Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2006 Issue 6
An Anomaly Intrusion Detection Technique of Support Vector Machine Based on Rough Set Attribute Reduction
ZHANG Yi-Rong;XIAN Ming;XIAO Shun-Ping;WANG Guo-Yu
..............page:64-68
Strategies of Object Migration for Object-based Storage System
TAN Zhi-Peng;FENG Dan
..............page:61-63,68
Rough Set Model and Precision Reduction in Incomplete and Fuzzy Decision Information Systems
WEI Da-Kuan;ZHOU Xian-Zhong;HUANG Bing
..............page:182-185
Fuzzy Weighted Median Filters
LU Rui-Hua;ZHANG Wei-Qun
..............page:186-187,191
Study on SoftMan Communication Model Based on SOAP
MA Zhong-Gui;YE Bin;ZENG Guang-Ping;TU Xu-Yan
..............page:188-191
Study on Context Awareness Application Framework Based on State Machine
YU Zhao-An;ZHANG Shen-Sheng;ZHANG-Yong;TONG Hong-Xia
..............page:192-194,199
Fuzzy Comprehensive Assessment in Network Survivability Based on the Uncertain AHP
WANG Jian;WANG Hui-Qiang;ZHAO Guo-Sheng
..............page:73-75,111
The Study of On-line Testing for BACnet Application Layer TSM
xu yi ping ; zhu zhen hua ; zhou man li
..............page:76-78,82
Access Control Framework for Mobile Terminal Systems
LIU Wei;LIANG Hong-Liang
..............page:79-82
Mobile IPv6-the Basis of Automobile Computer System
BAI Yong;LAN Zhang-Li
..............page:83-84,88
Scheduling Algorithm in Grids Based on Benefit
YOU Xin-Dong;CHANG Gui-Ran;CHEN Xue-Yao;TIAN Cui-Hua
..............page:85-88
A Task Duplication Based Scheduling Algorithm in Grid Computing Systems
LIN Jian-Ning;WU Hui-Zhong;CHEN Xue-Qin
..............page:89-92,105
A Grid Resources Allocation Mechanism Based on Futures Markets Theory
LIU Hui-Bin;DU Zhi-Hui
..............page:93-96
Cross-Domain Security Auditing Architecture and Implement in Grid Based on Mobile Agent
XIAO Zheng-Hong;HU Zhong-Wang;YIN Hao
..............page:97-100
Client-Based Access Control Management for XML Documents
LU Chang-Sheng;HONG Xiao-Guang
..............page:124-127
Design and Implementation of an Efficient StAX Based XML Parser
REN Xin;CAO Dong-Lei;JIN Bei-Hong
..............page:128-131,273
Genetic Scheduling Algorithm for Service Oriented Grid Workflow
GUO Wen-Cai;YANG Yang
..............page:132-134
Modeling Workflow Patterns Using Coloured Petri Nets
WEN Li-Jie;WANG Jian-Min;SUN Jia-Guang
..............page:135-139
Information-Theoretically Analysis of Secure Steganographic System
LU Xin;MA Zhi;FENG Deng-Guo
..............page:140-142
A Survey on Detection and Prevention Technologies of Buffer Overflow Vulnerability
XU Liang-Hua;CHEN Zuo-Ning
..............page:143-147
A New Adaptive Watermarking Algorithm Based on DCT
HUANG Song;YANG Hua-Qian;ZHANG Wei;WEI Peng-Cheng
..............page:148-149,160
DOC: The Degree of Credibility Model in Contract Net Protocol
ZHAO Xin-Yu;LIN Zuo-Quan
..............page:150-153,167
Modeling for Multi-Agent Plan Based on Coloured Petri Nets
DU Zhuo-Min;HE Yan-Xiang
..............page:154-157
An Ant Colony Optimization Algorithm for Traveling Agent Problem
DU Rong-Hua;YAO Gang;WU Quan-Yuan
..............page:158-160
Fuzzy Self-Adapted Particle Swarm Optimization Algorithm for Traveling Salesman Problems
GUO Wen-Zhong;CHEN Guo-Long
..............page:161-162,185
Nonrestrictive Concept-Acquisition by Representation Redescription
CHEN Yan;WEI Hui
..............page:168-171
Properties and Construction Methods of Kernel in Support Vector Machine
WANG Guo-Sheng
..............page:172-174,178
Intent Reduction of Concept Lattices and its Algorithm Based on Rough Set Theory
WU Qiang;ZHOU Wen;LIU Zong-Tian;CHEN Hui-Qiong
..............page:179-181
Research on the Key Algorithms of HNC Question Answering System
WU Chen;ZHANG Quan
..............page:200-202,217
The Performance Analysis of Wu-Manber Algorithm and its Improvement
CHEN Yu;CHEN Guo-Long
..............page:203-205,209
Data Mining Based on Knowledge-Grid
WEI Ding-Guo;PENG Hong
..............page:210-213
Research of Intellective Class Scheduling System Based on Negotiation
WANG Lu;QIU Yu-Hui
..............page:214-217
Get the Best Possible Optimization Result for Linear Programming with Two Stages
CHEN Ying-Zu;WAN Xin;ZHU Jian-Fang;PENG Jun
..............page:218-220
Throughput Analysis of IEEE 802.11 WLANs in Non-Saturated Conditions
XU Yan-Yi;WANG Shu-Zong;XU Chang-Chun
..............page:42-43,51
An Algorithm for the Solution to the Maximum-flow Problem of Networks
LING Yong-Fa;XU Zong-Ben
..............page:39-41
A Rate Control and Pruning Algorithm for Single-rate Multicast Sessions
YANG Zong-Kai;ZHANG Guan-Xiang;CHENG Wen-Qing
..............page:35-38
Moving Average Forecasting for Network Traffic with Self-Similar
WEN Yong;ZHU Guang-Xi
..............page:32-34,38
A Trust Model Based on the Subjective Logic Theory for P2P Network
YAO Han-Bing;HU He-Ping;LU Zheng-Ding;HUANG Bao-Huang;LI Rui-Xuan
..............page:29-31
Network Mobility and the Technologies of Route Optimization
LI Jun;GE Jing-Guo
..............page:25-28
A New Method of Merging Contoure Groups in 3D Surface Reconstruction
HUANG Kui-Dong;ZHANG Ding-Hua;WANG Kai;MAO Hai-Peng
..............page:221-224
Disaster Recovery Architecture of Information System
ZHANG Yan;LI Qiang;LI Zhou-Jun;HE De-Quan
..............page:101-105
The Research of Performance Model on Database Heterogeneous Cluster
WANG Yuan-Zhen;GONG Wei-Hua
..............page:106-108,142
A Method of Database Repairs Based on Semantic Tableau
LIU Quan;LING Xing-Hong;ZHANG Hong-Bin;SUN Ji-Gui
..............page:109-111
Architectures for Intrusion Tolerant Databases Based on Role-Based Accesss Control
DENG Wei;WU Zhong-Fu;YE Chun-Xiao;ZHONG Jiang
..............page:112-114,134
Practical Techniques for Fast Searches on Encrypted String Data in Databases
CUI Bin-Ge;LIU Da-Xin;WANG Tong
..............page:115-118
Research on Methodology of Generating Task-Based Tactical Situation Picture from Global Resource Picture
LIU Hong-Fang;YANG Dong-Sheng;LIU Zhong;ZHANG Wei-Ming
..............page:119-123
Optical Flow Estimation Based on SVD Covariance Weighted Techniques
HOU Yun-Shu;ZHANG Yan-Ning;ZHAO Rong-Chun
..............page:236-238
An Unbalanced Partitioning Scheme for Graphs in Heterogeneous Computing
SHEN Yi-Wei;ZENG Guo-Sun
..............page:260-263
Research on COTS Evaluation and Selection Methods
SHENG Jin-Fang;WANG Bin;ZHANG Yao-Xue;CHEN Song-Qiao
..............page:264-266,277
A Software Cyclomatic Complexity Metrics Method Based on Procedure Blueprint
LIU Jian-Bin;LI Jian-Zhong;YU Chu-Ying;YANG Lin-Bang
..............page:267-269,283
Research on Microreboot and Design of Crash-only Software
ZHU Yan;WANG Hui-Qiang
..............page:270-273
Research on High Performance DOM Implementation
GUO Hong-Yan;YANG Bo;JIN Bei-Hong
..............page:274-277
Designing and Evaluating the Performance of a Beowulf Cluster System Based on Windows and PVM
ZHU Yong-Zhi;WEI Rong-Hui;ZHAO Ben-Li
..............page:278-279,封四
Research on the Model of Distant Education System Based on Grid
MAI Hong;LI Ji-Gui
..............page:293-295
Study of Data-Fusion Model for Wireless Sensor Network
YE Ning;WANG Ru-Chuan
..............page:58-60
Real-time Concurrency Control Based QSR in Broadcast Environments
LU Yan;DANG De-Peng
..............page:55-57
A Study on the Effect of Topology Control on Performance of Mobile Ad Hoc Networks
WANG Xuan;LI Jian-Dong;ZHANG Wen-Zhu
..............page:44-47
Improved Four Points Subdivision Scheme and its Applications
ZHAO Hong-Qing;PENG Guo-Hua;YE Zheng-Lin
..............page:239-241,259
An Architecture-oriented Visual Environment for Service Integration Artemis-VIDE
LUO Bin;PAN Jian;MA Xiao-Xing;LU Jian
..............page:242-246
Feature Refinement-based Generative Programming Method
ZHUO Wei;GU Ming
..............page:247-250
A Reuse-based Approach to Software Process Improvement
XU Ru-Zhi;DU Yi-Bing;YU Hua;LU Jing;QIAN Le-Qiu
..............page:251-254
Distributed Load Balancing Strategy Based on Software Rejuvenation
GAO Wei;YANG Qun;XU Man-Wu
..............page:255-259
UML State Diagram-based Test Case Generation of OO Software
JIANG Man;WANG Tian-Qing;PAN Jin-Gui
..............page:284-286,290
An Extended Model of Persistent State Service Based on Message-oriented Middleware
ZENG Yi;LIANG Bao-Lan;LIU Yuan-Yong
..............page:287-290
Mapping UML-RT to Architecture of a Graphical Design Environment
LIU Xiao-Yan;ZHANG Yun-Sheng;J-J.Schwarz;LI Jun-Chang
..............page:280-283
Construction of Low Density Parity Check Codes Using Quadratic Congruential Sequences
LIU Wen-Ming;ZHU Guang-Xi;DENG Yong-Qiang
..............page:291-292,295
Research & Development of WLAN-based Location Techniques
LANG Xin-Pei;XU Ke;ZHAO Ming
..............page:21-24
Anatomy of Internet Architecture
YANG Peng;LIU Ye
..............page:15-20
The Integration and Virtualization of Networking Storage
ZHANG Cheng-Feng;XIE Chang-Sheng;LUO Yi-Hui;LUO Dong-Jian
..............page:11-14
A Definition Framework of Spatial Logic and Decidability
YAN Feng;CHEN Tao-Lue;HAN Ting-Ting;LU Jian
..............page:7-10
A Study of Optimization Techniques about Reachability in Timed Automata
CHEN Ming-Song;ZHAO Jian-Hua;LI Xuan-Dong;ZHENG Guo-Liang
..............page:1-6,100