Volume 14,Issue 9,2003 Table of Contents
On Optimal Rectilinear Shortest Paths and 3-Steiner Tree Routing in Presence of ObstaclesZHOU Zhi,JIANG Cheng-Dong,HUANG Liu-Sheng and GU Jun2003,14(9):1503-1514 [Abstract(4313)] [View PDF(7164)1.16 M]A Non-Deadlock Time Management AlgorithmLIU Bu-Quan,WANG Huai-Min and YAO Yi-Ping2003,14(9):1515-1522 [Abstract(4534)] [View PDF(5237)645.19 K]Multi-Layer Channel Normalization for Frequency-Dynamic Feature ExtractionWANG Dong,ZHU Xiao-Yan and LIU Ying2003,14(9):1523-1529 [Abstract(3946)] [View PDF(5069)532.89 K]A Method of Finding Priorities in Default TheoriesZHAO Xi-Shun and DING De-Cheng2003,14(9):1530-1537 [Abstract(4115)] [View PDF(4870)688.29 K]Research of Specific Information Recognition in Multi-Carrier Data StreamsZHENG De-Quan,HU Yi,YU Hao,ZHAO Tie-Jun and WANG Qing-Song2003,14(9):1538-1543 [Abstract(3835)] [View PDF(5180)513.08 K]A Spatial Feature Selection Method Based on Maximum Entropy TheorySONG Guo-Jie,TANG Shi-Wei,YANG Dong-Qing and WANG Teng-Jiao2003,14(9):1544-1550 [Abstract(4677)] [View PDF(10326)688.28 K]Study of Reduction Speckle of Ultrasound Image Based on Multiwavelet AnalysisLIU Li-Zhuang,BIAN Zheng-Zhong and ZHOU Qin-Wu2003,14(9):1551-1557 [Abstract(4011)] [View PDF(5260)1.40 M]A Hierarchical Markov Image Model and Its Inference AlgorithmWANG Xi-Li,LIU Fang and JIAO Li-Cheng2003,14(9):1558-1563 [Abstract(4522)] [View PDF(6348)892.09 K]Reasoning about Functional Dependency for XMLTAN Zi-Jing,PANG Yin-Ming and SHI Bai-Le2003,14(9):1564-1570 [Abstract(4140)] [View PDF(5450)720.93 K]A Constraint-Based Multi-Dimensional Data Exception Mining ApproachLI Cui-Ping,LI Sheng-En,WANG Shan and DU Xiao-Yong2003,14(9):1571-1577 [Abstract(4161)] [View PDF(5896)675.77 K]A Similarity-Based Algorithm for Topic Exploration and DistillationWANG Xiao-Yu,XIONG Fang,LING Bo and ZHOU Ao-Ying2003,14(9):1578-1585 [Abstract(4819)] [View PDF(6717)775.71 K]An Algorithm and Its Updating Algorithm Based on FP-Tree for Mining Maximum Frequent ItemsetsSONG Yu-Qing,ZHU Yu-Quan,SUN Zhi-Hui and CHEN Geng2003,14(9):1586-1592 [Abstract(5064)] [View PDF(7684)641.78 K]A Statistical Query Expansion Model Based on Query LogsCUI Hang,WEN Ji-Rong and LI Min-Qiang2003,14(9):1593-1599 [Abstract(4834)] [View PDF(5812)652.55 K]A Moving Object Database Model Based on Road NetworkYU Xiu-Lan,CHEN Ying,DING Xiao-Cheng and LIU Dong2003,14(9):1600-1607 [Abstract(4081)] [View PDF(5259)748.99 K]A Mobile Multicast Algorithm Based on Hierarchical ArchitectureSUN Li-Min,LIAO Yong,ZHENG Jian-Ping and WU Zhi-Mei2003,14(9):1608-1614 [Abstract(3945)] [View PDF(5342)618.87 K]Optimizing Path Expression Queries of XML DataLü Jian-Hua,WANG Guo-Ren and YU Ge2003,14(9):1615-1620 [Abstract(3991)] [View PDF(6051)730.78 K]A Collaborative Filtering Recommendation Algorithm Based on Item Rating PredictionDENG Ai-Lin,ZHU Yang-Yong and SHI Bai-Le2003,14(9):1621-1628 [Abstract(13386)] [View PDF(22340)680.35 K]Study on IP Supporting over User-Level Protocol BCL-3CHEN Zhi-Hui,MA Jie,CHEN Guo-Liang and GAO Fan2003,14(9):1629-1634 [Abstract(3921)] [View PDF(5048)545.70 K]Zero Knowledge Watermark Verification ProtocolsZOU Xiao-Xiang,DAI Qiong,HUANG Chao and LI Jin-Tao2003,14(9):1645-1651 [Abstract(4758)] [View PDF(5825)641.02 K]A Robust Image-Adaptive Public Watermarking Technique in Wavelet DomainYANG Heng-Fu and CHEN Xiao-Wei2003,14(9):1652-1660 [Abstract(4899)] [View PDF(5245)2.56 M]
Computer Forensics and Its Future TrendWANG Ling and QIAN Hua-Lin2003,14(9):1635-1644 [Abstract(13279)] [View PDF(14355)622.06 K]