Volume 17,Issue 4,2006 Table of Contents

Other Issues:  
  
Contents

  • Unifying the Software Process Spectrum
  • Mingshu Li,Barry W. Boehm and Leon J. Osterweil
  • 2006,17(4):649-657 [Abstract(2867)]  [View PDF(2571)489.78 K]
  • A Role-Based Approach to Design Pattern Modeling and Implementation
  • HE Cheng-Wan and HE Ke-Qing
  • 2006,17(4):658-669 [Abstract(3407)]  [View PDF(3214)742.63 K]
  • Compositional Semantics and Refinement of Statecharts
  • ZHU Xue-Yang and TANG Zhi-Song
  • 2006,17(4):670-681 [Abstract(3285)]  [View PDF(3029)855.52 K]
  • A Trust Measurement and Evolution Model for Internetware
  • WANG Yuan,Lü Jian,XU Feng and ZHANG Lin
  • 2006,17(4):682-690 [Abstract(3613)]  [View PDF(3408)408.72 K]
  • An Interaction-Centered Hierarchical Post-WIMP User Interface Model
  • QIN Yan-Yan,TIAN Feng,WANG Xiao-Chun and DAI Guo-Zhong
  • 2006,17(4):691-702 [Abstract(4120)]  [View PDF(3121)672.34 K]
  • An Approach to Automated Software Design Improvement
  • FENG Tie,ZHANG Jia-Chen,WANG Hong-Yuan and JIN Chun-Zhao
  • 2006,17(4):703-712 [Abstract(3262)]  [View PDF(2788)629.84 K]
  • Subcoalgebras and Cocongruence Corelations
  • ZHOU Xiao-Cong and SHU Zhong-Mei
  • 2006,17(4):713-719 [Abstract(3350)]  [View PDF(2778)448.37 K]
  • Efficient Translation from Transition-Based Generalized Büchi Automata to Büchi Automata
  • YI Jin and ZHANG Wen-Hui
  • 2006,17(4):720-728 [Abstract(3026)]  [View PDF(3207)805.89 K]
  • Dynamic Analysis of the Coupled Logistic Map
  • WANG Xing-Yuan and LUO Chao
  • 2006,17(4):729-739 [Abstract(3339)]  [View PDF(3483)871.89 K]
  • Sliding Window Based Method for Processing Continuous J-A Queries on Data Streams
  • WANG Wei-Ping,LI Jian-Zhong,ZHANG Dong-Dong and GUO Long-Jiang
  • 2006,17(4):740-749 [Abstract(2995)]  [View PDF(3051)661.72 K]
  • Inference Control in Secure Database
  • YAN He-Ping,WANG Wei and SHI Bai-Le
  • 2006,17(4):750-758 [Abstract(3225)]  [View PDF(3032)559.86 K]
  • A Data Model for XML Database
  • HE Zhen-Ying,LI Jian-Zhong and WANG Chao-Kun
  • 2006,17(4):759-769 [Abstract(3812)]  [View PDF(2763)996.13 K]
  • 并行数据库;XML文档;工作负载;数据分片;媒介节点
  • WANG Guo-Ren,TANG Nan,YU Ya-Xin,SUN Bing and YU Ge
  • 2006,17(4):770-781 [Abstract(3201)]  [View PDF(2861)841.69 K]
  • Query Expansion and Its Search Algorithm in Hybrid Peer-to-Peer Networks
  • ZHANG Qian,ZHANG Xia,LIU Ji-Ren,SUN Yu,WEN Xue-Zhi and LIU Zheng
  • 2006,17(4):782-793 [Abstract(3035)]  [View PDF(3023)897.07 K]
  • Spatio-Temporal Query Processing Method in Wireless Sensor Networks
  • GUO Long-Jiang,LI Jian-Zhong and LI Gui-Lin
  • 2006,17(4):794-805 [Abstract(3305)]  [View PDF(3139)837.18 K]
  • Online Aggregation on Data Cubes Without Auxiliary Information
  • LI Hong-Song and HUANG Hou-Kuan
  • 2006,17(4):806-813 [Abstract(2941)]  [View PDF(2687)473.64 K]
  • Timeslot Weighted Fair Scheduling in EPFTS
  • LI Ji and ZENG Hua-Xin
  • 2006,17(4):822-829 [Abstract(2938)]  [View PDF(2872)530.88 K]
  • Study on Bottleneck Nodes in Wireless Sensor Networks
  • TIAN Le,XIE Dong-Liang,HAN Bing,ZHANG Lei and CHENG Shi-Duan
  • 2006,17(4):830-837 [Abstract(3672)]  [View PDF(3437)496.10 K]
  • Algorithm for the Network Flow Monitoring Set Based on Primal-Dual Method
  • LIU Xiang-Hui,YIN Jian-Ping,LU Xi-Cheng,CAI Zhi-Ping and ZHAO Jian-Min
  • 2006,17(4):838-844 [Abstract(2801)]  [View PDF(3141)313.72 K]
  • Incentive Compatible Adaptive Topologies for P2P Networks
  • TIAN Hui-Rong,ZOU Shi-Hong,WANG Wen-Dong and CHENG Shi-Duan
  • 2006,17(4):845-853 [Abstract(2887)]  [View PDF(3251)684.53 K]
  • A Path Capacity Analytical Model for Wireless Networks
  • LIU Yong-Qiang,YAN Wei and DAI Ya-Fei
  • 2006,17(4):854-859 [Abstract(3070)]  [View PDF(2845)452.18 K]
  • An Algorithm of Data Aggregation Based on Data Compression for Sensor Networks
  • XIE Zhi-Jun,WANG Lei,LIN Ya-Ping,CHEN Hong and LIU Yong-He
  • 2006,17(4):860-867 [Abstract(3523)]  [View PDF(3060)478.28 K]
  • Analysis and Improvement of a Security-Provable Mutually Authenticated Key Agreement Protocol
  • ZHOU Yong-Bin,ZHANG Zhen-Feng and FENG Deng-Guo
  • 2006,17(4):868-875 [Abstract(3021)]  [View PDF(2991)519.52 K]
  • A Video-on-Demand Streaming Service Architecture in P2P Environment
  • LIU Ya-Jie and DOU Wen-Hua
  • 2006,17(4):876-884 [Abstract(3586)]  [View PDF(3551)371.90 K]
  • Quantitative Hierarchical Threat Evaluation Model for Network Security
  • CHEN Xiu-Zhen,ZHENG Qing-Hua,GUAN Xiao-Hong and LIN Chen-Gu
  • 2006,17(4):885-897 [Abstract(6844)]  [View PDF(5956)835.61 K]
  • SPVT: An Efficient Verification Tool for Security Protocol
  • LI Meng-Jun,LI Zhou-Jun and CHEN Huo-Wang
  • 2006,17(4):898-906 [Abstract(3146)]  [View PDF(2844)783.78 K]
  • Pairwise Key Agreement Protocols Based on the Weil Pairing
  • YAO Gang and FENG Deng-Guo
  • 2006,17(4):907-714 [Abstract(3099)]  [View PDF(2914)494.05 K]
  • Large-Capacity Media Library Supporting Highly Simultaneous Access
  • CHEN Ming,YANG Guang-Wen and WANG Ding-Xing
  • 2006,17(4):915-924 [Abstract(3282)]  [View PDF(2901)706.91 K]
  • Study on Mobility Management Cost of Mobility Support Protocols
  • ZHAO A-Qun
  • 2006,17(4):925-931 [Abstract(2627)]  [View PDF(2466)427.97 K]
  • Finding the Minimum MPR Set in OLSR Protocol with Genetic Algorithms
  • ZHANG Xin-Ming,ZENG Yi-Ling,GAN Guo-Zheng and CHEN Guo-Liang
  • 2006,17(4):932-938 [Abstract(3526)]  [View PDF(3073)402.89 K]
  • P2P Authenticity Query and Replica Management Algorithm Based on Trust
  • LI Zhi-Jun and LIAO Ming-Hong
  • 2006,17(4):939-948 [Abstract(2764)]  [View PDF(2827)676.36 K]
  • 国家杰出青年科学基金促进青年科学家成长
  • 徐琳,刘克,刘志勇
  • 2006,17(4):949-950 [Abstract(3681)]  [View PDF(2871)122.48 K]
  • Review Articles

  • Study of Minimum Interference Routing Algorithm for MPLS Traffic Engineering
  • ZHENG Zhi-Mei and CUI Yong
  • 2006,17(4):814-821 [Abstract(5252)]  [View PDF(3941)325.08 K]