Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2007 Issue 9
Cryptanalysis of Traitor-tracing Schemes Based on Fully Public Keys
YANG Jun;ZHOU Xian-Wei
..............page:80-82
A DC-Net Anonymous Communication Scheme with Revocable Anonymity
LI Long-Hai;FU Shao-Feng;XIAO Guo-Zhen
..............page:77-79,89
Illustrating the Attribute Reduction Based on HU's Discernibility Matrix with Information View
XU Zhang-Yan;YANG Bing-Ru;SONG Wei;HOU Wei
..............page:191-193
Research on Approximation Operator in Generalized Variable Precision Rough Set Model
SUN Shi-Bao;PU Jie-Xin;QIN Ke-Yun
..............page:194-197
A New Modified Adaptive Particle Swarm Optimization
TONG Yi;WU Zhi-Ming;TONG Zheng-Xiong
..............page:198-199,252
A Model for University Student Credit Fuzzy Evaluation Based on Neural Network
XIAN Xiao-Dong;XIONG Qing-Yu;CHEN Jing;LIANG Shan
..............page:203-205
A New Algorithm for Finding Convex Hull Based on Intelligent Approximating with a Maximum Pitch of Base Lines
ZHOU Qi-Hai;HUANG Tao;WU Hong-Yu;ZHANG Yuan-Xin
..............page:206-208
Study on Rectangle NAM Model for Connected Component Labeling
XIA Hui;CHEN Chuan-Bo;QIN Pei-Yu;LV Ze-Hua
..............page:209-212
A Multi-granularity Data Fusion-based Algorithm for Line Detection
XIE Wei-Bo;WANG Yong-Chu;ZHENG Yi-Quan
..............page:213-217
A Trust Evaluating Model in Education Resources Grid
DONG Xiao-Hua;LI Ji;WU Zhong-Fu
..............page:83-86
An Improved E-mail Classifier Based on Support Vector Machine
XIONG Zhong-Yang;DU Sheng-Dong;ZHANG Yu-Fang
..............page:90-92
Classify E-mails by Support Vector Machine
WANG Qing-Xiang;GUANG Kai;PAN Jin-Gui
..............page:93-94,116
Adaptive Node Schedule of Query Optimization in Grid Database
HU Nai-Jing;ZHAO Liang;HU Jin-Hua
..............page:95-98,109
Research on Key Technologies of Geo-Data Services-oriented Spatial Data Integration
TANG Gui-Fen;LIAO Wei;CHEN Luo;JING Ning
..............page:99-102
A Hybrid Indexing Mechanism for Spatial-Temporal Databases
WANG Ping-Gen;ZHOU Jiao-Gen
..............page:103-106
An Efficient Multidimensional Hierarchical Clustering Storage Schema for OLAP
YUAN Lin;ZOU Heng-Ming;LI Zhan-Huai
..............page:110-113,124
The Demand and Analysis Algorithms of OLAP Based on the Business Space
WANG Wei-Yang;GUO Wei-Jun
..............page:114-116
Access Control Model for CSCW System and Implementation Based on Trusted Computing Technology
ZHANG Zhi-Yong;YANG Lin;MA Jian-Feng;PU Jie-Xin
..............page:117-121,124
An Automatic Match Management System Model for Supply Chain Based on Multi-Agent Techniques
LI Suo-Feng;ZHOU Qi-Hai;ZHANG Yuan-Xin
..............page:122-124
An Algorithm for Clustering Evolving Text Data Stream with Outliers
DENG Wei-Wei;PENG Hong
..............page:125-127,162
The PP Principal Component Based on Kernel and its Application in Clustering with Outliers
XU Xue-Song;ZHANG Xu;SONG Dong-Ming;ZHANG Hong;LIU Feng-Yu
..............page:131-134,138
Artificial Immune Algorithm Based on Niche Technology and Cluster Analysis
HAO Xiao-Li;XIE Ke-Ming
..............page:135-138
Research on Qualitative Evaluation of Generalized Intelligence in Intelligent System
LIU Dong;YIN Yi-Xin;TU Xu-Yan
..............page:167-169
The Research of an Individualized Learning-map Based on ISM Technology
XIE Ying-Gang;WANG Zhi-Liang;QIAO Xiang-Jie;MASATAKE NAGAI
..............page:170-173,223
Research on the Model of Integrating Chinese Word Segmentation with Part-of-speech Tagging
TONG Xiao-Jun;SONG Guo-Long;LIU Qiang;ZHANG Li;JIANG Wei
..............page:174-175,212
Optimal Hamilton Path between Two Vertices in Halin Graph
WEN Xue-Lian;LOU Ding-Jun;LU Yun-Ting;LIANG Hua-Jin
..............page:176-180,217
Algorithms Based on Facility Location for Steiner Problems
WANG Ji-Qiang;LI Guo-Jun
..............page:181-182
Time-Series Forecast Based on Bayes Network
QIN Peng;XING Yong-Kang;YANG Hua-Li
..............page:183-185,193
Research and Design of Realizing Remote Network Management by Mobile Terminal
ZHANG Hong-Cai;CHENG Wei-Dong
..............page:73-76
Reconfigure Feasibility Analyzing and Implementation of Embedded Protocol Stack
SONG Li-Hua;ZHANG Xiao-Tong;WANG Qin;GUO Yan-Fei
..............page:69-72,76
An Approach to Estimate the True Error Second-order Moment of IMM
QU Yan-Wen;YANG Jing-Yu
..............page:186-188
Attribute Rdeuction Basde on Fractal Dimension
GUO Ping;CHEN Qi-Xin;WANG Yan-Xia
..............page:189-190,239
Face Detection and Location Based on a Novel Color Space YCgCr
WANG Jian-Guo;WANG Jiang-Tao;YANG Jing-Yu
..............page:221-223
Texture Analysis-based Edge Detection Algorithm
WANG Guang-Yong;WANG Lin-Lin;WANG Zuo-Cheng
..............page:227-229
A New Method of Fisher Discriminant Analysis with Schur Decomposition
LIN Yu-Sheng;YANG Jing-Yu
..............page:233-235
A New Feature Extraction Method on Handwritten Digits Recognition System
SONG Yue-Cong;HU Wei
..............page:236-239
Fuzzy Object Segmentation Based on Maximal Fuzzy Exponential Entropy
LIU Suo-Lan;YANG Jing-Yu;GUO Ke-Hua
..............page:240-241,272
A High Throughput AP Selection Scheme for IEEE 802.11 Wireless Mesh Networks
WU Yu;XI Yong;YONG Ting
..............page:23-26,38
K-Simulation Based Abstractions
YUAN Zhi-Bin;XU Zheng-Quan;WANG Neng-Chao
..............page:242-244
Measuring Software Architecture Evolution Based on Component Combination Operations
HUANG Wan-Gen;CHENG Song-Qiao
..............page:245-248,261
Research on Software Architecture under Pervasive Computing Environment
JIANG Li-Fen;LU Gui-Zhang;XIN Yun-Wei
..............page:249-252
A Survey of CMT Processor Thread Schedule Policies
WANG Jing;FAN Xiao-Ya;ZHANG Sheng-Bing;WANG Hai
..............page:256-258,289
Software Reused Model Design Based on Aspect-oriented
MAO Kai
..............page:259-261
Research of Inter-Process Communication Technology Based on VC++
XU Jiang-Feng;ZHANG Zhan-Hui;YANG You
..............page:262-264
A Self-adaptive and Prediction-based I/O Performance Optimization Method
YAN Qi;XING Chun-Xiao;HU Qing-Cheng;LI Yi-Min
..............page:265-268,封3
Resarch of a Machine-Learning Based Load Prediction Approach for the Service-oriented Computing Environment
WANG Jun;ZHENG Di;WU Quan-Yuan;GUAN Yan-An
..............page:269-272
Data Mining on Imbalanced Data Sets
ZHAO Feng-Ying;WANG Chong-Jun;CHEN Shi-Fu
..............page:139-141
An Association Rules Mining Algorithm Based on Linear Linker
LI Xiao-Hong;YANG You
..............page:142-144
Survey on the Research of Ontology Change Management Technology
BAO Ai-Hua;YAO Li;LIU Fang;ZHANG Wei-Ming
..............page:151-155
Weak Diagnosis Model Based on System Structure
ZHANG Xue-Nong;JIANG Yun-Fei;CHENG Ai-Xiang
..............page:273-276,292
An Insider Behavior Monitoring Model Based on the Behavior-Tree
TAN Liang;ZHOU Ming-Tian
..............page:277-281
Dynamic Detection of Stack Overflow
LIU Tong-Ping
..............page:282-286,封4
Security Requirement-based Software Vulnerability Analysis Model
WANG Tong-Tong;HAN Wen-Bao;WANG Hang
..............page:287-289
Individualized Distance Education System Based on Multi-Agent
YANG Yong-Qi;FU Yun-Qing;LIU Ying-Yu
..............page:290-292
Design of the Power Product Manage System Based on GIS
DING Ming-Yong;JANG Yong-De;DAI Chun-Yan
..............page:293-封3
Study on Physiological Monitoring-oriented Wireless Personal Area Network
WU Yi-Zhi;DING Yong-Sheng;XU Hong-An;XIAO Ting
..............page:52-54,57
An Algorithm of Web Routing in Small-worlds Network
XU Xin-Wei;XU Xiao-Ming;ZHOU Liang;DING Qiu-Lin
..............page:48-51
Implementation of Anycast Service with Multicast Tree
WANG Xiao-Nan;QIAN Huan-Yan
..............page:44-47
Research on QoS Transmission Based on Traffic Tyfe for Mobile Ad Hoc Network
YANG Shi-Ping;XIE Sheng-Li;HUANG Geng-Wen
..............page:39-41
A Disjoint Multipath QoS Routing Algorithm in an End to End Network
ZHU Shang-Ming;ZHUANG Xin-Hua;GAO Da-Qi
..............page:35-38
Analysis of QoS Requirement of Satellite Network Satisfying Applications Demands of Users and Tasks
YI Xian-Qing;ZHAO Yang;FENG Ming-Yue;LUO Xue-Shan
..............page:27-34
A Grid-based Geographic Hash Table Data Dissemination Algorithm of Wireless Sensor Networks
TAO Zi-Jin;LUO Ming-Yu;OUYANG Yi-Xing;GONG Zheng-Hu
..............page:62-66
A Self-adapted Bisection IP Address Allocation Algorithm
CHEN Tao;WAGN Feng;WANG Wei;YAN Bao-Ping;MAO Wei
..............page:58-61,89
Research on BitTorrent Bandwidth Model
OU YANG Rong;LEI Zhen-Ming
..............page:55-57
A Survey on Music Visualization
QU Tian-Xi;HUANG Dong-Jun;TONG Ka-Na
..............page:16-22
Algorithms for Set Packing: A Survey
MA Zhen-Yu;WANG Jian-Xin;FENG Qi-Long;CHEN Jian-Er
..............page:12-15,22
Review of Defect Analysis-oriented Software Repositories Mining Methods
LIU Ying-Bo;WANG Jian-Min
..............page:1-4,11