Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2003 Issue 10
Research of Protocol Converter Based on Function Mapping Partition
zhao xin you ; gu tian long ; cai guo yong ; dong rong sheng
..............page:117-119,130
DCCP Research and Analysis of its Performance
guo xiao feng ; feng tai ming ; zhou jing yang ; chen gui hai
..............page:120-124
The Congestion Control of ATM Networks Based on the Smith Principle
guan xin ping ; liu zhi xin ; long cheng nian
..............page:125-127
Study on the Technologies of IPSec Security Processing Unit in High Speed Boundary Routers
rong ni ; gong zheng hu ; su jin shu
..............page:128-130
Group Communication System Based on Semi-Active Replication
yuan yuan ; chen song qiao ; chen jian er
..............page:131-132,183
The Mobile IP(IPv6) Based on Cellular Wireless Network Technology
zhang quan xin ; song zuo tao
..............page:133-135
Research on IP/DWDM Optical Internet Routing Mechanisms
wang xing wei ; cui jian ye ; zuo kui ; zheng lu di
..............page:136-137,148
Probabilistic Analysis of Fault Tolerant Broadcast Routing Algorithms on Mesh Networks
wang gao cai ; chen jian er ; wang guo jun ; chen song qiao
..............page:113-116
An ECN-Based Bandwidth Sharing Algorithm for Unicast and Multicast Flows
yang ming ; zhang fu yan
..............page:109-112,140
Survey of Algorithms on Reliability Evaluation of Flow Networks
sun wei ping ; zhou jing li ; yu sheng sheng
..............page:106-108
The Design Pattern: Hub of Enterprise Application Integration
dong yun wei ; li wei hong ; hao ke gang
..............page:103-105,108
The Application and Research of CORBA Components in Distributed Information System
hu jin zhu ; wang rui ; zhang zhao li
..............page:96-98
Security Policies Based on Object in Security-Enhanced Operating System
jin lei ; lin zhi qiang ; mao bing ; xie li
..............page:93-95
Research of Revoking Mechanism of Authorization in Secure Operating System
wu xin yong ; xiong guang ze
..............page:89-92
Research of Process Management of Linux
zhao hui bin ; li xiao qun ; ye yi min
..............page:84-88
FastQueue:A High Performance Disk Queue Storage Management Mechanism
wei qing song ; lu xian liang ; zhou xu
..............page:81-83,88
A Mapping Approach for MDA Model Transformation Based On J2EE Platform
shi yao zuo ; cui meng ; li xuan dong ; zheng guo liang
..............page:1-6
The Concept of Recursive Dimension and Corresponding Operations
yuan lin ; li zhan huai ; xu qiu yuan
..............page:7-10,20
Resource Competition and User Requirement Policy Study for QoS Guarantee
luo jun ; yuan man ; hu jian ping ; zuo zhi gang ; ma jian
..............page:11-15
A Hierarchical Load Balancing Scheduling Model Based on Rules
li dong mei ; shi hai hu ; gu zuo qing
..............page:16-20
Testing Website Based on Statistic Data
xu lei ; xu bao wen ; chen zhen qiang
..............page:21-24
The Correspondence between Horn Logic Programs and Formal Grammars
chen wen bin ; wang ju
..............page:25-27
Riding the Information Wave
he jia zhou ; zhao yan nan
..............page:28-30
Research on Mobile Agent System Construction
jia zhi yong ; xie li
..............page:31-34
Medical Knowledge Acquisition: An Ontology-Based Approach
zhou xiao bin ; cao cun gen
..............page:35-39,54
Research on Modeling with Adaptive Neuro-Fuzzy Inference System
lu bin ; he hua can
..............page:40-44
Active Learning Based Text Categorization
zuo gang li ; huang ke ; yang jia ben
..............page:45-48
Discovery of Web Topic-Specific Association Rules
yang pei ; zheng qi lun ; peng hong
..............page:49-51
Measure of Similarity between Rough Sets
xu jiu cheng ; shen jun yi ; wang guo zuo
..............page:55-57,60
Fuzzy Decision Trees with Possibility Distributions as Output
yuan xiu jiu ; zhang wen xiu
..............page:58-60
A New Algorithm of Mining Classification Rules Based on Decision Table
xie juan ying ; feng de min
..............page:61-63,77
A Weak-Signal Separation Algorithm Based on Extended Alternating Projection Neural Networks
wang jin gen ; chen shi fu ; gong shen guang ; chen zhao qian
..............page:64-66
A Shot-Detection Scheme Combining Color and Motion Features
chen jian zuo ; li yun hao ; lao song yang ; wu ling da
..............page:70-73
A Stroke Extraction Model for Chinese Character
chen zuo ; tang yan ; qiu yu hui
..............page:74-77
Research on the Key Technology of Real-Time Middleware in Open System
peng jian ; yu ling ; dong peng ; liu jin de
..............page:78-80,124
Wireless Sensor Networks and their Applications
zheng zeng wei ; wu chao zuo ; jin shui xiang
..............page:138-140
Implementation of Proxy Caching Based on LAN for Streaming Media
tan jin ; yu sheng sheng ; zhou jing li
..............page:141-143
QoS Management Mechanisms and Prototype System of VoIP
chen xiu zhong ; wang chun feng ; huang xiao lu
..............page:144-148
Research on IP Network Accounting Management
zhao hui ; hou jian rong
..............page:152-154
A Summary of Network Intrusion Traceback
zhang jing ; gong jian
..............page:155-159
A Study of Automated Intrusion Response Systems
ding yong ; yu ping ; gong jian
..............page:160-162,166
The Design and Implementation of Extensible Naming Service in Web Application Server
chen ning jiang ; fan guo chuang
..............page:163-166
Rate Control Strategy of MPEG-4 Verification Model
zhou bing ; li xiao qiang ; li zuo
..............page:167-169
Application and Research of Subsumption in XML Types
hong xiao guang ; wang hai yang ; ma shao han
..............page:170-171,180
On Optimized Methods for Concurrency Control Algorithm of Database Systems
zhao ruo yun ; huang guo xing ; xiao jing
..............page:172-174
An Anonymous Payment Scheme Based on SPKI
zhu qing sheng ; li wei wei ; wang zuo ; fu he gang
..............page:175-177
Bank Access Control of Electronic Payment Based on SPKI
wang zuo ; wang fu qiang ; fu he gang ; zhu qing sheng
..............page:178-180
The Research on Technical Advantages of ECC
xia xian zhi ; zhao yi
..............page:181-183