Volume 16,Issue 3,2005 Table of Contents

Other Issues:  
  
Contents

  • Generating SAT Instances from First-Order Formulas
  • HUANG Zhuo and ZHANG Jian
  • 2005,16(3):327-335 [Abstract(4076)]  [View PDF(3420)1019.11 K]
  • Homomorphism Proof Systems for Unsatisfiable Formulas
  • XU Dao-Yun
  • 2005,16(3):336-345 [Abstract(3295)]  [View PDF(2527)1.13 M]
  • A Tag Type for Certifying Compilation of Java Program
  • CHEN Hui,CHEN Yi-Yun and RU Xiang-Min
  • 2005,16(3):346-354 [Abstract(2764)]  [View PDF(2821)1.01 M]
  • QRDChecker: A Model Checking Tool for QRDC
  • PEI Yu,XU Qi-Wen,LI Xuan-Dong and ZHENG Guo-Liang
  • 2005,16(3):355-364 [Abstract(2949)]  [View PDF(3332)684.99 K]
  • Convergence of a Mean Shift Algorithm
  • LI Xiang-Ru,WU Fu-Chao and HU Zhan-Yi
  • 2005,16(3):365-374 [Abstract(6731)]  [View PDF(11053)1.12 M]
  • A Round-Robin Scheduling Algorithm by Iterating Between Slots for Input- Queued Switches
  • WU Jun,CHEN Qing and LUO Jun-Zhou
  • 2005,16(3):375-383 [Abstract(3534)]  [View PDF(3666)997.49 K]
  • A Distributed Computing Model for Wu's Method
  • WU Yong-Wei,YANG Guang-Wen,YANG Hong,ZHENG Wei-Min and LIN Dong-Dai
  • 2005,16(3):384-391 [Abstract(3134)]  [View PDF(3601)884.29 K]
  • Approximated Computational Hardness and Local Search Approximated Algorithm Analysis for k-Median Problem
  • PAN Rui,ZHU Da-Ming,MA Shao-Han and XIAO Jin-Jie
  • 2005,16(3):392-399 [Abstract(3908)]  [View PDF(4396)1.03 M]
  • Schedule of Activity Instances in Workflow Management System
  • SUN Rui-Zhi and SHI Mei-Lin
  • 2005,16(3):400-406 [Abstract(3080)]  [View PDF(3229)824.27 K]
  • An Active Measurement Model for Software Process Control and Improvement
  • WANG Qing,LI Ming-Shu and LIU Xia
  • 2005,16(3):407-418 [Abstract(3126)]  [View PDF(3411)1.24 M]
  • A Method for the Design of Petri Net Controller Enforcing General Linear Constraints
  • WANG Shou-Guang and YAN Gang-Feng
  • 2005,16(3):419-426 [Abstract(2810)]  [View PDF(3018)1018.53 K]
  • A Quantification Approach to Software Requirements Analysis and Its Fuzzy Analytic Hierarchy Process Mapping
  • XIONG Wei,Hisakazu SHINDO and Yoshimichi WATANABE
  • 2005,16(3):427-433 [Abstract(2985)]  [View PDF(5256)864.87 K]
  • A Distributed Entropy-Based Long-Life QoS Routing Algorithm in Ad Hoc Network
  • SHEN Hui,SHI Bing-Xin,ZOU Ling,SHI Jian and ZHOU Jian-Xin
  • 2005,16(3):445-452 [Abstract(2898)]  [View PDF(3650)1.00 M]
  • An Adaptively Secure Distributed Key Generation Scheme Against General Adversary without Erasure
  • HE Yun-Xiao,LI Bao and Lü Ke-Wei
  • 2005,16(3):453-461 [Abstract(2813)]  [View PDF(2571)1003.62 K]
  • Traffic Control in Linux-Based Routers
  • ZHANG Huan-Qiang and WU Zhi-Mei
  • 2005,16(3):462-471 [Abstract(2528)]  [View PDF(3487)1.03 M]
  • Cryptanalysis of a Member Deletion Scheme for Group Signature
  • HUANG Zhen-Jie and LIN Xuan-Zhi
  • 2005,16(3):472-476 [Abstract(2878)]  [View PDF(2751)628.75 K]
  • A Method for Mobile Agent Data Protection
  • TAN Xiang,GU Yu-Qing and BAO Chong-Ming
  • 2005,16(3):477-484 [Abstract(2854)]  [View PDF(3062)763.89 K]
  • Review Articles

  • Improving TCP Performance over MANET: A Survey
  • FENG Yan-Jun,SUN Li-Min,QIAN Hua-Lin and SONG Cheng
  • 2005,16(3):434-444 [Abstract(5935)]  [View PDF(3990)1.14 M]