Volume 16,Issue 3,2005 Table of Contents
Generating SAT Instances from First-Order FormulasHUANG Zhuo and ZHANG Jian2005,16(3):327-335 [Abstract(5562)] [View PDF(5377)1019.11 K]Homomorphism Proof Systems for Unsatisfiable FormulasXU Dao-Yun2005,16(3):336-345 [Abstract(4565)] [View PDF(4194)1.13 M]A Tag Type for Certifying Compilation of Java ProgramCHEN Hui,CHEN Yi-Yun and RU Xiang-Min2005,16(3):346-354 [Abstract(3791)] [View PDF(4750)1.01 M]QRDChecker: A Model Checking Tool for QRDCPEI Yu,XU Qi-Wen,LI Xuan-Dong and ZHENG Guo-Liang2005,16(3):355-364 [Abstract(4036)] [View PDF(5109)684.99 K]Convergence of a Mean Shift AlgorithmLI Xiang-Ru,WU Fu-Chao and HU Zhan-Yi2005,16(3):365-374 [Abstract(8759)] [View PDF(13236)1.12 M]A Round-Robin Scheduling Algorithm by Iterating Between Slots for Input- Queued SwitchesWU Jun,CHEN Qing and LUO Jun-Zhou2005,16(3):375-383 [Abstract(4607)] [View PDF(5328)997.49 K]A Distributed Computing Model for Wu's MethodWU Yong-Wei,YANG Guang-Wen,YANG Hong,ZHENG Wei-Min and LIN Dong-Dai2005,16(3):384-391 [Abstract(4176)] [View PDF(5282)884.29 K]Approximated Computational Hardness and Local Search Approximated Algorithm Analysis for k-Median ProblemPAN Rui,ZHU Da-Ming,MA Shao-Han and XIAO Jin-Jie2005,16(3):392-399 [Abstract(5180)] [View PDF(6479)1.03 M]Schedule of Activity Instances in Workflow Management SystemSUN Rui-Zhi and SHI Mei-Lin2005,16(3):400-406 [Abstract(4414)] [View PDF(4912)824.27 K]An Active Measurement Model for Software Process Control and ImprovementWANG Qing,LI Ming-Shu and LIU Xia2005,16(3):407-418 [Abstract(4318)] [View PDF(5233)1.24 M]A Method for the Design of Petri Net Controller Enforcing General Linear ConstraintsWANG Shou-Guang and YAN Gang-Feng2005,16(3):419-426 [Abstract(3801)] [View PDF(4748)1018.53 K]A Quantification Approach to Software Requirements Analysis and Its Fuzzy Analytic Hierarchy Process MappingXIONG Wei,Hisakazu SHINDO and Yoshimichi WATANABE2005,16(3):427-433 [Abstract(4138)] [View PDF(7266)864.87 K]A Distributed Entropy-Based Long-Life QoS Routing Algorithm in Ad Hoc NetworkSHEN Hui,SHI Bing-Xin,ZOU Ling,SHI Jian and ZHOU Jian-Xin2005,16(3):445-452 [Abstract(3944)] [View PDF(5401)1.00 M]An Adaptively Secure Distributed Key Generation Scheme Against General Adversary without ErasureHE Yun-Xiao,LI Bao and Lü Ke-Wei2005,16(3):453-461 [Abstract(3967)] [View PDF(4225)1003.62 K]Traffic Control in Linux-Based RoutersZHANG Huan-Qiang and WU Zhi-Mei2005,16(3):462-471 [Abstract(3558)] [View PDF(5267)1.03 M]Cryptanalysis of a Member Deletion Scheme for Group SignatureHUANG Zhen-Jie and LIN Xuan-Zhi2005,16(3):472-476 [Abstract(3915)] [View PDF(4270)628.75 K]A Method for Mobile Agent Data ProtectionTAN Xiang,GU Yu-Qing and BAO Chong-Ming2005,16(3):477-484 [Abstract(3904)] [View PDF(4731)763.89 K]
Improving TCP Performance over MANET: A SurveyFENG Yan-Jun,SUN Li-Min,QIAN Hua-Lin and SONG Cheng2005,16(3):434-444 [Abstract(7811)] [View PDF(6742)1.14 M]