Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2006 Issue 12
Research on Mobile Payment System Based on Tate Pairing
YANG Xiao-dong;HUANG Ping;ZHANG Gui-cang;LU Hong-wen
..............page:175-177
Against-Expectation Pattern and Its Application in Marketing
YOU Xiao-fang;QIN Ze;CHEN Feng;ZHANG Shi-chao
..............page:171-174,177
Research and Realization of Integrated Environment for Data Warehouse
CUI Xiao-jun;XUE Yong-sheng
..............page:178-180,184
Technology of Enterprise Application Integration Based on XML Message Brokers
SHENG Bu-yun;ZHANG Ming-xiong;LUO Dan;XIE Qing-sheng
..............page:185-187,191
Design and Implementation of E-mail Protocols Assembly and Analysis System
CHEN Ming-jian;LIU Bao-xu;XU Rong-sheng
..............page:265-267,270
Design and Implementation of Symbolized Module Based on ArcGIS Engine
CAI Guo-lin;LI Yong-shu;FENG De-jun
..............page:268-270
Method of How Smart Home System Connect to Internet
KANG Ping;YUAN Hong-chao
..............page:256-257,259
Theory Model of Grid Computing with Active Multi-Tape Memory
CAO Yao-qin;LI Guang-ming;SONG Jian-she
..............page:258-259
Design and Implementation of Natural Language Understanding for Search Engine
QIAN Bing;WANG Yong-cheng;GAO Kai
..............page:260-262
Application of Fuzzy Neural Networks in Business Rule Data Mining
feng zheng ;feng zheng
..............page:263-264,274
Organization and Query of GIS Data Based on Oracle Spatial
SU Bing-jun;ZHU Chang-qian;LI Lin
..............page:278-280
Research and Comparison on Routing Protocols for Wireless Sensor Networks
DAI Shi-jin;ZHANG Yi-de;LI Le-min
..............page:294-297
Research of Signal Integrity Design of Ethernet Switch
GUO Peng;LIU Qiong
..............page:298-300
Study on Routing Technologies in Intelligent Optical Networks Based on GMPLS
MAO Yan-fang;LI La-yuan
..............page:301-303
Implementation of Group-Ping Program Compatible with IPv4 and IPv6
LAN Cui-fen;DONG Shou-ling;ZHOU Jie
..............page:281-283
Design and Implementation for Intelligent Transportation Information Collection System
NI Wei-jian;KANG Ye-wei;ZHAO Hai-shan;HUANG Ya-lou
..............page:271-274
Application and Implementation of Bridge CA in B2B EC
LIU Qiang;YANG Wei;WANG Min;ZHOU Li-hua
..............page:275-277,283
Design and Implementation of G-code Interpreter in Linux Environment
JI Hua;LI Yan;XIAO Shi-guang
..............page:200-202
PSP/TSP-based Software Process Improvement Framework
WANG Dan-hua;YIN Jun;PAN Jin-gui
..............page:206-208
Telecom Self-Service System Based on J2EE
ZHOU Shui-qing;JIN Ou;HE Jian-biao
..............page:211-212,229
Design and Analysis of DMA Controller IP Core on AMBA Bus
XIE Lang;YANG Yan
..............page:213-214
Quickly Construction of Top-quality Course Editor Tool Based on .NET Platform
GAO Zhen;YU Ben-gong;CHU Wei
..............page:227-229
Design and Key Technology of Soil Erosion Information System Based on ArcGIS Engine and .NET
ZHANG Zhen-long;ZENG Zhi-yuan;HU Zi-fu
..............page:230-232
Implementation of Heterogeneous DBMS Migration
LUO Lin-qiu;MENG Qi;LI Xiao;SU Guo-ping;ZHANG Cheng-che
..............page:233-235,238
Distant Education System Research in Field of Village Information Service
DAI Xiao-peng;YU Fei;HUANG Huang;ZHANG Lin-feng
..............page:284-286
Business Rule-based Framework for Telecom Network Data Processing
BAO Tie;LIU Shu-fen
..............page:287-288,332
Research on Rights Expression Language Model for Learning Resources and Its Implementation Mechanism
LIU Qing-tang;JIN Jing;ZHAO Gang;CHENG Wen-qing;YANG Zong-kai
..............page:289-291
Optimized in DSR Routing Protocol of Ad hoc Networks
ZHOU Jing-xiang;LI La-yuan
..............page:292-293,322
Research of Relative Aspects of MAC Layer Design for Ad hoc Networks
HE Min;LIU Xin-song;ZHAO Dong-feng
..............page:304-306,309
E-commerce Recommendation Systems Based on Knowledge Grid
CHEN Dong-lin;NIE Gui-hua;LIU Ping-feng
..............page:307-309
Cooperative Web Caching System Research Based on Enterprise P2P Model
ZHOU Gang;ZHOU Jian-guo;ZHENG Li-xia
..............page:310-312
Novel Image Thresholding Method Based on Parzen Window Technique and Renyi Entropy
XIONG Fu-song;WANG Shi-tong
..............page:313-315,328
Segmentation of LSCM Images Based on Multi-channel Information Fusion
HE Lei;ZHANG Su;XIAO Chang-yan;CHEN Ya-zhu
..............page:316-318,325
Chaotic Semi-Fragile Image Watermarking Based on Block-DCT
CHEN Zhi-gang;ZHU Cong-xu
..............page:319-322
New Image Classification Application Research
WANG Song;WANG Wei-hong;QIN Xu-jia
..............page:323-325
Investigation on Micro-surgery Operation Quantity Evaluation Based on Image Processing
LIN Xiao;PU Jie-xin;LEI Wan-jun
..............page:326-328
Algorithm and Implementation of Digital Watermarking Based on Improved SVD
ZHU Xin-zhong;XU Hui-ying;ZHAO Jian-min
..............page:329-332
Image Adaptive Blind Watermarking Algorithm Based on Wavelet Transform
FU Xiao-qing;LI Xiao-ping;SHI Lei
..............page:333-335
Steganalysis Based on Bit Plane Correlation in Images
LI Yi-min;WANG Dao-shun
..............page:336-337,340
Method for Inpainting Large Block
jiang rui ;ma li-zhuang; ma li zhuang ; nie dong dong
..............page:338-340
Multi-focus Image Fusion Using Multiresolution and Block Segment
CHU Heng;DING Yi;LI Jie;ZHU Wei-le
..............page:344-346
Digital Image Watermark Scheme Based on Parity of Pixels
XUE Hui;WANG Ping;LIANG Jing;DU Wei-min
..............page:347-348
Research and Implementation of Skinned Mesh Character Animation in 3D-Graphic Engine
WANG Hong-fu;CHEN Lei-ting;LI Dong-kui
..............page:349-350,356
Remote Sensing Image Restoration Grid Processing
LI Sheng-yang;ZHU Chong-guang
..............page:351-353
Research on Embedded Middleware and Its Implementation Oriented DTV
LEI Yu;GU Jian-hua;NI Hong-bo
..............page:354-356
Building Enterprise Application Integration Based on Grid Computing
YU Feng;DING Xiang-qian
..............page:242-243,246
Novel Scheme for On-line Capacity Expansion in RAID System
FENG Dan;PENG Li
..............page:244-246
Design and Implementation of Expert System for Cow Disease Diagnose Based on .NET Framework
XIAO Jian-hua;GAO Li;DOU Ya-ping;WANG Hong-bin
..............page:247-248
Summary and Research of JFFS2 Mounting Improvement Schemes
YU Sheng-sheng;GU Ren-kui;ZHOU Jing-li;WANG You-cheng
..............page:249-252
Design and Implementation of Daemon SoftMan for Linux
ZENG Guang-ping;CHEN Ming;TU Xu-yan
..............page:253-255
MFC Programming Framework's .NET Extension Model
HU Zi-yi;LIANG Bo
..............page:215-216,219
Semantic Query of Enterprise Data Based on Semantic Model
DONG Xiao-feng;ZHANG Shu-sheng;ZHAO Han;ZHOU Jing-tao;FENG Yun;TIAN Zhan-qiang
..............page:217-219
Implementation of AV Frame Based on UPnP Protocol
LUAN Xin;XU Dan-tian;WANG Peng;LI Zhi-wei
..............page:224-226,232
Design & Implementation of Property Management Information System Based on GIS
LU Xia;SUN Ji-gui;LI Hai-tao
..............page:188-191
Research on Design and Application of Domain Ontology of Zhalong Wetland Protection
XING Jun;ZHOU Kai-peng;HAN Min
..............page:192-194
Approach for Lexicon Updating Based on Data Mining
WANG Li-xi;WANG Jian-dong;WANG Jing
..............page:195-197
Improved Optimization Flow Control Model
CHEN Yuan-yan;YAN You-biao;LUO Xiao-shu
..............page:198-199,202
Research of Security Protocol in Distributed Sensor Network
LIU Yan;WANG Dong-an;NAN Kai;YAN Bao-ping
..............page:165-167,170
Study of Attack in IPv6 and IPv4 Network
ZHENG Xiao-hong;LIU Zhi-gui;LU Rong-jie
..............page:159-161,164
Trusted Network Connect Based on Access Control Model for Data Acquisition System
XIANG Dong;WANG Run-xiao;SHI Cheng-qi;JIANG Xiao-peng
..............page:157-158
Research and Implementation of J2EE-based Resource Access Decision Services
ZHANG Fang-zhou;WANG Dong-an;LI Sheng;QIN Gang;SONG Cheng
..............page:135-137
Research and Application of Time Synchronization Technology in Network Monitor
LIU Yan;FAN Xun;YAN Bao-ping
..............page:132-134
Analysis of Isearch Mechanism
ZHANG Hui;XIAO Wei-dong;LIU Jian;HU Yan-li
..............page:129-131
Research on Architecture and Technologies of Resource Sharing Service Environment for Industrial Cluster
NING Qian;YIN Guo-fu;XU Lei;WANG Yong-chao
..............page:48-50
Multi-Project Resource Leveling and Its Genetic Algorithm
WANG Wei-xin;LI Yuan
..............page:46-47,58
Strategy of Workflow Dynamic Modification Based on Component
LIU Bin;ZHANG Chun-hai
..............page:43-45
Data Clustering Based on Quantum-behaved Particle Swarm Optimization
LONG Hai-xia;XU Wen-bo;SUN Jun
..............page:40-42,45
Source Address Spoofed Packets Detecting Approach Based on TTL Anomalies
XUN Bao-cheng;LUO Jun-yong
..............page:127-128,131
United Authentication Platform Based on HTTPS Tunnel Technology
LU Rong-jie;LIU Zhi-gui;ZHENG Xiao-hong
..............page:168-170
Fast Algorithm for Updating Maximum Frequent Itemsets
HU Bin;JIANG Wai-wen;HUANG Tian-qiang;CHEN Sheng-ping;SHI Yuan
..............page:81-83,88
Research of Sensor Localization Based on Received Signal Strength
GE Fei;CAO Yang;WANG Yue-wei
..............page:77-80
Method for Requirement Acquirement Based on Domain Model
CHENG Xue-sheng;WANG Cong
..............page:74-76
Research on Replica Technique of Grid System
YAN Hong-mei;ZHAN Shou-yi;YANG Fang-ting
..............page:154-156
Research and Implementation of Enforced Access Point Design of WLAN
FU Sheng-chun;WANG Dao-shun
..............page:151-153
Construction of Kind of S-box with Good Cryptographic Properties
YIN Xin-chun;YANG Jie;XIE Li
..............page:147-150
Research on Threat Model and Security Mechanism of Wireless Sensor Network
ZHOU Xian-wei;SHEN Ji-hong;QIN Bo-ping
..............page:143-146
Algorithm of Anomaly Detection Based on Traffic Decomposition
GUO Lin;ZHANG Da-fang;LI Wen-wei;XIE Kun
..............page:140-142
Constructing Attack Scenarios Based on Correlation
QIU Rong-bin;XU Rong-sheng
..............page:138-139,142
Scheduling Algorithm for Distributing Static Request in Web Server Cluster
XIONG Zhi;YAN Pu-liu;GUO Cheng-cheng
..............page:84-88
Study of Risk Zoning System of Debris-flow Based on Real-time Numerical Simulation
GUAN Qun;WEI Fang-qiang;HU Kai-heng
..............page:54-55
Study on Standardization for Metadata of Government Information Resources
ZHANG Cheng-wei;LAI Hong-bo;WU Li-juan
..............page:51-53
Study of Key Technologies for SIP Protocol Mapping in Parlay Gateway
LUO Shi-zhang;WU Jia-chun;LIAO Jian-xin
..............page:124-126
New Intrusion Detection Method Based on System Call
LIU Xue-fei;WANG Shen-qiang;WU Bo-qiao;MA Heng-tai
..............page:112-114
IBE-based Security Solution for Credit Management System
SUN Fei-xian;CHENG Shi-hui;LIU Sun-jun;WANG Dian-gang;WANG Tie-fang
..............page:121-123,126
Software Watermarking Algorithm Based on Hiding Execution Path of Watermark-functions
ZHU Zheng-ping;ZHONG Cheng;CHEN Dong-yong
..............page:118-120
Light-weight Key Shares Renewal Protocol in MANETs
WANG Guo-jun;YANG Li-juan;SHI Rong-hua
..............page:115-117
ITS Pattern Based on Video and GIS Data
SHI Yong;WANG Ying-long
..............page:69-70
Mobility Management in NGN
XU Peng;LIAO Jian-xin;WU Nai-xing
..............page:65-68
Research on Algorithms of LPP for Image Retrieval
LU Ke;ZHAO Ji-dong;YE Ya-lan;ZENG Jia-zhi
..............page:56-58
Research on Modeling Artificial Psychology Based on HMM
GU Xue-jing;WANG Zhi-liang;LIU Ji-wei;LIU Shan
..............page:30-32
Research on Personal Information Service Based on Multi-Agent of E-government
WANG Yi-lei;LI Tao;HE Yi
..............page:28-29,32
Effect of Rainfall on Orthogonal Polarization of LMDS
CHEN Yi-tian;CHEN Dou-xue;LAI NGAI MING
..............page:71-73
Two Circulant Graphs of Prime Order and New Lower Bounds of Eight Classical Ramsey Numbers
WU Kang;SU Wen-long;LUO Hai-peng;XU Xiao-dong
..............page:23-24,27
Comparison and Selection of XML-EDI Frameworks in SCM
QIU Jiang-nan;LIU Yi;ZHONG Qiu-yan;MIAO Miao
..............page:15-19,53
Study on Key Technologies of Next Generation Intelligence E-commerce
HUANG Wei;WANG Run-xiao;JIANG Xiao-peng;YANG Ya-luo
..............page:12-14
Survey of Steganography in Video
XU Chang-yong;PING Xi-jian;ZHANG Tao
..............page:8-11
Survey of Dimension Reduction Methods in High-dimensional Indexing Schemes
WU Ling-da;HE Ling;CAI Yi-chao
..............page:4-7
Runtime Multi-language AOP System Architecture Based on Low Level Virtual Machine
PENG Fan;FAN Ming-yu;ZHU Da-yong
..............page:95-96,100
Survey of Application of Web Services to RFID Systems
ZHAO Yi-qiang;ZENG Jun-fang
..............page:1-3,14
Methodology for Entities Matching Based on Neural Network
CHEN Ling;QIANG Bao-hua;YU Jian-qiao;WU Kaigui;WU Zhong-fu
..............page:38-39,73
Research on Information Platform of Product Based on ASP
WEN Li-li;CHEN Xin-du;LIU Qiang
..............page:35-37
Research on Authentication Strategy in Wireless Sensor Network
ZHOU Xian-wei;SHI De-jun;QIN Bo-ping
..............page:108-111
Solving DNS Security Issues Using Handle Protocol Theory
LI Xiao;WANG Feng;MAO Wei
..............page:104-107
Research on Comparison for Reliable Messaging Specifications in Web Service
LIU Ying;HE Ke-qing;LIANG Peng;FENG Zai-wen
..............page:101-103,107
XML-based Performance-Constraint Component Composition
LU Yan-sheng;CHAI Yong-xing;XU Li-ping
..............page:97-100
Research of Distributed Spatial Data Share Platform Based on Jabber
CHAI Sheng;ZHOU Yun-xuan
..............page:33-34,37