Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2008 Issue 6
Research about Disk Array in Stream Media Server
JIANG Guo-song;XIE Chang-sheng;LU Zheng-wu;WANG Yu-de
..............page:86-89
Design and Implement for Grid Simulation Environment Based on GridSim TooIKits
LIU Yan-bing;YANG Qian-hui;WANG Wen-bin
..............page:83-85
Non-monotone Attribute Delegation Based on Constraint Logic
CHEN Bo;ZENG Guo-sun;LI Li
..............page:202-205
Particle Swarm Optimization Algorithm for Solving Non-linear Transportation Problem
ZHANG Mei-yu;HUANG Han;HAO Zhi-feng
..............page:206-209
Data Quality Propagation of Cartesian Product for Relational Database
CHEN Wei-dong;ZHANG Wei-ming
..............page:210-212,216
A Data Mining Algorithm Based on Rough Set Theory
MA Jun-hua;CHEN Yun-kai
..............page:213-216
A Parallel Hash Function Based on Chaos
DENG Shao-jiang;LAIO Xiao-feng;XIAO Di
..............page:217-219
Method for Revising Dimension Structure in Exceptions
LU Chang-hui;WU Xiao-hua;LIU Qing-bao;DENG Su;ZHANG Wei-ming
..............page:220-222,239
Fast Temlplate Matching Based on Extended Integral Image with Mask
SHAO Ping;YANG Lu-ming
..............page:223-226
Design of Abstract Digital Event Reconstruction Model
YANG Li-li;YANG Yong-chuan
..............page:227-229
Research of an Adaptive Failure Detector on iSCSI
YANG Guang;ZHOU Jing-li;LIU Gang
..............page:90-94
A Tree-ring-based Application-layer Multicast Protocol
LIU Yang-zhi;XIAO Yang;YANG Ming
..............page:95-98,102
Tree and Chains United into Multicast Authentication
WANG Wei-dong;LI Zhi-tang
..............page:99-102
Analyse the Undetectable Behavior of Rootkits on System Services
LONG Hai;HAO Dong-bai;HUANG Hao
..............page:103-106
Maxflow-based Routing Algorithm for Network Coding Multicast
TAO Shao-guo;HUANG Jia-qing;YANG Zong-kai;CHENG Wen-qing;Rami S.Youail
..............page:107-109,117
Algorithm and Simulation of Network Setup and Topology Discovery for Circle-distributed 2-hops WSN
ZHONG Jin-rong;CAO Chang-xiu;TANG Xian-lun
..............page:110-113
Muti-User Diversity Based on Virtual Sub-channel for MIMO System
WANG De-sheng;ZHU Guang-xi;LIU Ying-zhuang;LIU De-ming;HU Zheng-ping
..............page:114-117
Study on Equilibrium Problem of Multicast Flow Interacting in IP Network
ZHAO Xi;CHEN Jian-yang
..............page:122-124
Research and Design of Data Service Bus Based on SOA
QI Qi;LIAO Jian-xin;WANG Chun;ZHU Xiao-min
..............page:125-127,162
Security System of Distributing Laboratory Data Based on GAP
HUANG Wen;WEN Chun-sheng;OU Hong-xin
..............page:128-130
Taxonomy of Subnets in Petri Net and their Normalization
WANG Zhi-jian;WEI Ding-guo;WU Shi-lin
..............page:131-134,167
An Indexing Management Algorithm Used in P2P Storage System
GUAN Zhong
..............page:139-140,144
Cryptanalysis and Improvement on a Block Cipher Based on Iterating a Chaotic Map
LIU Jia-ling;ZHANG Hong;WANG Yong
..............page:141-144
An Ontology-based Grid Service Matching Method
ZHANG Yan;JIA Yan;HUANG Xiao-bin;ZHOU Bin;GU Jian
..............page:145-147,151
Semantically Improved Automatic Keyphrase Extraction
FANG Jun;GUO Lei;WANG Xiao-dong
..............page:148-151
Research on Intelligent Search Engine Based on Semantic Comprehension
CHEN Lin;YANG Dan;ZHAO Jun-qin
..............page:152-154
A Dynamic Description Logic with Matter Element
WANG Jing;LIU Qun;SHI Lei
..............page:155-157,170
Research on Affective Model of Affective Robot
MENG Xiu-yan;WANG Zhi-liang;LI Na;LIU Yao-feng
..............page:158-162
Research on Fuzzy Buried Markov Model
CHENG Ke-yang;WEN Chuan-jun;ZHAN Yong-zhao
..............page:163-167
An Improved UCONc-based Authorization Policy Specification in Grid
GUI Jin-song;CHEN zhi-gang;GUO Ying
..............page:77-82
Research of K-means Clustering Method Based on Parallel Genetic Algorithm
DAI Wen-hua;JIAO Cui-zhen;HE Ting-ting
..............page:171-174
SMO Training Algorithm for Hyper-sphere One-class SVM
XU Tu;LUO Yu;HE Da-ke
..............page:178-180
A Novel Fuzzy Multiple Spheres Classification Algorithm and its Ensemble Method
GU Lei;WU Hui-zhong;XIAO Liang
..............page:183-185
Fast Scalar Multiplication Based on DBNS
YIN Xin-chun;HOU Hong-xiang;XIE Li
..............page:186-189,195
Sequential Decision Method in State Tiansition Based on Variant S-rough Sets
LU Yan-li;LEI Ying-jie;LI Zhao-yuan
..............page:193-195
Face Recognition Based on Feature Fusion and Boosting RBF Neural Network
JI Xin-hao;DING Rong-tao
..............page:196-198
A Novel Approach to Query Heterogenous Data Sources Based on XML
CHEN Jin-hui;DONG Biao;SUN Ya-min
..............page:230-232
Research of Temporal XML and Querying
TANG Na;CHEN Luo-wu;LIU Rui-jun;TANG Yong
..............page:233-235
Fuzzy Query Based on Non-numeric Attribute Keywords over relational Databases
YANG Lu-ming;WANG Jia-yi;XIE Dong
..............page:236-239
Formal Mapping of Temporal Relational Databases with Valid Times into Temporal XML
LIU Jian;MA Zong-min;YAN Li
..............page:240-242,250
Knapsack Problem with DNA Algorithm Based on Biochips
ZHU Ying;DING Yong-sheng;LI Wang-gen
..............page:243-245
Chaos-based Wavelet Digital Watermarking Algorithm Implementation
FU De-sheng;SUN Wen-jing;ZHANG Xiao-fei
..............page:246-250
Texture Brush Based on Run-time Texture Synthesis
ZOU Kun;HAN Guo-qiang;LI Wen;ZHANG Xiao-yuan
..............page:251-254
Face Location Algorithm in Video Sequences with Complex Background
LAN Zhang-li;CAO Jian-qiu;LIANG Shuang
..............page:255-257,279
Three-dimensional Seismic-data Parallel Volume Rendering Algorithm
YANG Lei;LI Ken-li;QI Xue-sheng;PENG Cheng-bin
..............page:258-260,264
On Feature Extraction Method for Carved Stone Image
LI Ya-mei;WU Zhong-fu
..............page:261-264
A New Compression Approach to Document Image Based on Template
YANG You
..............page:265-267,271
Research and Implementation of Handwritten Form Recognition System
WANG Xing-rong;YING Jun
..............page:268-271
Research and Application of Auditory Display
YU Yao-hua;LIU Zheng-jie
..............page:272-275
Design and Implementation of Automated Generator of Test Scripts
ZHAO Bin-fei;LIU Lei
..............page:276-279
Extension Interface Mutation Testing for Component Based on XML API
NIE Nan;XIE Xiao-dong;GAN Yong;LU Yan-sheng
..............page:283-286
Research on Multi-Agent CRM System Model and its Cooperative Communication
MAO Ming-zhi;JIANG Yun-fei
..............page:287-288,292
Task-oriented Community with Proactive Information Exchange in eCommerce
LI Li-xin;QIU Yu-hui
..............page:289-292
Study of Collaborative Office System Based on P2P
ZHANG Yan
..............page:293-294
Database System Design of Warehouse Management Based On UML
ZHANG Yi-zhi;FENG Chun-hui
..............page:295-296,封3
Implementation and Designment of the DM Based on OLAM
LI Xian-li
..............page:297-298
Distributed Subscribe/Notification Framework with Support of Mobile Applications
YAN Xin-qing;YIN Zhou-ping;XIONG You-lun
..............page:74-76,89
Research and Design of a Multi-policy Security Model
WU Xian;QIAN Pei-de
..............page:71-73
Efficient Plane-based Hierarchical Application Layer Multicast Model
XU Jian-zhen;PU Song-lan;ZHANG Fu-yan
..............page:67-70
Design and Implementation of Mix Intrusion Detection System Based on Immunology Principle
FU Tao;SUN Wen-jing;SUN Ya-min;CUI Meng-meng
..............page:63-66
An Innovation Three Color Marker in Diffserv Networks
HAO Jun-rui;YU Shao-hua
..............page:55-59
A Colored Petri Net-based Model for Automated Web Service Composition
ZHANG Zhao-li;HONG Fan
..............page:50-54
Intelligent Resilient Framework of Multi-SoftMan Intrusion Prevention System Model
MA Zhan-fei;ZHENG Xue-feng;ZENG Guang-ping;TU Xu-yan
..............page:46-49,66
Trust Model Research in the P2P Environment Based on RBAC
WEN Zhu-mu;LU Zheng-ding;TANG Zhuo;GU Xi-wu
..............page:32-36
Survey of Peel-to-Peer Streaming Technology
LU Yi-feng;WANG Jin-lin;SU Shao-wei
..............page:28-31
Survey of Cooperative Awareness Research in Mobile Environment
TENG Wen-xing;LI Shi-ning;YIN Xiao-yan
..............page:25-27
Security Protocol Model Checking Based on Classcial Logic
XU Chang;LIU Ji-feng;SUN Ji-gui
..............page:20-24
Dependable Middleware: Survey and Further Evolution
LI Qi-lin;ZHOU Min-tian
..............page:15-19
Research and Development of Computer Generated Integral Image
WANG Hong-xia;WU Chun-hong;YANG Yang;ZHANG Lan
..............page:11-14
Survey of Data Mining Technology Standards
LIU Ming-liang;LI Xiong-fei;SUN Tao;XU Xiao-qing
..............page:5-10,14
Survey on Efficiency and Vulnerability of Complex Network
OU-Yang Min;FEI Qi;YU Ming-hui;LUAN En-jie
..............page:1-4