Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2007 Issue 2
Nearest Neighbor Convex Hull Classification of Fisher Discriminant Features
JIANG Wen-Han;YANG Jing-Yu;ZHOU Xiao-Fei
..............page:186-188
A Survey of Ontology Learning from Text
JIA Xiu-Ling;WEN Dun-Wei
..............page:181-185
Research of Algorithm for Finding TFBS Based on Gibbs Sampling
HE Cai-Sheng;DAI Xian-Hua;XIANG Qian;WANG Jiang;DENG Yang-Yang;DAI Zhi-Ming
..............page:178-180
Spatial Clustering in the Presence of Obstacles Based on Voronoi Diagram
XUE Li-Xia;WANG Zuo-Cheng;LI Yong-Shu;Wang Lin-Lin
..............page:189-191
Relative Density-based Clustering Algorithm
LIU Qing-Bao;DENG Su;ZHANG Wei-Ming
..............page:192-195
A New Method for Crime Data Mining Based on Conceptual E-mail System
LIU Wei;TANG Chang-Jie;QIAO Shao-Jie;WEN Fen-Lian;ZOU Jie
..............page:213-215
An Entropy-based Algorithm for OBDD Variable Ordering
ZHAO Ling-Zhong;WANG Xue-Song;GU Tian-Long;QIAN Jun-Yan
..............page:216-219
Updating Algorithm for Association Rules Based on Fully Mining Incremental Transactions
CAI Jin;XUE Yong-Sheng;LIN Li;ZHANG Dong-Zhan
..............page:220-222,233
Service Engine on Demand in Grid Environment
OU Jian-Hong;LI Qi;ZHANG Xue-Hu;MAO Xi
..............page:223-226
Adaptive Visual Object Tracking in Video
HU Fu-Yuan;ZHANG Yan-Ning;PAN Jin;YUAN Jin-Gang
..............page:253-255,257
Application of Image Denoising Based on Nonlinear Wavelet Transform
HUANG Zheng-Hong;XIA Li
..............page:256-257
Technologies on Fast Search for Non-uniform 3D-LUT
DING Er-Rui;ZENG Ping;LUO Xue-Mei;WANG Yi-Feng
..............page:258-259,276
Web Service Evaluation Algorithm Based on QoWS
HUANG Han;HAO Zhi-Feng;CHEN Ming;HAO Tao
..............page:260-263,封三
Trusted Recovery Based on Security Compromises Analysis in Secure Operating System
LI Song-Lin;YUAN Chun-Yang;ZHU Ji-Feng;HUAI Xiao-Yong;LIANG Hong-Liang;HE Ye-Ping
..............page:264-266,273
Design and Implementation on System Security View in SoftOS
LI Guo-Le;WANG Yi;MAO Bing
..............page:289-291
GPRS Technology Platform-based Application Development Study
DI Zhen-Qiang
..............page:292-封三
The Research and Implementation of Ontology-based Legal Knowledge Base
HE Qing;TANG Yong;HUANG Yong-Zhao
..............page:175-177
Construction and Presentation of Ontology on Semantic Web Based on Formal Concept
XU Hong-Sheng;SHEN Xia-Jiong;LIU Zong-Tian
..............page:171-174
Study on Ontology Development by Reverse Engineering
WANG Hong-Wei;YI Lei;ZHANG Yuan-Yuan
..............page:166-170
Concept Extraction and Verification from Web Corpus
YU Lei;CAO Cun-Gen
..............page:161-165,195
An Optimization Method of Workflow Dynamic Scheduling Based on Heuristic GA
XIAO Zhi-Jiao;CHANG Hui-You;YI Yang
..............page:157-160,191
Research on Security Mechanisms of Outsourced Database
ZHU Qin;YU Shou-Jian;LE Jia-Jin;LUO Yi-Shu
..............page:152-156,195
Study of Normalization Existing MVD in XML DTD
QIU Wei;ZHANG Li-Chen
..............page:149-151,185
Research for XML Query Optimization Technology Based on Regular Path Expression
CHEN Ji-Ming;JU Shi-Guang;PAN Jin-Gui
..............page:144-148
Study on Compression Technique for Streaming Data in Wireless Sensor Networks
LIU Xiang-Yu;WANG Ya-Zhe;YANG Xiao-Chun;WANG Bin;YU Ge
..............page:141-143
Website Crawling for Specific Topics
LI Gang;ZHOU Li-Zhu;GUO Qi;LIN Ling
..............page:137-140,148
The Research on TBAC-based Access Control of BPEL
LIU Xiao-Ling;TANG Yong;JI Gao-Feng;YI Sheng
..............page:132-136
Study on Mobile Code Safety Based on Certifying Compilation
LUO Xiao-Guang;WANG Sheng-Yuan;DONG Yuan;ZHANG Su-Qin
..............page:267-269
Research on Behavior Modeling Technology of Virtual Environment
SU Shao-Yong;CHEN Ji-Ming;PAN Jin-Gui
..............page:270-273
An Optimization Method for Protocol Conformance Test Sequence Based on Multiple UIO
WU Yong;HE Qian-Hua;TU Yong-Jun
..............page:274-276
A Kind of Formal Method to Describe UML2. 0 Class Diagram
YANG Jing-Zhong;ZHANG Guang-Quan;RONG Mei
..............page:277-279,288
Limitations of the Finite State Verification Approach
GE Wei;GONG Xiao-Qing;HAO Ke-Gang
..............page:280-283
Research on Semantic Web Services Security
YANG Xin;SHEN Jian-Jing
..............page:115-118
Spatial Information Portal Based on Web Information Search
LI Qi;HUANG Feng;TU Yong
..............page:111-114
An Algorithm for Semi-automatic Web Service Composition
ZHANG Da-Lu;WANG Xuan-Zhao
..............page:107-110
The Composition and Analysis of Web Service Based on Petri Net
YAN Chun-Gang;JIANG Chang-Jun;LI Qi-Yan
..............page:100-103,124
Study on Optimization of Web Services Composition Based on Graph
CAO Li-Pei;LIU Jing;MIAO Huai-Kou
..............page:95-99
A Dynamic Web Service Composition Process Definition Meta-Model and its Application
LI Guo-Zhong;LIU Shu-Lei;WU Qing-Yun;JING Ning
..............page:91-94
Analysis of Choosing the Initial Value of Principal Curve Algorithm
WANG Zhen;CAO Li-Min
..............page:227-229
Real-time Gradient Estimating in Texture-Based Volume Rendering
ZHENG Jie;JI Hong-Bing;YANG Wan-Hai
..............page:230-233
Imagery Unsupervised Segmentation Based on GMLR and MMARP Model
JU Yan-Wei;TIAN Zheng;WU Xin-Qian
..............page:234-237
Unequal Loss Protection of Image Based on Rearranging the Source Symbols
YANG Ya-Dong;WU Cheng-Ke;XIAO Song;DU Jian-Chao
..............page:238-241,249
Algorithms for Boundary Detection within a Pyramid of Hexagonal Pixel Grids
TANG Hao-Jun;CHEN Ming;Richard W.Stimets;J.T.Hsu
..............page:243-249
Moving Object Detection under Complex Background Based on Radial Basis Function Neural Network
LAI Zuo-Mei;WANG Jing-Ru;ZHANG Qi-Heng
..............page:250-252
Study on Implementing RSA Algorithm in Actual Project
LI Rong-Sen;QIN Jie;DOU Wen-Hua
..............page:86-90
OntoRBAC: Specify and Integrate RBAC Policies with Ontologies
WANG Zhi-Gang;WANG Xiao-Gang;LU Zheng-Ding;LI Rui-Xuan
..............page:82-85
An Efficient Group Signature Scheme for Large Groups
CUI Guo-Hua;LI Jun
..............page:79-81,118
Web Service Matching Model Based on Extended Interface with Semantic
YU Shou-Jian;XIA Xiao-Ling;LE Jia-Jin;HUANG Xiao-Hu
..............page:129-131,136
Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-agent System
WU Jun;WANG Chong-Jun;WANG Jun;CHEN Shi-Fu
..............page:71-75
Continuous Distributed Top-k Monitoring over Data Streams
DENG Bo;RAO Xiang;JIA Yan;YANG Shu-Qiang
..............page:125-128
One Method and Implementation of Security-Policy-based Data Protection
ZHANG Xiao;WANG Shan;PENG Zhao-Hui
..............page:122-124
Research on Information System Architecture Description Method Based on Multi-Views
LUO Ai-Min;LUO Xue-Shan;HUANG Li
..............page:119-121,128
The Summary of Congestion Control Algorithm in Network
WU Hang-Xing;MU De-Jun;PAN Wen-Ping;QIAO Mei-Mei
..............page:51-56
The Hierarchical Multicast Routing with Multiple QoS Constraints
YAN Xin;LI La-Yuan
..............page:27-34,110
Live Streaming Overlay Multicast Service Network
ZHAO Yu-Hui;AN Yu-Yan;WANG Hong-Jun;GAO Yuan
..............page:22-26
Developing High-assurance Secure Information System According to Common Criteria
YUAN Chun-Yang;HE Ye-Ping;PAN Xue-Jian;LIANG Hong-Liang
..............page:17-21,47
The Semantical Research on Real-time Component Composition
HUANG Jing;LU Yan-Sheng;XU Li-Ping
..............page:10-16
Optimizing Neuron Function Types Based on GP in Functional Network Design
ZHOU Yong-Quan;JIAO Li-Cheng
..............page:7-9,16
Research on News Video Mining Techniques
LUAN Xi-Dao;XIE Yu-Xiang;HAN Zhi-Guang;WU Ling-Da
..............page:1-6
A Spam Worm Propagation Model in Scale-free Networks
WANG Chang-Guang;WANG Fang-Wei;ZHANG Yun-Kai;MA Jian-Feng
..............page:68-70
Design and Realization of a Network Attack Generator
WANG Yong-Jie;XIAN Ming;CHEN Zhi-Jie;WANG Guo-Yu
..............page:64-67,90
Study on Wireless Local Area Network Gateway Based on IEEE802. 11b
ZHANG Li;LUO Yi-Rong
..............page:62-63,143
Study of Mobility Prediction Method in Mobile Ad Hoc Networks
TAN Chang-Geng;CHEN Song-Qiao;GONG Xiao-Xia;WANG Jian-Xin
..............page:57-61
A Single-Actor-Selection Algorithm Based on Hop-Bounded in Wireless Sensor and Actor Networks
FU Qi;JIANG Yun-Xia;XU Zhen-Yang;DOU Wen-Hua
..............page:48-50
VRF/RT-based Discovery of VPN Topology in BGP/MPLS VPNs
LIANG Hai-Ying;HOU Kun;LAN Li-Hui;GAO Yuan
..............page:43-47
A Research on Weighted Fuzzy Aggregation Operators
LI Ai-Ping;JIA Yan;WU Quan-Yuan
..............page:196-197,203
An Efficient Nearest Neighbor Classifier Algorithm Based on Pre-classify
WANG Wei-Dong;ZHENG Yu-Jie;YANG Jing-Yu;YANG Jian
..............page:198-200
Research on Spectral Clustering in Machine Learning
GAO Yan;GU Shi-Wen;TANG Jin;CAI Zi-Xing
..............page:201-203
Weighted Naive Bayes Classification Algorithm Based on Rough Set
DENG Wei-Bin;WANG Guo-Yin;WANG Yan
..............page:204-206,219
On Cluster Validity for Kernelized Fuzzy C-Mean Algorithm
PU Yun-Wei;JIN Wei-Dong;ZHU Ming;HU Lai-Zhao
..............page:207-210,229
DnaReSM: A Multi-Supports-based DNA Repetitive Sequences Mining Algorithm
XIONG Yun;CHEN Yue;ZHU Yang-Yong
..............page:211-212,封四
MDLP——The Resource Allocating Policy for Multi Divisible Loads in Heterogeneous Linear Networks
LIU Hong-Tao;YUE Peng;YANG Juan;QIU Yu-Hui
..............page:41-42,61
Design and Study of the Model of the Management System Based on Active Network
MA Yan;ZHANG Xiao-Zhen;LI Tai-Hua;ZHONG Guo-Xiang
..............page:38-40,75
A Hybrid Intelligent Preventive Fault-tolerant QoS Unicast Routing Scheme in NGI
WANG Xing-Wei;CAI Shu-Xiang;YU Yang;HUANG Min
..............page:35-37