A |
Paper# |
Session |
ISFST 2004 Accepted Paper
Title |
Authors |
*Problem* |
C |
004 |
2P1-T2 |
A Novel
Approach to Unit Testing: The Aspect-Oriented Way |
Guoqing Xu; Zongyuan Yang |
*SimSun* |
C |
071 |
2A2-T3 |
A Design of
Intrusion Detection System Based on Mobile Agent |
SU Fei; Wang Xiufen |
|
C |
088 |
2P2-T3 |
Web Fuzzy
Clustering and Its Applications in Web Usage Mining |
MaoFu Liu |
|
C |
102 |
1P2-T2 |
Zero-Time
Software Development Pattern and the Methodology |
Tan WenAn |
|
C |
119 |
2P1-T1 |
A
Multi-Fingerprints Based AntiSpam Peer-to-Peer Network |
Wenqiang Wang |
|
C |
129 |
2P2-T2 |
Using
Ontologies for Distributed Workflow Management |
Zhang zhao-hui |
|
C |
131 |
1P2-T2 |
Web
Services-Based Software Reuse and Composition |
Rao Yuan |
|
C |
133 |
2P2-T3 |
An
Interval-value Clustering Approach to Data Mining |
Yunfei Yin; Zhi Zhong; Hongbing Huang |
|
C |
154 |
2A2-T3 |
A Reliable
Multicast Transport Protocol in Mobile Ad Hoc Networks |
Sun Baolin |
|
C |
159 |
2P1-T3 |
An Improved
Chaotic System and Application in Secure Communication |
Yonghong chen |
|
C |
161 |
1P2-T1 |
A New
Efficient Identification Scheme based on the Strong Diffie-Hellman Assumption |
Jun Shao; Rongxing Lu; Zhenfu Cao |
|
C |
168 |
2P2-T3 |
Location
Database Clustering to Achieve Location Management Time Cost Reduction in A
Mobile Computing System |
Li Guohui |
|
C |
173 |
2P1-T1 |
A Scheme of
Tracing Anonymous Attack in the Controllable Network |
Dai Jiangshan |
*SimSun* |
O |
176 |
1A1-T1 |
OpenWeb: An
All-Featured and Dynamically-Evolved Open Development Environment |
Youliang Zhong |
|
O |
177 |
2P1-T3 |
Sonar-based
Visual Information Architecture for Handwriting Information Processing |
Youliang Zhong |
|
C |
180 |
1P2-T1 |
A Secure
method of delivery message |
HU Jin-chu |
|
J |
181 |
2A1-T3 |
Formal
Modeling for INformation Appliance Using MVC Architecture |
Yuji Arichika |
|
C |
183 |
2A2-T3 |
(=C178)
Dynamic Range-Based Mobile Multicast |
Sheng ling Wang |
|
C |
189 |
2A1-T2 |
Agent Based
Multiviews Requirements Model |
Zhengping Liang |
*SimSun+2* |
C |
190 |
2P2-T2 |
Goal Driven
Measurement of Agility in Software Process |
Shen Beijun |
|
C |
191 |
2P1-T3 |
The
Application of Multi-agent Cooperation Model in Multi-area Synchronous
Cooperative Work Based on a Dynamic Group |
Zhang Xiaobo |
*SimSun* |
C |
200 |
2A1-T3 |
Verification
of Workflow Model Based on Temporal Logic |
LIU Feng |
|
C |
208 |
2A1-T1 |
Orchestration
of Web Service in E-government |
Yuyi OU |
|
C |
212 |
2A2-T1 |
An XML-based
System to Improve Web Application Level Security |
Teng Lv |
|
J |
215 |
2A2-T1 |
Dynamic
Semantic Checking for UML Models in the IIOSS System |
Motoyuki Sano; Teruo Hikita |
|
C |
220 |
2P2-T1 |
A Novel
Network Transmission Architecture for Internet-Based Process Control Systems |
Hong-Yan Li |
|
K |
221 |
2A1-T2 |
Value-Based
Requirements Analysis for Product Families: A Goal and Scenario Oriented
Approach |
Minseong Kim |
|
C |
229 |
2A1-T1 |
(=C143) GIS
Grid Services Load Balancing Based on Dynamic Resource Discovery |
Li Wenjun |
|
C |
230 |
2P1-T2 |
(=C091)
Software Defect Measure |
Rui Zhang |
|
C |
234 |
2P2-T1 |
Using Web
Services in TMN Environment |
Lin Chen |
|
C |
235 |
1P2-T1 |
Design of
Digital Multisignature Schemes Based on Schnorr Algorithm |
Hongwei CHU |
|
C |
240 |
2A2-T2 |
(=223)
Generic Programming in C++; Delphi and Java |
Xu Wen-Sheng |
|
C |
243 |
2P2-T1 |
(=242) A fast
algorithm of Non-prefix Rule in Packet Classification |
Fu Ge |
|
J |
249 |
2A2-T2 |
Dependence-Based
Representation for Concurrent Java Programs and Its Application to Slicing |
Jianjun Zhao |
|
C |
260 |
2A1-T1 |
Optimizing
Grid Services on Byte Code Specification |
Hongyan Mao |
|
O |
261 |
2P1-T3 |
Implementing
a CBR model on MAS to catch a scaping goal |
AliReza Ansari |
|
C |
271 |
1P2-T1 |
A Blind
Digital Signature Scheme based on Elliptic Curve Cryptography |
Zhan Xiong-Quan |
|
C |
292 |
2P1-T1 |
Secure
Authenticated Protocols Designing Using Automated Analysis Tool |
CHEN Tie-ming |
|
J |
333 |
2A2-T1 |
Generating
Dependency Relationships among UML Model Elements for Impact Analysis of UML
Documents |
Masayuki Kotani; Koichiro Ochimizu |
|
J |
338 |
1P2-T2 |
Soft System
Bus as a Future Software Technology |
Jingde Cheng |
*locked PDF* |
O |
346 |
2P1-T2 |
Metamorphic
Testing and Its Applications |
Zhi Quan Zhou; D.H.Huang; T.H.Tse;Zongyuan
Yang; Haitao Huang; T.Y.Chen |
|
K |
352 |
2A1-T2 |
DREAM: Domain
REquirement Asset Manager in Product Lines |
Jihyeon Park; Mikyeong Moon; Keunhyuk Yeom |
|
J |
353 |
2A1-T3 |
Multi-Aspect
System Analysis Using State Machines Extracted from Specifications in VDM‐SL |
Kengo Miyoshi |
|
J |
355 |
2P1-T1 |
Dynamic
Software Birthmarks to Detect the Theft of Windows Application |
Haruaki Tamada; Keiji Okamoto; Masahide
Nakamura; Akito Monden; Kenichi Matsumoto |
|
C |
pc034 |
1A1-T3 |
(Industry
report) IT Talents Engineering At Shanghai |
Dehua JU |
|
C |
pc043-1 |
2P2-T2 |
The
Enterprise Application Integration Approach in Enterprise Process Monitoring
and Controlling System |
Wen Bilong |
*FZSTK--GBK1-0; SimSun* |
C |
pc043-2 |
2A2-T2 |
Research on
Visual Language Specification and Visual Language Editor Automatic Generator |
LuYang |
*SimSun+2* |
C |
pc043-4 |
2P2-T2 |
THE RESEARCH
OF ENTERPRISE PROCESS ANALYSIS AND ITS SUPPORT ENVIRONMENT |
SunYi |
|
|
|
|
|
|
|
J |
354 |
1A1-T1 |
Proposal for
Working Group Sessions |
Kouichi Kishida |
|
J |
356 |
1A1-T2 |
SPO Manifest
(Topic Proposal) |
Masao Ito |
|
J |
341 |
1A1-T3 |
Computer
Supported Knowledge Collaboration (a proposal for a discussin session) |
Kouichi Kishida |
|
|
|
|
|
|
|
Legend of
region: |
|
|
|
C |
China |
WS: |
Working Group Session: the 1st Day
morning at Track1,2,3 |
|
|
J |
Japan |
|
|
|
|
K |
Korea |
|
|
|
|
O |
Others |
|
|
|
|
|
|
|
|
|
|
|
|
UPdAted: |
Tue Aug 24
16:16:16 JST 2004 |
|
|
|
|
|
|
|
|