Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2010 Issue 10
Ontology-based Web Services Reliability Model
WANG Xi-feng;WANG Guang-zheng;JIN Ling-ling
..............page:148-151,160
Construction and Research of Network Security Qualification Evaluation System
WANG Yuan;QI Shan-ming;YANG Huai
..............page:127-129,147
Real-time Extension of Component Behavior Protocol and its Compatibility Verification
JIA Yang-li;ZHANG Zhen-ling;LI Zhou-iun
..............page:143-147
Action Space Based Caving Degree Approach for the 3D Rectangular Packing Problem
HE Kun;HUANG Wen-qi;HU Qian
..............page:181-183,220
Analysis for Travel Route Planning Based on Fusion of Multi-intelligent Algorithm
MA Qing-lu;LIU Wei-ning;SUN Di-hua;DAN Yu-fang
..............page:211-213,253
Research on Uncertainty Measurement for Covering Rough-Vague Sets
XU Jiu-cheng;ZHANG Qian-qian
..............page:225-227,282
Two-way Fast String Matching Algorithm in Ad hoc Networks
ZHANG Ying;XU Jian;CHANG Gui-ran;JIA Jie
..............page:42-47
Personal Assistant Agents with a Case-based Memory
CHEN Ke-jia;BARTHES A.Jean-Paul
..............page:184-189,192
State of the Art on Cancer Classification Problems Based on DNA Microarray Data
YU Hua-long;GU Guo-chang;ZHAO Jing;LIU Hai-bo;SHEN Jing
..............page:16-22,32
Effective Term-Concept Mapping Method Based on Ontology
LI Wen;CHEN Ye-wang;PENG Xin;ZHAO Wen-yun
..............page:138-142
Distance Measurement Based Adaptive Particle Swarm Optimization
LI Tai-yong;WU Jiang;ZHU Bo;FANG Bing
..............page:214-216
Prospects and Current Studies on Video Mining
DAI Ke-xue;LI Qiang;LI Guo-hui
..............page:11-15
Quality Assessment for Halftone Image Based on Non-ideal Printer Model
XU Guo-liang;TAN Qing-ping
..............page:228-232
Algorithm Based on Sliding Window for Similarity Queries over Data Stream
WANG Kao-jie;ZHENG Xue-feng;Song Yi-ding
..............page:169-172,201
Heuristic and Dynamic Thread Pooling Mechanism Based on Queuing System in Middleware
CHEN Ning-jiang;LIN Pan
..............page:161-164,201
Consideration about Some Problems in Artificial Intelligence
HU Yang;GUI Wei-hua;CAI Zi-xing;YE Hua-wen
..............page:173-174
Risk Assessment Approach Based on Trust in P2P Network
LI Kai;LI Rui-xuan;ZHANG Hua-juan;LU Zheng-ding
..............page:102-104,122
GridsimHelper:A Code Generator for GridSim Platform
DENG Rong;CHEN Hong-zhong;LI Can;WANG Xiao-ming;LI Jie;ZHANG Jun-qi
..............page:135-137
Uniform Motion Burred Image Restoration Algorithm Based on the Z-transform and Fuzzy Weighted Mean Filter
LI Ming-he;HE Bin;YUE Ji-guang;LU Han-xiong;LI Yong-gang
..............page:260-262,294
RCEA: An Energy Efficient Based Regular Coverage-enhancing Algorithm for Wireless Sensor Networks
TANG Lei;ZHOU Xing-she;ZHANG Da-qing;SUI Yu-lei;MA Jun-yan
..............page:48-54
Parameterized Complexity of Probabilistic Inference in Ising Graphical Model
CHEN Ya-rui;LIAO Shi-zhong
..............page:207-210,245
Approach to Recognizing Chinese Metaphorical Phrases Based on Distinction Words
FU Jian-hui;CAO Cun-gen;WANG Shi
..............page:193-196,232
Research of Universal Combination Operation Model
JIA Peng-tao;HE Hua-can
..............page:175-180
Survey on Weight Information Problem Based on FN-E&DM
LI Ming-hui;XIA Jing-bo
..............page:23-26,54
Moving Objects Detection of Adaptive Gaussian Mixture Models on HSV
LIN Qing;XU Zhu;WANG Shi-tong;ZHAN Yong-zhao
..............page:254-256,290
Real Time Routing Protocol Based on Data Driven Link Estimation in Sensor Networks
YOU Shao-hui;LIU Qiang;SHEN Xue-ping
..............page:63-67
Theoretical Discussion about Topology Control for Wireless Sensor Networks
ZHANG Xue;GONG Hai-gang;LIU Ming
..............page:105-109
Intrusion Detection Method Based on Model Checking of Concurrent Propositional Projection Temporal Logic
CHEN Jian-hui;WANG Wen-yi;ZHU Wei-jun
..............page:116-117,137
Unsupervised SAR Image Segmentation Based on Multi-features
WANG Qing-xiang;LI Di;ZHANG Wu-jie
..............page:267-270
FCM Image Segmentation Based on the Spatial Restrained Fuzzy Membership
PENG Dai-qiang;LI Jia-qiang;LIN You-quan
..............page:257-259
Time-domain Non-uniform Error Protection Algorithm of Audio Information
MAO Qian;XU Jun-jun;DONG De-cun
..............page:89-91
Provable Secure Trust Data Sharing Protocol for Hybrid P2P Networks
LIN Huai-qing;WANG Bin;ZHOU Yan
..............page:85-88
Image Denoise and Enhancement Based on Structure Self-similarity in Wavelet Domain
JIAO Feng;BI Shuo-ben;ZHAO Ying-nan;GENG Huan-tong
..............page:242-245
Discrete Particle Swarm Optimization Algorithm for the Routing of VLSI Circuit
LIU Geng-geng;WANG Xiao-xi;CHEN Guo-long;GUO Wen-zhong;WANG Shao-ling
..............page:197-201
Gene Selection with Tolerance Rough Set Theory from Gene Expression Data
JIAO Na;MIAO Duo-qian
..............page:217-220
Adaptive Transmission Scheme for Cooperative OFDM Networks Based on Subcarrier Mapping
LI Fu-nian;ZHU Guang-xi;WANG De-sheng
..............page:82-84,94
Analysis of Network Coding Nodes Selection in Wireless Mesh Networks
SHEN Xiao-jian;CHEN Zhi-gang;YE Hui;XIA Zhuo-qun
..............page:71-73,91
Performance Analysis of CCSDS Sender Packet Multiplexing Processing System
BIE Yu-xia;LIU Hai-yan;PAN Cheng-sheng
..............page:92-94
Static Decentralized Output Feedback Control for Bilinear System
GUO Gang;NIU Wen-sheng;CUI Xi-ning
..............page:295-296,封3
Estimating the Number of Components of Mixture Models for Medical Image
XIE Cong-hua;SONG Yu-qing;CHEN Jian-mei;CHANG Jin-yi
..............page:271-274
New Improved Pseudo-boolean Satisfiability Algorithm for FPGA Routing
TANG Yu-lan;LIU Zhan;YU Zong-guanga;CHEN Jian-hui
..............page:297-300,封3
New Scheme of Full Disk Encryption Based on Logical Password Lock
ZHAO Fu-xiang;PANG Liao-jun;WANG Yu-min
..............page:95-97,109
Image Spare Decomposition Algorithm Based on MP and 1DFFT
LI Xiao-yan;YIN Zhong-ke
..............page:246-247,250
Cryptanalysis and Improvement of a New Identity-based Key Exchange Protocol
GUO Hua;ZHANG Fan;LI Zhou-jun;ZHOU Xiao-juan
..............page:78-81
Hybrid Real-time Scheduling Algorithm Based on Partial Reconfigurable FPGA
YIN Jin-yong;GU Guo-chang;WU Yan-xia
..............page:283-286
Survey of Mining Imbalanced Datasets
ZHAI Yun;YANG Bing-ru;QU Wu
..............page:27-32
Demodulation Method for UWB Signal Based on Amplitude Comparison
ZHANG Lin;WANG Shu
..............page:68-70,81
Color Image Representation Method Using NAM Based on Gray Code
ZHENG Yun-ping
..............page:263-266,270
Method of Catching NPR Hue in Double Light Source Condition
WANG Xiang-hai;Qin Xiao-bin;Xin Ling
..............page:239-241,278
Software Development Cost Estimates Based on Fuzzy Theory
REN Yong-chang;XING Tao;LIU Da-cheng
..............page:130-134,142
Hierarchical Classification Approach of Hierarchical Feature Selection and Error Control
WU Bi-jun;LI Juan-zi;JIN Xin
..............page:165-168,180
Specification-based Distributed Detection for Mobile Ad Hoc Networks
WANG Fang;YI Ping;WU Yue;WANG Zhi-yang
..............page:118-122
Models of Web Services Composition Based oil Timed Color Petri Nets
WANG Yu-ying;CHEN Ping
..............page:152-155
Research on Wireless Sensor Network Architecture Model in Ocean Scene
LIU Lin-feng;LIU Ye
..............page:74-77,101
WAN Intelligent Storage System for Next Generation Internet
LI Jie-qiong;FENG Dan
..............page:279-282
Research on Degree Reduction of Parameters Curves and Surfaces
SHI Mao;KANG Bao-sheng;YE Zheng-lin;BAI Hong-wu
..............page:233-238,286
Image Threshold Segmentation Based on Improved Two-dimensional Renyi Entropy
HUANG Jin-jie;GUO Lu-qiang;LU Ren-hu;DING Yan-jun
..............page:251-253