Volume 16,Issue 6,2005 Table of Contents

Other Issues:  
  
Contents

  • Texture Spectrum Descriptor Based Image Retrieval
  • SHI Zhi-Ping,HU Hong,LI Qing-Yong,SHI Zhong-Zhi and DUAN Chan-Lun
  • 2005,16(6):1039-1045 [Abstract(4225)]  [View PDF(5743)1.03 M]
  • A Fingerprint Matching Algorithm with Registration Pattern Inspection
  • CHEN Hong and TIAN Jie
  • 2005,16(6):1046-1053 [Abstract(4492)]  [View PDF(6198)1.73 M]
  • Text-To-Visual Speech in Chinese Based on Data-Driven Approach
  • WANG Zhi-Ming,CAI Lian-Hong and AI Hai-Zhou
  • 2005,16(6):1054-1063 [Abstract(4760)]  [View PDF(6167)964.62 K]
  • A Neural Network Algorithm for Computing Matrix Eigenvalues and Eigenvectors
  • LIU Yi-Guang,YOU Zhi-Sheng,CAO Li-Ping and JIANG Xin-Rong
  • 2005,16(6):1064-1072 [Abstract(4636)]  [View PDF(6086)765.97 K]
  • A Hybrid Algorithm Based on Attention Model
  • YANG Bo,SU Xiao-Hong and WANG Ya-Dong
  • 2005,16(6):1073-1080 [Abstract(3844)]  [View PDF(5729)784.23 K]
  • A Search Coding Method and Its Application in Supervised Classification
  • JIANG Yan-Huang,ZHAO Qiang-Li and YANG Xue-Jun
  • 2005,16(6):1081-1089 [Abstract(3926)]  [View PDF(5530)963.71 K]
  • An Algorithm for Dense Disparity Mapping by Using Graph Cuts
  • PENG Qi-Min and JIA Yun-De
  • 2005,16(6):1090-1095 [Abstract(4598)]  [View PDF(6225)886.12 K]
  • Study on Digital Elevation Mode Data Watermark via Integer Wavelets
  • LUO Yong,CHENG Li-Zhi,CHEN Bo and WU Yi
  • 2005,16(6):1096-1103 [Abstract(4417)]  [View PDF(5666)1.17 M]
  • A Simple and Efficient Broadcasting Scheme for Mobile Ad Hoc Networks
  • ZOU Shi-Hong,WU Hai-Tao and CHENG Shi-Duan
  • 2005,16(6):1104-1111 [Abstract(4331)]  [View PDF(6168)685.86 K]
  • A Routing Algorithm in Heterogeneous Overlay Multicast Networks
  • WU Jia-Gao,YE Xiao-Guo and JIANG Ai-Quan
  • 2005,16(6):1112-1119 [Abstract(3909)]  [View PDF(5533)761.05 K]
  • Active Queue Management Algorithms in DiffServ Networks
  • LIU Wei,CHENG Wen-Qing,HE Jian-Hua,LE Chun-Hui,CHOU Chun-Tung and YANG Zong-Kai
  • 2005,16(6):1120-1130 [Abstract(4527)]  [View PDF(5540)1.34 M]
  • New Consideration on the Evaluation Model of Cluster Area Network
  • TANG Yuan,SUN Jia-Chang,ZHANG Yun-Quan and ZHANG Lin-Bo
  • 2005,16(6):1131-1139 [Abstract(3875)]  [View PDF(5466)780.82 K]
  • A P2P Network Model with Multi-Layer Architecture Based on Region
  • YUE Guang-Xue,LI Ren-Fa and ZHOU Zu-De
  • 2005,16(6):1140-1150 [Abstract(4012)]  [View PDF(5758)1023.11 K]
  • Study on Program Behavior Control Based on LSM
  • ZHANG Heng,BIAN Hong-Liu,WU Li-Fa,ZHANG Yu-Sen,CUI Ming-Wei and ZENG Qing-Kai
  • 2005,16(6):1151-1158 [Abstract(4155)]  [View PDF(6054)593.19 K]
  • A Header Compression Algorithm for Real-Time Streams in Wireless IP Networks
  • WU Yi-Chuan,ZHENG Jian-Ping,HUANG Kui,ZHAO Zhuang and WU Zhi-Mei
  • 2005,16(6):1159-1167 [Abstract(3791)]  [View PDF(5610)700.89 K]
  • A Method for Reducing Movement Detection Delay Based on Dynamic Region
  • ZHAO Qing-Lin,LI Zhong-Cheng,ZHANG Yu-Jun,LI Jun and WANG Kai
  • 2005,16(6):1168-1174 [Abstract(3740)]  [View PDF(4924)691.14 K]
  • Analysis for Security Flaw in Demand Loading Code Protocol
  • XIA Zheng-You,JIANG Yi-Chuan,ZHONG Yi-Ping and ZHANG Shi-Yong
  • 2005,16(6):1175-1181 [Abstract(4102)]  [View PDF(5056)623.79 K]
  • Formal Verification of IPv6 Neighbor Discovery Protocol
  • YE Xin-Ming and HAO Song-Xia
  • 2005,16(6):1182-1189 [Abstract(3711)]  [View PDF(5925)711.53 K]
  • A (t,n) Threshold Proxy Signature Scheme with Specified Verifiers
  • WANG Xiao-Ming and FU Fang-Wei
  • 2005,16(6):1190-1196 [Abstract(4197)]  [View PDF(5256)624.25 K]