Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2002 Issue 10
Research and Implementation of CSCW Model in Heterogeneous Environment
li jun huai ; zhou ming quan ; geng guo hua
..............page:104-106
A Model Management Framework for Negotiation Support Systems
wang bo ; shi pei zuo ; tian qi jia ; shi zhong zhi
..............page:107-109,116
Research on an ASP Scheme-Based Enabling Service System for Small-Medium Enterprise Dynamic Alliances
shen de rong ; yu ge ; song bao yan ; wang dan ; dong xiao mei ; wang guo ren
..............page:110-113
The Strategy about Supply and Demand Relation on Supply Chain
zhang hong ; qiu yu hui
..............page:114-116
The Information Space Model and User Model Based on Topic
he jun ; zhou ming tian
..............page:117-120
The Research on the Recommendation Strategies to Commerce Website
xie zhong ; qiu yu hui
..............page:121-122,120
A Software Process Model Based on CMM
ye shu yuan ; zhou peng ; gu qing ; chen dao xu
..............page:123-127,138
A Metrics Suite for Class Complexity Based-on UMI
zhang yong ; tao zuo ; qian le qiu
..............page:128-132
An Overview of AOP
gao hai yang ; chen ping
..............page:133-135
The Design and Implementation of An XML-based Workflow Process Model
zou bing ; zhang xu ; yi xiao qiang ; wang hong an ; dai guo zhong
..............page:101-103,75
Algorithm and Analysis of Multiple Messages Broadcast in the Multiport Model
ding ding ; li wei sheng
..............page:98-100
Internet、its Software Environment and Application
yang sen ; xu ze tong
..............page:95-97,100
ip wang luo fu wu zhi liang ti zhi yu xing neng fen xi
zhu qing xin ; zhao zuo
..............page:92-94
The Dependent Relationships of Access Authorization Tasks and its Timed Color Petri Net Analysis Model
wang xiao ming ; zhao zong tao ; feng de min
..............page:88-91
Path Protection and Recovery Mechanism for MPLS Network
wang xin hong ; wang guang xing
..............page:85-87
An Evolutionary Algorithm for Active Learning of Neural Network
sun gong xing ; dai gui liang
..............page:61-63
The Survey on Teamwork Technique Based on Multi-agent
wang ; chen shi fu
..............page:38-42
The Research of Mobile Agent-based Distributed File System
lu jun ; lu xian liang ; han hong ; xu teng
..............page:42-45,48
Research on Teamwork in the RoboCup Simulator
li jing ; chen zhao qian ; chen shi fu
..............page:46-48
The Research on Security Mechanisms of Mobile Agent
luo fei ; qiu yu hui
..............page:49-51
Using Immune Neural Network for Data Mining
zheng jian guo ; liu fang ; jiao li cheng
..............page:52-55
Discussing the Relationship between XML and Data Mining
zhu mei lin ; wang chong jun ; chen shi fu
..............page:56-58,66
A Fast Algorithm on Association Rules in Large Transaction Databases
zhu yu quan ; sun zhi hui
..............page:59-60,69
Comparison of Z and VDM with B
zou sheng rong ; zheng guo liang
..............page:136-138
Research on and Design of Meta-Computing system
li guo dong ; wang dong kui ; yang hai rong ; zhang de fu
..............page:139-143
Research and Design of A Middleware to Supporting Wide-Area Distributed Applications
zhao dong ; yao shao wen ; zhou ming tian
..............page:144-149
Research on Using UML with SDL
wei ding guo ; wu shi lin
..............page:150-152,159
ji yu xiao xi xu lie de xing shi hua mian xiang dui xiang ruan jian ce shi ji shu
lai xiang wei ; zhang wei qun
..............page:153-155
The Metadata Exploration about Media Material Database of Modern Distance Education
zhang yu fang ; xiong zhong yang ; wu zhong fu
..............page:156-159
Network Techniques and Control Methods of Information Risk in Corporation
huang da yong ; jiang yong de
..............page:160-161
Research for the Critical Technology of Firewall and Implementation in a High Level Security Firewall
huang deng zuo ; qing si han ; meng yang
..............page:81-84,封四
Lossless Image Compression Based on Image Segmentation Technique
yuan yan hui ; yang chang sheng
..............page:79-80
The Comparison of Typical Approaches to the Integration in Multimodad Interface
zuo shang min ; dai guo zhong ; chen you di ; guan zhi wei
..............page:73-75
BS CFG-Based Bi-directional Parsing
zhou ya zuo ; huang zuo zuo ; wu li de
..............page:70-72
WWW Personalized Information Retrieval Based on Measures of Interestingness
lu chao ; mei wei feng ; chen jun liang ; xu yong sen
..............page:67-69
A New Evolutionary Algorithm with Individual Learning Capability
he feng ; kang li shan ; chen zuo ping
..............page:64-66
Spatial Data Warehouse Model and Spatial Data Cube Computation Methods
tong yun hai ; xie kun qing ; tang shi wei
..............page:1-5
Storage Models and Query Execution of Semi-Structured Data
feng jian hua ; wang qin ke ; zhou li zhu ; meng xian hu
..............page:6-10
Design and Implementation of A Intelligent Data Mining Engine
zhang ying chao ; deng su ; zhang wei ming ; liu qing bao
..............page:11-13
The Paradigms of Concurrent Computations :CCS and π-Calculus
du xu tao ; li zhou jun
..............page:14-17
The Random Set Expression of Pawlak Rough Set Model and its Composition
chen de gang ; zhang wen xiu
..............page:18-19
Some Research on Proof-Carrying Code in Mobile Agent Security
feng yang yue ; tao xian ping ; lv jian
..............page:20-24,5
Analyzing Collaboration and Parallel in Geo-Agents
luo ying wei ; gao chao hua ; wang xiao lin ; xu zhuo qun
..............page:25-27
The Analysis and Implementation of Tuple Space Based Agent Coordination
guo zhong ; wang hui fang ; huang yong zhong ; guo jin geng
..............page:28-29,51
FIPA Specifications: Open Standards for Agent-Based Systems
zhang de tong ; zhou ming quan ; geng guo hua
..............page:30-32
On Agent's Genetic Algorithm
li fan chang ; zuo yu mei
..............page:33-37