Aqueous computing: A survey with an invitation to participate Tom HeadXia ChenSusannah Gal Regular Papers Pages: 672 - 681
Structure of weakly invertible semi-input-memory finite automata with delay 2 Tao RenjiChen Shihua Regular Papers Pages: 682 - 688
Checking Temporal Duration Properties of timed automata Li YongDang Hung Regular Papers Pages: 689 - 698
An optimum placement search algorithm based on extended Corner Block List Dong SheqinZhou ShuoCai Yici Regular Papers Pages: 699 - 707
Automatic generation of interprocedural data-flow analyzers and optimizers Lian RuiqiZhang ZhaoqingQiao Ruliang Regular Papers Pages: 708 - 717
Lower bound estimation of hardware resources for scheduling in high-level synthesis Shen ZhaoxuanJong Ching Chuen Regular Papers Pages: 718 - 730
BIST design for detecting multiple stuck-open faults in CMOS circuits using transition count Hafizur RahamanDebesh K. DasBhargab B. Bhattacharya Regular Papers Pages: 731 - 737
SPMH: A solution to the Problem of Malicious Hosts Zhou ChongSun Yongqiang Regular Papers Pages: 738 - 748
Multiparty authentication services and key agreement protocols with semi-trusted third party Zheng DongChen KefeiYou Jinyuan Regular Papers Pages: 749 - 756
A model-based approach to object-oriented software metrics Mei HongXie TaoYang Fuqing Correspondence Pages: 757 - 769
Behavior relativity of Petri nets Jiang ChangjunWang HuaiqingLiao Shaoyi Correspondence Pages: 770 - 780
Distributing and scheduling divisible task on parallel communicating processors Li GuodongZhang Defu Correspondence Pages: 788 - 796
Variables bounding based retiming algorithm Lu ZongweiLin ZhenghuiChen Houpeng Correspondence Pages: 797 - 806
Clustering DTDs: An interactive two-level approach Zhou AoyingQian WeiningJin Wen Correspondence Pages: 807 - 819
Efficient non-repudiation multicast source authentication schemes Li XianxianHuai Jinpeng Correspondence Pages: 820 - 829
Fair electronic cash based on double signatures Chen XiaofengWang ChangjieWang Yumin Correspondence Pages: 830 - 835
Selection of secure hyperelliptic curves ofg=2 based on a subfield Zhang FangguoZhang FutaiWang Yumin Correspondence Pages: 836 - 842
A tracing algorithm for surface-surface intersections on surface boundaries Kyu-Yeul LeeDoo-Yeoun ChoTae-Wan Kim Correspondence Pages: 843 - 850
Physics-based Loop surface modeling Qin KaihuaiChang ZhengyiLi Denggao Correspondence Pages: 851 - 858
Head tracking using shapes and adaptive color histograms Liu QingshanMa SongdeLu Hanqing Correspondence Pages: 859 - 864
Optimistic voting for managing replicated data Lin HuaizhongChen Chun Correspondence Pages: 874 - 881
Automatic mesh generation on a regular background grid Lo S. H.Liu Jianfei Correspondence Pages: 882 - 887
Coordinating mobile agents by the XML-based tuple space Lu ZhengdingLi ChunlinLi Layuan Correspondence Pages: 888 - 900
A personalized information dissemination system based on how-net Zhang LeiDu XiaoyongWang Shan Correspondence Pages: 901 - 907
Internet Network Resource Information Model Chen ChuanfengLi ZengzhiLiu Kangping Correspondence Pages: 908 - 914
Combining trigram and automatic weight distribution in Chinese spelling error correction Li JianhuaWang Xiaolong Correspondence Pages: 915 - 923
Spontaneous speech parsing in travel information inquiring and booking systems Yan PengjuZheng FangXu Mingxing Correspondence Pages: 924 - 932
Semantic computation in a Chinese Question-Answering system Li SujianZhang JianLiu Qun Correspondence Pages: 933 - 939