Volume 15,Issue 1,2004 Table of Contents

Other Issues:  
  
Contents

  • Study of Application Framework Meta-Model Based on Component Technology
  • HU Wen-Hui,ZHAO Wen,ZHANG Shi-Kun and WANG Li-Fu
  • 2004,15(1):1-8 [Abstract(3099)]  [View PDF(3423)640.02 K]
  • Key Techniques of a Hierarchical Simulation Runtime Infrastructure—StarLink
  • LIU Bu-Quan,WANG Huai-Min and YAO Yi-Ping
  • 2004,15(1):9-16 [Abstract(2692)]  [View PDF(3215)687.67 K]
  • Workflow Model Analysis Based on Time Constraint Petri Nets
  • LI Hui-Fang and FAN Yu-Shun
  • 2004,15(1):17-26 [Abstract(3475)]  [View PDF(3059)807.43 K]
  • A General Model for Component-Based Software Reliability
  • MAO Xiao-Guang and DENG Yong-Jin
  • 2004,15(1):27-32 [Abstract(3167)]  [View PDF(3482)609.23 K]
  • Illumination-Constrained Inpainting for Single Image Highlight Removal
  • TAN Ping,YANG Jie,LEI Bei,Steve Lin and Harry Shum
  • 2004,15(1):33-40 [Abstract(3525)]  [View PDF(4291)829.55 K]
  • Enhancing Content-Based Image Retrieval by Exploiting Relevance Feedback Logs
  • ZHANG Liang,SHI Bai-Le,ZHOU Xiang-Dong,LIU Li and ZHANG Qi
  • 2004,15(1):41-48 [Abstract(2476)]  [View PDF(3231)752.67 K]
  • A Virus Coevolution Genetic Algorithm for Project Optimization Scheduling
  • HU Shi-Cheng,XU Xiao-Fei and LI Xiang-Yang
  • 2004,15(1):49-57 [Abstract(3097)]  [View PDF(3726)514.23 K]
  • Evidence Ullage Analysis in D-S Theory and Development
  • XU Ling-Yu,ZHANG Bo-Feng,XU Wei-Min,XU Huai-Yu and GUO Fei-Fan
  • 2004,15(1):69-75 [Abstract(2741)]  [View PDF(2998)713.71 K]
  • A Study on Architecture of Massive Information Management for Digital Library
  • XING Chun-Xiao,ZENG Chun,LI Chao and ZHOU Li-Zhu
  • 2004,15(1):76-85 [Abstract(2901)]  [View PDF(3294)814.07 K]
  • A Long-Term Learning Based Similarity Retrieval of Multimedia Database
  • ZHOU Xiang-Dong,SHI Bai-Le,ZHANG Qi,ZHANG Liang and LIU Li
  • 2004,15(1):86-93 [Abstract(3077)]  [View PDF(3067)715.59 K]
  • Mining Frequent Closed Patterns by Adaptive Pruning
  • LIU Jun-Qiang,SUN Xiao-Ying,ZHUANG Yue-Ting and PAN Yun-He
  • 2004,15(1):94-102 [Abstract(3186)]  [View PDF(3296)850.61 K]
  • Direction Relation Query Processing Using R-Trees
  • XIAO Yu-Qin,ZHANG Ju,JING Ning and LI Jun
  • 2004,15(1):103-111 [Abstract(3025)]  [View PDF(3241)837.22 K]
  • A Mechanism to Efficiently Transport Wireless Real-Time IP Services over Cellular Links
  • WU Yi-Chuan,HUANG Kui,SUN Li-Min and WU Zhi-Mei
  • 2004,15(1):112-119 [Abstract(2531)]  [View PDF(2722)583.42 K]
  • Study on RTI Congestion Control Based on the Layer of Interest
  • ZHOU Zhong and ZHAO Qin-Ping
  • 2004,15(1):120-130 [Abstract(2893)]  [View PDF(2569)986.59 K]
  • Secure Authentication Protocol for Trusted Copyright Management Based on Dynamic License
  • MA Zhao-Feng,FENG Bo-Qin,SONG Qin-Bao and WANG Hao-Ming
  • 2004,15(1):131-140 [Abstract(2526)]  [View PDF(3501)824.36 K]
  • Reliable Detection of Spatial LSB Steganography Based on Difference Histogram
  • ZHANG Tao and PING Xi-Jian
  • 2004,15(1):151-158 [Abstract(3209)]  [View PDF(3777)1.21 M]
  • Review Articles

  • An Overview of the Core Technology of JVT Draft's
  • ZHENG Xiang,YE Zhi-Yuan and ZHOU Bing-Feng
  • 2004,15(1):58-68 [Abstract(4825)]  [View PDF(4526)882.18 K]
  • A Survey of Research on Key Management for Multicast
  • XU Ming-Wei,DONG Xiao-Hu and XU Ke
  • 2004,15(1):141-150 [Abstract(5517)]  [View PDF(4934)861.11 K]