Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2003 Issue 4
The Technology and Application of SOAP
li jian bing ; he deng ping
..............page:111-112,128
Platform for Visualization Software Based on Software Architecture
hu hua ; lin chang dong
..............page:113-115,封4
A Single Loop Vectorization Method Based on Assemble Code
lu hong yi ; dai kui ; wang zhi ying
..............page:116-117,124
A Hierarchical Program Visual Model Based on Object, Scope and Type
zhao yang ; cai zhi ; jin hao ; pan jin gui
..............page:118-120,135
Approaches for Security Requirements Analysis of Information Systems
cao yang ; zhang wei ming
..............page:121-124
Refinement Methods for Software Architecture
rong mei ; zhang guang quan
..............page:108-110
Research on B2B Electronic Business Collaboration Model
li shuang qing ; cheng dai jie ; he ling
..............page:102-104
Webpage Recommendation Model in Personal Surfing
su gui yang ; wang yong cheng ; ma ying hua
..............page:99-101
A Survey of Web Link Structure Information Research
li jian ; jin zuo hong
..............page:95-98,138
Study on Metadata Management Pattern Based on Internet——With Geographic Spatial Metadata Management As a Case
wu hong qiao ; he jian bang ; chi tian he ; huang yu xia
..............page:89-91
A Cache Invalidation Scheme Based on Mobile Agent in Mobile Computing Environments
wu jin ; lu xian liang ; ren li yong
..............page:82-84
Switched Hierarchical Network—a New Architecture for Future Internet
ge jing guo ; qian hua lin
..............page:1-6,10
Adaptive QoS Mechanism on the Next Generation Network
luo jun ; yuan man ; hu jian ping ; zuo zhi gang ; ma jian
..............page:7-10
Face Recognition Using Support Vector Machines
cui guo qin ; li jin tao ; gao wen ; jiao feng
..............page:11-15
The Multi-Agent System Based on Reinforcement Learning
tang wen bin ; zhu zuo liang
..............page:16-18
A Survey of Pervasive Computing
zheng zeng wei ; wu chao zuo
..............page:18-22,29
Initial Research on Agent Grid
zhang ying chao ; zhang wei ming ; xiao wei dong ; sha ji chang
..............page:23-26
Cluster System Management Research and Design
meng qing ping ; liu tao ying ; li zuo
..............page:26-29
Resource Management in Distributed Transaction Processing
zhang zuo ; ding ke
..............page:30-32
A Concurrent Object Oriented Model Based on MPI
lu hong wei ; xiao yong ling
..............page:33-35
A QoS-Based IP VPN Architecture Research
li zhen dong ; xie li
..............page:36-40
A Novel Distributed Loop-free Routing Algorithm in the Ad hoc Networks
kang kai ; guo wei ; wu shi qi
..............page:40-42
Research on the Distribution of Activated IP Flow in the Large-scale Networks
cheng guang ; gong jian ; ding wei
..............page:43-46
Bandwidth Resource Dynamic Allocation in Differentiated Services Model
qiu zuo ; zhu zuo liang
..............page:47-50,64
The Implement of Test Executing System Based Linux Environment
ye xin ming ; wang hong xia ; shi li xin
..............page:51-54
A Research and Design for Network Security Mechanism
yang xiao ping ; zhu qing xin
..............page:55-57
The Research of Intrusion Tolerance System Based on State Transition Model
cui jing song ; wang li na ; zhang huan guo ; fu jian ming ; luo min
..............page:61-64
Detection Approach for Malicious Behaviors Based on Data Mining
cai wan dong
..............page:65-66,84
Network Information Content Analysis and Monitor Technology Based on Linux
li fang min ; zhou zu de ; liu quan
..............page:67-69,75
A Popularity-Based on Server-Proxy Caching Strategy for Streaming Media
tan jin ; yu sheng sheng ; zhou jing li
..............page:70-72,101
The Application of Computer Simulation in the Questions of Queue in Multipoint Communications
ma bing peng ; cao ju ; yang shu tang ; yu sheng sheng
..............page:73-75
A Video-on-Demand Delivery Policy for Improving the Disk Access Performance
he xiao jian ; li fang min ; you jin yuan
..............page:76-78
The Design of Model and System for Network Attached Storage Security
han de zhi ; xie chang sheng ; fu xiang lin ; yi fa ling
..............page:79-81,88
The Experience for the Concept of Web Service on WebSphere
fan yu zhen ; gu zuo qing
..............page:125-128
The Web Application Frame and Expansion Developed from MVC
luo guang chun ; lu xian liang ; han hong ; lu jun
..............page:129-130,164
Study of Fuzzy Evaluation for SRS and its Quality
gan zao bin ; chen zheng yong ; chen chuan bo ; pei xian deng
..............page:131-133
The Typical Algorithm of Boost-by-Majority Series in Boosting Family
tu cheng sheng ; diao li li ; lu ming yu ; lu yu chang
..............page:133-135
A Subsection Learning Algorithm Based on Support Vector Machines
yang qiang ; wu zhong fu ; wang zuo
..............page:136-138
The Real-Time and Cooperative Inference of Multi-Agent Based on Rete Algorithm
feng mei ; wang hong an ; jin hong ; liu hai long ; dai guo zhong
..............page:139-142
A Model of Case-Deletion Based on Clustering
geng huan tong ; qian quan ; cai qing sheng
..............page:143-144,149
Association Rule Mining: A Survey
jia cai yan ; ni xian jun
..............page:145-149
A Novel Hybrid Clustering Algorithm Incorporating K-means into Canonical Immune Programming Algorithm
xing xiao shuai ; pan jin ; jiao li cheng
..............page:150-152,158
Study of Measurability on Rough Random Information System
yi shu hong ; zhang wei qun
..............page:156-158
A Partheno Genetic Algorithm for Traveling Salesman Problem
wang bin ; li yuan xiang ; wang zhi
..............page:162-164
Study on Agent-Based Credit Risk Prediction Implementation Technology
peng yan ; tu xu yan
..............page:165-167
Algorithms of Feature Extraction from High-Dimensional Objects and their Comparisons
lin xiao li ; chen en hong ; ren wan ying
..............page:168-170
A Color Image Segmentation Method Based on SOM Network
chen ke jia ; jiang yuan ; zhou zhi hua
..............page:171-173
The Default Weight Regular Mining Algorithm Based on Inconsistent Data Base
liu kai di ; pang yan jun ; wang yi nao
..............page:174-176
Research on Automatic Code Generation Based on SDL
wu zuo ; xiong guang ze
..............page:104-107