Volume 18,Issue 7,2007 Table of Contents

Other Issues:  
  
Contents

  • A Reduction Technique of Petri Nets Based on Logic Circuit
  • YE Jian-Hong,SONG Wen and SUN Shi-Xin
  • 2007,18(7):1553-1562 [Abstract(3205)]  [View PDF(3493)734.05 K]
  • Reasoning Within Extended Fuzzy Description Logic Supporting Terminological Axiom Restrictions
  • KANG Da-Zhou,XU Bao-Wen,LU Jian-Jiang and LI Yan-Hui
  • 2007,18(7):1563-1572 [Abstract(3362)]  [View PDF(2753)479.43 K]
  • The Complexity of Dual Models Problem of Propositional Linear Temporal Logics
  • WU Zhi-Lin and ZHANG Wen-Hui
  • 2007,18(7):1573-1581 [Abstract(3078)]  [View PDF(2583)598.30 K]
  • Feature Model Driven Web Services Composition Approach and Its Support Tool
  • XING Yan,GU Fang and MEI Hong
  • 2007,18(7):1582-1591 [Abstract(2955)]  [View PDF(2916)564.42 K]
  • Sequential Patterns-Based Cache Replacement in Servlet Container
  • LI Yang,ZHANG Wen-Bo,WEI Jun,ZHONG Hua and HUANG Tao
  • 2007,18(7):1592-1602 [Abstract(3458)]  [View PDF(3287)699.64 K]
  • EfLA Algorithm Based on Dynamic Feedback
  • TANG Feng,WU Cheng-Gang,FENG Xiao-Bing and ZHANG Zhao-Qing
  • 2007,18(7):1603-1611 [Abstract(3241)]  [View PDF(2791)562.14 K]
  • MDA-Based Model Management Method and Its Application for TRISO-Model
  • YUAN Feng and LI Ming-Shu
  • 2007,18(7):1612-1625 [Abstract(3528)]  [View PDF(3330)758.25 K]
  • Manufacturing Supply Chain Planning Based on Extended State Task Network
  • SU Sheng,ZHAN De-Chen and XU Xiao-Fei
  • 2007,18(7):1626-1638 [Abstract(2565)]  [View PDF(3191)971.52 K]
  • Evaluation and Improvement of Vertical Handoff Algorithms in Heterogeneous Wireless Networks
  • LIU Min,LI Zhong-Cheng,GUO Xiao-Bing and ZHANG De-Kui
  • 2007,18(7):1652-1659 [Abstract(3383)]  [View PDF(4375)535.17 K]
  • Online Model Estimating-Based Performance Guarantee Mechanism for Dynamic Web Site
  • ZHANG Yong,HUANG Tao,CHEN Ning-Jiang and JIN Bei-Hong
  • 2007,18(7):1660-1671 [Abstract(3182)]  [View PDF(3255)787.71 K]
  • A Location-Independent Connected Coverage Protocol for Wireless Sensor Networks
  • MAO Ying-Chi,FENG Guo-Fu,CHEN Li-Jun and CHEN Dao-Xu
  • 2007,18(7):1672-1684 [Abstract(3875)]  [View PDF(3510)862.84 K]
  • A Collaborative Filtering Recommendation Algorithm Based on Influence Sets
  • CHEN Jian and YIN Jian
  • 2007,18(7):1685-1694 [Abstract(3600)]  [View PDF(4237)669.61 K]
  • TCP Proxy for Satellite Network
  • ZENG Bin,LI Zhi-Tang and XU Fan-Jiang
  • 2007,18(7):1695-1704 [Abstract(3169)]  [View PDF(3580)671.08 K]
  • A Semantic Data Coordination Based Approach for Application Integration in Portals
  • SONG Jing-Yu,WEI Jun and WAN Shu-Chao
  • 2007,18(7):1705-1714 [Abstract(2726)]  [View PDF(2955)529.10 K]
  • Capture and Storage of Digital Evidence Based on Security Operating System
  • DING Li-Ping,ZHOU Bo-Wen and WANG Yong-Ji
  • 2007,18(7):1715-1729 [Abstract(3487)]  [View PDF(3647)762.96 K]
  • A Prestige Reporting Mechanism Based on Gray System Theory
  • XU Lan-Fang,HU Huai-Fei,SANG Zi-Xia,XU Feng-Ming and ZOU De-Qing
  • 2007,18(7):1730-1737 [Abstract(3379)]  [View PDF(3035)538.32 K]
  • Applying Dixon Resultants in Cryptography
  • TANG Xi-Jin and FENG Yong
  • 2007,18(7):1738-1745 [Abstract(3202)]  [View PDF(2962)673.01 K]
  • An Improved Formal Model of Cryptographic Protocol
  • ZHANG Chang,WANG Ya-Di,HAN Ji-Hong and GUO Yuan-Bo
  • 2007,18(7):1746-1755 [Abstract(2956)]  [View PDF(3282)824.71 K]
  • A Parallelizable Message Authentication Code
  • WANG Da-Yin,LIN Dong-Dai and WU Wen-Ling
  • 2007,18(7):1756-1764 [Abstract(3779)]  [View PDF(2823)505.24 K]
  • Coverage-Ensured Reliable Links with Accurate Timing in Mobile Ad Hoc Network
  • ZHANG Zhi-Guo,LIU Cong and ZHANG Peng
  • 2007,18(7):1765-1773 [Abstract(2489)]  [View PDF(2864)536.53 K]
  • Construction of Elliptic Curves over Finite Fields with a Point of Given Order
  • WANG Kun-Peng and LI Bao
  • 2007,18(7):1774-1777 [Abstract(3353)]  [View PDF(3278)250.29 K]
  • Debt Relationship Based Fair File Exchange in Distributed Hash Table Network
  • YU Kun,WU Guo-Xin,XU Li-Bo and CHEN Gang
  • 2007,18(7):1778-1785 [Abstract(3256)]  [View PDF(3016)505.20 K]
  • A Cluster-Based QoS Multipath Routing Protocol for Large-Scale MANET
  • LU Xi-Cheng,AN Hui-Yao,PENG Yu-Xing and PENG Wei
  • 2007,18(7):1786-1798 [Abstract(3025)]  [View PDF(3117)887.59 K]
  • Compression of Tate Pairings on Elliptic Curves
  • HU Lei
  • 2007,18(7):1799-1805 [Abstract(3356)]  [View PDF(2930)466.54 K]
  • Hardware/Software Interface Design of Godson-2 Simultaneous Multithreading Processor
  • LI Zu-Song,XU Xian-Chao,HU Wei-Wu and TANG Zhi-Min
  • 2007,18(7):1806-1817 [Abstract(3153)]  [View PDF(2926)591.80 K]
  • An NPV-Based Optimal Fault-Tolerant Routing Algorithm for Generalized Hypercube
  • TIAN Shao-Huai,LU Ying-Ping and ZHANG Da-Fang
  • 2007,18(7):1818-1830 [Abstract(3049)]  [View PDF(2558)1.35 M]
  • Stream Task Scheduling Method for Deadline-Sensitive Applications
  • YU Ge,LI Xiao-Jing,YANG Xiao-Chun,OU Zheng-Yu and DENG Qing-Xu
  • 2007,18(7):1831-1843 [Abstract(3016)]  [View PDF(2803)527.59 K]
  • A Static Priority Assignment Algorithm with the Least Number of Priority Levels
  • XING Jian-Sheng,WANG Yong-Ji,LIU Jun-Xiang,ZENG Hai-Tao and NASRO Min-Allah
  • 2007,18(7):1844-1854 [Abstract(2826)]  [View PDF(3060)734.26 K]
  • Review Articles

  • Lightweight Intrusion Detection System Based on Feature Selection
  • CHEN You,CHENG Xue-Qi,LI Yang and DAI Lei
  • 2007,18(7):1639-1651 [Abstract(5633)]  [View PDF(5562)845.09 K]