Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2008 Issue 2
Network Isolation and Switching Based on Hardware Region Division and IP Packet Reintegration
TIAN Xin-Guang;QIU Zhi-Ming;SUN Chun-Lai;LI Wen-Fa;DUAN Mi-Yi
..............page:81-83,95
A Bilinear Pairing-based Key Agreement Protocol in MANET
HUANG Qing-Yuan;WANG Yong-Jun;SU Jin-Shu
..............page:78-80,114
Blind Source Separation Algorithm Using Multilayer Networks
ZHAO Feng;LI Wei-Qin;ZHANG Jun-Ying
..............page:185-187
Research of Vertical Search Engine Incorporating with Ontology Filtering and Text Mining
HE Jian-Ying;YAN Hai-Hua;JIN Mao-Zhong;LIU Chao
..............page:188-190
Research on the Search Space Representation and the Search Methods in Large Continuous Speech Recognition
YANG Feng-Qin;SUN Ji-Gui;ZHANG Chang-Sheng;ZHANG Chang-Hai
..............page:191-195
Ranking Problem in Semantic Web
ZHANG Xiang;QU Yu-Zhong
..............page:196-200
A Query Expansion Method Based on Semantic Element
LI Li;GAO Qing-Shi
..............page:201-204
Design and Analysis of a Secure Entail Authentication System Based on Identity-based Encryption
LIU Hong-Wei;XIE Wei-Xin;ZHAO Chao
..............page:84-86,114
Research on Normalization towards Instructions Reordering Metamorphism Technique
JIN Ran;WEI Qiang;WAN Qing-Xian
..............page:89-92
A Stack-related Method for Detecting Obfuscated System Calls of Malware
LI Yi-Chao;HE Zi-Ang;CAO Yue
..............page:93-95
Variance Analysis Based Stealthy Malicious Code Detection
CAO Yue;LIANG Xiao;LI Yi-Chao;HE Zi-Ang
..............page:96-98
The Detection of DIMs Attack
ZHANG Wei-Wei
..............page:99-100,123
An Anonymous Efficient (M + 1)-st Electronic Auction
YANG Jia-Xi;TAN Xin-Lian;WANG Yu-Min
..............page:107-108
Strand Spaces Analysis of Electronic Commerce Protocols
LIU Yi-Chun;ZHANG Huan-Guo
..............page:109-114
Reduction of Petri Net-based Workflow Model
ZHOU Cong-Hua;LIU Zhi-Feng
..............page:115-119
Research on the Coding Mechanism-based Data Replication in Grid Environments
TAO Jun;SHA Ji-Chang;WANG Hui
..............page:120-123
A Hybrid Data Framework of Relational and Directory Models
ZHAO Xi;CHEN Jian-Yang
..............page:124-125,149
A Distributed Simple Semantic-based Searching Method for Web Service
ZHAO Wen-Feng;CHEN Jun-Liang
..............page:126-128,137
A Method of Capturing Video Stream Based on Visual C + +
FENG Mao-Yan
..............page:132-133,153
A Grid and Density-based Clustering Algorithm for Processing Data Stream
GAO Yong-Mei;HUANG Ya-Lou
..............page:134-137
Belief Logic Based on Cognitive Reflection
LI Hui-Tao;JIANG Feng;SUI Yue-Fei;CAO Cun-Gen
..............page:157-159
A Survey of Event-based Knowledge Processing
ZHOU Wen;LIU Zong-Tian;KONG Qing-Ping
..............page:160-162,184
Knowledge Reductions in Incomplete Information Systems Based on Similarity Relation
YANG Xi-Bei;YU Dong-Jun;WU Chen;YANG Jing-Yu
..............page:163-165,177
A New Hybrid Quantum Evolutionary Algorithm
XIE Ping;LI Bin;ZHUANG Zhen-Quan
..............page:166-170
A Communication Model between DNA Computer and Electronic Computer
ZHU Ying;DING Yong-Sheng;LI Wang-Gen
..............page:171-173,207
Fuzzy Interpolative Reasoning Method Based on Center Set and Similarity
Liu Wen-Yuan;ZHANG Qing-Da;WANG Bao-Wen;SHI Yan
..............page:174-177
A DNA Computing Model for Three-Valued Logical Circuit
ZHU Xiang-Ou;LIU Wen-Bin;CHEN LiC-hun;WU Gui-Chu
..............page:178-180,187
Salience Scheme for Words in Different Parts of Information Request
XIONG Wen-Xin;SONG gou
..............page:181-184
Design and Implementation of Kilomega Wirespeed Intrusion Detect System
XU Chen-Jia;CAI Sheng-Wen;XIE Jun-Yuan;CHEN Shi-Fu
..............page:75-77
The Evolving Intrusion Detection System
LIN Guo-Yuan;HUANG Hao;ZHANG Yong-Ping
..............page:69-74
An Usability Testing for the 3D User Interface on Mobile Terminals
REN Gang;WANG Jian-Min;HUANG Ding-Long
..............page:65-68
Advances in Study of 3D Modeling
LUAN Xi-Dao;YING Long;XIE Yu-Xiang;WU Ling-Da;WEN Jun
..............page:208-210,229
A New Method for Camera Composition
LI Liang-Jun;YUE Xiao-Li;LI Zhi-Hao;JIANG Lan;CAO Cun-Gen
..............page:211-215
On the Object-oriented Virtual Reality Simulation
HUANG Fei
..............page:216-219
A Fast Fractal Image Compression Using the Improved K-mean Clustering
WANG Xiang-Yang;YU Yan-Chun
..............page:219-222
A Way of Remote Sensing Image Wavelet Interpolation and Filter Based on Subpixei Technology
ZHANG Zhi;WEI Zhi-Hui;XIA De-Shen
..............page:223-225
Segmentation of MRI Based on Dynamic and Adaptive Ant Colony Algorithm
BAI Yang;SUN Yue;WANG Jun;ZHOU Wun-Jun;HU Ning-Ping
..............page:226-229
A Method of Edge Detection Based on Cloud Model and Morphology
XIE Lei;WANG Lin-Lin;WANG Zuo-Cheng
..............page:230-231,273
Exponential Uniform B-Spline with Shape Parameter
ZHAO Yan-Li;GUO Cheng-Hao;LIU Feng-Yu
..............page:238-241
Mechanism of Human Reading-drawings and its Application in Machine Reading-drawings
YANG Hua-Fei;YANG Ruo-Yu;LU Tong;CAI Shi-Jie
..............page:242-245
Goal-independent Semantics for Path Dependent Analysis of Prolog Programs
ZHAO Ling-Zhong;GU Tian-Long;QIAN Jun-Yan
..............page:246-252,297
Research and Implementation of a Trusted File System CIVFS Based on TPM
ZHANG Wei-Wei;SHI Wen-Chang
..............page:256-258
Progress of Research on UML Activity Diagrams-based Testing
GAO Hong-Mei;XU Dong;Liu Zong-Tian
..............page:263-267,281
ASRSP: A New Testing Criterion for Concurrent Programs
LU Yan-Sheng;LU Chao
..............page:268-273
Adaptive Method for Handling Local Concept Drift of Data Streams Classification
HUANG Shang-Teng;YIN Zhi-Wu
..............page:138-139,143
Fuzzy-Rough Sets for Prediction of Moving Objects' K-Nearest Neighbor
YUAN Yan;HONG Xiao-Guang
..............page:140-143
Feature Subset Selection Based on Particle Swarm Optimization Algorithm and Relevance Analysis
GUO Wen-Zhong;CHEN Guo-Long;CHEN Qing-Liang;YU Lun
..............page:144-146
A Chinese Text Classification Method Using Implied Sub-class Information and Rough Set
JIN Kai-Min;MIAO Duo-Qian;DUAN Qi-Guo
..............page:147-149
Maximum Frequent Tree Mining and its Applications
YANG Pei;TAN Qi
..............page:150-153
Research for the Component-based Development Software Testing Strategy
CAO Yan-Yuan;ZHANG Wei-Qun
..............page:274-276
The Design and Implementation of a Safe Device Driver Model
YIN Yi-Ming;ZHOU Ling-Ling;YING Ren-Dong;GE Yi
..............page:277-281
LSE: A Development Tool for Computer Architecture Simulator
YU Zhi-Bin;Jin Hai
..............page:282-285
SARS Transmission Simulation and Modeling Based on Repast Platform
QU Yi-Zhen;LI Qi;GAN Jie-Fu
..............page:286-288,封4
The Design and Implementation of the Embedded Coprocessor Based on TrA
LAI Ming-Che;DAI Kui;LU HongYi;YUE Hong;WANG ZhiYin
..............page:293-297
Research on the High Sealability of the Beowule-Tcluster System
ZHU Yong-Zhi;LI Bing-Feng;WEI Rong-Hui
..............page:298-300
PERT-based Research on Human Scheduling
LI Xun;LI Peng;GU Qing;CHEN Dao-Xu
..............page:301-封3
ENBD:Extended Network Block Device
ZHANG Yu-Guo;ZHANG Jian-Gang;XU Lu
..............page:62-64
The Optimization of H. 264 Decoder on Windows Mobiles
ZHAO Peng;ZHOU Bing
..............page:60-61,64
Formal Definition of Grid System Based on Petri Nets
YING Hong;WANG Zi-Quan;LIU Fu-Ming;YAN Pei
..............page:58-59,106
Research and Development of Trust Mechanism for Pervasive Computing
XU Wen-Shuan;XIN Yun-Wei;LU Gui-Zhang
..............page:52-57
Research on Scheduling Algorithms for Wireless Sensor Network
KANG Bo;KE Xin;SUN Li-Min;REN Yong
..............page:47-51
A Cross-Layer Synchronization Scheme of Wireless Sensor Networks
SHI Jun-Feng;ZHONG Xian-Xin
..............page:42-46
Dynamic Context_aware Usage Control-based Grid Access Control Model
CUI Yong-Quan;HONG Fan;LONG Tao;LIU Ming
..............page:37-41
A Multi-dimensional Overlays based Structured Peer-to-Peer Search
FENG Guo-Fu;JIANG Yu-Quan;ZHANG Jin-Cheng;GU Qing;CHEN Dao-Xu
..............page:32-36,51
A Multi-channel MAC Protocol for Wireless Sensor Networks
XING Zhi-Hao;ZENG Peng;WANG Hong
..............page:27-31
A Dynamic Load Balancing P2P Application Layer Multicast Scheme
LIN Long-Xin;ZHOU Jie;ZHANG Ling;YE Zhao
..............page:23-26
PGA:Optimal-path-based Geographic Routing Arithmetic in Ad Hoc Networks
YU Kun;WU Guo-Xin;FANG Qun
..............page:19-22
On a New Variant of Tissue P Systems
XU Xian;DONG Xiao-Ju
..............page:16-18,46
The Key Problems for Network on Chip
LIU You-Yao;DU Hui-Min;HAN Jun-Gang
..............page:13-15,31
Review on the End-to-End Congestion Control Research in the Internet
LIU Yong-Min;JIANG Xin-Hua;NIAN Xiao-Hong;LU Wu-Yi
..............page:6-12
An Overview of Data Quality Research
HAN Jing-Yu;XU Li-Zhen;DONG Yi-Sheng
..............page:1-5,12