Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2008 Issue 12
Intrusion Detection System Based on Immune Agent
LI Yong-zhong;XU Jing;LUO Jun-sheng;SUN Yan
..............page:122-125
Improved Link Prediction Method for Co-authorship Network
GUO Jing-feng;WANG Chun-yan;ZOU Xiao-hong;ZHAO Peng-fei;ZHANG Jian
..............page:126-128
Extended QoS Model Based on Fuzzy Set in Service-oriented Computing
LIU Dong-mei;SHAO Zhi-qing
..............page:129-132
Design of Classifier Based on Immune Algorithm
CHEN Yun-fang;WANG Ru-chuan
..............page:133-136,174
Diagnosis of Active Systems Modeling with Time Interval Algebra
ZHAO Xiang-fu;OUYANG Dan-tong
..............page:137-141,177
Compositive Approach for Ontology Similarity Computation
ZHANG Zhong-ping;TIAN Shu-xia;LIU Hong-qiang
..............page:142-145,182
Axiomatic System of Autonomic Learning Subspace Based on DFL
WANG Jing;LI Fan-zhang
..............page:146-147,170
Several Properties on the Primitive σ-LFSR Sequences
ZHANG Meng;HE Kai-cheng;HAN Wen-bao;ZENG Guang
..............page:119-121
Spectrum Density Analysis on Router-level Internet Macroscopic Topology
XU Ye;ZHAO Hai;ZHANG Wen-bo
..............page:34-38
Risk Probability Estimating Model Based on Neural Networks
LIU Fang;CAI Zhi-ping;XIAO Nong;WANG Zhi-ying;CHEN Yong
..............page:28-33
Composite Access Control Model for RFID Information in Supply Chain
YAN Xin-qing;YIN Zhou-ping;XIONG You-lun
..............page:24-27
Survey of Finite Automaton Based XML Filtering Techniques
QIN Yong-rui;SUN Wei-wei;ZHANG Zhuo-yao;YU Ping
..............page:19-23,47
Status and Prospect of Spatio-temporal Ontologies and Logic Foundation
WANG Sheng-sheng;LIU Da-you;LI Xin;JIANG Xin-lei;YUAN Min-yu
..............page:15-18
Survey on Peer-to-Peer Video-on-demand Streaming Protocols
PENG Zhao;LU Guan-zhong;LIANG Jie;YANG Zong-kai
..............page:9-14,27
Agent Service Matchmaking for Autonomic Computing:A Survey
ZHANG Kun;XU Man-wu;LIU Feng-yu
..............page:1-4,18
Support Vector Machines with Hyperkernel Functions
JIA Lei;LIAO Shi-zhong
..............page:148-150,166
Mobile Communication Solution Based on New Network Architecture
LI Xiu-qin;LAN Ju-long
..............page:116-118
Like ID-based Broadcast Encryption Scheme
WANG Qing-long;YANG Bo;CAI Ying;HAN Zhen
..............page:114-115
Real-time SYN Flooding Attacks Detection Method Based on Hurst Parameter
YAN Fen;WANG Jia-jia;YIN Xin-chun;HUANG Hao
..............page:109-113,162
Design of IPSec Gateway Based on IXP2400 Network Processor
LIU Yan-hua;CHEN Guo-long;GUO Wen-zhong
..............page:106-108,157
Research on Semi-automatic Generation Method of Testing Data for Next Generation Internet Protocol
LI Hua;YE Xin-ming;WU Cheng-yong;WANG Long
..............page:102-105
Research on Proxy-based Overlay Multicast Spanning Tree Algorithms
LIN Long-xin;ZHOU Jie;ZHANG Ling;YE Zhao
..............page:98-101
Detecting DDoS Attacks with a Deep Mode
XU Tu;HE Da-ke
..............page:94-97
Open Service Architecture in Agent-based P2P Environment
XIA Yang;CHEN Gui-hai;ZHANG Qiang;XU Zhao
..............page:62-64,68
Research on Hierarchical ID-based E-government Grid Authentication Model
YU Dai-rong;YANG Yang;MA Bing-xian;XIONG Zeng-gang;ZENG Ming
..............page:55-57,61
Fast Intrusion Detection Based on Muti-Agent
Qian Yu-wen;WANG Fei;KONG Jian-shou;WANG Zhi-quan
..............page:51-54
Neural-network Based Aggregation Framework for Wireless Sensor Networks
YU Li-yang;WANG Neng;ZHANG Wei
..............page:43-47
Access Control Based Trust Model for P2P File Sharing Systems
ZUO Cui-hua;LI Rui-xuan;LU Zheng-ding
..............page:39-42
Extensions of Rough Set Model and Set Pair Analysis in Incomplete Ordered Decision System
XIE Jun;SONG Yu-qing;CHEN Jian-mei;SUN Huai-jiang;YANG Xi-bei;YANG Jing-yu
..............page:154-157
Continuity and Approximation Property of Triple I Method
PAN Hai-yu;PEI Dao-wu;HUANG A-min
..............page:158-162
Hybrid Heuristic for Learning Bayesian Network with Missing Values
LIAO Xue-qing;LU Qiang
..............page:163-166
Research on Text Classification Based on Rule Mining by Granule Network Constructing
ZHANG Xia;YIN Yi-xin;YU Hai-yan;ZHAO Hai-long
..............page:167-170
Lipreading HLM and Text Flow Analysis
WANG Dan;YAO Hong-xun;WAN Yu-qi;HONG Xiao-peng
..............page:171-174
Personality Model of Virtual Character
LIU Zhen
..............page:203-206
Information Hiding Technology of LSB Based on Direct Bit-plane Replacement
SUN Wen-jing;SUN Ya-min;ZHANG Xue-mei
..............page:207-208,219
Digital Image Watermarking Scheme with Pseudo-Zernike Moments
YANG Hong-ying;HOU Li-min;WANG Xiang-yang
..............page:209-211
Color Image Enhancement Approach Based on High-dimensional Space Geometry
TAN Le-yi;WANG Shou-jue
..............page:214-215,223
Research of Catching Hue in Non-photorealistic Canvas Painting
XIN Ling;WANG Xiang-hai
..............page:216-219
Face Recognition Based on Semi-supervised Manifold Learning
HUANG Hong;LI Jian-wei;FENG Hai-liang
..............page:220-223
Probabilistic Fuzzy Cognitive Maps Based on Ordered Weighted Averaging Operators
LU Zhen-bang;ZHOU Li-hua
..............page:187-189
Kernel-based Adaptive K-medoid Clustering and its Application in Intrusion Detection
SUN Sheng;WANG Yuan-zhen
..............page:190-191,228
New Approach to Detect Outlier which is Insensitive to Input Parameter
TAO Yun-xin;PI De-chang
..............page:192-195,206
Novel One-way Hash Function Construction Based on Spatiotemporal Chaos
WANG Yong;LIAO Xiao-feng;DU Mao-kang
..............page:196-199
Concept Similarity Calculation and Application in OWL
ZHI Dong-jie;ZHI Hui-lai;LIU Zong-tian
..............page:200-202
Design and Implementation for Business Process Management Oriented Agent Platform
ZHAO Hai-yan;CAO Jian;ZHOU Xiao-jun
..............page:262-264,267
Method for Operational Plan Optimization Based on Plan Merging
LI Hao;CHANG Guo-cen;YANG Fan
..............page:265-267
Design Strategy for Embedded CNC Model Verification
ZHENG Jian-hua;LI Di;ZHU Rong;XIAO Su-hua;SU Zhao-gang
..............page:268-272
Web Service Description and Selection Mechanism Based on QoS Ontology
GAO Ya-chun;ZHANG Wei-qun
..............page:273-276
Solving Anycast Scalability with Multicast Tree in IPv6
WANG Xiao-nan;TANG Zhen-min
..............page:90-93
SmartCache:Interest-based Cooperative Web Cache
CHEN Hai-tao;LU Yu-tong;HUANG Zun-guo
..............page:87-89,118
Trustworthiness-based Access Control Model for Grid Virtual Organizations
CUI Yong-rui;LI Ming-chu;HU Hong-gang;REN Yi-zhi
..............page:83-86
Optimization Policy for Object-based Distributed Multimedia Storage System
ZOU Qiang;FENG Dan;CAO Ju;TIAN Lei;ZENG Ling-fang
..............page:79-82
Research on Job Scheduling Algorithm of Computing Grid Based on Performance Measured-Matrix
HUANG Yi-fan;GUO Qing-ping;LIU Peng;YAN Zhi-chao
..............page:76-78,132
Capability Sharing Architecture and Implementation in IM or SNS
CUI Jin-hong;WANG Xu
..............page:73-75,82
Improving XCP Performance for Multi-bottleneck Topology
ZHANG Hui-xiang;DAI Guan-zhong;YAO Lei;PAN Wen-ping
..............page:69-72,97
Prediction Rules Based Communication Model of MAS
WANG Xiao-ling;MU De-jun;YUAN Yuan;LIU Zhe-yuan
..............page:65-68
Algorithm for Dynamic Disassembly Based on Interrupt Scheme
YANG Mu-han
..............page:280-284,294
Technical Study on Photoshop Based Relief Image Digital Rubbings
ZHU Xiao-li;WU Zhong-fu
..............page:224-228
Design and Implementation of an Automatic Testing Platform for Component Security
CHEN Jin-fu;LU Yan-sheng;XIE Xiao-dong;YOU Liang;WEN Xian-xin
..............page:229-233,261
Dynamic Service Composition and its Supporting System
YU Jian-jie;MA Xiao-xing;LU Jian
..............page:234-238
Application of Resources Reconfiguration Algorithms in System's Survivability
HU Fang-wei;LI Qian-mu;XU Man-wu
..............page:239-243,276
Method of Generating Test Case for HLR Software Based on Immune Genetic Algorithm
MA Zhen;CHEN Tian;LI Yuan;SUN Miao;GUO Rui
..............page:244-246,272
AOP-based Approach to Implement Algorithm Animation
ZHOU Xiao-cong;ZHENG Han-xiong;LUO Da
..............page:247-249,257
Design and Implementation of Scalable Policy Sets for Traffic Control
LIU Xiao-xiao;ZHANG Da-fang;XIE Kun;JIANG Yu-rong
..............page:250-253
Object-oriented Integration Testing Based on Complex Networks
LI Li-ping;MIAO Huai-kou;QIAN Zhong-sheng
..............page:254-257
Hybrid Migrating Behavior Based Self-organizing Migrating Algorithm
LIN Zhi-yi;LI Yuan-xiang;WANG Ling-ling
..............page:175-177
Research on Emotion-model Based on Nonlinear State Space Model
MENG Xiu-yan;WANG Zhi-liang
..............page:178-182
Architecture of Stochastic Model Based on Concurrent Constraint in Analog-Cell
LU Xin-hua;SUN Ji-gui;XING Rong;HAN Xiao-song
..............page:183-186