Volume 18,Issue 1,2007 Table of Contents

Other Issues:  
  
Contents

  • A Time Petri Net Extended with Price Information
  • LIU Xian-Ming,LI Shi-Xian,LI Wen-Jun and PAN Li
  • 2007,18(1):1-10 [Abstract(4030)]  [View PDF(3500)767.00 K]
  • Timing Constraint Petri Nets and Their Schedulability Analysis and Verification
  • SONG Wei,DOU Wan-Chun and LIU Xi-Ping
  • 2007,18(1):11-21 [Abstract(3496)]  [View PDF(3702)902.74 K]
  • Property Analysis of Synthesis of Petri Nets Shared PP-Type Subnets
  • XIA Chuan-Liang,JIAO Li and LU Wei-Ming
  • 2007,18(1):22-32 [Abstract(2955)]  [View PDF(3129)875.27 K]
  • Theory of α-Truth Degrees in n-Valued G?del Propositional Logic
  • LI Jun and WANG Guo-Jun
  • 2007,18(1):33-39 [Abstract(2793)]  [View PDF(2830)435.15 K]
  • On the Structure of Binary Feedforward Inverse Finite Automata with Delay 3
  • WANG Hong-Ji and YAO Gang
  • 2007,18(1):40-49 [Abstract(2806)]  [View PDF(2433)1.28 M]
  • Scenario-Driven Component Behavior Derivation
  • ZHANG Yan,HU Jun,YU Xiao-Feng,ZHANG Tian,LI Xuan-Dong and ZHENG Guo-Liang
  • 2007,18(1):50-61 [Abstract(4125)]  [View PDF(3330)770.53 K]
  • A Method for Testing Real-Time System Based on Timed Automata
  • CHEN Wei,XUE Yun-Zhi,ZHAO Chen and LI Ming-Shu
  • 2007,18(1):62-73 [Abstract(4546)]  [View PDF(4945)760.47 K]
  • An Approach of Data-Flow Analysis Based on Exception Propagation Analysis
  • JIANG Shu-Juan,XU Bao-Wen and SHI Liang
  • 2007,18(1):74-84 [Abstract(3054)]  [View PDF(3220)671.46 K]
  • A Method of Heuristic Web Services Composition Based on Goal Distance Estimate
  • WEN Jia-Jia,CHEN Jun-Liang and PENG Yong
  • 2007,18(1):85-93 [Abstract(3278)]  [View PDF(3491)529.68 K]
  • A Model-Based Approach to Detecting Feature Interactions
  • ZUO Ji-Hong,WANG Qian-Xiang and MEI Hong
  • 2007,18(1):94-104 [Abstract(2945)]  [View PDF(2989)653.07 K]
  • A Trace Label Based Consistency Maintenance Algorithm in Unstructured P2P Systems
  • XIE Kun,ZHANG Da-Fang,XIE Gao-Gang and WEN Ji-Gang
  • 2007,18(1):105-116 [Abstract(3201)]  [View PDF(2942)743.85 K]
  • Fast Packet Inspection Using State-Based Bloom Filter Engine
  • YE Ming-Jiang,CUI Yong,XU Ke and WU Jian-Ping
  • 2007,18(1):117-126 [Abstract(4354)]  [View PDF(3985)629.39 K]
  • Analysis for Multi-Coverage Problem in Wireless Sensor Networks
  • LIU Ming,CAO Jian-Nong,ZHENG Yuan,CHEN Li-Jun and XIE Li
  • 2007,18(1):127-136 [Abstract(3823)]  [View PDF(3186)788.35 K]
  • Risk Propagation Model for Assessing Network Information Systems
  • ZHANG Yong-Zheng,FANG Bin-Xing,CHI Yue and YUN Xiao-Chun
  • 2007,18(1):137-145 [Abstract(4458)]  [View PDF(4555)904.20 K]
  • A Greedy Algorithm for Capacity-Constrained Surrogate Placement in CDNs
  • CHEN Yi-Feng,HE Yan-Xiang and CAO Jian-Nong
  • 2007,18(1):146-156 [Abstract(8053)]  [View PDF(13741)728.16 K]
  • A Trust Model Based on Similarity-Weighted Recommendation for P2P Environments
  • LI Jing-Tao,JING Yi-Nan,XIAO Xiao-Chun,WANG Xue-Ping and ZHANG Gen-Du
  • 2007,18(1):157-167 [Abstract(5225)]  [View PDF(6484)647.89 K]
  • RSA Verifiable Signature Sharing Scheme Based on Secure Distributed Key Generations
  • Lü Ke-Wei
  • 2007,18(1):168-176 [Abstract(3246)]  [View PDF(2848)570.47 K]