Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2003 Issue 2
Research on Nontraditional Development Model of Secure Operating Systems
shi wen chang ; sun yu fang
..............page:125-129
Network Stack Analyzing and Protocol Add Technology in Linux
tang xu ; liu xin song ; yang feng
..............page:130-132
STEP-Based Feature Model and Feature Reconstructed Arithmetic
liu nai ruo ; wang jin lun
..............page:133-135
Overview on Software Architecture Description
sun chang ai ; jin mao zhong
..............page:136-139,167
Dynamic Reuse Based on Region
zhang ke xin ; zhang zhao qing
..............page:121-124
Study of Verification for the Openness of Common Agent Request Broker Architecture (CARBA)
zhang yun yong ; peng jian ; liu jin de
..............page:118-120,96
The Study on the Organizational Model of Coordination Association
lu peng ; zhang xiao lei ; tao xian ping ; lv jian
..............page:113-117
Research of Infiniband Architecture
hou zong hao ; zheng shou zuo ; dong xiao she ; huang yong xiang
..............page:140-143
Topic-Driven Web Information Mining
yu chen ; gu zuo qing
..............page:158-160
Tolerant Rough Set Based Attribute Reduction Algorithm
wang zuo ; liu san yang ; liu zhen hua
..............page:161-162
Study on Software Architecture Performance Evaluation
zhao hui qun ; sun jing ; wang guo ren ; gao yuan
..............page:144-146
Research on Agent Interoperability
jia zhi yong ; jing guang jun ; xie li
..............page:147-150
A Survey on Web Crawling
li sheng zuo ; yu zhi hua ; cheng xue qi ; bai shuo
..............page:151-157,171
A Survey to Scalable Distributed Intrusion Detection Methods
zuo ying song ; wang zhi jian ; zhou xiao feng
..............page:108-112
A Survey of Data Mining-Based Intrusion Detection
luo min ; zhang huan guo ; wang li na
..............page:105-107,117
Research and Application of a Network Security Quantitative Evaluation System
xia yang ; lu yu liang ; jiang fan
..............page:100-104
Summary of Anomaly-Detection Approaches
zhang jian ; gong jian
..............page:97-99
Information Hiding and Countermeasures
wu shu feng ; huang liu sheng ; lu ji jun ; chen guo liang
..............page:92-96
Framework of a Remote Surveillance System Based on QoS
du run qiu ; zhou bing ; li bo
..............page:89-91,封四
Research of Methods for Computational Grid Resource Management
wu xiu chuan ; ju jiu bin
..............page:87-88,104
Key Issues of Video Services in a Wireless Environment
yang shu hui ; gu tie cheng ; wu min qiang ; chen dao xu
..............page:83-86
A Storage Network System that Merges NAS and SAN
fu xiang lin ; xie chang sheng ; cao qiang ; liu chao bin
..............page:79-82
Research on Diameter Protocols
qiu xi peng ; liu hai peng
..............page:75-78
Parallel Packet Forwarding for High End Routers
li sheng lei ; zhang de yun ; liu gang
..............page:72-74
A Survey on Internet Service Management Techniques
yuan man ; luo jun ; zuo zhi gang ; hu jian ping ; ma jian
..............page:1-4,16
Simulator and Evaluation of Micro-Mobility Protocols
xu xiao gang ; zhao chen ; xia qin ; gu guan qun
..............page:5-8,59
The Approach to Solving Combinatorial Optimization Schedule Problems
zhang ju yang ; sun ji gui
..............page:9-16
Unified Object Model--Understanding of GIS Fusion into IT
liang jun ; he jian bang
..............page:49-51
Technology Framework of Digital Province
chi tian he ; wang lei ; wang qin min ; chen chong cheng
..............page:52-54
Thinking in Enterprise Architecture of Web GIS Applications
qi ming yao ; chi tian he ; huo liang
..............page:55-56,62
Research on Four-Tiered Data Management Model in E-Commerce
wang jin lun ; zhang yu long ; gu ming
..............page:60-62
Query-Optimization Based Virtual Data Warehouse Model
xu qiang ; li wen zuo ; gu zuo qing
..............page:63-65,86
Research of Active Database System's Behavior Based on Parametrized Petri Net
wang zi qiang ; feng bo qin
..............page:66-68
Layer Transfer: A Rapid Response Method in Layered Multicast Congestion Control
yang ming ; zhang fu yan
..............page:69-71,82
K-Means Clustering Based on Genetic Algorithm
wang chang ; chen zeng qiang ; yuan zhu zuo
..............page:163-164
SVM Model with Unequal Sample Number Between Classes
xiao jian hua ; wu jin pei
..............page:165-167
An Algorithm of Multiscale Segmentation for Documen Image
zhu qing sheng ; shu run zhen ; zhu zheng yu
..............page:168-171
A Method of Fast On-Line Graphics Recognition and Regularization
sun jian yong ; jin xiang yu ; peng bin bin ; sun zheng xing ; liu wen yin
..............page:172-176
Review of Web Service Management
zuo yu hong ; chen song qiao
..............page:26-29
Semantic Web,Agent and Network-Virtual Society
dai xin ; shen rui min ; zhang tong zhen
..............page:30-33
On Current Development of NESSIE Block Cipher Candidates
zhang wen tao ; wu wen ling ; qing si han
..............page:22-25
The Object Oriented Model of Cyberspace and Information Dissemination
ma wei dong ; li you ping ; yuan hong chun
..............page:34-37
Information-Based Computing Technology in Grid
wang yi jie ; lu xi cheng
..............page:38-39,51
Typical XML Document Transformation Methods and an Application System
li li hong ; shao min ; zheng zhen kun ; he chuan ; du zhi hui
..............page:40-44
On the Views for Semistructured Data
nie pei yao ; li zhan huai ; hu zheng guo
..............page:45-48