Volume 16,Issue 4,2005 Table of Contents
Design and Implementation of MITK for 3D Medical Image Processing and AnalyzingZHAO Ming-Chang,TIAN Jie,XUE Jian,ZHU Xun,HE Hui-Guang and Lü Ke2005,16(4):485-495 [Abstract(5176)] [View PDF(7864)888.47 K]Bagging-Based Selective Clusterer EnsembleTANG Wei and ZHOU Zhi-Hua2005,16(4):496-502 [Abstract(5503)] [View PDF(8469)644.30 K]Hardware/Software Partitioning Based on Dynamic Combination of Genetic Algorithm and Ant AlgorithmXIONG Zhi-Hui,LI Si-Kun and CHEN Ji-Hua2005,16(4):503-512 [Abstract(4084)] [View PDF(6540)896.16 K]A Hybrid Algorithm on Class Cover ProblemsHUANG Yan-Xin,ZHOU Chun-Guang,ZOU Shu-Xue and WANG Yan2005,16(4):513-522 [Abstract(4084)] [View PDF(5959)938.68 K]Active Discriminant Function for Handwriting RecognitionSUN Guang-Ling,LIU Jia-Feng,TANG Xiang-Long,SHI Da-Ming and ZHAO Wei2005,16(4):523-532 [Abstract(4342)] [View PDF(4799)763.98 K]Propagating Functional Dependency and Normalization Between Relations and XMLTAN Zi-Jing and SHI Bai-Le2005,16(4):533-539 [Abstract(3640)] [View PDF(6274)344.16 K]Efficient Top-k Query Processing in Pure Peer-to-Peer NetworkHE Ying-Jie,WANG Shan and DU Xiao-Yong2005,16(4):540-552 [Abstract(4486)] [View PDF(5780)811.83 K]Fast Mining of Global Maximum Frequent ItemsetsLU Jie-Ping,YANG Ming,SUN Zhi-Hui and JU Shi-Guang2005,16(4):553-560 [Abstract(4326)] [View PDF(5680)651.41 K]A Result Size Estimation Algorithm for Value Predication in XML QueryQU Wei-Min,SUN Le and SUN Yu-Fang2005,16(4):561-569 [Abstract(3633)] [View PDF(5015)599.11 K]Security Proof for Distributed Key Distribution SchemeXU Hai-Xia and LI Bao2005,16(4):570-576 [Abstract(4351)] [View PDF(6034)532.40 K]A Grid Architecture for Scalable e-Science and Its PrototypeHUANG Li-Can,WU Zhao-Hui and PAN Yun-He2005,16(4):577-586 [Abstract(4666)] [View PDF(5201)666.23 K]Investigation on Handoff Performance of Mobility Support ProtocolsZHAO A-Qun2005,16(4):587-594 [Abstract(3730)] [View PDF(5046)577.22 K]On the Number of 5-Variable Best Boolean FunctionsXIE Min and PEI Ding-Yi2005,16(4):595-600 [Abstract(3434)] [View PDF(5030)523.45 K]An LKH Method Based on the Behavior of Group Members in Secure MulticastXU Yong and CHEN Kai2005,16(4):601-608 [Abstract(3404)] [View PDF(5430)589.25 K]An Efficient and Secure Dynamic Group Signature SchemeHE Ye-Feng and ZHANG Jian-Zhong2005,16(4):609-615 [Abstract(4178)] [View PDF(4813)450.80 K]Disk Bézier Curve Approximation of the Offset CurveCHEN Xiao and WANG Guo-Jin2005,16(4):616-624 [Abstract(3497)] [View PDF(5422)316.24 K]Hyperbolic Polynomial Uniform B-Spline with Shape ParameterWANG Wen-Tao and WANG Guo-Zhao2005,16(4):625-633 [Abstract(3720)] [View PDF(5865)325.15 K]Geometric Hermite Interpolation for Space Curves by B-SplineZHU Chun-Gang and WANG Ren-Hong2005,16(4):634-642 [Abstract(4283)] [View PDF(5735)640.54 K]