Volume 14,Issue 9,2003 Table of Contents
On Optimal Rectilinear Shortest Paths and 3-Steiner Tree Routing in Presence of ObstaclesZHOU Zhi,JIANG Cheng-Dong,HUANG Liu-Sheng and GU Jun2003,14(9):1503-1514 [Abstract(4332)] [View PDF(7233)1.16 M]A Non-Deadlock Time Management AlgorithmLIU Bu-Quan,WANG Huai-Min and YAO Yi-Ping2003,14(9):1515-1522 [Abstract(4551)] [View PDF(5339)645.19 K]Multi-Layer Channel Normalization for Frequency-Dynamic Feature ExtractionWANG Dong,ZHU Xiao-Yan and LIU Ying2003,14(9):1523-1529 [Abstract(3961)] [View PDF(5133)532.89 K]A Method of Finding Priorities in Default TheoriesZHAO Xi-Shun and DING De-Cheng2003,14(9):1530-1537 [Abstract(4133)] [View PDF(4942)688.29 K]Research of Specific Information Recognition in Multi-Carrier Data StreamsZHENG De-Quan,HU Yi,YU Hao,ZHAO Tie-Jun and WANG Qing-Song2003,14(9):1538-1543 [Abstract(3849)] [View PDF(5273)513.08 K]A Spatial Feature Selection Method Based on Maximum Entropy TheorySONG Guo-Jie,TANG Shi-Wei,YANG Dong-Qing and WANG Teng-Jiao2003,14(9):1544-1550 [Abstract(4693)] [View PDF(10438)688.28 K]Study of Reduction Speckle of Ultrasound Image Based on Multiwavelet AnalysisLIU Li-Zhuang,BIAN Zheng-Zhong and ZHOU Qin-Wu2003,14(9):1551-1557 [Abstract(4026)] [View PDF(5317)1.40 M]A Hierarchical Markov Image Model and Its Inference AlgorithmWANG Xi-Li,LIU Fang and JIAO Li-Cheng2003,14(9):1558-1563 [Abstract(4538)] [View PDF(6416)892.09 K]Reasoning about Functional Dependency for XMLTAN Zi-Jing,PANG Yin-Ming and SHI Bai-Le2003,14(9):1564-1570 [Abstract(4161)] [View PDF(5539)720.93 K]A Constraint-Based Multi-Dimensional Data Exception Mining ApproachLI Cui-Ping,LI Sheng-En,WANG Shan and DU Xiao-Yong2003,14(9):1571-1577 [Abstract(4175)] [View PDF(5963)675.77 K]A Similarity-Based Algorithm for Topic Exploration and DistillationWANG Xiao-Yu,XIONG Fang,LING Bo and ZHOU Ao-Ying2003,14(9):1578-1585 [Abstract(4829)] [View PDF(6794)775.71 K]An Algorithm and Its Updating Algorithm Based on FP-Tree for Mining Maximum Frequent ItemsetsSONG Yu-Qing,ZHU Yu-Quan,SUN Zhi-Hui and CHEN Geng2003,14(9):1586-1592 [Abstract(5081)] [View PDF(7770)641.78 K]A Statistical Query Expansion Model Based on Query LogsCUI Hang,WEN Ji-Rong and LI Min-Qiang2003,14(9):1593-1599 [Abstract(4843)] [View PDF(5906)652.55 K]A Moving Object Database Model Based on Road NetworkYU Xiu-Lan,CHEN Ying,DING Xiao-Cheng and LIU Dong2003,14(9):1600-1607 [Abstract(4106)] [View PDF(5343)748.99 K]A Mobile Multicast Algorithm Based on Hierarchical ArchitectureSUN Li-Min,LIAO Yong,ZHENG Jian-Ping and WU Zhi-Mei2003,14(9):1608-1614 [Abstract(3953)] [View PDF(5407)618.87 K]Optimizing Path Expression Queries of XML DataLü Jian-Hua,WANG Guo-Ren and YU Ge2003,14(9):1615-1620 [Abstract(4006)] [View PDF(6136)730.78 K]A Collaborative Filtering Recommendation Algorithm Based on Item Rating PredictionDENG Ai-Lin,ZHU Yang-Yong and SHI Bai-Le2003,14(9):1621-1628 [Abstract(13442)] [View PDF(23071)680.35 K]Study on IP Supporting over User-Level Protocol BCL-3CHEN Zhi-Hui,MA Jie,CHEN Guo-Liang and GAO Fan2003,14(9):1629-1634 [Abstract(3935)] [View PDF(5139)545.70 K]Zero Knowledge Watermark Verification ProtocolsZOU Xiao-Xiang,DAI Qiong,HUANG Chao and LI Jin-Tao2003,14(9):1645-1651 [Abstract(4775)] [View PDF(5907)641.02 K]A Robust Image-Adaptive Public Watermarking Technique in Wavelet DomainYANG Heng-Fu and CHEN Xiao-Wei2003,14(9):1652-1660 [Abstract(4914)] [View PDF(5328)2.56 M]
Computer Forensics and Its Future TrendWANG Ling and QIAN Hua-Lin2003,14(9):1635-1644 [Abstract(13330)] [View PDF(14958)622.06 K]