Volume 16,Issue 3,2005 Table of Contents

Other Issues:  
  
Contents

  • Generating SAT Instances from First-Order Formulas
  • HUANG Zhuo and ZHANG Jian
  • 2005,16(3):327-335 [Abstract(4463)]  [View PDF(3638)1019.11 K]
  • Homomorphism Proof Systems for Unsatisfiable Formulas
  • XU Dao-Yun
  • 2005,16(3):336-345 [Abstract(3721)]  [View PDF(2740)1.13 M]
  • A Tag Type for Certifying Compilation of Java Program
  • CHEN Hui,CHEN Yi-Yun and RU Xiang-Min
  • 2005,16(3):346-354 [Abstract(3110)]  [View PDF(3038)1.01 M]
  • QRDChecker: A Model Checking Tool for QRDC
  • PEI Yu,XU Qi-Wen,LI Xuan-Dong and ZHENG Guo-Liang
  • 2005,16(3):355-364 [Abstract(3280)]  [View PDF(3587)684.99 K]
  • Convergence of a Mean Shift Algorithm
  • LI Xiang-Ru,WU Fu-Chao and HU Zhan-Yi
  • 2005,16(3):365-374 [Abstract(7376)]  [View PDF(11346)1.12 M]
  • A Round-Robin Scheduling Algorithm by Iterating Between Slots for Input- Queued Switches
  • WU Jun,CHEN Qing and LUO Jun-Zhou
  • 2005,16(3):375-383 [Abstract(3821)]  [View PDF(3886)997.49 K]
  • A Distributed Computing Model for Wu's Method
  • WU Yong-Wei,YANG Guang-Wen,YANG Hong,ZHENG Wei-Min and LIN Dong-Dai
  • 2005,16(3):384-391 [Abstract(3422)]  [View PDF(3836)884.29 K]
  • Approximated Computational Hardness and Local Search Approximated Algorithm Analysis for k-Median Problem
  • PAN Rui,ZHU Da-Ming,MA Shao-Han and XIAO Jin-Jie
  • 2005,16(3):392-399 [Abstract(4413)]  [View PDF(4738)1.03 M]
  • Schedule of Activity Instances in Workflow Management System
  • SUN Rui-Zhi and SHI Mei-Lin
  • 2005,16(3):400-406 [Abstract(3507)]  [View PDF(3482)824.27 K]
  • An Active Measurement Model for Software Process Control and Improvement
  • WANG Qing,LI Ming-Shu and LIU Xia
  • 2005,16(3):407-418 [Abstract(3480)]  [View PDF(3623)1.24 M]
  • A Method for the Design of Petri Net Controller Enforcing General Linear Constraints
  • WANG Shou-Guang and YAN Gang-Feng
  • 2005,16(3):419-426 [Abstract(3142)]  [View PDF(3224)1018.53 K]
  • A Quantification Approach to Software Requirements Analysis and Its Fuzzy Analytic Hierarchy Process Mapping
  • XIONG Wei,Hisakazu SHINDO and Yoshimichi WATANABE
  • 2005,16(3):427-433 [Abstract(3376)]  [View PDF(5532)864.87 K]
  • A Distributed Entropy-Based Long-Life QoS Routing Algorithm in Ad Hoc Network
  • SHEN Hui,SHI Bing-Xin,ZOU Ling,SHI Jian and ZHOU Jian-Xin
  • 2005,16(3):445-452 [Abstract(3187)]  [View PDF(3858)1.00 M]
  • An Adaptively Secure Distributed Key Generation Scheme Against General Adversary without Erasure
  • HE Yun-Xiao,LI Bao and Lü Ke-Wei
  • 2005,16(3):453-461 [Abstract(3135)]  [View PDF(2758)1003.62 K]
  • Traffic Control in Linux-Based Routers
  • ZHANG Huan-Qiang and WU Zhi-Mei
  • 2005,16(3):462-471 [Abstract(2884)]  [View PDF(3684)1.03 M]
  • Cryptanalysis of a Member Deletion Scheme for Group Signature
  • HUANG Zhen-Jie and LIN Xuan-Zhi
  • 2005,16(3):472-476 [Abstract(3172)]  [View PDF(2946)628.75 K]
  • A Method for Mobile Agent Data Protection
  • TAN Xiang,GU Yu-Qing and BAO Chong-Ming
  • 2005,16(3):477-484 [Abstract(3208)]  [View PDF(3296)763.89 K]
  • Review Articles

  • Improving TCP Performance over MANET: A Survey
  • FENG Yan-Jun,SUN Li-Min,QIAN Hua-Lin and SONG Cheng
  • 2005,16(3):434-444 [Abstract(6433)]  [View PDF(4285)1.14 M]