Volume 16,Issue 2,2005 Table of Contents
JIACKPT: A Recoverable Software Distributed Shared Memory SystemZHANG Long-Bing,ZHANG Fu-Xin,HU Wei-Wu and TANG Zhi-Min2005,16(2):165-173 [Abstract(4717)] [View PDF(6161)829.90 K]Optimized GLR Parsing for Programming LanguagesLI Hu,JIN Mao-Zhong,XU Fu and ZHANG Min2005,16(2):174-183 [Abstract(5280)] [View PDF(5905)981.79 K]Workflow-Based Knowledge Flow Modeling and ControlZHANG Xiao-Gang and LI Ming-Shu2005,16(2):184-193 [Abstract(4442)] [View PDF(7202)815.88 K]Static Analysis of OpenMP Directive Nesting Types and Its ApplicationCHEN Yong-Jian,SHU Ji-Wu,LI Jian-Jiang and WANG Ding-Xing2005,16(2):194-204 [Abstract(4245)] [View PDF(5498)726.75 K]An Efficient Compression Method of Relational DatabaseLUO Ji-Zhou and LI Jian-Zhong2005,16(2):205-214 [Abstract(4609)] [View PDF(9837)954.44 K]Efficiently Mining of Maximal Frequent Item Sets Based on FP-TreeYAN Yue-Jin,LI Zhou-Jun and CHEN Huo-Wang2005,16(2):215-222 [Abstract(6687)] [View PDF(8328)686.19 K]Tree Automata Based Efficient XPath Evaluation over XML Data StreamGAO Jun,YANG Dong-Qing,TANG Shi-Wei and WANG Teng-Jiao2005,16(2):223-232 [Abstract(5284)] [View PDF(5575)846.24 K]A Long-Term Learning-Based Dynamic User Model in Image RetrievalZHANG Liang,ZHOU Xiang-Dong,ZHANG Qi and SHI Bai-Le2005,16(2):233-238 [Abstract(4394)] [View PDF(4924)595.63 K]Research on Routing Algorithm and Self-Configuration in Content-Based Publish-Subscribe SystemXUE Tao and FENG Bo-Qin2005,16(2):251-259 [Abstract(4161)] [View PDF(6369)736.01 K]Study on Relevant Law and Technology Issues about Computer ForensicsDING Li-Ping and WANG Yong-Ji2005,16(2):260-275 [Abstract(4977)] [View PDF(8560)1.05 M]A Two-Layer Markov Chain Anomaly Detection ModelXU Ming,CHEN Chun and YING Jing2005,16(2):276-285 [Abstract(4669)] [View PDF(5708)772.18 K]A Fuzzy Congestion Control Algorithm Based on QueueQI Zhao-Hui,SUN Ji-Zhou and LI Xiao-Tu2005,16(2):286-294 [Abstract(3522)] [View PDF(5557)772.31 K]A Robust Detection Method of Blind Digital Watermark Based on Image Projective SequenceJIN Cong and PENG Jia-Xiong2005,16(2):295-302 [Abstract(4086)] [View PDF(5777)866.33 K]Research of Interaction Computing Based on Pen Gesture in Conceptual DesignMA Cui-Xia,DAI Guo-Zhong,TENG Dong-Xing and CHEN You-Di2005,16(2):303-308 [Abstract(4546)] [View PDF(5099)520.19 K]2-D Polygon Blending Based on Feature DecompositionYANG Wen-Wu,FENG Jie-Qing,JIN Xiao-Gang and PENG Qun-Sheng2005,16(2):309-315 [Abstract(4410)] [View PDF(5668)923.80 K]An Effective Approach for Leather NestingZHANG Yu-Ping,ZHANG Chun-Li and JIANG Shou-Wei2005,16(2):316-323 [Abstract(5004)] [View PDF(10135)876.19 K]Analysis of Application for Funding and Supporting for Key Programs by Computer Science Division of Information Science Department of NSFC in 2004XU Lin,LIU Zhi-Yong and LIU Ke2005,16(2):324-326 [Abstract(4902)] [View PDF(5181)419.94 K]
A Survey on the Core Technique and Research Development in SIP StandardSI Duan-Feng,HAN Xin-Hui,LONG Qin and PAN Ai-Min2005,16(2):239-250 [Abstract(7788)] [View PDF(9132)1.14 M]