A Paper# Session ISFST 2004 Accepted Paper Title Authors *Problem*
C 004 2P1-T2 A Novel Approach to Unit Testing: The Aspect-Oriented Way Guoqing Xu; Zongyuan Yang *SimSun*
C 071 2A2-T3 A Design of Intrusion Detection System Based on Mobile Agent SU Fei; Wang Xiufen
C 088 2P2-T3 Web Fuzzy Clustering and Its Applications in Web Usage Mining MaoFu Liu
C 102 1P2-T2 Zero-Time Software Development Pattern and the Methodology Tan WenAn
C 119 2P1-T1 A Multi-Fingerprints Based AntiSpam Peer-to-Peer Network Wenqiang Wang
C 129 2P2-T2 Using Ontologies for Distributed Workflow Management Zhang zhao-hui
C 131 1P2-T2 Web Services-Based Software Reuse and Composition Rao Yuan
C 133 2P2-T3 An Interval-value Clustering Approach to Data Mining Yunfei Yin; Zhi Zhong; Hongbing Huang
C 154 2A2-T3 A Reliable Multicast Transport Protocol in Mobile Ad Hoc Networks Sun Baolin
C 159 2P1-T3 An Improved Chaotic System and Application in Secure Communication Yonghong chen
C 161 1P2-T1 A New Efficient Identification Scheme based on the Strong Diffie-Hellman Assumption Jun Shao; Rongxing Lu; Zhenfu Cao
C 168 2P2-T3 Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System Li Guohui
C 173 2P1-T1 A Scheme of Tracing Anonymous Attack in the Controllable Network Dai Jiangshan *SimSun*
O 176 1A1-T1 OpenWeb: An All-Featured and Dynamically-Evolved Open Development Environment Youliang Zhong
O 177 2P1-T3 Sonar-based Visual Information Architecture for Handwriting Information Processing Youliang Zhong
C 180 1P2-T1 A Secure method of delivery message HU Jin-chu
J 181 2A1-T3 Formal Modeling for INformation Appliance Using MVC Architecture Yuji Arichika
C 183 2A2-T3 (=C178) Dynamic Range-Based Mobile Multicast Sheng ling Wang
C 189 2A1-T2 Agent Based Multiviews Requirements Model Zhengping Liang *SimSun+2*
C 190 2P2-T2 Goal Driven Measurement of Agility in Software Process Shen Beijun
C 191 2P1-T3 The Application of Multi-agent Cooperation Model in Multi-area Synchronous Cooperative Work Based on a Dynamic Group Zhang Xiaobo *SimSun*
C 200 2A1-T3 Verification of Workflow Model Based on Temporal Logic LIU Feng
C 208 2A1-T1 Orchestration of Web Service in E-government Yuyi OU
C 212 2A2-T1 An XML-based System to Improve Web Application Level Security Teng Lv
J 215 2A2-T1 Dynamic Semantic Checking for UML Models in the IIOSS System Motoyuki Sano; Teruo Hikita
C 220 2P2-T1 A Novel Network Transmission Architecture for Internet-Based Process Control Systems Hong-Yan Li
K 221 2A1-T2 Value-Based Requirements Analysis for Product Families: A Goal and Scenario Oriented Approach Minseong Kim
C 229 2A1-T1 (=C143) GIS Grid Services Load Balancing Based on Dynamic Resource Discovery Li Wenjun
C 230 2P1-T2 (=C091) Software Defect Measure Rui Zhang
C 234 2P2-T1 Using Web Services in TMN Environment Lin Chen
C 235 1P2-T1 Design of Digital Multisignature Schemes Based on Schnorr Algorithm Hongwei CHU
C 240 2A2-T2 (=223) Generic Programming in C++; Delphi and Java Xu Wen-Sheng
C 243 2P2-T1 (=242) A fast algorithm of Non-prefix Rule in Packet Classification Fu Ge
J 249 2A2-T2 Dependence-Based Representation for Concurrent Java Programs and Its Application to Slicing Jianjun Zhao
C 260 2A1-T1 Optimizing Grid Services on Byte Code Specification Hongyan Mao
O 261 2P1-T3 Implementing a CBR model on MAS to catch a scaping goal AliReza Ansari
C 271 1P2-T1 A Blind Digital Signature Scheme based on Elliptic Curve Cryptography Zhan Xiong-Quan
C 292 2P1-T1 Secure Authenticated Protocols Designing Using Automated Analysis Tool CHEN Tie-ming
J 333 2A2-T1 Generating Dependency Relationships among UML Model Elements for Impact Analysis of UML Documents Masayuki Kotani; Koichiro Ochimizu
J 338 1P2-T2 Soft System Bus as a Future Software Technology Jingde Cheng *locked PDF*
O 346 2P1-T2 Metamorphic Testing and Its Applications Zhi Quan Zhou; D.H.Huang; T.H.Tse;Zongyuan Yang; Haitao Huang; T.Y.Chen
K 352 2A1-T2 DREAM: Domain REquirement Asset Manager in Product Lines Jihyeon Park; Mikyeong Moon; Keunhyuk Yeom
J 353 2A1-T3 Multi-Aspect System Analysis Using State Machines Extracted from Specifications in VDMSL Kengo Miyoshi
J 355 2P1-T1 Dynamic Software Birthmarks to Detect the Theft of Windows Application Haruaki Tamada; Keiji Okamoto; Masahide Nakamura; Akito Monden; Kenichi Matsumoto
C pc034 1A1-T3 (Industry report) IT Talents Engineering At Shanghai Dehua JU
C pc043-1 2P2-T2 The Enterprise Application Integration Approach in Enterprise Process Monitoring and Controlling System Wen Bilong *FZSTK--GBK1-0; SimSun*
C pc043-2 2A2-T2 Research on Visual Language Specification and Visual Language Editor Automatic Generator LuYang *SimSun+2*
C pc043-4 2P2-T2 THE RESEARCH OF ENTERPRISE PROCESS ANALYSIS AND ITS SUPPORT ENVIRONMENT SunYi
J 354 1A1-T1 Proposal for Working Group Sessions Kouichi Kishida
J 356 1A1-T2 SPO Manifest (Topic Proposal) Masao Ito
J 341 1A1-T3 Computer Supported Knowledge Collaboration (a proposal for a discussin session) Kouichi Kishida
Legend of region:
C China WS: Working Group Session: the 1st Day morning at Track1,2,3
J Japan
K Korea
O Others
UPdAted: Tue Aug 24 16:16:16 JST 2004