| A | Paper# | Session | ISFST 2004 Accepted Paper Title | Authors | *Problem* |
| C | 004 | 2P1-T2 | A Novel Approach to Unit Testing: The Aspect-Oriented Way | Guoqing Xu; Zongyuan Yang | *SimSun* |
| C | 071 | 2A2-T3 | A Design of Intrusion Detection System Based on Mobile Agent | SU Fei; Wang Xiufen | |
| C | 088 | 2P2-T3 | Web Fuzzy Clustering and Its Applications in Web Usage Mining | MaoFu Liu | |
| C | 102 | 1P2-T2 | Zero-Time Software Development Pattern and the Methodology | Tan WenAn | |
| C | 119 | 2P1-T1 | A Multi-Fingerprints Based AntiSpam Peer-to-Peer Network | Wenqiang Wang | |
| C | 129 | 2P2-T2 | Using Ontologies for Distributed Workflow Management | Zhang zhao-hui | |
| C | 131 | 1P2-T2 | Web Services-Based Software Reuse and Composition | Rao Yuan | |
| C | 133 | 2P2-T3 | An Interval-value Clustering Approach to Data Mining | Yunfei Yin; Zhi Zhong; Hongbing Huang | |
| C | 154 | 2A2-T3 | A Reliable Multicast Transport Protocol in Mobile Ad Hoc Networks | Sun Baolin | |
| C | 159 | 2P1-T3 | An Improved Chaotic System and Application in Secure Communication | Yonghong chen | |
| C | 161 | 1P2-T1 | A New Efficient Identification Scheme based on the Strong Diffie-Hellman Assumption | Jun Shao; Rongxing Lu; Zhenfu Cao | |
| C | 168 | 2P2-T3 | Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System | Li Guohui | |
| C | 173 | 2P1-T1 | A Scheme of Tracing Anonymous Attack in the Controllable Network | Dai Jiangshan | *SimSun* |
| O | 176 | 1A1-T1 | OpenWeb: An All-Featured and Dynamically-Evolved Open Development Environment | Youliang Zhong | |
| O | 177 | 2P1-T3 | Sonar-based Visual Information Architecture for Handwriting Information Processing | Youliang Zhong | |
| C | 180 | 1P2-T1 | A Secure method of delivery message | HU Jin-chu | |
| J | 181 | 2A1-T3 | Formal Modeling for INformation Appliance Using MVC Architecture | Yuji Arichika | |
| C | 183 | 2A2-T3 | (=C178) Dynamic Range-Based Mobile Multicast | Sheng ling Wang | |
| C | 189 | 2A1-T2 | Agent Based Multiviews Requirements Model | Zhengping Liang | *SimSun+2* |
| C | 190 | 2P2-T2 | Goal Driven Measurement of Agility in Software Process | Shen Beijun | |
| C | 191 | 2P1-T3 | The Application of Multi-agent Cooperation Model in Multi-area Synchronous Cooperative Work Based on a Dynamic Group | Zhang Xiaobo | *SimSun* |
| C | 200 | 2A1-T3 | Verification of Workflow Model Based on Temporal Logic | LIU Feng | |
| C | 208 | 2A1-T1 | Orchestration of Web Service in E-government | Yuyi OU | |
| C | 212 | 2A2-T1 | An XML-based System to Improve Web Application Level Security | Teng Lv | |
| J | 215 | 2A2-T1 | Dynamic Semantic Checking for UML Models in the IIOSS System | Motoyuki Sano; Teruo Hikita | |
| C | 220 | 2P2-T1 | A Novel Network Transmission Architecture for Internet-Based Process Control Systems | Hong-Yan Li | |
| K | 221 | 2A1-T2 | Value-Based Requirements Analysis for Product Families: A Goal and Scenario Oriented Approach | Minseong Kim | |
| C | 229 | 2A1-T1 | (=C143) GIS Grid Services Load Balancing Based on Dynamic Resource Discovery | Li Wenjun | |
| C | 230 | 2P1-T2 | (=C091) Software Defect Measure | Rui Zhang | |
| C | 234 | 2P2-T1 | Using Web Services in TMN Environment | Lin Chen | |
| C | 235 | 1P2-T1 | Design of Digital Multisignature Schemes Based on Schnorr Algorithm | Hongwei CHU | |
| C | 240 | 2A2-T2 | (=223) Generic Programming in C++; Delphi and Java | Xu Wen-Sheng | |
| C | 243 | 2P2-T1 | (=242) A fast algorithm of Non-prefix Rule in Packet Classification | Fu Ge | |
| J | 249 | 2A2-T2 | Dependence-Based Representation for Concurrent Java Programs and Its Application to Slicing | Jianjun Zhao | |
| C | 260 | 2A1-T1 | Optimizing Grid Services on Byte Code Specification | Hongyan Mao | |
| O | 261 | 2P1-T3 | Implementing a CBR model on MAS to catch a scaping goal | AliReza Ansari | |
| C | 271 | 1P2-T1 | A Blind Digital Signature Scheme based on Elliptic Curve Cryptography | Zhan Xiong-Quan | |
| C | 292 | 2P1-T1 | Secure Authenticated Protocols Designing Using Automated Analysis Tool | CHEN Tie-ming | |
| J | 333 | 2A2-T1 | Generating Dependency Relationships among UML Model Elements for Impact Analysis of UML Documents | Masayuki Kotani; Koichiro Ochimizu | |
| J | 338 | 1P2-T2 | Soft System Bus as a Future Software Technology | Jingde Cheng | *locked PDF* |
| O | 346 | 2P1-T2 | Metamorphic Testing and Its Applications | Zhi Quan Zhou; D.H.Huang; T.H.Tse;Zongyuan Yang; Haitao Huang; T.Y.Chen | |
| K | 352 | 2A1-T2 | DREAM: Domain REquirement Asset Manager in Product Lines | Jihyeon Park; Mikyeong Moon; Keunhyuk Yeom | |
| J | 353 | 2A1-T3 | Multi-Aspect System Analysis Using State Machines Extracted from Specifications in VDM‐SL | Kengo Miyoshi | |
| J | 355 | 2P1-T1 | Dynamic Software Birthmarks to Detect the Theft of Windows Application | Haruaki Tamada; Keiji Okamoto; Masahide Nakamura; Akito Monden; Kenichi Matsumoto | |
| C | pc034 | 1A1-T3 | (Industry report) IT Talents Engineering At Shanghai | Dehua JU | |
| C | pc043-1 | 2P2-T2 | The Enterprise Application Integration Approach in Enterprise Process Monitoring and Controlling System | Wen Bilong | *FZSTK--GBK1-0; SimSun* |
| C | pc043-2 | 2A2-T2 | Research on Visual Language Specification and Visual Language Editor Automatic Generator | LuYang | *SimSun+2* |
| C | pc043-4 | 2P2-T2 | THE RESEARCH OF ENTERPRISE PROCESS ANALYSIS AND ITS SUPPORT ENVIRONMENT | SunYi | |
| J | 354 | 1A1-T1 | Proposal for Working Group Sessions | Kouichi Kishida | |
| J | 356 | 1A1-T2 | SPO Manifest (Topic Proposal) | Masao Ito | |
| J | 341 | 1A1-T3 | Computer Supported Knowledge Collaboration (a proposal for a discussin session) | Kouichi Kishida | |
| Legend of region: | |||||
| C | China | WS: | Working Group Session: the 1st Day morning at Track1,2,3 | ||
| J | Japan | ||||
| K | Korea | ||||
| O | Others | ||||
| UPdAted: | Tue Aug 24 16:16:16 JST 2004 | ||||