Volume 16,Issue 2,2005 Table of Contents

Other Issues:  
  
Contents

  • JIACKPT: A Recoverable Software Distributed Shared Memory System
  • ZHANG Long-Bing,ZHANG Fu-Xin,HU Wei-Wu and TANG Zhi-Min
  • 2005,16(2):165-173 [Abstract(4717)]  [View PDF(6161)829.90 K]
  • Optimized GLR Parsing for Programming Languages
  • LI Hu,JIN Mao-Zhong,XU Fu and ZHANG Min
  • 2005,16(2):174-183 [Abstract(5280)]  [View PDF(5905)981.79 K]
  • Workflow-Based Knowledge Flow Modeling and Control
  • ZHANG Xiao-Gang and LI Ming-Shu
  • 2005,16(2):184-193 [Abstract(4442)]  [View PDF(7202)815.88 K]
  • Static Analysis of OpenMP Directive Nesting Types and Its Application
  • CHEN Yong-Jian,SHU Ji-Wu,LI Jian-Jiang and WANG Ding-Xing
  • 2005,16(2):194-204 [Abstract(4245)]  [View PDF(5498)726.75 K]
  • An Efficient Compression Method of Relational Database
  • LUO Ji-Zhou and LI Jian-Zhong
  • 2005,16(2):205-214 [Abstract(4609)]  [View PDF(9837)954.44 K]
  • Efficiently Mining of Maximal Frequent Item Sets Based on FP-Tree
  • YAN Yue-Jin,LI Zhou-Jun and CHEN Huo-Wang
  • 2005,16(2):215-222 [Abstract(6687)]  [View PDF(8328)686.19 K]
  • Tree Automata Based Efficient XPath Evaluation over XML Data Stream
  • GAO Jun,YANG Dong-Qing,TANG Shi-Wei and WANG Teng-Jiao
  • 2005,16(2):223-232 [Abstract(5284)]  [View PDF(5575)846.24 K]
  • A Long-Term Learning-Based Dynamic User Model in Image Retrieval
  • ZHANG Liang,ZHOU Xiang-Dong,ZHANG Qi and SHI Bai-Le
  • 2005,16(2):233-238 [Abstract(4394)]  [View PDF(4924)595.63 K]
  • Research on Routing Algorithm and Self-Configuration in Content-Based Publish-Subscribe System
  • XUE Tao and FENG Bo-Qin
  • 2005,16(2):251-259 [Abstract(4161)]  [View PDF(6369)736.01 K]
  • Study on Relevant Law and Technology Issues about Computer Forensics
  • DING Li-Ping and WANG Yong-Ji
  • 2005,16(2):260-275 [Abstract(4977)]  [View PDF(8560)1.05 M]
  • A Two-Layer Markov Chain Anomaly Detection Model
  • XU Ming,CHEN Chun and YING Jing
  • 2005,16(2):276-285 [Abstract(4669)]  [View PDF(5708)772.18 K]
  • A Fuzzy Congestion Control Algorithm Based on Queue
  • QI Zhao-Hui,SUN Ji-Zhou and LI Xiao-Tu
  • 2005,16(2):286-294 [Abstract(3522)]  [View PDF(5557)772.31 K]
  • A Robust Detection Method of Blind Digital Watermark Based on Image Projective Sequence
  • JIN Cong and PENG Jia-Xiong
  • 2005,16(2):295-302 [Abstract(4086)]  [View PDF(5777)866.33 K]
  • Research of Interaction Computing Based on Pen Gesture in Conceptual Design
  • MA Cui-Xia,DAI Guo-Zhong,TENG Dong-Xing and CHEN You-Di
  • 2005,16(2):303-308 [Abstract(4546)]  [View PDF(5099)520.19 K]
  • 2-D Polygon Blending Based on Feature Decomposition
  • YANG Wen-Wu,FENG Jie-Qing,JIN Xiao-Gang and PENG Qun-Sheng
  • 2005,16(2):309-315 [Abstract(4410)]  [View PDF(5668)923.80 K]
  • An Effective Approach for Leather Nesting
  • ZHANG Yu-Ping,ZHANG Chun-Li and JIANG Shou-Wei
  • 2005,16(2):316-323 [Abstract(5004)]  [View PDF(10135)876.19 K]
  • Analysis of Application for Funding and Supporting for Key Programs by Computer Science Division of Information Science Department of NSFC in 2004
  • XU Lin,LIU Zhi-Yong and LIU Ke
  • 2005,16(2):324-326 [Abstract(4902)]  [View PDF(5181)419.94 K]
  • Review Articles

  • A Survey on the Core Technique and Research Development in SIP Standard
  • SI Duan-Feng,HAN Xin-Hui,LONG Qin and PAN Ai-Min
  • 2005,16(2):239-250 [Abstract(7788)]  [View PDF(9132)1.14 M]