Volume 16,Issue 6,2005 Table of Contents
Texture Spectrum Descriptor Based Image RetrievalSHI Zhi-Ping,HU Hong,LI Qing-Yong,SHI Zhong-Zhi and DUAN Chan-Lun2005,16(6):1039-1045 [Abstract(4195)] [View PDF(5592)1.03 M]A Fingerprint Matching Algorithm with Registration Pattern InspectionCHEN Hong and TIAN Jie2005,16(6):1046-1053 [Abstract(4461)] [View PDF(6070)1.73 M]Text-To-Visual Speech in Chinese Based on Data-Driven ApproachWANG Zhi-Ming,CAI Lian-Hong and AI Hai-Zhou2005,16(6):1054-1063 [Abstract(4733)] [View PDF(6007)964.62 K]A Neural Network Algorithm for Computing Matrix Eigenvalues and EigenvectorsLIU Yi-Guang,YOU Zhi-Sheng,CAO Li-Ping and JIANG Xin-Rong2005,16(6):1064-1072 [Abstract(4602)] [View PDF(5972)765.97 K]A Hybrid Algorithm Based on Attention ModelYANG Bo,SU Xiao-Hong and WANG Ya-Dong2005,16(6):1073-1080 [Abstract(3810)] [View PDF(5573)784.23 K]A Search Coding Method and Its Application in Supervised ClassificationJIANG Yan-Huang,ZHAO Qiang-Li and YANG Xue-Jun2005,16(6):1081-1089 [Abstract(3906)] [View PDF(5394)963.71 K]An Algorithm for Dense Disparity Mapping by Using Graph CutsPENG Qi-Min and JIA Yun-De2005,16(6):1090-1095 [Abstract(4576)] [View PDF(6075)886.12 K]Study on Digital Elevation Mode Data Watermark via Integer WaveletsLUO Yong,CHENG Li-Zhi,CHEN Bo and WU Yi2005,16(6):1096-1103 [Abstract(4378)] [View PDF(5517)1.17 M]A Simple and Efficient Broadcasting Scheme for Mobile Ad Hoc NetworksZOU Shi-Hong,WU Hai-Tao and CHENG Shi-Duan2005,16(6):1104-1111 [Abstract(4304)] [View PDF(6048)685.86 K]A Routing Algorithm in Heterogeneous Overlay Multicast NetworksWU Jia-Gao,YE Xiao-Guo and JIANG Ai-Quan2005,16(6):1112-1119 [Abstract(3877)] [View PDF(5388)761.05 K]Active Queue Management Algorithms in DiffServ NetworksLIU Wei,CHENG Wen-Qing,HE Jian-Hua,LE Chun-Hui,CHOU Chun-Tung and YANG Zong-Kai2005,16(6):1120-1130 [Abstract(4506)] [View PDF(5410)1.34 M]New Consideration on the Evaluation Model of Cluster Area NetworkTANG Yuan,SUN Jia-Chang,ZHANG Yun-Quan and ZHANG Lin-Bo2005,16(6):1131-1139 [Abstract(3849)] [View PDF(5323)780.82 K]A P2P Network Model with Multi-Layer Architecture Based on RegionYUE Guang-Xue,LI Ren-Fa and ZHOU Zu-De2005,16(6):1140-1150 [Abstract(3973)] [View PDF(5631)1023.11 K]Study on Program Behavior Control Based on LSMZHANG Heng,BIAN Hong-Liu,WU Li-Fa,ZHANG Yu-Sen,CUI Ming-Wei and ZENG Qing-Kai2005,16(6):1151-1158 [Abstract(4120)] [View PDF(5895)593.19 K]A Header Compression Algorithm for Real-Time Streams in Wireless IP NetworksWU Yi-Chuan,ZHENG Jian-Ping,HUANG Kui,ZHAO Zhuang and WU Zhi-Mei2005,16(6):1159-1167 [Abstract(3769)] [View PDF(5477)700.89 K]A Method for Reducing Movement Detection Delay Based on Dynamic RegionZHAO Qing-Lin,LI Zhong-Cheng,ZHANG Yu-Jun,LI Jun and WANG Kai2005,16(6):1168-1174 [Abstract(3725)] [View PDF(4802)691.14 K]Analysis for Security Flaw in Demand Loading Code ProtocolXIA Zheng-You,JIANG Yi-Chuan,ZHONG Yi-Ping and ZHANG Shi-Yong2005,16(6):1175-1181 [Abstract(4079)] [View PDF(4887)623.79 K]Formal Verification of IPv6 Neighbor Discovery ProtocolYE Xin-Ming and HAO Song-Xia2005,16(6):1182-1189 [Abstract(3684)] [View PDF(5773)711.53 K]A (t,n) Threshold Proxy Signature Scheme with Specified VerifiersWANG Xiao-Ming and FU Fang-Wei2005,16(6):1190-1196 [Abstract(4181)] [View PDF(5135)624.25 K]