Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2009 Issue 6
Review of P2P Network Behavior Security Monitoring Research
JIANG Zhuo-ming;ZHOU Xu;XU Rong-sheng
..............page:1-4
Research on Coordination Technology of Software Systems
WANG Cheng-yao;ZHENG Xue-feng;TU Xu-yan
..............page:5-9
Research and Development of Point-based Computer Graphics
QIU Hang;CHEN Lei-ting
..............page:10-15
Closed Cubing on PC Clusters
YOU Jin-guo;XI Jian-qing;ZHANG Ping-jian;LIU Yan-xia
..............page:153-155,161
Software Component Retrieval Based on Domain Ontology
FAN Xiao-guang;CHU Wen-kui;WAN Ming
..............page:156-158,238
Priority Judgment Based on the Test Scenario from UML Activity Diagram
XIE Tang-tang;LI Jun;ZHANG Wei-qun
..............page:159-161
Attribute-based Access Control Model for Web Services
FU He-gang;WU Cong;YOU Juan
..............page:162-164
Algorithm of Improved Extremum and Median Value Filter
SUN Shu-liang;WANG Shou-jue
..............page:165-166
Task-oriented Dynamic Update Migrating Plan for Virtual Robot in Network
WANG Hong-bo;MA Zhong-gui;ZENG Guang-ping;TU Xu-yan
..............page:167-170
Petri Net Model Transition Method Based on Ontology
WANG Zhuo;FENG Xiao-ning;XU Yu-ru
..............page:147-149,166
Web Service Inheritance and Interface Web Service
CUI Jin-hong;WANG Xu
..............page:144-146,191
SA: A New Multidimensional Clustering Method to Facilitate Range Queries on Multiple Attributes
WU Ling-kun;TANG Yong;WANG Peng;SHU Ran
..............page:133-137
Method for Storage Performance Optimization at Block Level
ZHAO Xiao-nan;ZENG Lei-jie;LI Zhan-huai
..............page:129-132,137
Collaborative Learning System Based on Coalitions of Agents
JIANG Feng;WANG Cheng-hua;LIU Guo-zhu
..............page:125-128
Planning of Process Action Flow with Real-time Reaction Based on Planning Graph
CHAI Xiao-long;JIANG Yun-fei;CHEN Ai-xiang;MAO Ming-zhi
..............page:119-124
Research on the Critical Technologies of Trustworthy Networks
ZHOU Yan-zhou;ZHANG Huan-guo;SONG Yang
..............page:112-113,143
Agent Based Model for Semantic Web Services
YUAN Jin-ping;YAO Li;BAO Ai-hua;LIU Fang
..............page:171-173,177
Algorithm of Similarity Propagation Based on Information Content of Concept
XU De-zhi;WU Jun-qing;CHEN Jian-er;ZHAO Yu-qian
..............page:174-177
Predictor Based Fast and Efficient Compression of Scalar Fields
WU Guo-qing;CHEN Hong
..............page:178-180,184
Model for Processing Recommendatory Trust Information Based on Ontology Mapping
BAO Yi-ping;ZHANG Wei-ming;YAO Li
..............page:185-187,195
DPFS:A Text Feature Selection Algorithm Based on Dynamic Programming
REN Yong-gong;LIN Nan
..............page:188-191
Dominance-based Rough Set Approach and Knowledge Reductions in Incomplete Fuzzy System
WEI Li-hua;TANG Zhen-min;YANG Xi-bei;QI Yun-song
..............page:192-195
Application &Research of Improved Adaptive Genetic Algorithm
LEI Liang;WANG Tong-qing;PENG Jun;YANG Bo
..............page:203-205,247
Video Retrieval Based on Two-phrase Fuzzy Fusion with SVM
CHEN Jie;ZHU Fu-xi
..............page:227-230
Speech Emotion Recognition with Multiple Feature Vectors
FU Li-qin;WANG Yu-bao;WANG Chang-jiang
..............page:231-234
Concept-based Binary Search Algorithm
SHI Bai-sheng
..............page:235-238
Research on Path Set Operation Based Algorithm for Path Searching in Public Transit Network
WU Yan-peng;PENG Xiao-qi;HUANG Tong-cheng
..............page:239-240,272
Trajectory Tracking for Tracked Mobile Robot
KANG Liang;ZHAO Chun-xia;GUO jian-hui
..............page:241-244
Spatial Distribution Rule Mining of Lithology in Three Gorges
WANG Xian-min;NIU Rui-qing
..............page:245-247
Using Gene Clusters for TSP Solving Genetic Algorithm
MA Guang-zhi;LU Yan-sheng;SONG En-min;TANG Hai-xian
..............page:248-250
Non-blocking Supervisor Design for Flexible Manufacturing Systems
ZHAO Mi;HOU Yi-fan
..............page:251-253,257
Enterprises Enter/Exit Game Model and Algorithm for Third-party Online Payment Market
SHUAI Qing-hong;ZHOU Qi-hai;SHI Qun-chang;YU Min
..............page:254-257
Robust Watermarking Algorithm of 3D Model
WANG Ying;ZHENG Xue-feng;LIU Hai-yan
..............page:262-264,封三
Writing on Wet Paper Based on Human Visual System Characters
CHEN Zhi-hong;LIU Wen-yao;LIU Fang-chao
..............page:265-267,296
Fast Kernel Foley-Sammon Discriminant Analysis with Application to Face Recognition
FAN Yan;SONG Xiao-ning;WU Xiao-jun;YANG Jing-yu
..............page:273-275,285
Weights-directly-determined and Structure-adaptively-tuned Neural Network Based on Chebyshev Basis Functions
ZHANG Yu-nong;CHEN Yu-long;JIANG Xiao-hua;ZENG Qing-dan;ZOU A-jin
..............page:210-213
Separators Introduced BK Inference Algorithm and its Application in Robocup
ZHANG Run-mei;YAO Hong-liang
..............page:214-216,234
Note on Question of Makinson
WU Mao-nian;CHEN Wu;ZHANG Ming-yi;SHEN Fu-xing
..............page:217-218,222
Coreference Resolution Based on Center Theory
KONG Fang;ZHU Qiao-ming;ZHOU Guo-dong;QIAN Pei-de
..............page:219-222
Efficient Association Rule Discovery Algorithm : ToARD Algorithm
FAN Jian-cong;RUAN Jiu-hong;LIANG Yong-quan;ZENG Qing-tian;TANG Lei-yu
..............page:223-226
Studies on Unequal Weights Universal Combinatorial Operation Model
FU Li-hua;HE Hua-can
..............page:199-202,213
Performance Analysis of Anti-jamming in JTIDS
YANG Guang;ZHOU Jing-lun;LUO Peng-cheng;ZENG Xiang-rong
..............page:108-111
Research of a Practical Lightweight RFID Security Protocol
JIANG Li-fen;LI Zhang-lin;XIN Yun-wei
..............page:105-107,118
P2P Botnet Control Strategy Based on Social Network Analysis
CHEN Duan-bing;WAN Ying;TIAN Jun-wei;FU Yan
..............page:101-104,111
One Error Integrity Indication Codes and Performance Analysis
CHEN Long;FANG Xin-lei;WANG Guo-yin
..............page:97-100
Coded Cooperative Communication Scheme on Turbo Product Code
SUN Yue;ZHU Wen-kai;WANG Xin-mei
..............page:95-96,128
Sensitive Content Protection in Digital Certificate Based on Bit Commitment
CAI Guo-ming;WANG Ya-di;WANG Miao;XU Kai-yong
..............page:93-94,100
Generic Construction of Certificate-based Encryption Scheme in the Standard Model
LU Yang;LI Ji-guo;XIAO Jun-mo
..............page:89-92
Research on Multilevel Delegation Policy in Distributed Response System
ZHU Li-na;SUN Chao-yi;ZHANG Huan
..............page:85-88
Improvement on the He-Dawson Multi-stage Secret Sharing Based on One-way Function
YAN De-qin;ZHAO Hong-bo;JIN Hong
..............page:75-77
Novell Hierarchy Topology Generation Algorithm of WSN
LI Jie;WU Zhi-bin;WANG Ru-chuan
..............page:72-74,92
Masquerader Detection and Identification Approach in Sensor Networks
XIE Lei;WANG Hui-bin;ZHU Yue-fei;XU Yong-jun
..............page:68-71,124
On-demand Routing Protocol in Ad Hoc Networks Based on Price Awareness
HAN Bing-qing;ZHANG Hong;CHEN Wei
..............page:63-67
Topology Control Based on Time Slots in Wireless Sensor Networks
XIONG Shu-ming;WANG Liang-min;WANG Xin-sheng;ZHAN Yong-zhao
..............page:57-62
ABC Supported QoS Multicast Routing Scheme Based on Beehive Algorithm
WANG Xing-wei;ZOU Rong-zhu;HUANG Min
..............page:47-52
Planning Exploit Graph Model for Information Security Risk Process
WANG Zhen-zhen;WU Xiao-yue;LIU Zhong
..............page:44-46,56
Effectiveness Evaluation of Reconnaissance Satellite Based on the ADC Model
MENG Jin;LI Qian-mu;ZHANG Hong;LIU Feng-yu
..............page:41-43,67
Time Delay Simulation and Analysis of Tactical Datalink System Using OPNET
REN Pei;WANG Wen-zheng;ZHOU Jing-lun;LUO Peng-cheng
..............page:38-40,88
Asymptotic Capacity of Partially Overlapped Channels Multi-hop Wireless Networks
CHEN Yong-hui;ZHU Guang-xi;YANG Yong-li;WANG De-sheng
..............page:35-37
Research Progress in Testing Techniques Based on Web Service Life Cycle
LI Wen-rui;WANG Zhi-jian;MAO Ying-chi
..............page:29-34,62
Survey of Reputation Mechanism in Peer-to-Peer Network
WU Peng;WU Guo-xin;FANG Qun
..............page:26-28,52
Survey on Architecture and QoS for Wireless Multimedia Sensor Networks
LI Fang-min;LI Heng;LIU Xin-hua
..............page:19-25
Moving Object Segmentation Based on Local Differential Optical Flow
LEI Zhen;WU Ling-da;LI Dong
..............page:276-278
CCTD:A Scheduling Algorithm under Communication Constraints for Fork-Join Task Graphs
LIANG Shan-shan;WU Jia-jun;ZHANG Jun-chao
..............page:282-285
Seamless Reconstruction Method for TMR Computer Based on Micro-package Protocol
ZHANG Wei-gong;ZHU Xiao-yan;GUAN Yong;ZHOU Ji-qin;SHANG Yuan-yuan
..............page:286-289
Practice and Study of the Efficiency and the Portability Based on Parallel Program
WANG Wen-yi;DONG Shao-jing
..............page:290-293
New Feature Extraction Method of Face Recognition
FENG Hai-liang;WANG li;LI Jian-wei
..............page:294-296
Principle-knowledge Centered Learning Object
XIAO Lannan;XIAO Fei;WANG Hongwei;GAO Lijin
..............page:297-298,封三