Volume 17,Issue 4,2006 Table of Contents
Unifying the Software Process SpectrumMingshu Li,Barry W. Boehm and Leon J. Osterweil2006,17(4):649-657 [Abstract(3915)] [View PDF(4232)489.78 K]A Role-Based Approach to Design Pattern Modeling and ImplementationHE Cheng-Wan and HE Ke-Qing2006,17(4):658-669 [Abstract(4539)] [View PDF(4791)742.63 K]Compositional Semantics and Refinement of StatechartsZHU Xue-Yang and TANG Zhi-Song2006,17(4):670-681 [Abstract(4665)] [View PDF(5256)855.52 K]A Trust Measurement and Evolution Model for InternetwareWANG Yuan,Lü Jian,XU Feng and ZHANG Lin2006,17(4):682-690 [Abstract(4864)] [View PDF(5123)408.72 K]An Interaction-Centered Hierarchical Post-WIMP User Interface ModelQIN Yan-Yan,TIAN Feng,WANG Xiao-Chun and DAI Guo-Zhong2006,17(4):691-702 [Abstract(5231)] [View PDF(5160)672.34 K]An Approach to Automated Software Design ImprovementFENG Tie,ZHANG Jia-Chen,WANG Hong-Yuan and JIN Chun-Zhao2006,17(4):703-712 [Abstract(4493)] [View PDF(4624)629.84 K]Subcoalgebras and Cocongruence CorelationsZHOU Xiao-Cong and SHU Zhong-Mei2006,17(4):713-719 [Abstract(4484)] [View PDF(4410)448.37 K]Efficient Translation from Transition-Based Generalized Büchi Automata to Büchi AutomataYI Jin and ZHANG Wen-Hui2006,17(4):720-728 [Abstract(4217)] [View PDF(4987)805.89 K]Dynamic Analysis of the Coupled Logistic MapWANG Xing-Yuan and LUO Chao2006,17(4):729-739 [Abstract(4538)] [View PDF(5087)871.89 K]Sliding Window Based Method for Processing Continuous J-A Queries on Data StreamsWANG Wei-Ping,LI Jian-Zhong,ZHANG Dong-Dong and GUO Long-Jiang2006,17(4):740-749 [Abstract(4187)] [View PDF(4872)661.72 K]Inference Control in Secure DatabaseYAN He-Ping,WANG Wei and SHI Bai-Le2006,17(4):750-758 [Abstract(4365)] [View PDF(4935)559.86 K]A Data Model for XML DatabaseHE Zhen-Ying,LI Jian-Zhong and WANG Chao-Kun2006,17(4):759-769 [Abstract(5270)] [View PDF(4876)996.13 K]并行数据库;XML文档;工作负载;数据分片;媒介节点WANG Guo-Ren,TANG Nan,YU Ya-Xin,SUN Bing and YU Ge2006,17(4):770-781 [Abstract(4307)] [View PDF(4527)841.69 K]Query Expansion and Its Search Algorithm in Hybrid Peer-to-Peer NetworksZHANG Qian,ZHANG Xia,LIU Ji-Ren,SUN Yu,WEN Xue-Zhi and LIU Zheng2006,17(4):782-793 [Abstract(4185)] [View PDF(4651)897.07 K]Spatio-Temporal Query Processing Method in Wireless Sensor NetworksGUO Long-Jiang,LI Jian-Zhong and LI Gui-Lin2006,17(4):794-805 [Abstract(4372)] [View PDF(5007)837.18 K]Online Aggregation on Data Cubes Without Auxiliary InformationLI Hong-Song and HUANG Hou-Kuan2006,17(4):806-813 [Abstract(3937)] [View PDF(4241)473.64 K]Timeslot Weighted Fair Scheduling in EPFTSLI Ji and ZENG Hua-Xin2006,17(4):822-829 [Abstract(3993)] [View PDF(4629)530.88 K]Study on Bottleneck Nodes in Wireless Sensor NetworksTIAN Le,XIE Dong-Liang,HAN Bing,ZHANG Lei and CHENG Shi-Duan2006,17(4):830-837 [Abstract(4867)] [View PDF(5335)496.10 K]Algorithm for the Network Flow Monitoring Set Based on Primal-Dual MethodLIU Xiang-Hui,YIN Jian-Ping,LU Xi-Cheng,CAI Zhi-Ping and ZHAO Jian-Min2006,17(4):838-844 [Abstract(4071)] [View PDF(4880)313.72 K]Incentive Compatible Adaptive Topologies for P2P NetworksTIAN Hui-Rong,ZOU Shi-Hong,WANG Wen-Dong and CHENG Shi-Duan2006,17(4):845-853 [Abstract(3957)] [View PDF(4980)684.53 K]A Path Capacity Analytical Model for Wireless NetworksLIU Yong-Qiang,YAN Wei and DAI Ya-Fei2006,17(4):854-859 [Abstract(4159)] [View PDF(4570)452.18 K]An Algorithm of Data Aggregation Based on Data Compression for Sensor NetworksXIE Zhi-Jun,WANG Lei,LIN Ya-Ping,CHEN Hong and LIU Yong-He2006,17(4):860-867 [Abstract(4690)] [View PDF(4719)478.28 K]Analysis and Improvement of a Security-Provable Mutually Authenticated Key Agreement ProtocolZHOU Yong-Bin,ZHANG Zhen-Feng and FENG Deng-Guo2006,17(4):868-875 [Abstract(4214)] [View PDF(4899)519.52 K]A Video-on-Demand Streaming Service Architecture in P2P EnvironmentLIU Ya-Jie and DOU Wen-Hua2006,17(4):876-884 [Abstract(4838)] [View PDF(5481)371.90 K]Quantitative Hierarchical Threat Evaluation Model for Network SecurityCHEN Xiu-Zhen,ZHENG Qing-Hua,GUAN Xiao-Hong and LIN Chen-Gu2006,17(4):885-897 [Abstract(9318)] [View PDF(9045)835.61 K]SPVT: An Efficient Verification Tool for Security ProtocolLI Meng-Jun,LI Zhou-Jun and CHEN Huo-Wang2006,17(4):898-906 [Abstract(4427)] [View PDF(4685)783.78 K]Pairwise Key Agreement Protocols Based on the Weil PairingYAO Gang and FENG Deng-Guo2006,17(4):907-714 [Abstract(4180)] [View PDF(4450)494.05 K]Large-Capacity Media Library Supporting Highly Simultaneous AccessCHEN Ming,YANG Guang-Wen and WANG Ding-Xing2006,17(4):915-924 [Abstract(4431)] [View PDF(4428)706.91 K]Study on Mobility Management Cost of Mobility Support ProtocolsZHAO A-Qun2006,17(4):925-931 [Abstract(3552)] [View PDF(3997)427.97 K]Finding the Minimum MPR Set in OLSR Protocol with Genetic AlgorithmsZHANG Xin-Ming,ZENG Yi-Ling,GAN Guo-Zheng and CHEN Guo-Liang2006,17(4):932-938 [Abstract(4647)] [View PDF(4776)402.89 K]P2P Authenticity Query and Replica Management Algorithm Based on TrustLI Zhi-Jun and LIAO Ming-Hong2006,17(4):939-948 [Abstract(3779)] [View PDF(4504)676.36 K]国家杰出青年科学基金促进青年科学家成长徐琳,刘克,刘志勇2006,17(4):949-950 [Abstract(4996)] [View PDF(4645)122.48 K]
Study of Minimum Interference Routing Algorithm for MPLS Traffic EngineeringZHENG Zhi-Mei and CUI Yong2006,17(4):814-821 [Abstract(6923)] [View PDF(6427)325.08 K]