Volume 16,Issue 3,2005 Table of Contents

Other Issues:  
  
Contents

  • Generating SAT Instances from First-Order Formulas
  • HUANG Zhuo and ZHANG Jian
  • 2005,16(3):327-335 [Abstract(3902)]  [View PDF(3356)1019.11 K]
  • Homomorphism Proof Systems for Unsatisfiable Formulas
  • XU Dao-Yun
  • 2005,16(3):336-345 [Abstract(3120)]  [View PDF(2470)1.13 M]
  • A Tag Type for Certifying Compilation of Java Program
  • CHEN Hui,CHEN Yi-Yun and RU Xiang-Min
  • 2005,16(3):346-354 [Abstract(2620)]  [View PDF(2754)1.01 M]
  • QRDChecker: A Model Checking Tool for QRDC
  • PEI Yu,XU Qi-Wen,LI Xuan-Dong and ZHENG Guo-Liang
  • 2005,16(3):355-364 [Abstract(2838)]  [View PDF(3262)684.99 K]
  • Convergence of a Mean Shift Algorithm
  • LI Xiang-Ru,WU Fu-Chao and HU Zhan-Yi
  • 2005,16(3):365-374 [Abstract(6446)]  [View PDF(10920)1.12 M]
  • A Round-Robin Scheduling Algorithm by Iterating Between Slots for Input- Queued Switches
  • WU Jun,CHEN Qing and LUO Jun-Zhou
  • 2005,16(3):375-383 [Abstract(3396)]  [View PDF(3599)997.49 K]
  • A Distributed Computing Model for Wu's Method
  • WU Yong-Wei,YANG Guang-Wen,YANG Hong,ZHENG Wei-Min and LIN Dong-Dai
  • 2005,16(3):384-391 [Abstract(3025)]  [View PDF(3549)884.29 K]
  • Approximated Computational Hardness and Local Search Approximated Algorithm Analysis for k-Median Problem
  • PAN Rui,ZHU Da-Ming,MA Shao-Han and XIAO Jin-Jie
  • 2005,16(3):392-399 [Abstract(3709)]  [View PDF(4014)1.03 M]
  • Schedule of Activity Instances in Workflow Management System
  • SUN Rui-Zhi and SHI Mei-Lin
  • 2005,16(3):400-406 [Abstract(2923)]  [View PDF(3158)824.27 K]
  • An Active Measurement Model for Software Process Control and Improvement
  • WANG Qing,LI Ming-Shu and LIU Xia
  • 2005,16(3):407-418 [Abstract(2996)]  [View PDF(3349)1.24 M]
  • A Method for the Design of Petri Net Controller Enforcing General Linear Constraints
  • WANG Shou-Guang and YAN Gang-Feng
  • 2005,16(3):419-426 [Abstract(2695)]  [View PDF(2884)1018.53 K]
  • A Quantification Approach to Software Requirements Analysis and Its Fuzzy Analytic Hierarchy Process Mapping
  • XIONG Wei,Hisakazu SHINDO and Yoshimichi WATANABE
  • 2005,16(3):427-433 [Abstract(2831)]  [View PDF(5194)864.87 K]
  • A Distributed Entropy-Based Long-Life QoS Routing Algorithm in Ad Hoc Network
  • SHEN Hui,SHI Bing-Xin,ZOU Ling,SHI Jian and ZHOU Jian-Xin
  • 2005,16(3):445-452 [Abstract(2702)]  [View PDF(3582)1.00 M]
  • An Adaptively Secure Distributed Key Generation Scheme Against General Adversary without Erasure
  • HE Yun-Xiao,LI Bao and Lü Ke-Wei
  • 2005,16(3):453-461 [Abstract(2678)]  [View PDF(2508)1003.62 K]
  • Traffic Control in Linux-Based Routers
  • ZHANG Huan-Qiang and WU Zhi-Mei
  • 2005,16(3):462-471 [Abstract(2410)]  [View PDF(3434)1.03 M]
  • Cryptanalysis of a Member Deletion Scheme for Group Signature
  • HUANG Zhen-Jie and LIN Xuan-Zhi
  • 2005,16(3):472-476 [Abstract(2770)]  [View PDF(2691)628.75 K]
  • A Method for Mobile Agent Data Protection
  • TAN Xiang,GU Yu-Qing and BAO Chong-Ming
  • 2005,16(3):477-484 [Abstract(2726)]  [View PDF(3005)763.89 K]
  • Review Articles

  • Improving TCP Performance over MANET: A Survey
  • FENG Yan-Jun,SUN Li-Min,QIAN Hua-Lin and SONG Cheng
  • 2005,16(3):434-444 [Abstract(5679)]  [View PDF(3917)1.14 M]