Volume 15,Issue 1,2004 Table of Contents

Other Issues:  
  
Contents

  • Study of Application Framework Meta-Model Based on Component Technology
  • HU Wen-Hui,ZHAO Wen,ZHANG Shi-Kun and WANG Li-Fu
  • 2004,15(1):1-8 [Abstract(3277)]  [View PDF(3574)640.02 K]
  • Key Techniques of a Hierarchical Simulation Runtime Infrastructure—StarLink
  • LIU Bu-Quan,WANG Huai-Min and YAO Yi-Ping
  • 2004,15(1):9-16 [Abstract(2825)]  [View PDF(3273)687.67 K]
  • Workflow Model Analysis Based on Time Constraint Petri Nets
  • LI Hui-Fang and FAN Yu-Shun
  • 2004,15(1):17-26 [Abstract(3639)]  [View PDF(3136)807.43 K]
  • A General Model for Component-Based Software Reliability
  • MAO Xiao-Guang and DENG Yong-Jin
  • 2004,15(1):27-32 [Abstract(3301)]  [View PDF(3559)609.23 K]
  • Illumination-Constrained Inpainting for Single Image Highlight Removal
  • TAN Ping,YANG Jie,LEI Bei,Steve Lin and Harry Shum
  • 2004,15(1):33-40 [Abstract(3706)]  [View PDF(4353)829.55 K]
  • Enhancing Content-Based Image Retrieval by Exploiting Relevance Feedback Logs
  • ZHANG Liang,SHI Bai-Le,ZHOU Xiang-Dong,LIU Li and ZHANG Qi
  • 2004,15(1):41-48 [Abstract(2607)]  [View PDF(3309)752.67 K]
  • A Virus Coevolution Genetic Algorithm for Project Optimization Scheduling
  • HU Shi-Cheng,XU Xiao-Fei and LI Xiang-Yang
  • 2004,15(1):49-57 [Abstract(3278)]  [View PDF(3819)514.23 K]
  • Evidence Ullage Analysis in D-S Theory and Development
  • XU Ling-Yu,ZHANG Bo-Feng,XU Wei-Min,XU Huai-Yu and GUO Fei-Fan
  • 2004,15(1):69-75 [Abstract(2856)]  [View PDF(3048)713.71 K]
  • A Study on Architecture of Massive Information Management for Digital Library
  • XING Chun-Xiao,ZENG Chun,LI Chao and ZHOU Li-Zhu
  • 2004,15(1):76-85 [Abstract(3022)]  [View PDF(3367)814.07 K]
  • A Long-Term Learning Based Similarity Retrieval of Multimedia Database
  • ZHOU Xiang-Dong,SHI Bai-Le,ZHANG Qi,ZHANG Liang and LIU Li
  • 2004,15(1):86-93 [Abstract(3244)]  [View PDF(3125)715.59 K]
  • Mining Frequent Closed Patterns by Adaptive Pruning
  • LIU Jun-Qiang,SUN Xiao-Ying,ZHUANG Yue-Ting and PAN Yun-He
  • 2004,15(1):94-102 [Abstract(3365)]  [View PDF(3370)850.61 K]
  • Direction Relation Query Processing Using R-Trees
  • XIAO Yu-Qin,ZHANG Ju,JING Ning and LI Jun
  • 2004,15(1):103-111 [Abstract(3171)]  [View PDF(3300)837.22 K]
  • A Mechanism to Efficiently Transport Wireless Real-Time IP Services over Cellular Links
  • WU Yi-Chuan,HUANG Kui,SUN Li-Min and WU Zhi-Mei
  • 2004,15(1):112-119 [Abstract(2642)]  [View PDF(2773)583.42 K]
  • Study on RTI Congestion Control Based on the Layer of Interest
  • ZHOU Zhong and ZHAO Qin-Ping
  • 2004,15(1):120-130 [Abstract(3013)]  [View PDF(2631)986.59 K]
  • Secure Authentication Protocol for Trusted Copyright Management Based on Dynamic License
  • MA Zhao-Feng,FENG Bo-Qin,SONG Qin-Bao and WANG Hao-Ming
  • 2004,15(1):131-140 [Abstract(2649)]  [View PDF(3566)824.36 K]
  • Reliable Detection of Spatial LSB Steganography Based on Difference Histogram
  • ZHANG Tao and PING Xi-Jian
  • 2004,15(1):151-158 [Abstract(3403)]  [View PDF(3853)1.21 M]
  • Review Articles

  • An Overview of the Core Technology of JVT Draft's
  • ZHENG Xiang,YE Zhi-Yuan and ZHOU Bing-Feng
  • 2004,15(1):58-68 [Abstract(5067)]  [View PDF(4609)882.18 K]
  • A Survey of Research on Key Management for Multicast
  • XU Ming-Wei,DONG Xiao-Hu and XU Ke
  • 2004,15(1):141-150 [Abstract(5770)]  [View PDF(5020)861.11 K]