Volume 15,Issue 1,2004 Table of Contents
Study of Application Framework Meta-Model Based on Component TechnologyHU Wen-Hui,ZHAO Wen,ZHANG Shi-Kun and WANG Li-Fu2004,15(1):1-8 [Abstract(4511)] [View PDF(5381)640.02 K]Key Techniques of a Hierarchical Simulation Runtime Infrastructure—StarLinkLIU Bu-Quan,WANG Huai-Min and YAO Yi-Ping2004,15(1):9-16 [Abstract(4068)] [View PDF(5160)687.67 K]Workflow Model Analysis Based on Time Constraint Petri NetsLI Hui-Fang and FAN Yu-Shun2004,15(1):17-26 [Abstract(4950)] [View PDF(5075)807.43 K]A General Model for Component-Based Software ReliabilityMAO Xiao-Guang and DENG Yong-Jin2004,15(1):27-32 [Abstract(4608)] [View PDF(5832)609.23 K]Illumination-Constrained Inpainting for Single Image Highlight RemovalTAN Ping,YANG Jie,LEI Bei,Steve Lin and Harry Shum2004,15(1):33-40 [Abstract(4961)] [View PDF(6298)829.55 K]Enhancing Content-Based Image Retrieval by Exploiting Relevance Feedback LogsZHANG Liang,SHI Bai-Le,ZHOU Xiang-Dong,LIU Li and ZHANG Qi2004,15(1):41-48 [Abstract(3680)] [View PDF(5122)752.67 K]A Virus Coevolution Genetic Algorithm for Project Optimization SchedulingHU Shi-Cheng,XU Xiao-Fei and LI Xiang-Yang2004,15(1):49-57 [Abstract(4436)] [View PDF(5755)514.23 K]Evidence Ullage Analysis in D-S Theory and DevelopmentXU Ling-Yu,ZHANG Bo-Feng,XU Wei-Min,XU Huai-Yu and GUO Fei-Fan2004,15(1):69-75 [Abstract(4102)] [View PDF(4730)713.71 K]A Study on Architecture of Massive Information Management for Digital LibraryXING Chun-Xiao,ZENG Chun,LI Chao and ZHOU Li-Zhu2004,15(1):76-85 [Abstract(4089)] [View PDF(5078)814.07 K]A Long-Term Learning Based Similarity Retrieval of Multimedia DatabaseZHOU Xiang-Dong,SHI Bai-Le,ZHANG Qi,ZHANG Liang and LIU Li2004,15(1):86-93 [Abstract(4485)] [View PDF(5019)715.59 K]Mining Frequent Closed Patterns by Adaptive PruningLIU Jun-Qiang,SUN Xiao-Ying,ZHUANG Yue-Ting and PAN Yun-He2004,15(1):94-102 [Abstract(4635)] [View PDF(5249)850.61 K]Direction Relation Query Processing Using R-TreesXIAO Yu-Qin,ZHANG Ju,JING Ning and LI Jun2004,15(1):103-111 [Abstract(4266)] [View PDF(5008)837.22 K]A Mechanism to Efficiently Transport Wireless Real-Time IP Services over Cellular LinksWU Yi-Chuan,HUANG Kui,SUN Li-Min and WU Zhi-Mei2004,15(1):112-119 [Abstract(3648)] [View PDF(4318)583.42 K]Study on RTI Congestion Control Based on the Layer of InterestZHOU Zhong and ZHAO Qin-Ping2004,15(1):120-130 [Abstract(4209)] [View PDF(4396)986.59 K]Secure Authentication Protocol for Trusted Copyright Management Based on Dynamic LicenseMA Zhao-Feng,FENG Bo-Qin,SONG Qin-Bao and WANG Hao-Ming2004,15(1):131-140 [Abstract(3858)] [View PDF(5809)824.36 K]Reliable Detection of Spatial LSB Steganography Based on Difference HistogramZHANG Tao and PING Xi-Jian2004,15(1):151-158 [Abstract(4595)] [View PDF(6026)1.21 M]
An Overview of the Core Technology of JVT Draft'sZHENG Xiang,YE Zhi-Yuan and ZHOU Bing-Feng2004,15(1):58-68 [Abstract(6850)] [View PDF(8223)882.18 K]A Survey of Research on Key Management for MulticastXU Ming-Wei,DONG Xiao-Hu and XU Ke2004,15(1):141-150 [Abstract(7562)] [View PDF(7833)861.11 K]