Volume 18,Issue 1,2007 Table of Contents

Other Issues:  
  
Contents

  • A Time Petri Net Extended with Price Information
  • LIU Xian-Ming,LI Shi-Xian,LI Wen-Jun and PAN Li
  • 2007,18(1):1-10 [Abstract(3802)]  [View PDF(3405)767.00 K]
  • Timing Constraint Petri Nets and Their Schedulability Analysis and Verification
  • SONG Wei,DOU Wan-Chun and LIU Xi-Ping
  • 2007,18(1):11-21 [Abstract(3336)]  [View PDF(3617)902.74 K]
  • Property Analysis of Synthesis of Petri Nets Shared PP-Type Subnets
  • XIA Chuan-Liang,JIAO Li and LU Wei-Ming
  • 2007,18(1):22-32 [Abstract(2799)]  [View PDF(3056)875.27 K]
  • Theory of α-Truth Degrees in n-Valued G?del Propositional Logic
  • LI Jun and WANG Guo-Jun
  • 2007,18(1):33-39 [Abstract(2639)]  [View PDF(2752)435.15 K]
  • On the Structure of Binary Feedforward Inverse Finite Automata with Delay 3
  • WANG Hong-Ji and YAO Gang
  • 2007,18(1):40-49 [Abstract(2662)]  [View PDF(2347)1.28 M]
  • Scenario-Driven Component Behavior Derivation
  • ZHANG Yan,HU Jun,YU Xiao-Feng,ZHANG Tian,LI Xuan-Dong and ZHENG Guo-Liang
  • 2007,18(1):50-61 [Abstract(3893)]  [View PDF(3244)770.53 K]
  • A Method for Testing Real-Time System Based on Timed Automata
  • CHEN Wei,XUE Yun-Zhi,ZHAO Chen and LI Ming-Shu
  • 2007,18(1):62-73 [Abstract(4357)]  [View PDF(4867)760.47 K]
  • An Approach of Data-Flow Analysis Based on Exception Propagation Analysis
  • JIANG Shu-Juan,XU Bao-Wen and SHI Liang
  • 2007,18(1):74-84 [Abstract(2898)]  [View PDF(3145)671.46 K]
  • A Method of Heuristic Web Services Composition Based on Goal Distance Estimate
  • WEN Jia-Jia,CHEN Jun-Liang and PENG Yong
  • 2007,18(1):85-93 [Abstract(3103)]  [View PDF(3361)529.68 K]
  • A Model-Based Approach to Detecting Feature Interactions
  • ZUO Ji-Hong,WANG Qian-Xiang and MEI Hong
  • 2007,18(1):94-104 [Abstract(2803)]  [View PDF(2913)653.07 K]
  • A Trace Label Based Consistency Maintenance Algorithm in Unstructured P2P Systems
  • XIE Kun,ZHANG Da-Fang,XIE Gao-Gang and WEN Ji-Gang
  • 2007,18(1):105-116 [Abstract(3022)]  [View PDF(2859)743.85 K]
  • Fast Packet Inspection Using State-Based Bloom Filter Engine
  • YE Ming-Jiang,CUI Yong,XU Ke and WU Jian-Ping
  • 2007,18(1):117-126 [Abstract(4115)]  [View PDF(3914)629.39 K]
  • Analysis for Multi-Coverage Problem in Wireless Sensor Networks
  • LIU Ming,CAO Jian-Nong,ZHENG Yuan,CHEN Li-Jun and XIE Li
  • 2007,18(1):127-136 [Abstract(3669)]  [View PDF(3105)788.35 K]
  • Risk Propagation Model for Assessing Network Information Systems
  • ZHANG Yong-Zheng,FANG Bin-Xing,CHI Yue and YUN Xiao-Chun
  • 2007,18(1):137-145 [Abstract(4150)]  [View PDF(4464)904.20 K]
  • A Greedy Algorithm for Capacity-Constrained Surrogate Placement in CDNs
  • CHEN Yi-Feng,HE Yan-Xiang and CAO Jian-Nong
  • 2007,18(1):146-156 [Abstract(7739)]  [View PDF(13649)728.16 K]
  • A Trust Model Based on Similarity-Weighted Recommendation for P2P Environments
  • LI Jing-Tao,JING Yi-Nan,XIAO Xiao-Chun,WANG Xue-Ping and ZHANG Gen-Du
  • 2007,18(1):157-167 [Abstract(4962)]  [View PDF(6393)647.89 K]
  • RSA Verifiable Signature Sharing Scheme Based on Secure Distributed Key Generations
  • Lü Ke-Wei
  • 2007,18(1):168-176 [Abstract(3097)]  [View PDF(2785)570.47 K]