Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2002 Issue 11
Security Architecture for Electronic Commerce
zhang feng ; qin zhi guang ; liu jin de ; zhang xian feng
..............page:121-123
The Design and Implementation of An On-line Handwritten Signature Verification
yang fei ; shen feng ; yuan yu liang ; pan jin gui
..............page:124-125,75
The Applied Character and Technical Advance of EDI for the Basic Technology of EC
xia feng ; gu yong hong
..............page:126-127,68
The Pointer Optimization Strategy Based on the distributed RSs in the Mobile IP Network
kang kai ; guo wei ; wu shi qi
..............page:128-130,92
Design and Implementation of a Reliable Name Service
li ya wei ; chen song ; zhou ming tian
..............page:131-134,137
prma zhong de yun xu gai lv dong tai jue ding suan fa
chen zuo ; xu fu pei
..............page:135-137
Analysis and Construction of Repository in PKI
hu yan ; dai ying xia ; lian yi feng ; lu zhen yu
..............page:118-120,123
mian xiang zi yuan de gong zuo liu shi wu mo xing
lai yao dong ; zhu jian xin ; gao ji
..............page:115-117,64
Language-Based Mobile-Code Security
guo fan ; chen yi yun ; hu rong gui
..............page:110-114
Enterprise Resources Planning and Its Key Technology
wang chong jun ; yin xu ri ; xie zuo ; chen shi fu
..............page:105-109
A Management-Enhanced Model for RBAC
yao li hong ; li zhen dong ; xie li
..............page:101-104,52
Topic Detection in News Video and Audio
chen kai jiang ; ou jia zhi ; huang zuo zuo ; wu li de
..............page:98-100,89
The Storage Optimization of XML Metadata in Digital Library
li ran ; zhang yun xia ; wang wei ; shi bo le
..............page:93-97
Mining Project Frequent Patterns without Candidate Generation
he yan xiang ; xiang jian wen ; zhu zuo feng ; kong wei qiang
..............page:71-75
Bayesian Networks for Causal Reasoning in Situation Assessment
li wei sheng ; wang bao shu
..............page:50-52
Based-Concept-Relation-Model Knowledge Interconnection
lei yu xia ; zuo yue fei
..............page:53-55,58
NPC Problems of the Reversal Distance between Genomes in Computational Biology
zuo jun feng ; zhu da ming ; ma shao han
..............page:59-64
A Multiple Pattern Matching Algorithm Based on Sequential Binary Tree
hu pei hua ; wang yong cheng ; liu gong shen
..............page:65-68
Application of Wavelet Analysis in Random Number Generators of the Information Security
lv shu wang ; su gui ping ; yang zhu ; xue ying hua
..............page:69-70
Key Establishment Protocols in Ad-Hoc Networks
lang wen hua ; zhou ming tian
..............page:138-140
Implement the Scalable Server Application with Completion Ports
wu xing ; huang ai ping
..............page:144-145,164
Software Architecture:a New Research Domain
zhao hui qun ; sun jing ; wang guo ren ; gao yuan
..............page:146-149
Agent-Oriented Methodology and Modeling Tools
ji qiang
..............page:150-153,160
Research of Security Kernel Mechanism Supporting Dynamical Policies
wu xin yong ; xiong guang ze
..............page:154-156,140
A Design Methodology for Extensible Operating Systems
shi xiao an ; zhou xing she ; lin zuo ; wang ji zuo
..............page:157-160
The Study of Method of Get Remote Object in Distributed System
wang ru chuan ; chen yun fang ; tu zuo
..............page:161-164
Model Checking on Duration Properties of Real-time Systems
li yong ; li xuan dong ; zheng guo liang
..............page:165-167,封四
Design and Implementation of XML-Based Distance Teaching System
shen zhen lin ; luo wei qi ; yao guo xiang
..............page:168-169
Several Three Stage Lifting Scheme in Wavelet Transforms and Image Compression
li gang ; wu yu ; wang guo zuo ; nie neng
..............page:87-89
Algorithms Based on Rough Set Theory for Feature Subset Selection
zhao jun ; wang guo zuo ; wu zhong fu ; tang hong ; li hua ; liao xiao feng
..............page:83-86
A System of Intelligent Professional Search of Virtual Enterprise
tian li wei ; yin chao wan
..............page:79-82
E-FP:An Efficient and Affective Method for Multi-level Multi-Dimensional Sequential Frequent Patterns Mining
he guang hui ; wang wei zuo ; guo ping ; jiang yu
..............page:76-78
A Compiling Framework Based on Uniform Partitioning Schemes for Parallel Loops
huang qi jun ; ding yang ; yu hua shan ; ding wen kui ; xu zhuo qun
..............page:1-8
Advance in Compiler Infrastructures
dai gui lan ; tian jin lan ; zhang su qin ; jiang wei du
..............page:9-11,28
From Distributed Object to Web Service
wu min qiang ; zhang zuo ; yang shu hui ; chen dao xu ; xie li
..............page:12-15,21
The Analysis and Comparing of Interprocess Communication
li xiao qun ; zhao hui bin ; sun yu fang
..............page:16-21
A Research on Multi-Level Networked RAID Based Cluster Architecture
liu xiao guang ; wang gang ; zeng zhao zhi ; liu
..............page:22-23,97
Exploiting Inter-node Pipelining Parallelism in Distributed Memory Systems
chen li ; zhang zhao qing ; feng xiao bing
..............page:24-28
Study on the Queuing Model of the Message-Oriented Middleware
zhou shi jie ; qin zhi guang ; liu jin de
..............page:29-32
A Heterogeneous Distributed Real-Time Scheduling System Based on Reflective Middleware
yang shi ping ; xiong guang ze ; liu jin de
..............page:32-35,39
Data Fusion of Numerical-Linguistic Based on Granular Neural Networks
xing xiao shuai ; jiao li cheng
..............page:40-43
Using Semantic Information and Language Knowledge in Bilingual Word Alignment
jin zuo ; huang he yan ; xia yun qing
..............page:44-47
Rules Reduction for Dynamic Knowledge Systems
zuo de qin ; chi zhong xian
..............page:48-49,78