Volume 16,Issue 9,2005 Table of Contents
Semantic Analysis and Structured Language ModelsLI Ming-Qin,LI Juan-Zi,WANG Zuo-Ying and LU Da-Jin2005,16(9):1523-1533 [Abstract(4451)] [View PDF(6984)601.56 K]A Method of Roads Extraction from Aerial City Images Using D-S Theory of EvidenceWANG Li-Li,HAO Ai-Min,HE Bing and ZHAO Qin-Ping2005,16(9):1534-1541 [Abstract(4488)] [View PDF(5080)574.61 K]Automatic Selection of Kernel-Bandwidth for Mean-Shift Object TrackingPENG Ning-Song,YANG Jie,LIU Zhi and ZHANG Feng-Chao2005,16(9):1542-1550 [Abstract(7982)] [View PDF(8066)918.06 K]An Image Analysis Method for Acquiring Cell's Immunological InformationYANG Da-Gang,DOU Wan-Chun,ZHANG Xi-Wen and CAI Shi-Jie2005,16(9):1551-1559 [Abstract(3673)] [View PDF(4776)630.57 K]Construction of Hierarchical Classifiers Based on the Confusion Matrix and Fisher's PrincipleZHANG Jing,SONG Rui,YU Wen-Xian,XIA Sheng-Ping and HU Wei-Dong2005,16(9):1560-1567 [Abstract(4311)] [View PDF(5789)321.59 K]A Background Reconstruction Algorithm Based on Pixel Intensity ClassificationHOU Zhi-Qiang and HAN Chong-Zhao2005,16(9):1568-1576 [Abstract(8250)] [View PDF(7888)605.92 K]A Classification Approach Based on Evolutionary Neural NetworksSHANG Lin,WANG Jin-Gen,YAO Wang-Shu and CHEN Shi-Fu2005,16(9):1577-1583 [Abstract(4405)] [View PDF(5798)511.38 K]A Better Scaled Local Tangent Space Alignment AlgorithmYANG Jian,LI Fu-Xin and WANG Jue2005,16(9):1584-1590 [Abstract(4299)] [View PDF(6039)467.40 K]A Microarray Cluster Algorithm Based on Dominant Set SegmentationTENG Li,FU Xu-Ping,LI Hong-Yu,LI Yao,CHEN Wen-Bin,LI Rong-Yu and SHEN Yi-Fan2005,16(9):1591-1598 [Abstract(4514)] [View PDF(6945)426.66 K]Testing and Computing Diagnoses by Using Component ReplacementLI Zhan-Shan,WANG Tao,SUN Ji-Gui,LIN Hai and FENG Guo-Chen2005,16(9):1599-1605 [Abstract(3683)] [View PDF(4433)402.53 K]Publicly Verifiable Zero-Knowledge Watermark DetectionHE Yong-Zhong,WU Chuan-Kun and FENG Deng-Guo2005,16(9):1606-1616 [Abstract(4132)] [View PDF(4923)606.03 K]A Hybrid Authentication Method Used for Mobile IPv6CHEN Wei,LONG Xiang and GAO Xiao-Peng2005,16(9):1617-1624 [Abstract(3893)] [View PDF(4544)433.31 K]Data Model and Matching Algorithm in an Ontology-Based Publish/Subscribe SystemWANG Jin-Ling,JIN Bei-Hong,LI Jing and SHAO Dan-Hua2005,16(9):1625-1635 [Abstract(3953)] [View PDF(5935)423.00 K]An Intelligent Packet Dropping Algorithm with ECN CapabilityFAN Yan-Fei,LIN Chuang,REN Feng-Yuan and ZHAO Da-Yuan2005,16(9):1636-1646 [Abstract(3982)] [View PDF(4465)1.60 M]Manycast in Mobile Ad hoc NetworksYAN Wei and NI Lionel2005,16(9):1647-1660 [Abstract(3695)] [View PDF(4407)883.31 K]A Delay Oriented Adaptive Routing Protocol for Mobile Ad hoc NetworksXIE Fei,ZHANG Xin-Ming,GUO Jia-Feng and CHEN Guo-Liang2005,16(9):1661-1667 [Abstract(3958)] [View PDF(4571)443.91 K]Research on Node-State Independence in Autonomous Systems with Limited Node NumberWANG Chun-Fang,WANG Yu-Han,MA Zheng-Xin and LIU Xu-Ming2005,16(9):1668-1677 [Abstract(3826)] [View PDF(4152)659.12 K]A Blind Additive Watermarking Algorithm Under Intense Interference BackgroundYAN Xiao,MENG Ying-Jie,WANG Yang and YU Jun2005,16(9):1678-1684 [Abstract(4229)] [View PDF(4617)472.77 K]Adaptive Hurst Index Estimator Based on WaveletHONG Fei and WU Zhi-Mei2005,16(9):1685-1689 [Abstract(4169)] [View PDF(5546)336.03 K]