • 2005,16(10):1811-1815 [Abstract(2920)]  [View PDF(2808)300.34 K]
  • An Anonymous Fingerprinting Scheme Based on Additively Homomorphic Public Key Cryptosystem
  • SUN Zhong-Wei,FENG Deng-Guo and WU Chuan-Kun
  • 2005,16(10):1816-1821 [Abstract(2831)]  [View PDF(3678)250.59 K]
  • Three Algorithms for Improving the Effectiveness of Software Pipelining:Comparison and Combination
  • LI Wen-Long,CHEN Yu,LIN Hai-Bo and TANG Zhi-Zhong
  • 2005,16(10):1822-1832 [Abstract(2588)]  [View PDF(3260)731.74 K]
  • Hiding Memory Access Latency in Software Pipelining
  • LIU Li,LI Wen-Long,CHEN Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1833-1841 [Abstract(3738)]  [View PDF(3309)619.93 K]
  • Optimization to Prevent Cache Penalty in Modulo Scheduling
  • LIU Li,LI Wen-Long,GUO Zhen-Yu,LI Sheng-Mei and TANG Zhi-Zhong
  • 2005,16(10):1842-1852 [Abstract(2952)]  [View PDF(2983)697.82 K]
  • Summarization of Results of Program Funded by NSFC in the Field of Natural Language Processing in Recent Years
  • XU Lin and ZHAO Tie-Jun
  • 2005,16(10):1853-1858 [Abstract(3557)]  [View PDF(4199)352.46 K]
  • Review Articles

  • Research on Theory and Approach of Provable Security
  • FENG Deng-Guo
  • 2005,16(10):1743-1756 [Abstract(7540)]  [View PDF(11517)545.62 K]