Volume 16,Issue 2,2005 Table of Contents

Other Issues:  
  
Contents

  • JIACKPT: A Recoverable Software Distributed Shared Memory System
  • ZHANG Long-Bing,ZHANG Fu-Xin,HU Wei-Wu and TANG Zhi-Min
  • 2005,16(2):165-173 [Abstract(3841)]  [View PDF(3818)829.90 K]
  • Optimized GLR Parsing for Programming Languages
  • LI Hu,JIN Mao-Zhong,XU Fu and ZHANG Min
  • 2005,16(2):174-183 [Abstract(4137)]  [View PDF(3452)981.79 K]
  • Workflow-Based Knowledge Flow Modeling and Control
  • ZHANG Xiao-Gang and LI Ming-Shu
  • 2005,16(2):184-193 [Abstract(3524)]  [View PDF(4617)815.88 K]
  • Static Analysis of OpenMP Directive Nesting Types and Its Application
  • CHEN Yong-Jian,SHU Ji-Wu,LI Jian-Jiang and WANG Ding-Xing
  • 2005,16(2):194-204 [Abstract(3299)]  [View PDF(3406)726.75 K]
  • An Efficient Compression Method of Relational Database
  • LUO Ji-Zhou and LI Jian-Zhong
  • 2005,16(2):205-214 [Abstract(3462)]  [View PDF(7605)954.44 K]
  • Efficiently Mining of Maximal Frequent Item Sets Based on FP-Tree
  • YAN Yue-Jin,LI Zhou-Jun and CHEN Huo-Wang
  • 2005,16(2):215-222 [Abstract(5500)]  [View PDF(5793)686.19 K]
  • Tree Automata Based Efficient XPath Evaluation over XML Data Stream
  • GAO Jun,YANG Dong-Qing,TANG Shi-Wei and WANG Teng-Jiao
  • 2005,16(2):223-232 [Abstract(4330)]  [View PDF(3586)846.24 K]
  • A Long-Term Learning-Based Dynamic User Model in Image Retrieval
  • ZHANG Liang,ZHOU Xiang-Dong,ZHANG Qi and SHI Bai-Le
  • 2005,16(2):233-238 [Abstract(3531)]  [View PDF(2899)595.63 K]
  • Research on Routing Algorithm and Self-Configuration in Content-Based Publish-Subscribe System
  • XUE Tao and FENG Bo-Qin
  • 2005,16(2):251-259 [Abstract(3304)]  [View PDF(4122)736.01 K]
  • Study on Relevant Law and Technology Issues about Computer Forensics
  • DING Li-Ping and WANG Yong-Ji
  • 2005,16(2):260-275 [Abstract(4005)]  [View PDF(5200)1.05 M]
  • A Two-Layer Markov Chain Anomaly Detection Model
  • XU Ming,CHEN Chun and YING Jing
  • 2005,16(2):276-285 [Abstract(3609)]  [View PDF(3347)772.18 K]
  • A Fuzzy Congestion Control Algorithm Based on Queue
  • QI Zhao-Hui,SUN Ji-Zhou and LI Xiao-Tu
  • 2005,16(2):286-294 [Abstract(2653)]  [View PDF(3544)772.31 K]
  • A Robust Detection Method of Blind Digital Watermark Based on Image Projective Sequence
  • JIN Cong and PENG Jia-Xiong
  • 2005,16(2):295-302 [Abstract(3278)]  [View PDF(3457)866.33 K]
  • Research of Interaction Computing Based on Pen Gesture in Conceptual Design
  • MA Cui-Xia,DAI Guo-Zhong,TENG Dong-Xing and CHEN You-Di
  • 2005,16(2):303-308 [Abstract(3694)]  [View PDF(3042)520.19 K]
  • 2-D Polygon Blending Based on Feature Decomposition
  • YANG Wen-Wu,FENG Jie-Qing,JIN Xiao-Gang and PENG Qun-Sheng
  • 2005,16(2):309-315 [Abstract(3494)]  [View PDF(3350)923.80 K]
  • An Effective Approach for Leather Nesting
  • ZHANG Yu-Ping,ZHANG Chun-Li and JIANG Shou-Wei
  • 2005,16(2):316-323 [Abstract(3981)]  [View PDF(7597)876.19 K]
  • Analysis of Application for Funding and Supporting for Key Programs by Computer Science Division of Information Science Department of NSFC in 2004
  • XU Lin,LIU Zhi-Yong and LIU Ke
  • 2005,16(2):324-326 [Abstract(3974)]  [View PDF(2848)419.94 K]
  • Review Articles

  • A Survey on the Core Technique and Research Development in SIP Standard
  • SI Duan-Feng,HAN Xin-Hui,LONG Qin and PAN Ai-Min
  • 2005,16(2):239-250 [Abstract(6041)]  [View PDF(4749)1.14 M]