Volume 16,Issue 7,2005 Table of Contents

Other Issues:  
  
Contents

  • On Rough Algebras
  • DAI Jian-Hua and PAN Yun-He
  • 2005,16(7):1197-1204 [Abstract(2706)]  [View PDF(2922)760.43 K]
  • Lawvere Theorem in Institution of Regular Order-Sorted Equational Logic and Initial (Terminal) Semantics for Its Glued Theories
  • LIU Fu-Chun
  • 2005,16(7):1205-1209 [Abstract(2871)]  [View PDF(2478)657.31 K]
  • Metamorphic Testing and Special Case Testing: A Case Study
  • WU Peng,SHI Xiao-Chun,TANG Jiang-Jun,LIN Hui-Min and CHEN T.Y.
  • 2005,16(7):1210-1220 [Abstract(3975)]  [View PDF(2577)1.24 M]
  • Managing the Inconsistency of Software Requirements
  • ZHU Xue-Feng and JIN Zhi
  • 2005,16(7):1221-1231 [Abstract(3447)]  [View PDF(3707)476.41 K]
  • Detecting Feature Interactions in Next Generation Communication Software
  • WANG Dong and MEI Hong
  • 2005,16(7):1232-1241 [Abstract(2550)]  [View PDF(3247)1021.12 K]
  • A Method for Semantic Verification of Workflow Processes Based on Petri Net Reduction Technique
  • ZHOU Jian-Tao,SHI Mei-Lin and YE Xin-Ming
  • 2005,16(7):1242-1251 [Abstract(3553)]  [View PDF(3531)1.06 M]
  • Processing Algorithms for Predictive Aggregate Queries over Data Streams
  • LI Jian-Zhong,GUO Long-Jiang,ZHANG Dong-Dong and WANG Wei-Ping
  • 2005,16(7):1252-1261 [Abstract(3329)]  [View PDF(5826)765.33 K]
  • Study on Distributed Sequential Pattern Discovery Algorithm
  • ZOU Xiang,ZHANG Wei,LIU Yang and CAI Qing-Sheng
  • 2005,16(7):1262-1269 [Abstract(3394)]  [View PDF(3347)693.70 K]
  • SEEKER: Keyword-Based Information Retrieval over Relational Databases
  • WEN Ji-Jun and WANG Shan
  • 2005,16(7):1270-1281 [Abstract(3205)]  [View PDF(3889)467.25 K]
  • Exceptional Slices Mining Based on Singular Value Decomposition
  • YU Hui,MA Xiu-Li,TAN Shao-Hua,TANG Shi-Wei and YANG Dong-Qing
  • 2005,16(7):1282-1288 [Abstract(2514)]  [View PDF(3141)298.12 K]
  • A Group of Threshold Group-Signature Schemes with Privilege Subsets
  • CHEN Wei-Dong and FENG Deng-Guo
  • 2005,16(7):1289-1295 [Abstract(2544)]  [View PDF(2649)642.07 K]
  • An Admission Control Algorithm with Minimum Contending Throughput Guarantee
  • FU Xiao-Rui and ZHANG Lian-Fang
  • 2005,16(7):1296-1304 [Abstract(2655)]  [View PDF(2697)764.64 K]
  • Characterization of Handoff in Mobile IP
  • ZHAO Qing-Lin,LI Zhong-Cheng,FENG Li and YANG Jian-Hua
  • 2005,16(7):1305-1313 [Abstract(2172)]  [View PDF(2855)779.38 K]
  • A Distributed Dynamic Micro-Mobility Management Scheme for Mobile IPv6
  • WANG Sheng-Ling,LIU Guo-Rong,SHEN Jun-Yi,HOU Yi-Bin and HUANG Jian-Hui
  • 2005,16(7):1314-1322 [Abstract(2640)]  [View PDF(3065)405.49 K]
  • A Robust Multi-Bits Image Watermarking Algorithm Based on HMM in Wavelet Domain
  • ZHANG Rong-Yue,NI Jiang-Qun and HUANG Ji-Wu
  • 2005,16(7):1323-1332 [Abstract(3092)]  [View PDF(3159)1.74 M]
  • A Fully Public Key Tracing and Revocation Scheme Provably Secure Against Adaptive Adversary
  • TAN Zuo-Wen,LIU Zhuo-Jun and XIAO Hong-Guang
  • 2005,16(7):1333-1343 [Abstract(3125)]  [View PDF(2914)876.23 K]
  • On the Security of Three Stream Ciphers
  • ZHANG Bin,WU Hong-Jun,FENG Deng-Guo and BAO Feng
  • 2005,16(7):1344-1351 [Abstract(2934)]  [View PDF(2807)755.12 K]
  • A New Network Improvement Algorithm in QoS Providing System
  • YANG Ting,SUN Yu-Geng,HU Hua-Dong and SUN Yong-Jin
  • 2005,16(7):1352-1358 [Abstract(2507)]  [View PDF(2860)686.37 K]