Volume 17,Issue 1,2006 Table of Contents

Other Issues:  
  
Contents

  • Reachability Checking of Finite Precision Timed Automata
  • Yan RJ,Li GY,Xu YB,Liu CM and Tang ZS
  • 2006,17(1):1-10 [Abstract(3415)]  [View PDF(2951)708.55 K]
  • Petri Net Refinement and Its Application in System Design
  • XIA Chuan-Liang,JIAO Li and LU Wei-Ming
  • 2006,17(1):11-19 [Abstract(3102)]  [View PDF(2854)724.64 K]
  • Fuzzy ER Modeling with Description Logics
  • JIANG Yun-Cheng,TANG Yong and WANG Ju
  • 2006,17(1):20-30 [Abstract(3426)]  [View PDF(3454)817.31 K]
  • A Task-Type Aware Transaction Scheduling Algorithm in J2EE
  • DING Xiao-Ning,ZHANG Xin,JIN Bei-Hong and HUANG Tao
  • 2006,17(1):31-38 [Abstract(2860)]  [View PDF(2770)518.91 K]
  • Feature-Based Component Model and Normalized Design Process
  • WANG Zhong-Jie,XU Xiao-Fei and ZHAN De-Chen
  • 2006,17(1):39-47 [Abstract(3037)]  [View PDF(3249)593.07 K]
  • Scenario-Based Consistency Verification of Component-Based Real-Time System Designs
  • HU Jun,YU Xiao-Feng,ZHANG Yan,LI Xuan-Dong and ZHENG Guo-Liang
  • 2006,17(1):48-58 [Abstract(2994)]  [View PDF(2918)729.39 K]
  • Directed Hypergraph Based and Resource Constrained Enterprise Process Structure Optimization
  • SUN Xue-Dong,XU Xiao-Fei and WANG Gang
  • 2006,17(1):59-68 [Abstract(3067)]  [View PDF(3052)419.65 K]
  • A Domain Model of Pen-Based User Interface Software and Its Usage
  • QIN Yan-Yan,TIAN Feng,WANG Xiao-Chun and DAI Guo-Zhong
  • 2006,17(1):69-78 [Abstract(2936)]  [View PDF(3135)570.35 K]
  • A Fast Multicast Handoff Based Hierarchical Mobile Multicast Architecture
  • WU Qian,WU Jian-Ping,XU Ming-Wei and CUI Yong
  • 2006,17(1):86-95 [Abstract(2981)]  [View PDF(2943)651.91 K]
  • Construction of Peer-to-Peer Multiple-Grain Trust Model
  • ZHANG Qian,ZHANG Xia,WEN Xue-Zhi,LIU Ji-Ren and Ting Shan
  • 2006,17(1):96-107 [Abstract(3156)]  [View PDF(3700)807.79 K]
  • An End-to-End Available Bandwidth Estimation Methodology
  • LIU Min,LI Zhong-Cheng,GUO Xiao-Bing and DENG Hui
  • 2006,17(1):108-116 [Abstract(3154)]  [View PDF(3992)618.13 K]
  • Distributed Monitoring Model with Bounded Delay for Evolving Networks
  • CAI Zhi-Ping,YIN Jian-Ping,LIU Fang and LIU Xiang-Hui
  • 2006,17(1):117-123 [Abstract(3445)]  [View PDF(2877)465.85 K]
  • Research on Automated Trust Negotiation
  • LI Jian-Xin,HUAI Jin-Peng and LI Xian-Xian
  • 2006,17(1):124-133 [Abstract(3612)]  [View PDF(3554)472.98 K]
  • Underlying Techniques for Large-Scale Distributed Computing Oriented Publish/Subscribe System
  • MA Jian-Gang,HUANG Tao,WANG Jin-Ling,XU Gang and YE Dan
  • 2006,17(1):134-147 [Abstract(3394)]  [View PDF(7465)664.65 K]
  • Analysis of Security Protocols Based on Authentication Test
  • YANG Ming and LUO Jun-Zhou
  • 2006,17(1):148-156 [Abstract(3186)]  [View PDF(3208)560.99 K]
  • Ownership Proofs of Digital Works Based on Secure Multiparty Computation
  • ZHU Yan,YANG Yong-Tian,SUN Zhong-Wei and FENG Deng-Guo
  • 2006,17(1):157-166 [Abstract(3108)]  [View PDF(2613)590.63 K]
  • Precomputation for Multi-Constrained QoS Routing in GMPLS Networks
  • HUA Yu,WU Chan-Le and WANG Yong
  • 2006,17(1):167-174 [Abstract(2792)]  [View PDF(2569)593.27 K]