Volume 14,Issue 9,2003 Table of Contents
On Optimal Rectilinear Shortest Paths and 3-Steiner Tree Routing in Presence of ObstaclesZHOU Zhi,JIANG Cheng-Dong,HUANG Liu-Sheng and GU Jun2003,14(9):1503-1514 [Abstract(4296)] [View PDF(7100)1.16 M]A Non-Deadlock Time Management AlgorithmLIU Bu-Quan,WANG Huai-Min and YAO Yi-Ping2003,14(9):1515-1522 [Abstract(4527)] [View PDF(5168)645.19 K]Multi-Layer Channel Normalization for Frequency-Dynamic Feature ExtractionWANG Dong,ZHU Xiao-Yan and LIU Ying2003,14(9):1523-1529 [Abstract(3935)] [View PDF(5008)532.89 K]A Method of Finding Priorities in Default TheoriesZHAO Xi-Shun and DING De-Cheng2003,14(9):1530-1537 [Abstract(4109)] [View PDF(4808)688.29 K]Research of Specific Information Recognition in Multi-Carrier Data StreamsZHENG De-Quan,HU Yi,YU Hao,ZHAO Tie-Jun and WANG Qing-Song2003,14(9):1538-1543 [Abstract(3828)] [View PDF(5118)513.08 K]A Spatial Feature Selection Method Based on Maximum Entropy TheorySONG Guo-Jie,TANG Shi-Wei,YANG Dong-Qing and WANG Teng-Jiao2003,14(9):1544-1550 [Abstract(4664)] [View PDF(10251)688.28 K]Study of Reduction Speckle of Ultrasound Image Based on Multiwavelet AnalysisLIU Li-Zhuang,BIAN Zheng-Zhong and ZHOU Qin-Wu2003,14(9):1551-1557 [Abstract(3997)] [View PDF(5197)1.40 M]A Hierarchical Markov Image Model and Its Inference AlgorithmWANG Xi-Li,LIU Fang and JIAO Li-Cheng2003,14(9):1558-1563 [Abstract(4517)] [View PDF(6290)892.09 K]Reasoning about Functional Dependency for XMLTAN Zi-Jing,PANG Yin-Ming and SHI Bai-Le2003,14(9):1564-1570 [Abstract(4132)] [View PDF(5379)720.93 K]A Constraint-Based Multi-Dimensional Data Exception Mining ApproachLI Cui-Ping,LI Sheng-En,WANG Shan and DU Xiao-Yong2003,14(9):1571-1577 [Abstract(4151)] [View PDF(5838)675.77 K]A Similarity-Based Algorithm for Topic Exploration and DistillationWANG Xiao-Yu,XIONG Fang,LING Bo and ZHOU Ao-Ying2003,14(9):1578-1585 [Abstract(4805)] [View PDF(6641)775.71 K]An Algorithm and Its Updating Algorithm Based on FP-Tree for Mining Maximum Frequent ItemsetsSONG Yu-Qing,ZHU Yu-Quan,SUN Zhi-Hui and CHEN Geng2003,14(9):1586-1592 [Abstract(5053)] [View PDF(7606)641.78 K]A Statistical Query Expansion Model Based on Query LogsCUI Hang,WEN Ji-Rong and LI Min-Qiang2003,14(9):1593-1599 [Abstract(4823)] [View PDF(5737)652.55 K]A Moving Object Database Model Based on Road NetworkYU Xiu-Lan,CHEN Ying,DING Xiao-Cheng and LIU Dong2003,14(9):1600-1607 [Abstract(4068)] [View PDF(5193)748.99 K]A Mobile Multicast Algorithm Based on Hierarchical ArchitectureSUN Li-Min,LIAO Yong,ZHENG Jian-Ping and WU Zhi-Mei2003,14(9):1608-1614 [Abstract(3941)] [View PDF(5287)618.87 K]Optimizing Path Expression Queries of XML DataLü Jian-Hua,WANG Guo-Ren and YU Ge2003,14(9):1615-1620 [Abstract(3980)] [View PDF(5978)730.78 K]A Collaborative Filtering Recommendation Algorithm Based on Item Rating PredictionDENG Ai-Lin,ZHU Yang-Yong and SHI Bai-Le2003,14(9):1621-1628 [Abstract(13353)] [View PDF(21950)680.35 K]Study on IP Supporting over User-Level Protocol BCL-3CHEN Zhi-Hui,MA Jie,CHEN Guo-Liang and GAO Fan2003,14(9):1629-1634 [Abstract(3907)] [View PDF(4974)545.70 K]Zero Knowledge Watermark Verification ProtocolsZOU Xiao-Xiang,DAI Qiong,HUANG Chao and LI Jin-Tao2003,14(9):1645-1651 [Abstract(4744)] [View PDF(5762)641.02 K]A Robust Image-Adaptive Public Watermarking Technique in Wavelet DomainYANG Heng-Fu and CHEN Xiao-Wei2003,14(9):1652-1660 [Abstract(4896)] [View PDF(5187)2.56 M]
Computer Forensics and Its Future TrendWANG Ling and QIAN Hua-Lin2003,14(9):1635-1644 [Abstract(13238)] [View PDF(14069)622.06 K]