Volume 15,Issue 5,2004 Table of Contents
Research on Similarity of Stochastic Non-Stationary Time Series Based on Wavelet-FractalZHAO Hui,HOU Jian-Rong and SHI Bai-Le2004,15(5):633-640 [Abstract(4623)] [View PDF(5196)619.76 K]Two-Dimensional Stack Generation and Block Merging Algorithms for Analog VLSILIU Rui,DONG She-Qin,HONG Xian-Long,LONG Di and GU Jun2004,15(5):641-649 [Abstract(4702)] [View PDF(4855)858.18 K]Further Study on the Smoothed Analysis of Condition Number of Matrix and Gaussian AlgorithmYANG Zhi-Ying,ZHU Hong and SONG Jian-Tao2004,15(5):650-659 [Abstract(4083)] [View PDF(5757)941.50 K]A Fast Low-Cost Shortest Path Tree AlgorithmWANG Tao and LI Wei-Sheng2004,15(5):660-665 [Abstract(5015)] [View PDF(7207)589.72 K]Metric Reconstruction Based on One Triplet of Corresponding Vanishing LineZHU Hai-Jiang and WU Fu-Chao2004,15(5):666-675 [Abstract(4300)] [View PDF(5489)1.21 M]Theory and Robust Algorithm of Trinocular RectificationZHANG Huai-Feng,Jan Cech,Radim Sara,WU Fu-Chao and HU Zhan-Yi2004,15(5):676-688 [Abstract(4251)] [View PDF(5089)1.78 M]A Teamwork Protocol for Multi-AgentSHENG Qiu-Jian,ZHAO Zhi-Kun,LIU Shao-Hui and SHI Zhong-Zhi2004,15(5):689-696 [Abstract(4319)] [View PDF(5419)726.11 K]An Applicable and Efficient Clustering AlgorithmWANG Jian-Hui,SHEN Zhan and HU Yun-Fa2004,15(5):697-705 [Abstract(4801)] [View PDF(6323)734.76 K]An Integrated-Utility Based Optimization in Multi-Issues NegotiationGUO Qing and CHEN Chun2004,15(5):706-711 [Abstract(4317)] [View PDF(4975)632.93 K]Fast Image Search Using Vector QuantizationYE Hang-Jun and XU Guang-You2004,15(5):712-719 [Abstract(4680)] [View PDF(5695)996.68 K]Structural Join of XML Based on Range PartitioningWANG Jing,MENG Xiao-Feng and WANG Shan2004,15(5):720-729 [Abstract(4756)] [View PDF(6493)889.99 K]An Algorithm for Creating an Object Normal Form Based on Directed GraphLIU Guo-Hua,WANG Wei,ZHANG Liang and SHI Bai-Le2004,15(5):730-740 [Abstract(3868)] [View PDF(5311)894.59 K]A Cost Model for Data Placement and Access Path Selection Problem in FC-SANLI Chao,ZHOU Li-Zhu and XING Chun-Xiao2004,15(5):741-751 [Abstract(3900)] [View PDF(5085)1.19 M]Security Flaws in a Confirmer Signature SchemeWANG Gui-Lin and QING Si-Han2004,15(5):752-756 [Abstract(4306)] [View PDF(5852)516.66 K]Distributed Group Rekeying Algorithms for Mobile Ad-Hoc NetworksKUANG Xiao-Hui,ZHU Pei-Dong and LU Xi-Cheng2004,15(5):757-766 [Abstract(4746)] [View PDF(6075)735.07 K]Cryptanalysis of a Variant of a Cellular Automata Based CryptosystemZHANG Wen-Tao,QING Si-Han and WU Wen-Ling2004,15(5):767-771 [Abstract(3782)] [View PDF(5240)493.13 K]A QoS-Aware and Scalable Multicast Routing Protocol Based on Bounded Flooding TechniqueHUANG Dong-Jun,WANG Jian-Xin,CHEN Song-Qiao and DENG Qing-Hua2004,15(5):772-782 [Abstract(3841)] [View PDF(5522)876.19 K]Fault-Tolerant Routing Based on Safety Path Vectors in Hypercube SystemWANG Lei,LIN Ya-Ping,CHEN Zhi-Ping and WEN Xue2004,15(5):783-790 [Abstract(4374)] [View PDF(5097)726.19 K]