Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2007 Issue 5
Study on Decision-making of Agent Based on the Behavior Selection for Artificial Life
ZHANG Xiao-Chuan;LI Zu-Shu
..............page:213-214,251
To Construct and Use FDI-based User Profile in Context-Aware Computing
BAI Yun;YANG Juan;QIU Yu-Hui
..............page:210-212
The Research Based on the Trust Region Method Algorithm in the Geometric Constraint Solving
CAO Chun-Hong;ZHANG Bin;LI Wen-Hui
..............page:208-209,221
Research of Online Evaluation Model and Algorithm for Network Attack Effect
WANG Yong-Jie;JIANG Liang;XIAN Ming;CHEN Zhi-Jie;WANG Guo-Yu
..............page:72-74,103
Anomaly Intrusion Detection Based on Data Stream
YU Yan;GUO Shan-Qing;HUANG Hao
..............page:66-71,114
The Research of Fast Direct Acquisition Methods Based on P Code
FENG Yong-Xin;LIU Fang;PAN Cheng-Sheng;WANG Guang-Xing
..............page:62-65
Application of Data Mining in IT Infrastructure Monitoring
SONG Ying-Pai;WANG Lin-Lin
..............page:205-207
A Study on the Method of Feature Selection in Chat Text
LI Sheng-Yu;HE Wen
..............page:202-204
The Pre-processing of Web Usage Mining
LIU Li-Jun;ZHOU Jun;MEI Hong-Yan
..............page:200-201,204
A Clustering Algorithm Based on Cluster Validity Indices
FAN Ming;DAI Guan-Zhong;QIN Seng
..............page:197-199,207
Data Stream Hierarchical Windows Model and Aggregate Query Algorithm
LIU Qing-Bao;JING Yan;HOU Dong-Feng;ZHANG Wei-Ming
..............page:194-196
An Approach and Implementation to Semantic Web Service Matchmaking
ZHANG Xian;LI Zhou-Jun;LI Meng-Jun
..............page:99-103
The Realization Mechanism of the Web Information Retrieval Based on the Domain Ontology
SONG Er-Wei;LIU Zong-Tian;XU Li-Bin;CHEN Guang
..............page:104-106,110
Study on Policy-based Access Control for Web Services
SHEN Hai-Bo;HONG Fan
..............page:107-110
Attribute-based Access Control Model for Web Services
FU He-Gang;LI Jing
..............page:111-114
A Research on BPM Monitor Based on Process Knowledge
TAO Ya-Xiong;WANG Jian;LING We-Qing
..............page:115-117,128
A Case-based Dynamic Scientific Workflow Model
WEN Yuan-Qiao;YU Sheng-Sheng
..............page:120-124,143
Behavior Preservation of Refined Workflow Nets
DING Zhi-Jun;PAN Mei-Qin;JIANG Chang-Jun
..............page:125-128
Analysis of OWL-S Process Model Based on Workflow Patterns and its Application
LEI Li-Hui;DUAN Zhen-Hua
..............page:129-133,封4
Design and Implementation of an Evolutionary Fuzzy Logic Controller Based on PFLC
ZHANG Da-Bin;LI Yuan-Xiang;XIA Xue-Wen
..............page:218-221
A Fast Method of SAR Image Classification
XUE Xiao-Rong;ZENG Qi-Ming;ZHAO Rong-Chun
..............page:222-223,239
A New Kernel Learning Algorithm for Wavelet Features-based Face Recognition
ZHOU Xiao-Fei;JIANG Wen-Han;YANG Jing-Yu
..............page:224-227
First Face-region Location Based on a Novel Color Space YCgCr
WANG Jian-Guo;LIN Yu-Sheng;YANG Jing-Yu
..............page:228-230,233
A Blind Detection Method of Digital Watermark Based on Coordinates Calibration
CAI Li-Min;FENG Jiu-Chao;XIAO Yong-Hao
..............page:234-236
An Improved Method of Adaptive Histogram Equilibrium for Document Image Enhancement
SHANG Jin;YANG You;LI Xiao-Hong
..............page:237-239
Research on Attack on Personalized Recommendations in E-commerce
YU Li;DONG Si-Wei;GUO Bin
..............page:134-138
A Survey of Cooperation and Coordination in Multi-agent System
XIAO Zheng;WU Cheng-Rong;ZHANG Shi-Yong
..............page:139-143
Integrate Agent and Semantic Web Services
YE Yun;LI Zhou-Jun;LI Meng-Jun;PENG Ding
..............page:144-146
Multi-agent Coordination Based on Semantic Approximation Technology
WU Ke-He;MA Ying-Long;ZHENG Yi;ZHOU Ming-Quan;LIN Peng-Cheng
..............page:152-158
Study of Ontology and Model of Emergency Event
ZHU Wei-Hua;XU Guang-Xia;YANG Dan
..............page:159-161,170
An Ant Colony Routing Algorithm with Mitigating Stagnation
LI Yuan;MA Zheng-Xin;CAO Zhi-Gang
..............page:162-165
Mission-based Organizational Adaptive Design Methodology Based on Granular Computing
XIU Bao-Xin;ZHANG Wei-Ming;LIU Zhong;YANG Dong-Sheng
..............page:166-170
Robust Clustering Based on Finite Mixtures t Distribution
YU Cheng-Wen;GUO Lei
..............page:190-193
Study on Main Factors Affecting the Optimal UDP Packet's Length
ZHANG Wen-Zhu;WANG Xuan
..............page:38-40,56
Research of Improving the Throughout of BWA System
WU Wei-Min;ZHU Guang-Xi;SHENG Zhao
..............page:36-37,78
Pareto Optimal Utility Based Packet Forwarding in Sensor Networks
YAN Yu-Jie;WANG Shu
..............page:32-35,80
Cluster-tree Based Networking and Routing Protocol for IPv6 Wireless Sensor Networks
LIU Xiang-Wen;HOU Hui-Feng;ZHANG Xia;YU Hong-Yi;HU Han-Ying
..............page:28-31,51
A Reinforcement Learning Based Ant Algorithm for Multiple Constrained QoS Routing Problem
CHEN Yan;YANG Hua-Jiang;SHEN Lin-Cheng
..............page:25-27,44
Location-based Adaptive Ad Hoc Routing (LAAR)
ZHANG Qi-Fei;LIU Wei;YANG Zong-Kai;YUAN Lin-Feng
..............page:20-24
A Survey of Spatial Data Mining Research
HU Cai-Ping;QIN Xiao-Lin
..............page:14-19
Overview of IP Network Survivability
WU Jing;GUO Cheng-Cheng;YAN Pi-Liu
..............page:8-13
A Survey on Dynamic Web Services Composition
ZHANG Pei-Yun;SUN Ya-Min
..............page:4-7,24
Research and Outlook on the Semantic Desktop
LI Sheng;HU He-Ping;LU Zheng-Ding
..............page:1-3,19
EIR :The Search Framework of Multi-dimensional Dataset on Unstructured P2P Network with Super-peer
ZENG Bi-Qing;CHEN Zhi-Gang;CHEN Heng-Fa;WU Rui-Zhen
..............page:59-61,91
Design of a Trust Management Model with Degrees of Trust and Feedback
GENG Xiu-Hua;HAN Zhen;YANG Bo
..............page:81-82,138
Fast Harn Cryptosystem Using N-adic Expansion
ZHANG Jing-Liang;WANG Yu-Min
..............page:79-80
A Fault Detection Mechanism in Erasure-code Byzantine Fault-tolerance Quorum
LIU Gang;ZHOU Jing-Li;Qin Lei-Hua;CHEN Xiao-Ping
..............page:75-78
Analysis of the Agent-Get Problem in Hybrid Wireless Network
CUI Wei-Jia;CHEN Xi;LIU Qin-Rang;HU Han-Ying
..............page:57-58,65
Simularity-based Semantics Searching in Peer-to-Peer Networks
CAO Ying-Chun;WANG Yi-Lin;CHEN Jian-Zhong;LU Sang-Lu;CHEN Dao-Xu
..............page:52-56
A Transceiver Saving Auxiliary Graph Model for Static Traffic Grooming in WDM Mesh Networks
YAO Hua-Xiong;YANG Zong-Kai;OU Liang;TAN Xian-Si
..............page:48-51
Analysis of the Grid Network Performance Measurement Based on Network Tomography
WANG Wei;CAI Wan-Dong;LI Yong-Jun
..............page:45-47
LDPC-Coded MIMO OFDMA for Frequency-Selective Fading Channels
GAO Jing-Bo;ZHOU Man-Li
..............page:41-44
An Improvement to DWFC Cohesion Measurement Based on PROBE Method
XIAO Yao;ZANG Wei-Qun
..............page:280-284
A Compiler Symbol Table Generation Approach Based on XML Schema
NiE Nan;XIE Xiao-Dong;GAN Yong
..............page:285-287
Empty Marking of Petri Net and Related Properties
WU Zhen-Huan;YU Feng;WU Zhe-Hui
..............page:288-290,封3
Research on Security Model for Industrial Control Networks
WANG Hao;WU Zhong-Fu;WANG Ping
..............page:96-98
Design and Implementation of BLP with Time Character on Linux
TAN Liang;ZHOU Ming-Tian
..............page:92-95
A Method to Construct Dynamic S-box Based on Chaotic Map
QIU Jing;WANG Ping
..............page:89-91
A Stream Cipher Based on Chaos and Matrix Transform
GU Guo-Sheng;HAN Guo-Qiang;LI Wen
..............page:85-88
Cryptanalysis of Some Provably Secure Signature Schemes
MING Yang;WANG Yu-Min
..............page:83-84
Review of High Performance Cluster Communication System
YANG Feng;DU Zhi-Hui;LIU Zhi-Qiang
..............page:240-242
Some Issues about Trusted Components Research
GUO Shu-Hang;LAN Yu-Qing;JIN Mao-Zhong
..............page:243-246
Formal Verification Based on Object-Z Specification
WEN Zhi-Cheng;MIAO Huai-Kou;ZHANG Xin-Lin
..............page:247-251
Modeling Concurrent Software System Based on Aspect-oriented Techniques
SU Yang;KANG Li;HU Sheng-Ming;CHEN Ping
..............page:252-254,262
Usability-oriented Interaction Process Cognitive Process Modeling and Model Check Method
LAI Xiang-Wei;QIU Yu-Hui;ZHANG Wei-Qun
..............page:255-259,279
A Situation Calculus-based Validation Approach to Uset Interface Model
LIANG Wei-Sheng;LI Lei
..............page:260-262
The Implementation of Software Project Track and Monitoring Based on EVA
XIE Yi;ZHANG Wei-Qun
..............page:263-265,272
Software Reliability Analysis of Component Based Software
FAN Lin-Bo;WU Zhi;ZHAO Ming
..............page:266-268
Program Extraction from Constructive Proof
SHI Kai-Yuan;PANG Jian-Min;ZHAO Rong-Cai;DAI Chao
..............page:269-272
Algorithms and Analysis of Construction for Feed-Foreword PONN
ZHU Shi-Jiao;YANG Lei;WANG Shou-Jue
..............page:171-174
Proximal Support Vector Machines for Samples with Unbalanced Distribution
TAO Xiao-Yan;JI Hong-Bing;MA Zhi-Qiang
..............page:174-176
A RFCA-based Approach for Concept Similarity Computation
CAO Ze-Wen;LU Chang-Hui;ZHANG Wei-Ming;DENG Su
..............page:177-180
Research on Algorithms of Constructing SVR Based on its Approximate Hyperplane
ZENG Shao-Hua;WEI Yan;CAO Chang-Xiu
..............page:181-182,193
Context Based Feature Description Model in Chinese Text Categorization
HE Zhong-Shi;LIU Li
..............page:183-186
PSO Based Feature Weighting Algorithm for KNN
REN Jiang-Tao;ZHUO Xiao-Lan;XU Shen-Chan;YIN Jian
..............page:187-189
Modeling Process and its Application Based on UML and Z
ZHU Yi;ZHANG Yong-Chang;ZHANG Guang-Quan;HUANG Zhi-Qiu
..............page:273-276