Volume 18,Issue 1,2007 Table of Contents
A Time Petri Net Extended with Price InformationLIU Xian-Ming,LI Shi-Xian,LI Wen-Jun and PAN Li2007,18(1):1-10 [Abstract(5332)] [View PDF(5193)767.00 K]Timing Constraint Petri Nets and Their Schedulability Analysis and VerificationSONG Wei,DOU Wan-Chun and LIU Xi-Ping2007,18(1):11-21 [Abstract(4693)] [View PDF(5753)902.74 K]Property Analysis of Synthesis of Petri Nets Shared PP-Type SubnetsXIA Chuan-Liang,JIAO Li and LU Wei-Ming2007,18(1):22-32 [Abstract(4114)] [View PDF(4945)875.27 K]Theory of α-Truth Degrees in n-Valued G?del Propositional LogicLI Jun and WANG Guo-Jun2007,18(1):33-39 [Abstract(3878)] [View PDF(4662)435.15 K]On the Structure of Binary Feedforward Inverse Finite Automata with Delay 3WANG Hong-Ji and YAO Gang2007,18(1):40-49 [Abstract(3921)] [View PDF(4042)1.28 M]Scenario-Driven Component Behavior DerivationZHANG Yan,HU Jun,YU Xiao-Feng,ZHANG Tian,LI Xuan-Dong and ZHENG Guo-Liang2007,18(1):50-61 [Abstract(5623)] [View PDF(5158)770.53 K]A Method for Testing Real-Time System Based on Timed AutomataCHEN Wei,XUE Yun-Zhi,ZHAO Chen and LI Ming-Shu2007,18(1):62-73 [Abstract(6086)] [View PDF(6757)760.47 K]An Approach of Data-Flow Analysis Based on Exception Propagation AnalysisJIANG Shu-Juan,XU Bao-Wen and SHI Liang2007,18(1):74-84 [Abstract(4217)] [View PDF(4857)671.46 K]A Method of Heuristic Web Services Composition Based on Goal Distance EstimateWEN Jia-Jia,CHEN Jun-Liang and PENG Yong2007,18(1):85-93 [Abstract(4569)] [View PDF(5405)529.68 K]A Model-Based Approach to Detecting Feature InteractionsZUO Ji-Hong,WANG Qian-Xiang and MEI Hong2007,18(1):94-104 [Abstract(4063)] [View PDF(4512)653.07 K]A Trace Label Based Consistency Maintenance Algorithm in Unstructured P2P SystemsXIE Kun,ZHANG Da-Fang,XIE Gao-Gang and WEN Ji-Gang2007,18(1):105-116 [Abstract(4459)] [View PDF(4488)743.85 K]Fast Packet Inspection Using State-Based Bloom Filter EngineYE Ming-Jiang,CUI Yong,XU Ke and WU Jian-Ping2007,18(1):117-126 [Abstract(5442)] [View PDF(5678)629.39 K]Analysis for Multi-Coverage Problem in Wireless Sensor NetworksLIU Ming,CAO Jian-Nong,ZHENG Yuan,CHEN Li-Jun and XIE Li2007,18(1):127-136 [Abstract(4986)] [View PDF(4953)788.35 K]Risk Propagation Model for Assessing Network Information SystemsZHANG Yong-Zheng,FANG Bin-Xing,CHI Yue and YUN Xiao-Chun2007,18(1):137-145 [Abstract(5719)] [View PDF(6546)904.20 K]A Greedy Algorithm for Capacity-Constrained Surrogate Placement in CDNsCHEN Yi-Feng,HE Yan-Xiang and CAO Jian-Nong2007,18(1):146-156 [Abstract(9634)] [View PDF(16381)728.16 K]A Trust Model Based on Similarity-Weighted Recommendation for P2P EnvironmentsLI Jing-Tao,JING Yi-Nan,XIAO Xiao-Chun,WANG Xue-Ping and ZHANG Gen-Du2007,18(1):157-167 [Abstract(7135)] [View PDF(8682)647.89 K]RSA Verifiable Signature Sharing Scheme Based on Secure Distributed Key GenerationsLü Ke-Wei2007,18(1):168-176 [Abstract(4574)] [View PDF(4524)570.47 K]