Volume 16,Issue 4,2005 Table of Contents
Design and Implementation of MITK for 3D Medical Image Processing and AnalyzingZHAO Ming-Chang,TIAN Jie,XUE Jian,ZHU Xun,HE Hui-Guang and Lü Ke2005,16(4):485-495 [Abstract(5164)] [View PDF(7753)888.47 K]Bagging-Based Selective Clusterer EnsembleTANG Wei and ZHOU Zhi-Hua2005,16(4):496-502 [Abstract(5468)] [View PDF(8365)644.30 K]Hardware/Software Partitioning Based on Dynamic Combination of Genetic Algorithm and Ant AlgorithmXIONG Zhi-Hui,LI Si-Kun and CHEN Ji-Hua2005,16(4):503-512 [Abstract(4069)] [View PDF(6454)896.16 K]A Hybrid Algorithm on Class Cover ProblemsHUANG Yan-Xin,ZHOU Chun-Guang,ZOU Shu-Xue and WANG Yan2005,16(4):513-522 [Abstract(4059)] [View PDF(5874)938.68 K]Active Discriminant Function for Handwriting RecognitionSUN Guang-Ling,LIU Jia-Feng,TANG Xiang-Long,SHI Da-Ming and ZHAO Wei2005,16(4):523-532 [Abstract(4314)] [View PDF(4722)763.98 K]Propagating Functional Dependency and Normalization Between Relations and XMLTAN Zi-Jing and SHI Bai-Le2005,16(4):533-539 [Abstract(3625)] [View PDF(6181)344.16 K]Efficient Top-k Query Processing in Pure Peer-to-Peer NetworkHE Ying-Jie,WANG Shan and DU Xiao-Yong2005,16(4):540-552 [Abstract(4470)] [View PDF(5684)811.83 K]Fast Mining of Global Maximum Frequent ItemsetsLU Jie-Ping,YANG Ming,SUN Zhi-Hui and JU Shi-Guang2005,16(4):553-560 [Abstract(4304)] [View PDF(5593)651.41 K]A Result Size Estimation Algorithm for Value Predication in XML QueryQU Wei-Min,SUN Le and SUN Yu-Fang2005,16(4):561-569 [Abstract(3616)] [View PDF(4918)599.11 K]Security Proof for Distributed Key Distribution SchemeXU Hai-Xia and LI Bao2005,16(4):570-576 [Abstract(4333)] [View PDF(5906)532.40 K]A Grid Architecture for Scalable e-Science and Its PrototypeHUANG Li-Can,WU Zhao-Hui and PAN Yun-He2005,16(4):577-586 [Abstract(4636)] [View PDF(5099)666.23 K]Investigation on Handoff Performance of Mobility Support ProtocolsZHAO A-Qun2005,16(4):587-594 [Abstract(3721)] [View PDF(4966)577.22 K]On the Number of 5-Variable Best Boolean FunctionsXIE Min and PEI Ding-Yi2005,16(4):595-600 [Abstract(3418)] [View PDF(4945)523.45 K]An LKH Method Based on the Behavior of Group Members in Secure MulticastXU Yong and CHEN Kai2005,16(4):601-608 [Abstract(3395)] [View PDF(5346)589.25 K]An Efficient and Secure Dynamic Group Signature SchemeHE Ye-Feng and ZHANG Jian-Zhong2005,16(4):609-615 [Abstract(4161)] [View PDF(4727)450.80 K]Disk Bézier Curve Approximation of the Offset CurveCHEN Xiao and WANG Guo-Jin2005,16(4):616-624 [Abstract(3483)] [View PDF(5343)316.24 K]Hyperbolic Polynomial Uniform B-Spline with Shape ParameterWANG Wen-Tao and WANG Guo-Zhao2005,16(4):625-633 [Abstract(3705)] [View PDF(5767)325.15 K]Geometric Hermite Interpolation for Space Curves by B-SplineZHU Chun-Gang and WANG Ren-Hong2005,16(4):634-642 [Abstract(4275)] [View PDF(5647)640.54 K]