Volume 16,Issue 2,2005 Table of Contents
JIACKPT: A Recoverable Software Distributed Shared Memory SystemZHANG Long-Bing,ZHANG Fu-Xin,HU Wei-Wu and TANG Zhi-Min2005,16(2):165-173 [Abstract(4736)] [View PDF(6265)829.90 K]Optimized GLR Parsing for Programming LanguagesLI Hu,JIN Mao-Zhong,XU Fu and ZHANG Min2005,16(2):174-183 [Abstract(5301)] [View PDF(5994)981.79 K]Workflow-Based Knowledge Flow Modeling and ControlZHANG Xiao-Gang and LI Ming-Shu2005,16(2):184-193 [Abstract(4467)] [View PDF(7294)815.88 K]Static Analysis of OpenMP Directive Nesting Types and Its ApplicationCHEN Yong-Jian,SHU Ji-Wu,LI Jian-Jiang and WANG Ding-Xing2005,16(2):194-204 [Abstract(4267)] [View PDF(5604)726.75 K]An Efficient Compression Method of Relational DatabaseLUO Ji-Zhou and LI Jian-Zhong2005,16(2):205-214 [Abstract(4650)] [View PDF(9929)954.44 K]Efficiently Mining of Maximal Frequent Item Sets Based on FP-TreeYAN Yue-Jin,LI Zhou-Jun and CHEN Huo-Wang2005,16(2):215-222 [Abstract(6713)] [View PDF(8430)686.19 K]Tree Automata Based Efficient XPath Evaluation over XML Data StreamGAO Jun,YANG Dong-Qing,TANG Shi-Wei and WANG Teng-Jiao2005,16(2):223-232 [Abstract(5312)] [View PDF(5660)846.24 K]A Long-Term Learning-Based Dynamic User Model in Image RetrievalZHANG Liang,ZHOU Xiang-Dong,ZHANG Qi and SHI Bai-Le2005,16(2):233-238 [Abstract(4403)] [View PDF(4998)595.63 K]Research on Routing Algorithm and Self-Configuration in Content-Based Publish-Subscribe SystemXUE Tao and FENG Bo-Qin2005,16(2):251-259 [Abstract(4179)] [View PDF(6450)736.01 K]Study on Relevant Law and Technology Issues about Computer ForensicsDING Li-Ping and WANG Yong-Ji2005,16(2):260-275 [Abstract(5019)] [View PDF(8670)1.05 M]A Two-Layer Markov Chain Anomaly Detection ModelXU Ming,CHEN Chun and YING Jing2005,16(2):276-285 [Abstract(4691)] [View PDF(5794)772.18 K]A Fuzzy Congestion Control Algorithm Based on QueueQI Zhao-Hui,SUN Ji-Zhou and LI Xiao-Tu2005,16(2):286-294 [Abstract(3539)] [View PDF(5635)772.31 K]A Robust Detection Method of Blind Digital Watermark Based on Image Projective SequenceJIN Cong and PENG Jia-Xiong2005,16(2):295-302 [Abstract(4115)] [View PDF(5881)866.33 K]Research of Interaction Computing Based on Pen Gesture in Conceptual DesignMA Cui-Xia,DAI Guo-Zhong,TENG Dong-Xing and CHEN You-Di2005,16(2):303-308 [Abstract(4565)] [View PDF(5167)520.19 K]2-D Polygon Blending Based on Feature DecompositionYANG Wen-Wu,FENG Jie-Qing,JIN Xiao-Gang and PENG Qun-Sheng2005,16(2):309-315 [Abstract(4428)] [View PDF(5758)923.80 K]An Effective Approach for Leather NestingZHANG Yu-Ping,ZHANG Chun-Li and JIANG Shou-Wei2005,16(2):316-323 [Abstract(5030)] [View PDF(10240)876.19 K]Analysis of Application for Funding and Supporting for Key Programs by Computer Science Division of Information Science Department of NSFC in 2004XU Lin,LIU Zhi-Yong and LIU Ke2005,16(2):324-326 [Abstract(4916)] [View PDF(5364)419.94 K]
A Survey on the Core Technique and Research Development in SIP StandardSI Duan-Feng,HAN Xin-Hui,LONG Qin and PAN Ai-Min2005,16(2):239-250 [Abstract(7825)] [View PDF(9408)1.14 M]