Volume 16,Issue 2,2005 Table of Contents

Other Issues:  
  
Contents

  • JIACKPT: A Recoverable Software Distributed Shared Memory System
  • ZHANG Long-Bing,ZHANG Fu-Xin,HU Wei-Wu and TANG Zhi-Min
  • 2005,16(2):165-173 [Abstract(4646)]  [View PDF(5563)829.90 K]
  • Optimized GLR Parsing for Programming Languages
  • LI Hu,JIN Mao-Zhong,XU Fu and ZHANG Min
  • 2005,16(2):174-183 [Abstract(5181)]  [View PDF(5328)981.79 K]
  • Workflow-Based Knowledge Flow Modeling and Control
  • ZHANG Xiao-Gang and LI Ming-Shu
  • 2005,16(2):184-193 [Abstract(4378)]  [View PDF(6479)815.88 K]
  • Static Analysis of OpenMP Directive Nesting Types and Its Application
  • CHEN Yong-Jian,SHU Ji-Wu,LI Jian-Jiang and WANG Ding-Xing
  • 2005,16(2):194-204 [Abstract(4175)]  [View PDF(4890)726.75 K]
  • An Efficient Compression Method of Relational Database
  • LUO Ji-Zhou and LI Jian-Zhong
  • 2005,16(2):205-214 [Abstract(4518)]  [View PDF(9165)954.44 K]
  • Efficiently Mining of Maximal Frequent Item Sets Based on FP-Tree
  • YAN Yue-Jin,LI Zhou-Jun and CHEN Huo-Wang
  • 2005,16(2):215-222 [Abstract(6577)]  [View PDF(7633)686.19 K]
  • Tree Automata Based Efficient XPath Evaluation over XML Data Stream
  • GAO Jun,YANG Dong-Qing,TANG Shi-Wei and WANG Teng-Jiao
  • 2005,16(2):223-232 [Abstract(5199)]  [View PDF(5043)846.24 K]
  • A Long-Term Learning-Based Dynamic User Model in Image Retrieval
  • ZHANG Liang,ZHOU Xiang-Dong,ZHANG Qi and SHI Bai-Le
  • 2005,16(2):233-238 [Abstract(4338)]  [View PDF(4348)595.63 K]
  • Research on Routing Algorithm and Self-Configuration in Content-Based Publish-Subscribe System
  • XUE Tao and FENG Bo-Qin
  • 2005,16(2):251-259 [Abstract(4105)]  [View PDF(5738)736.01 K]
  • Study on Relevant Law and Technology Issues about Computer Forensics
  • DING Li-Ping and WANG Yong-Ji
  • 2005,16(2):260-275 [Abstract(4886)]  [View PDF(7841)1.05 M]
  • A Two-Layer Markov Chain Anomaly Detection Model
  • XU Ming,CHEN Chun and YING Jing
  • 2005,16(2):276-285 [Abstract(4570)]  [View PDF(5102)772.18 K]
  • A Fuzzy Congestion Control Algorithm Based on Queue
  • QI Zhao-Hui,SUN Ji-Zhou and LI Xiao-Tu
  • 2005,16(2):286-294 [Abstract(3457)]  [View PDF(4989)772.31 K]
  • A Robust Detection Method of Blind Digital Watermark Based on Image Projective Sequence
  • JIN Cong and PENG Jia-Xiong
  • 2005,16(2):295-302 [Abstract(4024)]  [View PDF(5144)866.33 K]
  • Research of Interaction Computing Based on Pen Gesture in Conceptual Design
  • MA Cui-Xia,DAI Guo-Zhong,TENG Dong-Xing and CHEN You-Di
  • 2005,16(2):303-308 [Abstract(4479)]  [View PDF(4526)520.19 K]
  • 2-D Polygon Blending Based on Feature Decomposition
  • YANG Wen-Wu,FENG Jie-Qing,JIN Xiao-Gang and PENG Qun-Sheng
  • 2005,16(2):309-315 [Abstract(4360)]  [View PDF(5021)923.80 K]
  • An Effective Approach for Leather Nesting
  • ZHANG Yu-Ping,ZHANG Chun-Li and JIANG Shou-Wei
  • 2005,16(2):316-323 [Abstract(4910)]  [View PDF(9435)876.19 K]
  • Analysis of Application for Funding and Supporting for Key Programs by Computer Science Division of Information Science Department of NSFC in 2004
  • XU Lin,LIU Zhi-Yong and LIU Ke
  • 2005,16(2):324-326 [Abstract(4825)]  [View PDF(4681)419.94 K]
  • Review Articles

  • A Survey on the Core Technique and Research Development in SIP Standard
  • SI Duan-Feng,HAN Xin-Hui,LONG Qin and PAN Ai-Min
  • 2005,16(2):239-250 [Abstract(7571)]  [View PDF(7802)1.14 M]