Volume 15,Issue 1,2004 Table of Contents

Other Issues:  
  
Contents

  • Study of Application Framework Meta-Model Based on Component Technology
  • HU Wen-Hui,ZHAO Wen,ZHANG Shi-Kun and WANG Li-Fu
  • 2004,15(1):1-8 [Abstract(4511)]  [View PDF(5381)640.02 K]
  • Key Techniques of a Hierarchical Simulation Runtime Infrastructure—StarLink
  • LIU Bu-Quan,WANG Huai-Min and YAO Yi-Ping
  • 2004,15(1):9-16 [Abstract(4068)]  [View PDF(5160)687.67 K]
  • Workflow Model Analysis Based on Time Constraint Petri Nets
  • LI Hui-Fang and FAN Yu-Shun
  • 2004,15(1):17-26 [Abstract(4950)]  [View PDF(5075)807.43 K]
  • A General Model for Component-Based Software Reliability
  • MAO Xiao-Guang and DENG Yong-Jin
  • 2004,15(1):27-32 [Abstract(4608)]  [View PDF(5832)609.23 K]
  • Illumination-Constrained Inpainting for Single Image Highlight Removal
  • TAN Ping,YANG Jie,LEI Bei,Steve Lin and Harry Shum
  • 2004,15(1):33-40 [Abstract(4961)]  [View PDF(6298)829.55 K]
  • Enhancing Content-Based Image Retrieval by Exploiting Relevance Feedback Logs
  • ZHANG Liang,SHI Bai-Le,ZHOU Xiang-Dong,LIU Li and ZHANG Qi
  • 2004,15(1):41-48 [Abstract(3680)]  [View PDF(5122)752.67 K]
  • A Virus Coevolution Genetic Algorithm for Project Optimization Scheduling
  • HU Shi-Cheng,XU Xiao-Fei and LI Xiang-Yang
  • 2004,15(1):49-57 [Abstract(4436)]  [View PDF(5755)514.23 K]
  • Evidence Ullage Analysis in D-S Theory and Development
  • XU Ling-Yu,ZHANG Bo-Feng,XU Wei-Min,XU Huai-Yu and GUO Fei-Fan
  • 2004,15(1):69-75 [Abstract(4102)]  [View PDF(4730)713.71 K]
  • A Study on Architecture of Massive Information Management for Digital Library
  • XING Chun-Xiao,ZENG Chun,LI Chao and ZHOU Li-Zhu
  • 2004,15(1):76-85 [Abstract(4089)]  [View PDF(5078)814.07 K]
  • A Long-Term Learning Based Similarity Retrieval of Multimedia Database
  • ZHOU Xiang-Dong,SHI Bai-Le,ZHANG Qi,ZHANG Liang and LIU Li
  • 2004,15(1):86-93 [Abstract(4485)]  [View PDF(5019)715.59 K]
  • Mining Frequent Closed Patterns by Adaptive Pruning
  • LIU Jun-Qiang,SUN Xiao-Ying,ZHUANG Yue-Ting and PAN Yun-He
  • 2004,15(1):94-102 [Abstract(4635)]  [View PDF(5249)850.61 K]
  • Direction Relation Query Processing Using R-Trees
  • XIAO Yu-Qin,ZHANG Ju,JING Ning and LI Jun
  • 2004,15(1):103-111 [Abstract(4266)]  [View PDF(5008)837.22 K]
  • A Mechanism to Efficiently Transport Wireless Real-Time IP Services over Cellular Links
  • WU Yi-Chuan,HUANG Kui,SUN Li-Min and WU Zhi-Mei
  • 2004,15(1):112-119 [Abstract(3648)]  [View PDF(4318)583.42 K]
  • Study on RTI Congestion Control Based on the Layer of Interest
  • ZHOU Zhong and ZHAO Qin-Ping
  • 2004,15(1):120-130 [Abstract(4209)]  [View PDF(4396)986.59 K]
  • Secure Authentication Protocol for Trusted Copyright Management Based on Dynamic License
  • MA Zhao-Feng,FENG Bo-Qin,SONG Qin-Bao and WANG Hao-Ming
  • 2004,15(1):131-140 [Abstract(3858)]  [View PDF(5809)824.36 K]
  • Reliable Detection of Spatial LSB Steganography Based on Difference Histogram
  • ZHANG Tao and PING Xi-Jian
  • 2004,15(1):151-158 [Abstract(4595)]  [View PDF(6026)1.21 M]
  • Review Articles

  • An Overview of the Core Technology of JVT Draft's
  • ZHENG Xiang,YE Zhi-Yuan and ZHOU Bing-Feng
  • 2004,15(1):58-68 [Abstract(6850)]  [View PDF(8223)882.18 K]
  • A Survey of Research on Key Management for Multicast
  • XU Ming-Wei,DONG Xiao-Hu and XU Ke
  • 2004,15(1):141-150 [Abstract(7562)]  [View PDF(7833)861.11 K]