Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2004 Issue 3
Non-blocking Synchronization Mechanism for Embedded Operating System
zhang li ; li ren fa ; peng man man ; ling chun qing
..............page:88-90
A New Effective Method on Audio Information Retrieval
huang heng ; du zhong jun
..............page:85-87
A New Active Network Management System Based on Policy
zhang bin ; sun gang ; zhang chuang ; guo jun
..............page:174-177
Design and Implementation of a Tool for Data Extracting and Publishing on Web
deng tie qing ; wang zuo
..............page:178-180
An Architecture of Service Platform Based on Internet
qu ke wen ; li zeng zhi ; wang li ; yuan fei
..............page:181-182,227
Probe into PCI Interrupt Mechanism System
li xiao zuo ; liu xiao long ; xie chang sheng
..............page:91-93
Design and Implementation of Complex Cellular Signaling Transduction System
zhou zhi yuan ; li hong ; dai rong yang ; luo bo
..............page:94-95,111
Using Extended Anchortext for Classifying Web Pages
liu hong
..............page:112-113,124
Ways of Uniform Coding and Comparison
hu lei ; zhang shu guang ; ge xiao zuo
..............page:114-116
Application of Plug-in Method in Control Systems
liu jia ; wang li hong ; sun ke ning
..............page:117-118,148
Design and Implementation of Distribution Management System
cao zhao yong ; chen zhao qian ; wang ; chen jiang
..............page:119-121
Research and Implementation of Integration of P3 and Project Information System
wang hong bin ; zhou dong ru ; zhou zhi
..............page:122-124
Construction and Design of Network Experimental Platform in Education
zheng shi zuo ; zhang jiang ling
..............page:125-127,160
B/S-based File Management System of Automobiles and Drivers
han yu ; an bing ju
..............page:128-129
Key Technique of Developing System Applying ArcObjects
zhao wan feng ; liu nan ; liu ren yi ; wang jie
..............page:130-132
Develop MIS Applications Based on Multi-tier Distributed Model Using PB
kou yi ; wu li wen
..............page:133-135
Research on the Running Environments and Concurrent Protecting Mechanism of COM+ Components
liu hui ; zhi ming ; liu xian hui
..............page:136-138
Java Garbage Collection Mechanism and Tuning
chi zuo cheng
..............page:144-148
Web Database Development with Combined Technique of Java,ASP and ActiveX Data Control
shen yu yang ; zhang zuo ; jin xin yu
..............page:149-150,185
Design and Implementation of Web-based MIS on Markets of Person with Ability
dong dong ; jiang guo rui ; zhao shu liang
..............page:151-153
PC-Beowulf Cluster Based on Linux in Earthquake Information Processing
xu xia yi ; he xu li ; xu hong mei
..............page:154-155,204
The Model and Realization of a Platform for Smart Home
chu chun ping ; lv lv ; liu guang chang
..............page:156-157,169
Design and Analysis of an Embedded PCI Network Card Based on TriMedia Processor
chen hai hua ; yang chen zuo ; zuo song
..............page:158-160
Analysis of PE File Format
zuo hai ming ; yang zong yuan
..............page:165-166,193
Generalized Rose Curves and Their Application
jin yi ming ; zhang san yuan
..............page:170-171
Technology of Mixed Programming in Control Systems for Fixed-point DSPs
su yi zuo ; sun shuai hua ; bi chang qing
..............page:172-173,177
Heterogeneous Latencies and the Solution in Gnutella Network
guo yong qiang ; pan chun jian ; zhuang lei
..............page:183-185
Research of Server Cluster System
zeng bi qing ; chen zhi gang
..............page:186-187,196
Design and Implementation of Mobile Agent Platform in Intranet
yu hai yan ; li zuo ; zhang xia
..............page:188-190
Processing of Tense and Aspect in Chinese-English Machine Translation
cheng jie hua ; dai xin yu ; chen jia jun ; wang qi xiang
..............page:79-80
Information and Control in Gray-box Systems
chen peng fei ; wang chang shan
..............page:76-78
Find Minimal Reduces Using a Novel Survival of the Fittest Genetic Algorithm
yu xiao hui ; liu xi yu
..............page:73-75
Develop Aid Model Sustain Web-based Information Publishing System
zhao lian jun ; peng yan wu
..............page:70-72
A Diagnoses Means of Applications System Requirement
wang xiao wu ; shi hong
..............page:67-69
Modeling of Marine Geological Survey Database
dai qin fen ; wei he long ; su guo hui ; he shu feng
..............page:65-66,75
Prefix-Matching-Based Rule Updating Algorithm(PMBRUA)
chen shu zuo ; su jin shu
..............page:63-64
Design of Agent-based Virtual Enterprise Architecture
zhao yan hong ; chen fa ming
..............page:60-62,64
Based on Attention Mechanism Recognize Moving Target Research
luo xiao bin ; yin guo fu ; hu xiao bing ; chen zuo ; yin xiang yun
..............page:58-59
Researches and Implementation on the Distributed Heterogeneous Data Integration System
li guan yu ; liu jun ; zhang jun
..............page:96-98
Multi-tier Architecture Database and Application Instance
wu jian ping ; yang jian guo
..............page:99-100,116
Construct a Secure Client Relationship Management System with XML
wang shan shan ; fu hai ying ; li zuo
..............page:101-102,138
XML Support in Commercial RDBMS Products
xu zhuo ming ; liao shu mei ; tao wan ; dong yi sheng
..............page:103-105,121
Application Research of Logistics Information Based on DNA and COM+
liang zuo ; nie rui hua
..............page:106-108
Query of the Spatial Data in PDGIS
du bi qiang ; fan xiao liang ; xu shao lun
..............page:109-111
Research and Realization of the Network of Chain Enterprise Based on VPN
zhang xue jun ; huang li ya ; bao ya ping
..............page:191-193
Application of Multi Agent on Campus Information Gathering System
yan mei juan ; li jian hua
..............page:194-196
Study of an Explicit Rate Flow Control Mechanism Based on Fuzzy-PD in the ATM Network
liu zuo ; zhang shao bo ; wu jie yi ; zhang zuo bing
..............page:199-201
Research and Implementation of a High Performance File Access Protocol
zhong ning yi ; wan ji guang ; gu peng
..............page:202-204
Application of Smart Antenna Based on Software Radio Technology in CDMA Systems
cheng wei ; zuo ji zhang ; xu yue lei
..............page:205-207
The Comparison and Simulation of the Access Channel Design Technology in the WCDMA and CDMA2000 System
yan bin ; shi zhen hua ; zheng liang
..............page:208-210,216
Distributed Time-chain Security Protocol Based on E-document Time-stamping Service
zuo jun ; kang li shan ; chen zuo ping ; liang yi wen ; wu ren jie
..............page:211-213
The Formal Description of Distributed Denial of Service Attack
du yan hui ; ma rui ; liu yu shu
..............page:214-216
Research and Implementation of Multi-users Access Control in Management Information System
tang cheng hua ; chen xin du ; chen xin
..............page:217-219
Research and Implementation of Security Vulnerability Issue Based on LDAP
chen tie ming ; cai jia zuo
..............page:220-221
Design and Implementation of Visual LDAP in CA System
lu zuo ; zhang hai feng ; zhao kai
..............page:222-224
Studies in Intrusion Detection Technique Based on Immunological Principle
lu yun ping ; chen shu yu ; yao xue mei
..............page:228-229,232
Study on Method of Traffic Signs Recognition Based on Neural Network and Invariant Moments
wang kun ming ; xu zhong ren
..............page:254-255,260
A New Wavelet-based Image Compression Algorithm EBCOT
liu fang min ; jia shi xiang ; yu jian xin
..............page:256-260
Study of Integrating SOAP and CORBA
liu ai qin ; ge jun wei ; liu song bai
..............page:56-57,69
Study on Opponent Modeling in Adversarial Multi-Robot System
dun wen li ; meng qing chun ; zhuang xiao dong
..............page:53-55
Research on Monitoring Model Based on GMA
mei xiao yong ; xiao zheng hong
..............page:50-52
Unified Events Web Mining Model
li ying ji ; peng hong ; zheng qi lun
..............page:47-49
A Fast Algorithm for Mining Maximum Frequent Item Sets
song hai sheng
..............page:45-46
A Method Combining Rule-based and Statistics-based Approaches for Chinese Word Segmentation
zhao wei ; dai xin yu ; yin cun yan ; chen jia jun
..............page:23-25
OOS Centered Spare Parts Storage Model Based on Rebuild
he zhi de ; song jian she ; ma xiu hong
..............page:21-22
Study of Designing Insurance Electronic Business System Based on J2EE
jiang ping ; zuo chun ; chen bao bing
..............page:18-20
Application of Instant Messaging Technology in Group Decision Support System
liu da guang ; zuo zheng ; cao chang jun
..............page:16-17,25
Dynamic Data Allocation Algorithms for Distributed Video Servers
chen jin cai ; zhang jiang ling ; feng dan
..............page:13-15,22
The Theory and Application of Latent Semantic Analysis
gai jie ; wang zuo ; wu gang shan
..............page:9-12,20
The Technological Solution of the Public Amusement Service Place's Safe Protection
wang hong ; du xiao qin ; xu jun li
..............page:6-8
Research on User's Credit-degree Evaluation
tang long ye ; zhang ping ; zhou zong ping
..............page:233-234
Three Packet Marking Algorithm of IP Traceback Denial-of-Service Attacks
xu ming tao ; lu song nian ; yang shu tang
..............page:235-236,253
The Comparison of Five IP Traceback Denial-of-Service Attack Methods
xu ming tao ; lu song nian ; yang shu tang
..............page:237-238,245
RBAC Authorization Model and Application Research of Its Attribute Certificate Mechanism
xu chang feng ; he da ke ; liu ai jiang
..............page:239-242
A Model of Document Modeling-based Data Mining from DWG Files
zhong chun lai ; zhou xin ; chen gang ; dong jin xiang
..............page:243-245
Analysis to Dead Zones of Static-volume in Volumetric Display Technique
shi qiong ; shen chun lin
..............page:246-247,250
Research of Image Enhance for Tele-medical Information System
lv xiao zuo ; zhang zuo li
..............page:248-250
Point Targets Detection Method for Imaging Seeker
fang bin ; xing xiao zuo ; wang wei min ; chen yan zhong
..............page:251-253
Research and Application of Mould Injecting CAE System Based on Web Service
chen ke ; zhang yi sheng ; liang shu yun ; li de qun
..............page:42-44
Analysis of Spatial Data Structures
wu yuan hong ; guo ping ; ying xin yang
..............page:39-41,84
Study of Computing Technology and the Using in Finance
lan rong ; xu mi yu ; zheng shou zuo ; gui xiao lin
..............page:33-35
Practice and Analysis in Evaluation of Machine Translation
cao dong lin ; li tang qiu ; shi xiao dong ; cai jing qiu
..............page:29-32
A Study on Algorithm of Delaunay Triangulation for the Constrained Data Set and Application
liu shao hua ; cheng peng gen ; zhao bao gui
..............page:26-28