Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2003 Issue 1
Study on Workflow Simulation Based on P_PROCE Model
fu qian ; zhang shen sheng ; zhang xiao guang
..............page:158-160,136
The Study of Business Process Reengineering (BPR) Based on Role Model
xu huan liang ; li xu rong ; ding qiu lin
..............page:154-157
Infrastructure of Multi-Tier Enterprise Applications:J2EE Application Server
chen ning jiang ; jin zuo hong ; fan guo chuang
..............page:149-153
An Architecture of the XQuery System based on Virtual XML
zhu zheng yu ; zhu qing sheng ; wang zuo
..............page:145-148
A New Secure and Practical Electronic Voting Scheme
lai zuo ; fan yu shun
..............page:142-145
Semantic Web Language DAML+OIL and its Initiatory Application
yin qi zuo ; li shan ping
..............page:139-141,157
Research on Zero Knowledge Proof Protocol of Watermark Detection
zhou si qing ; yu ying lin ; chen chao tian
..............page:137-138
A New Public Key Infrastructure - SPKI
zhang peng cheng ; chen ke fei
..............page:133-136
The Analysis of Typical Methods to Rectify the Deviation of Random Sequence
yang zhu ; lv shu wang ; su gui ping
..............page:131-132
Design and Implementation of Elliptic Curve Encryption Based on ONB over Fm2
zhang xian feng ; qin zhi guang ; chen xing rong ; liu jin de
..............page:128-130,101
A Data Mining Based Intrusion Detection System Model
yang zuo ; liu heng ; lv shu wang
..............page:124-127
Role based Access Control Model
mao bi bo ; sun yu fang
..............page:121-123,89
The Research and Development of Text Mining System Based on Web
tang zuo ; shen ji quan ; yang bing ru
..............page:60-62
Decomposition Theorem and Measures of Similarity in Vague Sets
zuo de qin ; chi zhong xian
..............page:78-79
A New Bidirectional Approximate Reasoning Approach Based on Vague Set
wang tian jiang ; lu zheng ding ; li fan
..............page:74-77
Influence of Data Mining on Database Security
chen wei he ; yin xin chun ; zhang rui ; xie li
..............page:70-73
A Data Mining Model Based on Discrete Fourier Transform(DFT)Theory for Reliability Data of Communication Networks
zhou zhong ding ; sun qing hua ; liang xiong jian
..............page:67-69
Knowledge Discovery in Text: A Survey
zhou xue zhong ; wu chao zuo
..............page:63-66
Comparisons and Evaluations of Micro-Mobility Protocols
xu xiao gang ; zhao chen ; xia qin ; gu guan qun
..............page:16-18
Multimedia Mining
chen jian zuo ; lao song yang ; wu ling da
..............page:57-59,79
Reliability-Driven Tasks Scheduling for Real-Time System
zhang jun yan ; yang guo wei ; luo xu bin
..............page:53-56
An Introduction to Software Architecture Quality Evaluation
zhou xin ; huang zuo ; sun jia zuo ; yan xiao rong
..............page:49-52
The Design and Implementation of Edge Profiling in Compiler
dong xi qian ; zhang zhao qing
..............page:46-48,66
Analysis and Application Research on Chemical Abstract Machine
zhao heng ; wang zhen yu ; cao wan hua ; ye jun min
..............page:42-45
Design and Implementation of Runtime Support for Mobile-Agent-Based Component Software
yang mei ; hu hai yang ; tao xian ping ; lv jian
..............page:38-41,56
A Framework Based on Middleware for Pervasive Computing Environment
zhang xiang gang ; zhang yun yong ; liu jin de
..............page:34-37
Ubiquitous Computing and its Application Models
wu wei guo ; liu long guo ; qian de pei ; dong xiao she
..............page:30-33
MyVIA :One of Design and Implementation of Virtual Interface Architecture (VIA) based on Myrinet
jiao zhen qiang ; xie jun ; chen yu ; du zhi hui
..............page:27-29,37
Distributed Paralel Computing Environment :MPI
wang zuo han ; zhao chen ; xu xiao gang ; wu guo xin
..............page:25-26
Data Transmission over Wireless Internet
yang fan ; chen dao xu ; xie li
..............page:19-24
P2P and its Application in Enterprise Computing
peng jian ; yang si zhong ; liu jin de
..............page:118-120
A Promising Evolution of P2P Technologies--JXTA
huang xiao qin ; li xing xing ; zhu qing sheng
..............page:116-117,104
Two-Bit Differserv Implementing Policy Study
deng ya ping ; tan qiang
..............page:113-115
Dynamic Sliding Window Protocol for Short-Wave Communication
jin yan ; wen li
..............page:111-112,封四
A New Broadband Wireless Access Technology of the Broadband Network-LMDS
peng yi ; cha guang ming ; zhou zheng zhong
..............page:108-110,84
Research on the Approximate Algorithms for QoS Routing
zhang xin ming ; chen guo liang ; huang liu sheng ; xu yun
..............page:105-107,96
Flow Control for Multicast: A Weighted Cost-Benefit Approach
he yan xiang ; lv hui ; li xu zuo ; du zhuo min ; wang ce
..............page:102-104
Analysis on VPN Tunneling Techniques
liu gui kai ; lei zhen ming
..............page:99-101
Research on Formal Description Techniques of Protocols Based on RSL
zhao jing ; qu yu gui ; zhao bao hua
..............page:97-98
The Research on Visualization of Second Order Tensor Fields
li hai sheng ; yang qin ; chen qi ming
..............page:94-96
A Visual Semantic Template of Background for Scene Image
wang hui feng ; sun zheng xing
..............page:90-93
The Generalized DKL Transform and it's Application on Face Image Recognition
wu xiao jun ; yang jing yu ; wang shi tong ; liu tong ming
..............page:87-89
A Parameter Initialization Method for Wavelet-Based HMT Models
wang xi li ; liu fang ; jiao li cheng
..............page:85-86,77
A New Algorithm for Solving Function Optimization Problem
gao han ping ; kang li shan ; chen zuo ping
..............page:80-81,69
Micro-Mobility Protocols
xu xiao gang ; zhao chen ; xia qin
..............page:14-16
Detailed Description of the Grid Architecture
gao quan quan
..............page:6-11