Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2006 Issue 7
Construction of Branch Dependence Graph in Evolutionary Testing for Java
AI Li-Rong;ZHAO Qing-Lan;LIU Xi-Yang;LIU Yang;LIU He-Hui
..............page:249-252,285
An Efficient Resource Reclaim Algorithm for the Real-Time Multiprocessor Systems
BIN Xue-Lian;YANG YU-Hai;BIN Ya;JIN Shi-Yao
..............page:245-248,279
Research and Implement on Compensation in Web Service Transaction
XU Feng;XU Bi-Yun;HUANG Hao;XIE Li
..............page:242-244
MDA Model Transformation Methods for EDOC ER Models
JIANG Quan;ZHAO Jian-Hua;LI Xuan-Dong;ZHENG Guo-Liang
..............page:236-241
Component Description Model in the Internet Environment
XU Feng;ZHANG An-Qin;HUANG Hao;WANG Zhi-Jian
..............page:233-235
Reasoning about Polymorphic Behavior in Object-Z
WEN Zhi-Cheng;MIAO Huai-Kou;SUN Jun-Mei
..............page:230-232,256
A New Kernel Discriminant Analysis Algorithm and its Application to Face Recognition
ZHENG Yu-Jie;YANG Jing-Yu;WU Xiao-Jun;WANG Wei-Dong;ZHANG Li-Li
..............page:223-226
An Improved Genetic Algorithm for the Multidimensional 0-1 Knapsack Problem
ZENG Zhi;YANG Xiao-Fan;CHEN Jing;CHEN Wen-Bin;TANG Rong-Wang
..............page:220-223
Structure Optimization of Fuzzy Neural Network Based on Tabu Search
XIAO LI;LIU Guang-Yuan;HE Yi;QIU Yu-Hui
..............page:217-219
A Logic Analysis Model of Stability of Complex System Based on Ecology
FENG Nai-Qin;QIU Yu-Hui;ZHANG Ying-Shan;ZHAN Cong-Zan;ZHENG Zhong-Guo
..............page:213-216
Model of Knowledge Interaction for Short-Belief Agent with Others
ZHANG Hong-Bin
..............page:211-212,270
A Study and Implementation of the Ontology Knowledge Summary
YAN Xue-Dong;ZHANG Kuo;LI Juan-Zi
..............page:207-210,216
The Design and Application of Chinese Word Segmentation System in a MIS Intelligent Interface
TAN Wen-Rong;YANG Xian-Ze;TAN Jin;LIU Li
..............page:204-206
Research on Algorithm Building of Associative Classifier Based on Generalized Closed Compact Rules
MIN Hua-Qing;HUANG Li-Ying;LU Yan-Sheng;JIANG Jia-Zhi
..............page:182-185,226
Knowledge Reduction and Attributes Characteristics in Set-valued Decision Information System
SONG Xiao-Xue;LI Hong-Ru;ZHANG Wen-Xiu
..............page:179-181,235
A Formal Method of Interface-Connection Component Composition
SUN Ying;CHEN Song-Qiao
..............page:253-256
An Equivalence Proving in Formal Method for Aspect-Oriented Refactory
CHEN Sheng-Qing;ZHANG Li-Cheng;CHEN Guang-Ming
..............page:257-261
Real-time System Modeling Method Based on Aspect-oriented
LIU Rui-Cheng;ZHANG Li-Chen
..............page:262-265
Cryptanalysis of Schnorr Signature Scheme
LIU Jing-Mei;WANG Xin-Mei
..............page:141-142
A Fast Exponent Arithmetic of Hyperelliptic Curves Cryptosystrm
LI Bin;HAO Ke-Gang
..............page:143-144,152
A Stream Cryptographic Algorithm Based on Chaotic Neural Network
WEI Yu-Xuan;WEI Peng-Cheng;ZHANG Wei
..............page:145-146,206
Algorithms of Repeats in DNA Fragment Assembly
WANG Lei;ZHANG Zu-Ping;CHEN Jian-Er
..............page:164-166,170
Implementation of Serial Binary Carry-Save Adder Based on DNA Automaton
LI Wang-Gen;DING Yong-Sheng
..............page:167-170
A Lesniewski Mereological Analysis on Roughness Theory
CHEN Bo;ZHOU Ming-Tian
..............page:171-175,229
Rough Sets and Intuitionistic Fuzzy Special Sets
QIU Wei-Gen;YANG Xiao-Ping
..............page:176-178
Authentication and Key Exchange Scheme Based on SRP-6 and SOAP
LI Dong;GUO He-Qing
..............page:138-141
A New Traitor Tracing Scheme on Large Integer Factoring Problem
ZHANG Xue-Jun;ZENG Zhi-Yong;ZHOU Li-Hua
..............page:131-133
Research of Compound Data Right Control Basde on Flow
HUO Xiao-Li;CHEN Yuan-Ling;LI Rui-Xuan
..............page:266-270
Abstraction in Software Model Checking
YUAN Zhi-Bin;XU Zheng-Quan;WANG Neng-Chao
..............page:276-279
Matching Mechanisms Based on Software Functionality Models
YU Wei-Ping;WANG Qian
..............page:280-285
A BLP Model Based on Access History
LI Rui-Xuan;ZHAO Zhan-Xi;WANG Zhi-Gang;LU Zheng-Ding
..............page:286-288,封三
Research of Role-Based Security in .NET Framework
TIAN Yuan
..............page:289-291
Fault-Tolerant Adaptive and Minimal Routing in 2D-Mesh Using Region of Minimal Paths
CHEN Wen-Bin;YANG Xiao-Fan;SU Wei;TANG Rong-Wang;ZENG Zhi
..............page:292-封三
An Overview of Information Integration
YANG Xian-Di;PENG Zhi-Yong;LIU Jun-Qiang;LI Xu-Hui
..............page:55-59,80
Research on P2P-based View Maintenance
ZUO Ya-Yao;TANG Yong;SHU Zhong-Mei
..............page:92-94,封四
The Schema Mapping Technology in the Integration of Heterogeneous Data Source
YANG Xue-Mei;DONG Yi-Sheng;WANG Yong-Li;QIAN Jiang-Bo;QIAN Gang
..............page:87-91
The Formalization of Conceptual Multidimensional Data Model
LU Chang-Hui;LUI Qing-Bao;DENG Su;ZHANG Wei-Ming
..............page:84-86,120
A Scheme on Implementing Load-Balance Anycast Service on IP Layer in IPv6
WANG Xiao-Nan;QIAN Huan-Yan
..............page:52-54
Research on an OSPF-based Pre-Computational QoS Routing Extension Algorithm
ZHANG Jing;RAN Xiao-Min;HU Han-Ying
..............page:47-51
Research on Grid Quality of Service(QoS)
LIANG Quan;ZHANG Hong-Zheng;LIANG Kai-Jian;YANG Yang
..............page:42-46
The Throughput Capacity of Cluster CDMA Wireless Ad Hoc Networks
YU Gen-Jian;ZHENG Bao-Yu
..............page:40-41,91
An Adaptive MAC Protocol for Broadband Distributed Parallel Ad hoc Networks
HE Min;LIU Xing-Song;ZHAO Dong-Feng
..............page:34-39
A Trust Valuation Model in Mobile Ad hoc Networks
HONG Liang;HONG Fan;ZHANG Ming-Meng;YU Yuan-Lan
..............page:31-33
The Research of Pure Strategy Nash Equilibria on Replica Placement Problem in P2P Environment
WANG Wen-Fang;LIU Xiao-Guang;WANG Gang;LIU Jing
..............page:29-30
Layered Chord: Physical Topology Awared Structured P2P Network
XIAO Zhuo-Cheng;JING Jin-Hua
..............page:25-28
A Routing Assistant Reliable Multicast Method Based on DVMRP
XUE Jian-Sheng;WANG Guang-Xing
..............page:23-24,39
Software Architecture for Micro-Communication Element System
LU Ke;ZUO Ling;ZENG Jia-Zhi
..............page:20-22
Mining Spatial Association Rules in Two-direction
WANG Zuo-Cheng;WANG Lin-Lin;XUE Li-Xia;LI Yong-Shu
..............page:199-203
Algorithm for Association Rule Minning Based on Ordinal Matrix and Tree
ZHU Yi-Xia;YIAO Li-Wen;HUANG Shui-Yuan;HUANG Long-Jun
..............page:196-198
Algorithm Analysis for Anti-monotone and Monotone Constraints Association Rules Mining
LI Hong;CHEN Song-Qiao;DU Jian-Feng;CHEN Jian-Er
..............page:190-195
Study on a New Clustering Algorithm Based on Minimum Clustering Cell and its Application in CRM
ZHANG Guang-Jian;HUANG Xian-Ying
..............page:188-189,203
An Improved K-Means Clustering Algorithm Based on Feature Weighting
REN Jiang-Tao;SHI Xiao-Xiao;SUN Jin-Hao;HUANG Huan-Yu;YIN Jian
..............page:186-187
Security in Wireless Network
WANG Chang-Da;JU Shi-Guang
..............page:121-126
Elliptic Curve Cryptosystem Based Scheme of Hierarchical Access Controlling for Secure Multicast
XU Shou-Zhi;TAN Yun-Meng;YANG Zong-Kai;CHEN Wen-Qing
..............page:118-120
A Scheduling Algorithm Based on Load Balancing in Distributed Workflow
ZHANG Jian;LIU Chun-Lin;TAN Qing-Ping
..............page:115-118
The Analysis on Workflow Model Deadlock by Petri Nets
TAN Ling;ZHENG Dong;GU Qing;CHEN Dao-Xu
..............page:111-114
Real-time MPEG-2 Video Watermarking in the VLC Domain
ZOU Fu-Hao;LU Zheng-Ding;LING He-Fei
..............page:147-152
Image Watermark Technique Based on EZW
DONG Wei-Jun;ZHOU Ming-Quan;GENG Guo-Hua
..............page:153-154,163
An Adaptive Digital Watermarking Algorithm Based on DWT
HUANG Song;ZHANG Wei;CHEN Jun;YANG Hua-Qian
..............page:155-157
The Research of Visualization of DNA Sequences Based on Fractal
WANG Shu-Lin;WANG Ji;CHEN Huo-Wang;ZHANG Bo-Yun
..............page:158-163
A Formal Description of Optimistic Nested Workflow Transaction Model
DONG Yun-Wei;HAO Ke-Gang
..............page:107-110,195
Research on Web User Access Path's Difference Measurement
ZHU Xin-Liang;YOU Zhong-Sheng;WANG Yong
..............page:104-106
XML-based Web Data Model
QIN Jie;ZHAO Shu-Mei;YANG Shu-Qiang;DOU Wen-Hua
..............page:98-103
An Automatic Worm Signature Extraction Algorithm Based on Attribution-Oriented Induction Method
GU Rong-Jie;YAN Pu-Liu;ZOU Tao;YANG Jian-Feng
..............page:127-130,137
Comparison of Video Streaming Performance between Bluetooth and 802.11b
FANG Sheng;LIANG Yong-Quan
..............page:81-83,126
Research Progress on Fine Granularity Scalability Video Coding
WANG Xiang-Hai
..............page:75-80
Research of a Focused Crawler Using Genetic Algorithm
TANG Zhi;WANG Cheng-Liang
..............page:71-74
Indexing Scheme of Moving Objects on Fixed Networks
GUO Jing-Feng;WANG Jian-Chao;DONG Hong-Yu;YAN Li-Hua
..............page:68-70
Research and Application of Normalization for XML DTD
QIU Wei;ZHANG Li-Chen
..............page:63-67
Research of Data Fusion System Architecture in Wireless Sensor Network
CHENG Hong-Bing;HUANG Xiao;YANG Geng
..............page:60-62,106
A Study on Low Complexity Decoding Algorithm of LDPC Codes
DENG Yong-Qiang;ZHU Guang-Xi;LIU Wen-Ming
..............page:16-19
The Research of Information Flow Theory and its Applications
LI Wei-Hua;LI Shi-Xian
..............page:11-15
Lightness and Openness of Mobile Agent Systems: Principles and Implementation
YU Ping;MA Xiao-Xing;CAO Chun;LU Jian
..............page:5-10
On the Multiple-Factors Service Placement Problems on the Overlay Service Networks
PAN Yun;YU Zhen-Wei;FENG Yan-Li;GAO Bin
..............page:1-4,10