Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2006 Issue 9
Research on Dynamic Workflow Model in Workflow Platform
WAN Xin;LIU Qiang
..............page:69-71
Research on Negotiation Algorithm Based on SLA in DiffServ Network
GUO Xiao-qing;WU Jie-yi;ZHANG Sa-bing
..............page:67-68
Study and Implementation of United Platform of Network Security Management
SHI Jian;GUO Shan-qing;XIE Li
..............page:92-94,97
Research of Data-based Risk Assessment Model
ZHANG Miao;XU Guo-ai;HU Zheng-ming;YANG Yi-xian
..............page:95-97
Signcryption Scheme with Public Verifiability and Forward Security
LI Yan-ping;TAN Shi-chong;WANG Yu-min
..............page:98-99,106
Secure Dynamic Source Routing(SDSR) in Ad hoc Networks
YU Guo-liang;LI Guang-song;HAN Wen-bao
..............page:100-103,121
Research and Application of Small Town E-government System Based on J2EE Design Patterns
DING Zhen-lan;WU Hua-rui;ZHAO Chun-jiang;YU Zi-yi
..............page:169-171
Design and Implementation of Monitoring Software of Supervisory System KJ2005
ZHANG Ding-hua;GUI Wei-hua;HU Zhi-kun;PENG Bo
..............page:185-186,191
Surfaces Modeling with Adaptive Refinements
ZHAO Hong-qing;PENG Guo-hua;YE Zheng-lin;ZHOU Min
..............page:72-74,77
XML-based Interface Automatic Generation
FENG Wen-tang;HU Qiang;WAN Jian-cheng
..............page:75-77
Research on Optimization of Medicine Distribution Route in Automatic Chinese Traditional Medicine Distribution System
WANG Xue-song;LI Zhi-shu;TONG Ming;XIONG Ke;LIN Mei-qin;YUAN Xiao-ling
..............page:78-80,84
Design of File Storage and Replication Strategy on DHT Topology
ZHANG Lin;ZHANG Yan-yuan;AI Chang-quan;LIU Hai-long
..............page:81-84
Rank Group Signature
LI Min;WANG Shang-ping;MA Xiao-jing;QIN Hui
..............page:88-91
Design for Web Selecting Courses Management System Based on J2EE
FAN Hui-lian;LI Xian-li
..............page:172-174
Design and Implementation of iSCSI HBA Based on Embedded Linux
ZHOU Jing-li;LIU Zhan;YU Sheng-sheng;ZENG Dong
..............page:182-184
Design of Remote Backup/Recovery System
LIU Sha;LI Tao;ZHAO Kui;GUO Jing;WANG Dan-dan;WANG Li-hui
..............page:104-106
Comment on New Strategies of Information Security Development in USA
ZHENG Xiao-lin;GAO Neng;JING Ji-wu
..............page:107-110
Design and Implementation for Right Manage System of PDM Based on J2EE's Technology
ZHANG Xiao-nuo;CAO Bao-xiang;WANG Ting-wei;XIA Xiao-na
..............page:111-112,115
Designated-Verifier Group Signature Scheme Based on ACJT
SONG Kao;XIE Dong-qing
..............page:113-115
Application Research on XKMS
CHEN Li;ZHANG Hao-jun;ZHU Yue-fei
..............page:116-118
Technique of Anomaly Intrusion Detection Based on Neural Network and System Calls
ZHANG Yi-rong;XIAN Ming;XIAO Shun-ping;WANG Guo-yu
..............page:119-121
IP Traceback Based on Reflector Probabilistic Pipelined Packet Marking
LIU Yuan;GU Xiao-qing
..............page:122-123,126
Study of Identity-Based Encryption for Grid
LI Hong-wei;SUN Shi-xin;YANG Hao-miao
..............page:124-126
User Access Control Based on B-B-C E-business Mode
YAN Bing-jie;WANG Xiao-lan;XIONG Qian-xing
..............page:127-129,132
Research on Security Strategies for Distributed Management Information System
WEN Jun-hao;XU Chuan-yun;XU Guang-xia;ZHANG Yang
..............page:130-132
Model for Access Control of Network Security Based on Smart Card
ZHU Guang-tang;CHEN Rui-xin
..............page:133-135
Sensor Bus System Design for Structure Damage Monitoring of Offshore Platform
HE Lin;OU Jin-ping
..............page:136-138,159
Computer Assessment of Point Factors on Land Parcel Price Based on Shortest Path
YIN Ling;LI Man-chun;TAO Ye
..............page:143-145,178
Research and Application of J2EE-based Software Framework
XU Bo-yi;JIANG Li-hong;DONG Li
..............page:146-148
Theory and Technical Research of Internet-enabled Collaborative Product Assembly
XU Ao;QIU Hao-bo;LIU Qiong;GAO Liang
..............page:64-66,91
Study of Multiple Instances Schedule Based on Instances Groups
YANG Guang;ZHANG Chun-hai
..............page:60-63
RBAC Using Context Check in Session: RBAC-CCS
QIAN Wei;DING Er-yu;LUO Bin
..............page:57-59,63
Application of Colored Petri Net in Model for Web Service Composition
LI Jing-xia;HOU Zi-feng
..............page:149-151,154
Design of Software System for TOE Network Interface Card
GAO Peng;HU Xiao-feng;GONG Xue-chun
..............page:152-154
Spatial Data Warehouse's Designing of Land Resource in Songnen PlainBased on Integration of Multi-sources Data
LI Zhao-yang;TANG Jie;SUN Ping-an;LIN Nian-feng
..............page:155-159
Designing and Implementation of Tourism Geographic Information System Based on ArcIMS
dou chang-e; zuo chang e ; liu ren yi ; liu nan
..............page:160-162,165
Research and Practice on Some Key Technology of CAE Data Management in PDM System
CHEN Mo;YU Dao-yuan;ZHANG Guo-jun
..............page:163-165
Management of Spatial Data and Attribute Data of GIS Based on SDX+
LIU Ling;WANG Xue-bing;YANG Ming-yu
..............page:166-168,174
Detection of Vane Defects Based on Markov Random Field Model
WU Qing;ZHAO Xin-bo;ZHOU Hui-qun
..............page:187-188,212
Assessment Method of Water Quality of Monitoring Data Based on Support Vector Machine
GUAN Jun;XU Li-zhong;SHI Ai-ye
..............page:36-38
Research on Mapping from Relational Schemas to OWL
REN Bao-feng;XIAO Wei-dong;TANG Jiu-yang;LIU Fang
..............page:33-35
Research and Implementation of Web-based Mobile Phone Customized System
LI Xiao-ling;LU Chang-de;XUE Yan-min
..............page:30-32,38
Research on Whole Color Design Model Supporting Top-Down
GONG Xing-liang;WANG Xiao-ping;YE Wei-wei;JING Shao-yu
..............page:27-29
Multi-Agent-based Cooperative Knowledge Base Engineering Framework
WANG Ming-wei;ZHOU Jing-tao;ZHANG Shu-sheng
..............page:189-191
Standard Educational Resource Content Service System Based on XML Database
YANG Xiao-hua;YANG Zong-kai;WU Di
..............page:192-194
Research on Web Load Testing Framework Based on Multi-Agent
ZHANG Xiao-rui;ZHANG Yi-kun
..............page:195-197,200
Design and Implementation of PLC Server with Serial Interface
WU Xiao-ping;GAO Ping-shan;LIU Shi-zhong
..............page:201-202
Application of Dijkstra and Dijkstra-based N-Shortest-Paths Algorithm to Intelligent Transportation Systems
WANG Feng;YOU Zhi-sheng;MAN Li-chun;GAO Yan;TANG Li-ping
..............page:203-205,208
Combining Singular Value Decomposition and Neighbor-based Method in Collaborative Filtering
sun xiao hua ; chen hong ;kong fan-sheng; kong fan sheng
..............page:206-208
Indoor Wireless Sensor Networks and Its Applications
CAO Hong-ping;JIANG Yun-liang;MIAO Qiang
..............page:209-212
Distributed CA for Mobile Ad hoc Networks
WU Xue-cheng;ZHUANG Yi;WANG Jing;PAN Long-ping
..............page:213-215
Study of QoS Routing Protocols Based on Mobile Ad hoc Networks
XIAO Xiao-ling;LI La-yuan;ZHANG Xiang
..............page:216-218,227
Research and Realization of Agent of CE Supported SNMP in ForCES Framework
WU Xiao-chun;JIN Rong;WANG Wei-ming
..............page:219-220,223
Research and Implementation of 3G Service Simulation Based on Parlay
LIU Bo;ZHOU Wen-an;SONG Jun-de
..............page:221-223
Research on Web Resources Integration of Enterprise Portal and Its Implementation
YAN Yu-lan;XIONG Zhang;WU Jing;WANG Ping
..............page:224-227
Analysis and Amend Wireless Anonymous Conference Call Authentication Protocols
WANG Bin;CHANG Ya-qin;MA Zhi
..............page:228-229
Service Routing System Design Based on Trust in P2P Environment
SU Han;WANG Yun
..............page:230-233
3G Video Streaming Transmission and Error Control Based on AVS-M
YANG Meng;SUN Yan-feng;LI Xin;SU Hai-bin
..............page:234-236,239
Design of MPLS VPN Experimental System Based on Large Scale and Multi-user's Concurrent Access
LAI De-xin;LU Song-nian;YANG Shu-tang
..............page:237-239
NS-2-based Simulation and Performance Evaluation for MANET Routing Protocols
NIU Qiu-na;WANG Mei-qin;WANG Ying-long;XU Yong-dao
..............page:240-242,246
FSM Based Alarm Event Correlation
TANG Yong;ZHANG Xin;ZHOU Ming-tian
..............page:243-246
Research on Model of WLAN Testing and Evaluation
chen jing; chen jing ; wang mei fang ; si ji feng
..............page:247-249
Correlation of Image Low-level Features and High-level Semantics Using SVM
CHENG Jie;SHI Yue-xiang
..............page:250-252,255
Novel Adaptive SVR Based on Filter for Image Restoration
ZHU Jia-gang;WANG Shi-tong
..............page:253-255
MPEG-4 Content Tools Based on XML Scene Description
GUO Jun;YANG Zong-kai;LIU Wei;WU Di
..............page:256-257,260
Research on Computer Virus Spread and Control Strategy in Complex Networks
ZHU Gang;ZHANG Ning;MA Liang
..............page:54-56
Research on Fast Implementation of Rabin Algorithm
HE Yic-hao;LIU Kun-qi
..............page:51-53
Influence on Characteristics of Fingerprint in Binarization Processing in AFIS
GUO Lei;CHEN Da-hai;LI Gang;LI Hai
..............page:49-50,53
Web Service-based Intelligent Web Recommendation System
ZHOU Xiang;ZHENG Ying-ping;WANG Ling-qun
..............page:46-48
Lower Bound of Two Color Ramsey Number R(5,28)
WU Kang;SU Wen-long;LUO Hai-peng;HE Jian-dong
..............page:44-45
Application of Weighted Least Square Estimates on Wireless Sensor Network Node Localization
wang jian-gang; wang jian gang ; wang fu bao ; duan wei jun
..............page:41-43
Research on Distributed Hash Table in P2P
YUAN Lin;QIN Zheng
..............page:39-40,43
Precision Enhanced Active Queue Management Algorithm BLUE+
XU Jia;YIN Xin-chun;YANG Yun
..............page:23-26
Contourlet:Efficient Directional and Multiresolution Analytic Tool
YI Wen-juan;YU Mei;JIANG Gang-yi
..............page:18-22
Development of Configuration Conception
YANG Ya-luo;WANG Run-xiao;KU Xiang-chen;WANG Li-gang
..............page:13-17
Research on Multi-relational Data Mining Approaches
XU Guang-mei;YANG Bing-ru;ZHANG Wei;NING Shu-rong
..............page:8-12
Research on Classification of Malware
LU Hao;HU Hua-ping;LIU Bo
..............page:4-7,12
Overviews on Memory Leak in Java Program
JIA Xiao-xia;WU Ji;JIN Mao-zhong;LI Guo-huan
..............page:1-3,17