Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2005 Issue 6
A Dimidiate Grid Algorithm for the Unbounded Knapsack Problem
LI Qing-Hua;PAN Jun;LI Ken-Li
..............page:217-220
The Design and Implementation of the Distributed Collaborative System Based on Pattern Design
Gong Bin;MENG Xiang-Xu;YANG Cheng-lei
..............page:221-223
Design and Implement of Library Management System Based on Software Architecture and UML
RONG Mei;ZHANG Guang-quan;LIU Yan
..............page:224-227
The Design of Virtual Multi-wave Signal Generator Based on PCI Bus
ZHONG Yuan-Chang
..............page:230-232
Reusable MIS Component with Large Grain Size and General MIS Engine
LUO Jun;QIAO Xu-Feng
..............page:214-216,227
Legacy System Migrating Method Based on Language Transformation Toolset
CHEN Ming;ZHU Wei;PAN Jin-Gui
..............page:210-213
Access Control Management Language VPL and its Application
Yao Qian;CHEN Shun;XIE Li
..............page:206-209
Reliability Demonstration Testing Method for Continuous Execution Software
QIN Zhi-Dong;Lei Hang;Sang Nan;XIONG Guang-Ze
..............page:202-205
Software Integration Testing Method Based on E-CHAM Model
YE Jun-min;LUO Jing;ZHU Kai;ZHAO Liang;ZHAO Heng;WANG Zhen-Yu
..............page:199-201,205
Research and Improvements on Phantom Deadlock Rate of Deadlock Detection Algorithms
WU Kun;DAI Han;ZHOU Jing-yang;LU Sang-Lu;CHEN Dao-Xu;XIE Li
..............page:193-198
Design,Implementation and Verification of SkyEye Simulator's LCD and TouchScreen Simulation Modules
YIN Wen-Chao;CHEN Yu;KANG Shuo;YANG Ye;ZENG Yi
..............page:189-192
The Research on Automatical Code Generating Technique for RoMAS
LI Yang;YAN Qi;QI Zhi-Chang
..............page:185-188
Research on Design Patterns Automatically Discover Based on Program Source Code
MA Yue-feng;LI Fan;CHEN Ping
..............page:181-184
Optimizing Decimal Fixed and Floating Point Arithmetic for Computers
SHI Xue-lin;ZHANG Zhao-qing;Wu Cheng-gang
..............page:176-180
Analysis of the Reachability of Timed UML Sequence Diagrams
GONG Jia-Yu;LI Xuan-dong;ZHENG Guo-liang
..............page:169-175
The Higher-order Features of Haskell and their Applications
PANG Jian-Min;Zhao Rong-cai;Wang Huai-min
..............page:167-168,198
An Improved QoS Unicast Routing Algorithm Considering Uncertain Information
HU Zhong-hai;GUI Zhi-bo
..............page:59-61
The Influence of Forging in the Static Pricing Scheme for Priority Services
LIU Ji-cheng;SHI Bing-xin;YANG Xue-Nan
..............page:54-58
Research on the Stored Procedures of Java Based on DM4
FENG Yu-Cai;Hu Quan;BAN Peng-Xin
..............page:51-53
Secure Binding Update of Mobile IP with Kerberos
TIAN Feng-Bin;WU Zhong-fu;WEN Jun-hao
..............page:47-50
Generalized Tautologies Theory of the Basic Formal System of Universal Logic
MA Ying-cang;HE Hua-Can
..............page:96-98
The Study about Evaluation Model for System Security Based on Attack Tree Analysis
YANG Wu;WANG Xiao-Yun;LI Bo
..............page:91-93
VoiceXML Applied in Voice Active Dial
HU Xiao-Yong;WANG Lin-ling
..............page:85-86
Security Study on Web Service
ZHU Wei-Hua;ZHOU Ying;YANG Dan
..............page:76-78
Selective-Monitoring Based Worm-Warning System
HE Xue-Yu;QING Si-han
..............page:73-75
A Novel Chaotic Stream Cryptographic Algorithm Based on Hénon Map and m-Sequences
WEI Peng-cheng;ZHANG Wei;YANG Hua-qian
..............page:69-72
An Improved Method of Certificate Revocation Based on 2-3 Tree
HUANG Ying-chun;HE Liang-sheng;JIANG Fan
..............page:65-68
Active Network and it's Application in Telecommunication Network
FU Yua-Qing;LIANG Zhu;Liang Zhong
..............page:62-64
An Improved Scan Line Polygon Filling Algorithm
ZHANG Yu-fang;LIU Jun;PENG Yan
..............page:164-166
Two Color Decomposition Methods and their Application in Immunofluorescence Image
YANG Da-gang;DOU Wan-Chun;ZHANG Xi-wen;CAI Shi-jie
..............page:161-163
A New Approach for Image Retrieval Based on Color and Spatial Features
SUN Jun-Ding;ZHANG Xi-Min;CUI Jiang-Tao;ZHOU Li-Hua
..............page:158-160,184
The Collision Detection Algorithm Based on Combination of Buonding Volumes and Space Division
LI Jian-Bo;PAN Zhen-Kuan;SUN Zhi-jun
..............page:155-157
A New Method with Automaticity and Controllability for Terrain Generation
LI Guang-xin;DING Zhen-Guo;ZHOU Li-Hua
..............page:151-154
An E-Book Recommender System with Collaborative Filtering
ZENG Qing-hui;QIU Yu-Hui
..............page:147-150
A New Application of GIS Based on Data Mining in Vehicle Navigation System
ZHOU Ge;WANG Wei-tao;HE Guang-hui
..............page:145-146,175
Algorithm Analysis for Anti-monotone and Monotone Constraints Association Rules Mining
DU Jian-feng;LI Hong;CHEN Song-Qiao;CHEN Jian-er
..............page:142-144,166
A Design Method of Pseudo-Random Sequences Generator Based on Symbolic Dynamics
ZHANG Wei;WEI Peng-cheng;YANG Hua-qian
..............page:140-141,180
An Alert Correlation Method Based on Knowledge Accumulation
GONG Fa-gen;QIN Zheng;ZHANG Da-Fang
..............page:133-136
Approximate Decision Rules and Matching Rules in Rough Set Based Classification Algorithms
ZHANG Xue-ying;LIU Feng-yu;Jürgen Krause
..............page:129-132
Set-pair Rough Set Model Based on Limited Tolerance Relation
LIU Fu-chun
..............page:124-128
The Research on Consistency of Time and Space of IDS
LUO Guang-Chun;LU Xian-Liang
..............page:121-123,139
Acquisition and Role-Based Representation of "Attention" Psychological Commonsense
ZHANG Dong-lei;CAO Cun-Gen
..............page:103-108,128
On Intelligence
SHI Jun;SHI Zhong-zhi
..............page:109-110,封四
Study of Ants-Clustering Algorithm Based on Outlier
LI Rui;QIU Yu-Hui
..............page:111-113,223
An Effective Triangulation Algorithm for Bayesian Network Inference
ZHANG Cong;SHEN Yi-dong;CHENG Ke-fei
..............page:114-117,136
Applying An Adaptive Strategy-Based Tabu Search to Neural Network
HE Yi;LIU Guang-Yuan;LEI Kai-You;HE San;QIU Yu-Hui
..............page:118-120
The Conformance Testing of Neighbor Discovery for IPv6
YE Xin-ming;SUN Mei-Fei
..............page:43-46,68
A New Method to Reduce Registration Delay for Mobile IP Services over MPLS
LI Yun;YANG Feng-rui;LIU Xing-Qian;LONG Ke-ping;CHEN Qian-bin
..............page:41-42
A Survey of Secure Routing for Mobile Ad Hoc Networks
YI Ping;JIANG Yi-Chuan;ZHONG Yi-ping;ZHANG Shi-yong
..............page:37-40,64
Multipath Routing Research in Mobile Ad Hoc Networks
CHEN Yue-Quan;GUO Xiao-feng;ZENG Qing-Kai;Chen Gui-hai
..............page:33-36
Research on Multicast Congestion Control over Wireless Access Links
LIU Yan;ZHANG Guan-Xiang;YANG Zong-Kai;DU Xu
..............page:30-32,50
A Survey and Prospect of Signaling in the Next Generation Mobile Internet
YANG Zong-Kai;WANG Yu-Ming
..............page:1-5
Research of Connections-Oriented Relay Policy of P2P Instant Messages
DUAN Han-Cong;LU Xian-Liang;SONG Jie
..............page:25-29
Key Technologies of P2P Platform
WAN Shu-Chao;JIN Bei-hong;Huang Yu
..............page:21-24
Research on Grid Task Scheduling Based on Multi-Agent
ZENG Wan-Dan;Zhou Xu-bo;Dai Bo;YOU Xin-Dong;CHANG Gui-Ran
..............page:17-20
Design Analysis of 1 0Gbps Forwarding Engine with FPGA
LIU Qin-Rang;WU Jiang-Xing
..............page:14-17
Research and Implementation of Dyanmic Binding in Pervasive Computing
ZHANG Xiang-Gang;LIU Jin-De
..............page:11-13,20
State-of-the-art in Application Layer Multicast Research
YE Bao-Liu;LI Chun-hong;YAO Jian;GU Tie-Cheng;CHEN Dao-Xu
..............page:6-10,53