2Kunt Mlkonomopouls A,Koeher M Second.Generation Image Coding Techniques[J].Proc of the IEEE, 1985 ;73(4) :549-575.
3Nikos Grammalidis,Dimitfis Beletsiotis,Michael G.Strintzis.Sprite Generation and Coding in Mutiview Image Sequeces[J].IEEE Transaction on Circuits and Systems for Technology,2000; 10(2) :302-311.
4Aljoseha Smolic,Thonms Sikora,Jens-Rainer Ohm.Long-Term Global Motion Estimation and Its Application for Sprite Coding,Content Description,and Segmentation[J].IEEE Transaction on Circuits and Systems for Technology, 1999;9(8) : 1227-1242.
5DENNING DE. SMID M. Key escrowing today[J]. IEEE Communication Magazine, 1994, 32(9): 55 -68.
6GENNARO R. Theory and practice of verifiable secret sharing[D].Massachusetts Institute of Technology (MIT) ,Cambridge, 1996.
7David S.Linthicum.B2B应用集成.科学出版社,2002.
8Gunjan Samtani.EAI and Web Services,EAI Journal,2001.
9California Software Labs,Enterprise Integration Techniques And Web Services,2002.
10S.Tilley,J.Gerdes,T.Hamilton,S.Huang,H.Muller D.Smith and K.Wong.,On the business value and technical challenges of adopting Web Services,Journal of software maintenance and evolution,2004.