Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2003 Issue 9
Research on the Security of the United Storage Network Converging the NAS and SAN
han de zhi ; geng hong qin ; xie chang sheng ; hu yu ping
..............page:107-110
Access Grid Based Video Conference
shen hua pin ; wu chao hui
..............page:116-117,106
Key Issues of the Design of Proxy Cache Server for Video Data in the Internet Environment
yang shu hui ; gu tie cheng ; chen dao xu
..............page:118-123
A Design for G-WebService Based on RM-ODP Model
li zuo ; xia zuo
..............page:124-126,137
A Survey of Workflow Modeling Approaches and Model Verification
yang dong ; wang ying lin ; zhang shen sheng ; fu qian
..............page:127-131
Self-Adaptive Tracking Method Based on Multi-Scale Dynamic Model
li tao ; wang bao shu ; qiao xiang dong
..............page:132-134
Research on ORACLE Storage Architecture and its Object Space Allocation
yang hua qian ; liu yong guo ; yang de gang ; liao xiao feng
..............page:135-137
Research on Building Data Warehouse by the Means of Mobile Agent Technology
zhong guo xiang ; zhang wei qun
..............page:138-140
The Radio Office Network with the Bluetooth Technique
kang jin ; xu chao ; hou jian hui ; feng wen jiang
..............page:141-143
Research on Monitoring System for Grid
huang da ming ; li guo dong ; zhang de fu
..............page:144-147,151
Scheduling Based on Network Resources Consumer Models
yang xiang mao ; tan zuo
..............page:105-106
Study on a Random N-Ary Tree Collision Resolution Algorithm of Improved Isolation Type Based on VSAT System
li li ; peng yun fan ; liu li mei ; yun li jun
..............page:103-105
Efficient Method for Time Series Similar Searching
xiao jing ; huang guo xing ; zhao ruo yun ; huang yu lei
..............page:97-99
Research on Searching Policy in Peer-to-Peer Networks
li xiao ge ; yang shou bao
..............page:94-96
Research on Algorithms Analyzing Hyperlinks:A Survey
zhu zuo ; wang chao ; li jun ; pan jin gui
..............page:89-93,140
IPoIB Architecture and its Application
liu ai hua ; qian de pei ; dong xiao she ; qiao zuo
..............page:85-88
Lattice Theory Properties of Fuzzy Rough Sets
liu gui long
..............page:83-84
Intelligent Web
shi zhong zhi ; dong ming kai ; jiang yun cheng ; sheng qiu zuo ; zhang hai jun
..............page:1-4,10
Aspect Orientation--A New Approach to Programming
cao dong gang ; mei hong
..............page:5-10
The Theory,Methodology and Tools of Algorithm Engineering:A Case Study with SAT Algorithms
jiao jia zuo ; han xiao feng ; xu liang xian
..............page:11-13,26
Object Concepts Research Based on UniNet
zhou guo fu ; yu peng ; yuan chong yi
..............page:14-18,38
Seldom Questions about HLA Research
lv liang quan ; zhao qin ping
..............page:19-21,96
A Survey on Statistical Language Models
xing yong kang ; ma shao ping
..............page:22-26
Elaboration Tolerance in Logical AI
zhu jian zhong ; ge ye ting ; luo bin ; chen shi fu
..............page:31-34
Neural Network Ensemble in Lung Cancer Cell Identification
yang yu bin ; li ning ; chen shi fu ; chen zhao qian
..............page:39-42,53
Probabilistic Radial Basis Function Network Based Face Recognition
zuo dong jun ; zhao hai tao ; yang jing yu
..............page:43-45,123
The Applied Research of Web Usage Mining
liu li zhen ; song zuo tao ; lu yu chang
..............page:46-48
The Research on Key Problems of Spatial Data Mining
xiao yu qin ; jing ning ; wu qiu yun ; zhong zhi nong
..............page:49-53
The Overview of Statistic Natural Language Parsing Technology
meng yao ; li sheng ; zhao tie jun ; yang zuo zuo
..............page:54-58
A Two-Directions Method of Chinese Corpus Tagging Based on Statistical Language Model
liu qi he ; zhan si zuo ; yang guo wei
..............page:59-60,168
Multi-Agent Application System Model Based on UML
sun hua zhi
..............page:61-63
The Theory Analysis on FSDVS and an Optimal Model
xu yong ; yang qiang ; yang jing yu
..............page:64-66,182
Extended Vector-Based Radiosity
sun yuan hao ; gong zhen yu ; pan jin gui
..............page:67-69,78
Adaptive Wavelet Thresholding for Image Denoising
shang xiao qing ; wang jun feng ; song guo xiang
..............page:70-71
Fast Method for Obstacle Detection Based on Color Stereo Vision
li qing zhong ; chen xian hua ; gu wei kang
..............page:72-75
A Blind Image-Debluring Method Based on Visual Characteristics
jiang jin shan ; yu ying lin ; lu zi qiang ; guo guo xiong
..............page:79-80,88
EH_GRBAC:A Knowledge-Based Access Control Prototype for Pervasive Computing
zhang xiang gang ; zhang yun yong ; liu jin de
..............page:148-151
Design of a Trust Management Framework in Software Service Coordination
xu feng ; cao chun ; zheng zuo ; feng yang yue ; lv jian
..............page:152-154,161
TFSP :A Formalized Description Tool of Distributed Real-Time System
ye jun min ; wang zhen yu ; chen li ; zhao heng
..............page:155-157
Scalable Parallel Computers:System Architecture and Up-to-Date Development
zeng qing hua ; chen tian zuo
..............page:158-161
Parallel Algorithm of Multi-Parameters Joint Estimation Based on the Parallel Array
zeng qing hua ; chen tian zuo
..............page:162-164
The Study on Dependable Computing and its Key Technology
wang zhi gang ; li shi xian
..............page:165-168
Exception Handling--An Approach to Improving Software Robustness
jiang shu juan ; xu bao wen
..............page:169-172
ACP Model of Java Concurrency
liu yuan ; xu bao wen
..............page:173-174
The Design and Implementation of Privilege Divided Linux Based System
lin zhi qiang ; jin lei ; mao bing ; xie li
..............page:175-178,164
The Transform between Fomal and Visual Software Model
zhou yan zuo ; zhang wei qun
..............page:179-182