Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2009 Issue 8
Study of Improved Particle Swarm Optimization
WANG Yong;ZHANG Wei;CHEN Jun;WEI Peng-cheng
..............page:258-259,280
New Solving Algorithm of TSP Based on Return-to-zero Matrix
GUO Wen-qiang;QIN Zhi-guang;FENG Hao
..............page:254-257
Windows Rootkit Detection Method Based on Cross-view
BAI Guang-dong;GUO Yao;CHEN Xiang-qun
..............page:133-137
Aspect-oriented Architecture Description Language AC2-ADL
WEN Jing;YING Shi;ZHANG Lin-lin;NI You-cong
..............page:126-132
Performance Predication of Distributed Component Systems Based on Aspect Templates
HUANG Xiang;ZHANG Wen-bo;ZHANG Bo;WEI Jun
..............page:121-125,157
Web Service Oriented Workflow Model Based on ECA Rules
HE Chun-lin;TENG Yun;PENG Ren-ming
..............page:112-115
Comparison on the Performance of Media Access Control Mechanism for IEEE802.11 Wireless LAN
SONG Jun;JIN Yan-hua;LI Yuan-yuan;LI Lin
..............page:109-111
Verifiably Encrypted Signature Scheme Based on Certificateless
ZHOU Min;YANG Bo;FU Gui;WU Li-li
..............page:105-108
Digital Content Lending(Renting)Model and its Implementaion Framework
ZHONG Yong;LIN Dong-mei;LIU Feng-yu
..............page:98-104
New Improvement on a Fair Non-repudiation Protocol
LEI Xin-feng;LIU Jun;XIAO Jun-mo
..............page:94-97,148
Evaluation on the Implementation Process of IS Based on FI-SEM
YU Xiu-yan;HU Ke-jin;LUAN Dong-qing
..............page:250-253
Gaussian Processes Reinforcement Learning Method in Large Discrete States Space
ZHOU Wen-yun;LIU Quan;LI Zhi-tao
..............page:247-249,275
Method of Multi-granularity Community Structure Mining Based on Local Information Detection
ZHU Tao;CHANG Guo-cen;GUO Rong-xiao;LI Xiang-jun
..............page:243-246
Non-linear Transfer Learning Model
YANG Pei;TAN Qi;DING Yue-hua
..............page:212-214,242
Based on Environment Ontology Web Service Description: A Projection Approach
CAI Guang-jun;JIN Zhi
..............page:116-120
Microcalcification Detection Based on K-means Cluster and Multiple Kernel Support Vector Machine
CHANG Tian-tian;LIU Hong-wei;FENG Jun
..............page:231-233
Algorithm of Attribute Reduction Based on Database Technology
WANG Xiong-bin;ZHENG Xue-feng;XU Zhang-yan
..............page:227-230
Privacy Preserving Association Rule Mining Method Based on Web Logs
BAO Yu;HUANG Guo-xing
..............page:220-223
Spam Filtering Based on Covering Algorithm
DUAN Zhen;WANG Qian-qian;ZHANG Yan-ping;ZHANG Ling
..............page:217-219,253
Particle Filter Algorithm Imported Weighted Sampling about Pre-frame in Object Tracking
WU Gang;TANG Zhen-min;GENG Feng;CHENG Yong
..............page:215-216,246
Incremental Maintenance of Approximate Equal-depth Histograms Based on Merge-split Strategy
ZHANG Long-bo;LI Zhan-huai;WANG Yong
..............page:182-184
Formal Modeling and Evolution of Design Pattern Based on Role
SUN Jun-mei;MIAO Huai-kou
..............page:177-181
Component Composition Evaluation Method Based on Grey Correlation
YANG Xiao-ping;ZHANG Wei-qun;ZHOU Xiang-bing
..............page:174-176
Enhancement of Code Search Results Using Syntax and Semantic Analysis
LIU Shi;LI He;WANG Xiao-yin;ZHANG Lu;XIE Bing
..............page:165-168
Optimal Preventive Software Rejuvenation Policy with Periodic Testing
ZHAO Xu-feng;QIAN Cun-hua;NAKAGAWA Toshio
..............page:158-160,195
Entity Relation Extraction for Complex Chinese Text
WANG Yuan;XU De-zhi;CHEN Jian-er
..............page:208-211
Application of an Improved Dijkstra Algorithm in Multieast Routing Problem
ZHANG Yi;ZHANG Meng;LIANG Yan-chun
..............page:205-207,233
Survey on Modelling and Verification of Time Sensitive Security Protocol
ZHOU Ti;LI Zhou-jun;WANG Zhi-yong;WANG Jin-ying
..............page:3-7,48
Research and Prospect of Dynamic Routing in Wireless Sensor Networks
QI Xiao-gang;LIU San-yang
..............page:1-2,16
Fast Chinese Text Search Based on LSH
CAI Heng;LI Zhou-Jun;SUN Jian;LI Yang
..............page:201-204,230
Complete Algorithm of Quick Heuristic Attribute Reduction Based on Indiscernibility Degree
TENG Shu-hua;WEI Rong-hua;SUN Ji-xiang;TAN Zhi-guo;HU Qing-hua
..............page:196-200
Study on the Generalized Function-effect Chain in Information Retrieval
MIAO Jian-ming;ZHANG Quan
..............page:193-195
Muti-sources Web Service\'s QoS Collection Approach and Implementation
CHENG Zhi-wen;ZHAO Jun-feng;LI Tian;SHAO Ling-shuang;SUN Jia-su
..............page:189-192,211
Mean Value Coordinates on Tangent Plane for Laplacian Mesh Deformation
ZHAO Jian;HU Jian-guang;WU Ling-da
..............page:270-272
Image Encryption Communication Scheme Based on Clifford Map and Additive Modular Arithmetic
PAN Bo;FENG Jin-fu;TAO Qian;LI Qian
..............page:273-275
Research on Face Recognition Technique Based on Improved LBP Features
ZHAO Jian-min;ZHU Xin-zhong;JIANG Xiao-hui
..............page:276-280
Improved Adaptive FCM Color Image Segmentation Algorithm
YANG Hong-ying;WANG Xiang-yang;WANG Chun-hua
..............page:281-284
System Dynamics Model for a Mixed-strategy Game of Environmental Pollution
CAI Ling-ru;WANG Hong-wei;ZENG Wei
..............page:234-238,257
Optimization Technology of Domain-special Data Transmission Based on XML
ZHAO Chong-chong;WANG Xin;HU Chang-jun
..............page:185-188
Model Checking Web Services Based on Temporal Logic of Knowledge
LUO Xiang-yu;CHEN Yan;GU Tian-long;DONG Rong-sheng
..............page:153-157
Method of Evolutionary Testing Based on Unstructured Control Flow
JIANG Sheng;LU Yan-sheng
..............page:149-152,181
Reflection Mechanism for Software Architecture Reuse and its Formalization
LUO Ju-bo;YING Shi;YE Peng
..............page:145-148
Research on Integration Process of Viewpoints in Viewpoint-oriented Requirements Engineering
LIANG Zheng-ping;MING Zhong;WU Guo-qing
..............page:138-144
Model for Dependent Evidences in DSmT Framework
WANG Jin;SUN Huai-Jiang
..............page:260-263,295
Novel Design of Perfect Reconstructed Quadrature Mirror IIR Filter Banks
CHEN Hua-li;CHENG Geng-guo
..............page:92-93,115
Research on Implementation of OGC Web Processing Service
SUN Yu;LI Guo-qing;HUANG Zhen-chun
..............page:86-88,137
Mechanism for Packet Reordering in MANET
SUN Wei;WEN Tao;GUO Quan
..............page:82-85,108
Real-valued Negative Selection Algorithm with Boundary Detectors
WANG Da-wei;ZHANG Feng-bin
..............page:79-81
Communication Energy Model for Large Scale Fields Sensor Networks
XIAO De-qin;WANG Jing-li;LUO Xi-wen
..............page:75-78
Self-adaptive and Prediction-based Smooth Handoff Algorithm in 802.11 Networks
ZENG Zhi;LI Ren-fa;WEN Ji-gang;XIE Kun
..............page:71-74
Vehicle Synthetic Mobility Model for VANET Simulation
ZHANG Guo-qing;CHEN Wu;XU Zhong;HONG Liang;MU De-jun
..............page:67-70
Module Based Self-adaptive Contention Resolution Scheme for WiMAX Network with Heavy Traffic
DU Wen-feng;WANG Zhi-qiang;TAO Lan;FU Xiang-hua
..............page:54-58
Fine-grained Non-blocking Join Algorithm Based OH XJoin
CHEN Gang;LI Guo-hui;GU Jin-guang;YANG Bing;CHEN Hui;TANG Xiang-hong
..............page:49-53
Research on Component-based Protocol for Wireless Networks
WANG Lu;LIU Li-xiang;WANG Da-peng
..............page:64-66,144
SCSRM:A Splliting-connection-based Satellite Reliable Multicast Scheme
LIU Gong-liang;KANG Wen-jing;GU Xue-mai;GUO Qing
..............page:59-63
Survey of High-performance Web Crawler
ZHOU De-mao;LI Zhou-jun
..............page:26-29,53
Overview of Software Defect Data Processing Research
LI Ning;LI Zhan-huai
..............page:21-25,78
Scheme for Primary User Emulation in Cognitive Radio Networks
XUE Nan;ZHOU Xian-wei;XIN Xiao-yu;LI Dan;YANG Zhen
..............page:45-48
Brief Report of Research on Cognizing the Subarea of Evolutionary Computation(Ⅱ)
LIU Kun-qi;KANG Li-shan;ZHAO Zhi-zhuo
..............page:35-39,70
Research of Image Mining
FANG Ling-ling;WANG Xiang-hai
..............page:30-34,58
Survey on Router Buffer Sizing Strategy
WANG Jian-xin;LI Chun-quan;HUANG Jia-wei
..............page:12-16
Survey on Security Issues in Delay/Disruption Tolerant Networks
HU Qiao-lin;SU Jin-shu;ZHAO Bao-kang;HUANG Qing-yuan;SUN Yi-pin
..............page:8-11
Application Research of SVM Introjecting Fuzzy Theory in Image Affective Recognition
CHEN Jun-jie;ZHANG Da-wei;LI Hai-fang
..............page:288-290,299
Design of Adaptive Watermarking Algorithms for Video Signals Using Subjective Tests
SONG Xing-guang;ZHANG Chun-tian;SU Yu-ting
..............page:291-295
License Plate Location Algorithm Based on Multi-phases
PIAN Zhao-yu;MENG Xiang-ping;ZHANG Hong
..............page:296-299
Feature Extraction Algorithm Based on Locality and Globality and its Application in Face Recognition
ZHANG Guo-yin;LOU Song-jiang;CHENG Hui-jie;WANG Qing-jun
..............page:285-287