Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2006 Issue 10
Computing Economics-based Grid QoS Control Model
LIU Li;YANG Yang;LIU Song-Tao
..............page:66-67
The Analysis of Market Allocation Mechanism of Network Resource
TAO Jun;SHUAI Dian-Xun
..............page:68-70
PDHA:A Protocol for Mobile Agent Protection
HU Jian-Li;WANG Jia-Zhen;YANG Su-Min
..............page:74-79
A Design of Asynchronous Remote Mirroring Protocol Based on Log
LIU Wei-Ping;CAI Wan-Dong
..............page:80-83
Fast Arithmetic of Genus 3 Hyperelliptic Curves over Prime Fields
HAO Yan-Hua;TAN Shi-Chong;WANG Yu-Min
..............page:84-89
A Multi-secret Sharing Scheme with General Access Structures Based on a Geometric Property
PANG Liao-Jun;LI Hui-Xian;WANG Yu-Min
..............page:90-93
Research on Systematically Describing Attacks
YAN Fen;HUANG Hao
..............page:93-96,105
Study on Taxonomy and Effectiveness Evaluation of DDoS Attacks
WANG Yong-Jie;XIAN Ming;CHEN Zhi-Jie;WANG Guo-Yu
..............page:97-100
Research on Description Logic Based Conflict Detection Methods for RB-RBAC Model
YU Hai-Bo;CHE Hai-Yan;JIN Chun-Zhao
..............page:101-105
Security Analysis for Wireless Sensor Networks Based on ZigBee
REN Xiu-Li;YU Hai-Bin
..............page:111-113
Research on Thread Dispatch Based Hidden Process Detection Technique
LIANG Xiao;LI Yi-Chao
..............page:114-115,118
Anomaly Detection and Implementation Based on Wavelet
XIAO Zhi-Xin;YANG Yue-Xiang;YANG Lin
..............page:116-118
Study on Complicated Information System Model
WANG Kun;YUAN Feng;ZHOU Li-Hua
..............page:119-123
The Application of AHP and Grey Corerelation Analysis in Object Relation Mapping
ZHANG Guo-Ping;JING Hai-Feng
..............page:124-125,133
Application of Bussiness Intelligence in Modern Enterprise
WANG Lin-Lin;JIAO Hui-Min
..............page:128-130,162
Syntactic Completeness of Medium Logic (ML)
PAN Zheng-Hua
..............page:131-133
Research on Model of Emotional Softman
NING Shu-Rong;BAN Xiao-Juan;ZENG Guang-Ping;YIN Yi-Xin;TU Xu-Yan
..............page:134-137
A Model of Context-Awareness Computing Based on Ontology
WANG Gang;QIU Yu-Hui
..............page:138-140
Study on Knowledge Query in Personalized Ontologies
HAN Yong-Guo;SUN Shi-Xin
..............page:141-143
A Framework for the Natural Language Request Processing in Information Retrieval
XIONG Wen-Xin;SONG Rou
..............page:144-147,204
A Chinese Part-of-speech Tagging Approach Using Conditional Random Fields
HONG Ming-Cai;ZHANG Kuo;TANG Jie;LI Juan-Zi
..............page:148-151,155
An Error-correct Approach in Chinese Automatic Speech Recognition Based on Semantic Analysis
WEI Xiang-Feng;ZHANG Quan;XIONG Liang
..............page:152-155
Particle Swarm Optimization Algorithm with Reverse Thinking Particles
ZHANG Xiao-Ming;WANG Ru-Jing
..............page:156-159
Ant Colony Optimization Algorithm Based on Multiplicate Pheromone
GAO Shang;SUN Ling-Fang;HOU Zhi-Yuan;YANG Jing-Yu
..............page:160-162
Particle Swarm Optimization Based on Dynamic Niche Technology with Applications to Conceptual Design
LIU Xi-Yu;WANG Wen-Ping;LIU Hong;DUAN Hui-Chua
..............page:163-168,209
Strategy of Structuring and Learning Based on Multi-Input and Single Output Functional Network
CUI Ming-Yi;ZHANG Xin-Xiang;SU Bai-Yun;ZHANG Rui
..............page:169-171,192
Semantic Fuzzy Matching towards Resource Discovery in Virtual Organization
TANG Jiu-Yang;ZHANG Wei-Ming;XIAO Wei-Dong;SONG Jun-feng;TANG Da-Quan
..............page:172-175
The Research of an Automatic Modeling Method of Linear Programming Problem
CHEN Xue-Long;HAN Sheng-Ju;WANG Yan-Zhang;XU Yong-Tao
..............page:176-178
Proportional Stretch Factor Differentiated Service in Heterogeneous Web Server Cluster
XIONG Zhi;YAN Pu-Liu;GUO Cheng-Cheng
..............page:61-65
Study of the Hierarchy Management Model Based on Active Network Node
ZOU Xian-Chun;ZHANG Wei-Qun
..............page:58-60
Correspondent Node Binding of Method Based Mobile Option in Hierarchical Mobile IPv6 Inter-region Handoff
WU Kai-Gui;HE Jian-Feng;LIU Dong;ZUO Youg-Li
..............page:55-57
Calculation and Analysis of the Capacity of an IEEE802.11b Wireless LAN
FU He-Gang;ZHOU Zhen-Dong
..............page:51-54,70
A Comparative Performance Evaluation of F-HMIPv6
LIU Chu-Da;QIAN De-Pei;LIU Yi;XIAO Kai-Ping;LI Yan-Ping
..............page:48-50
Rough Entropy of Rough Fuzzy Sets Based on Covering
XU Fei-Fei;MIAO Duo-Qian;LI Dao-Guo;WEI Lai
..............page:179-181
Study on Influence of Effectiveness Factor in HCM Algorithm in 2-D Space
JIN Jian;HUANG Guo-Xing;LIANG Dao-Lei
..............page:182-185
Application of Clustering Analysis Based on Genetic Algorithm in CT Image Segmentation
ZHU Ling-Li;LI Ji-Gui;BAO Su-Su
..............page:186-188
A Research on the Knowledge-based Neural Network Ensembles
WANG Yong;XING Hong-Jie
..............page:189-192
Feature Selection Based on Information Gain and GA
REN Jiang-Tao;SUN Jing-Hao;HUANG Huan-Yu;YIN Jian
..............page:193-195,251
A Searching Algorithm for α-Outlying Reduction Based on Genetic Algorithm
JIN Yi-Fu;ZHU Qing-Sheng;ZOU Xian-Lin
..............page:198-201
Application of Multi-agent Integration to Fault Prediction of Complicated Systems
SONG Jun;HUANG Da-Rong;XU Qiang
..............page:202-204
An Image Encryption Scheme Based on Random Chaotic Sequence
YANG Hua-Qian;ZHANG Wei;WEI Peng-Cheng;HUANG Song
..............page:205-209
Discovering Communities in Complex Networks
ZHANG Guang-Wei;KANG Jian-Chu;XIA Chuan-Liang;LI He-Song
..............page:1-4,28
An Improved Image's Edge Preserving Orientation Smoothing Algorithm
LIU Xing-Hong;WANG Lin-Lin
..............page:210-212
A Novel Image Retrieval Algorithm Based on Fast Wavelet Packet Histogram Techniques
ZENG Zhi-Yong;ZHOU Li-Hua;WU Cheng-Ke
..............page:213-215
Quantum Measurement and Quantum Computation
ZHANG Yun-Jie
..............page:216-220,255
Effective Conflict and its Elimnation of Interval Speed Continuous Petri Nets
LIAO Wei-Zhi;GU Tian-Long
..............page:221-224,封四
Methods for Obtaining the Process Expressions of S-Nets
DUAN Hua;ZENG Qing-Tian
..............page:225-227,237
Overview of Model Transformation Technology in MDA
ZHANG De-Fen;LI Shi-Xian;GU Si-Shan
..............page:228-230,290
The Research of Timing-Constraint Component Model on the Basis of Reflection Technology
HUANG Jing;LU Yan-Sheng;XU Li-Ping
..............page:231-237
An Overview of Worst Case Execution Time (WCET)Analysis
JI Meng-Luo;QI Zhi-Chang
..............page:238-241
A Reflective Implementation of the Coordination Model in ARCTEMIS-ARC
MA Qian;YU Chun;MA Xiao-Xing;LU Jian
..............page:242-246
Inconsistency Handling of Viewpoints: An Epistemic Logic-Based Approach
JIANG Min;WU Guo-Qing;LIU Xiao-Li
..............page:247-251
A Process Framework of Reuse-Oriented Incremental Software Development
ZHANG Guang-Quan;RONG Mei;LU Ming
..............page:252-255
The Research and Application of AM-RUP Requirement Modeling
DUAN Long-Zheng;WANG Feng-Bin;GAN Sheng-Ke;HUANG Shui-Yuan
..............page:256-259
Unnecessary Time Management in Centralized RTI
CHEN Chun-Peng;SUO Hong-Jun;YAO Yi-Ping;WANG Huai-Min
..............page:260-263
Design and Communication Performance Test of Message Driven Bean Component Based on JMS PTP Model
XIAN Guang-Ming;WANG Zhi-Yan;HUANG Kun
..............page:264-268
The Method Test Data Generation and Maintenance of Web Application Based on DataPool
HUANG Long;LI Nuo;JIN Mao-Zhong;LIU Chao
..............page:272-274
Design and Implementation of a System for Conformance Testing of Protocol Based on XML
LI Hua;YE Xing-Ming;ZENG Min;DING Xue-Lian
..............page:275-278
Security Vulnerability Detection Study Based on Static Analysis
XIA Yi-Min;LUO Jun;ZHANG Min-Xuan
..............page:279-282
Performance Analysis and Comparison of Tree Multicast Routing Protocols for Ad Hoc Network
ZHOU Yuan;LI Guang-Sheng;ZHAN Yong-Zhao;HOU Yi-Bin
..............page:40-47,123
A Novel Ad-hoc Network Congestion Forecast Method Based on Fuzzy Neural Network
LI Qian-Mu;QI Yong;XU Man-Wu;ZHANG Hong;LIU Feng-Yu
..............page:37-39,113
Study of Subcarrier Allocation for Improvement of V-BLAST/OFDM System's Performance
XIAO Xiao;ZHU Guan-Xi;HU Zhen-Ping
..............page:34-36,57
A Global IP Roaming Multi-hop Access Framework and its Protocol Extension
WANG Yu-Ming;YANG Zong-Kai;ZHAO Da-Sheng
..............page:29-33,89
Fixed-rate Layered Multicast Congestion Control
ZHANG Bing;YUAN Bing;LIU Zeng-Ji
..............page:23-28
An On-demand Dual-Channel Routing Scheme in Ad Hoc Networks
WANG Qing-Hui;ZHENG Gui-Ping;WANG Guang-Xing
..............page:20-22
An Adaptive Query Processing Mechanism in Data Stream System
SONG Bao-Yan;ZHANG Li-Jie;LU Yan;YU Ge
..............page:16-20
The New Developments of Classification Methods: Overview
ZHANG Li-Juan;LI Zhou-Jun
..............page:11-15
Survey of Network Situation Awareness System
WANG Hui-Qiang;LAI Ji-Bao;ZHU Liang;LIANG Ying
..............page:5-10
Security Patches Analyzing Through Disassemble Technology
ZENG Ming;ZHAO Rong-Cai;WANG Xiao-Qin;YAO Jing-Song
..............page:283-287
Research on Document Management System Based on UML
GAN Li-Jie
..............page:288-290
Java Native Interface Application Research
XU Xiao-Ning
..............page:291-292,封三
Parallel Conversion of NFA to DFA
SUN Yu-Qiang;LIU San-Yang;WANG Ming-Fei;ZOU Ling
..............page:293-封三