Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2010 Issue 2
Complementarity Support Vector Machines
ZHANG Xiang-song;LIU San-yang
..............page:165-166,206
Study on Trust Mechanism Based Component Selection Approach in Internetware
ZHANG Xiao-mei;ZHANG Wei-qun
..............page:161-164
Vehicle Type Recognition Based on Biological Vision Salience
CHEN Zhen-xue;LIU Cheng-yun;CHANG Fa-liang
..............page:207-208,224
Research of Text Clustering Based on Fuzzy Granular Computing
ZHANG Xia;WANG Su-zhen;YIN Yi-xin;ZHAO Hai-long
..............page:209-211
Efficient Roaming Authentication with Anonymity Protocol for Wireless Vehicle Mesh Networks
WU Xiu-qiang;MA Hua;ZHANG Wei-dong;PEI Qing-qi
..............page:53-55,81
Novel Dynamic Security Analysis Model for Computing System Based on DBN
ZHAO Feng;ZHANG Qin;LI Min
..............page:61-64
Colored Multiway Cuts in Almost Trees with Parameter k
LI Shu-guang;XIN Xiao
..............page:246-249
Generalized Equivalence between RST and SPA
ZHU Hong-ning;ZHANG Bin
..............page:167-170
Data Backup Scheme Based on Network Coding
LIN Guo-qing;CHEN Ru-wei;LI Ying;WANG Xin-mei
..............page:116-119
Improved Watermarking Algorithm for Digital Images Robust to Geometric Distortion
LI Jian;YE You-pei;HAN Mou
..............page:126-130
Network Model for Convergence of VSN and Computer Network
WU Zuo-shun
..............page:94-96,109
Survey of the Cross-layer Approaches of P2P over MANET
QU Da-peng;WANG Xing-wei;HUANG Min
..............page:31-37,47
Self-feedback Fault Detection Algorithm for Peer-to-Peer Storage System
WAN Ya-ping;FENG Dan;OUYANG Li-jun;LIU Li;YANG Tian-ming
..............page:48-52,77
Stability Analysis of Swarms with Interaction Time Delays
LIU Qun;WANG Lan-fen;LIAO Xiao-feng;WU Yu
..............page:242-245
Security Model for Image Hidden Communication
DING Yi-jun;ZHENG Xue-feng;YU Gui-rong
..............page:120-122,130
Carry-free Addition in Parallel Based on Ternary Optical Computer
WANG Xian-chao;YAO Yun-fei;JIN Yi
..............page:290-293
Optimal Search Flooding Protocol for Wireless Sensor Networks
YU Qin;WANG Wei-dong;QIN Zhi-guang;MAO Yu-ming
..............page:56-60
Algorithms for Dominating Problems: A Survey
WANG Jian-xin;CHEN Bei-wei;CHEN Jian-er
..............page:7-11
Registration for Breast Magnatic Resonance Imaging Using Demon Algorithm
WANG Yang-ping;DANG Jian-wu;DU Xiao-gang;LI Sha;TIAN Zhong-ze
..............page:261-263,268
Survey of Sensor Networks Key Management and Authentication
ZHANG Guo-yin;SUN Rui-hua;MA Chun-guang;ZHU Hua-min
..............page:1-6,11
Adaptive Control-based Proportional Delay Differentiated Service on DTN Web Servers
SUN Qi-lu;DAI Guan-zhong;PAN Wen-ping
..............page:105-109
Research on Web Service Discovering Algorithm Based on Information Description Framework
HUANGFU Xian-peng;WEI Wei;CHEN Hong-hui
..............page:134-138
Approach for Evolution of OWL-S Requirements Specification Based on Reflection Mechanism
YUAN Wen-jie;YING Shi;WU Ke-jia;YAO Jun-feng
..............page:141-145,195
Trust Computing Based on Probability Theory in Unstructured P2P Network
WANG Ping;QIU Jing;QIU Yu-hui
..............page:212-215
Survey on Progressive Transmission Strategy of Large-scale Virtual Scenes
WANG Wei;JIA Jin-yuan;ZHANG Chem-xi;JIANG Yin
..............page:38-43,60
Cluster-head Predication Distributed Clustering Routing Protocol
TANG Qiang;TANG Xiao-ying;WANG Bing-wen
..............page:78-81
Robust Renal Artery Flow Signal Extraction Method for Ultrasonic Doppler Images
WANG Jie;YANG Meng;CAI Sheng;LI Jian-chu;TANG Ping
..............page:274-276
Research on a Clustering Algorithm Based on Generalized Quantum Particle Model and its Convergence
HUANG Liang-jun;SHUAI Dian-xun;ZHANG Bin
..............page:225-228,236
Multiple Features Based Intelligent Biometrics Verification Model
SUN Ao-bing;ZHANG De-xian;ZHANG Miao
..............page:221-224
Diversity Strategies on Multiobjective Evolutionary Algorithms
XIE Cheng-wang;DING Li-xin
..............page:175-179
Word Segmentation Approach in Military Text on the Basis of Word Combination
HUANG Wei;GAO Bing;LIU Yi;YANG Ke-wei
..............page:171-174
Risk Assessment of Information Security Based On Improved Wavelet Neural Network
ZHAO Dong-mei;LIU Jin-xing;MA Jian-feng
..............page:90-93
Graph Cut Method Based on Non-scalar Distance Metric for Texture Synthesis
ZOU Kun;HAN Guo-qiang;WO Yan;ZHANG Jian-wei
..............page:277-281
Two New Digital Image Encryption Effect Evaluation Criterions
ZHANG Xue-feng;FAN Jiu-lun
..............page:264-268
Relationship between Uncertainty and Parallelism of Natural Computation
WANG Peng;LI Jian-ping
..............page:216-220
Consistency Protocol for Metadata Processing in KESS
DENG Ke-feng;HE Lian-yue;WANG Xiao-chuan;ZHOU Xian-feng
..............page:75-77
Research on Sensor Data Description Protocol Based on Extended SDP
SHEN Chun-shan;WU Zhong-cheng;LUO Jia-ronge
..............page:110-112,174
Research on Multi-peers Cluster P2P System
SHEN Xin-peng;LI Zhan-huai
..............page:71-74,93
Study of Obtaining Chinese Entity Relation Pattern Automatically
DENG Bo;ZHENG Yan-ning;FU Ji-bin
..............page:183-185
Formalizing Advanced Branching and Synchronization Patterns Using Pi Calculus
GUO Xiao-qun;HAO Ke-gang;HOU Hong;DING Jian-jie
..............page:139-140,179
Object-based Rate Control Scheme for H.264 Video Coding
XUE Wei;DU Si-dan;YE Xi-jun
..............page:131-133
Color Image Retrieval Based On Multiple Features of Image Edges
YANG Fang-yu;WANG Xiang-yang
..............page:256-260
Novel Strategy for Selecting Incremental Support Vectors
SHEN Feng-shan;MA Yu-jun;ZHANG Jun-ying
..............page:200-202,220
Hybrid Evolutionary Algorithm Based 0n Adaptive Operator and its Application
YOU Xiao-ming;LIU Sheng;SHUAI Dian-xun
..............page:192-195
Study on Term Relation Extraction from Domain Text
SUN Xia;ANG Xiao-feng;DONG Le-hong;WU Jiang
..............page:189-191,215
Overview on Target Tracking Methods in Binary Wireless Sensor Networks
SUN Xiao-yan;LI Jian-dong;HUANG Peng-yu;CHEN Ting
..............page:19-22,64
Collaborative Filtering Recommendation Algorithm Based on Co-ratings and Similarity Weight
WANG Jing;YIN Jian;ZHENG Li-rong;HUANG Chuang-guang
..............page:99-104
New Information-theoretic Security Channel Model
WANG Bao-cang;LIU Hui;HU Yu-pu
..............page:97-98,119
Research of Support Vector Classifier Based on Neighborhood Rough Set
HAN Hu;DANG Jian-wu;REN En-en
..............page:229-231,285
Algorithm of Dynamic Event System\'s Synchronization Diagnosis
WANG Xiao-yu;OUYANG Dan-tong;ZHAO Xiang-fu;CHANG Xiao-huan
..............page:180-182,199
Research on Virtual Hardware Method for Carrier Ethernet
DAI Jin-you;YU Shao-hua;WANG Xue-shun;ZHU Guo-sheng
..............page:82-86
Parallel Gene Expression Programming Based on EDA
DU Xin;DING Li-xin;XIE Cheng-wang;CHEN Li
..............page:196-199
tou gao xu zhi
..............page:封2
Overview on RRM Based on BoD in Broadband Multimedia Satellite Systems
QIN Yong;ZHANG Jun;ZHANG Tao
..............page:23-30
Research on Trace-based Network Storage System Evaluation
ZHAO Xiao-nan;LI Zhan-huai;ZHANG Xiao;ZENG Lei-jie
..............page:154-157,170
Non-cluster Based Topology Control Method in Wireless Sensor Networks
ZHANG Wen-zhu;LIU Jia;ZHANG Lin;YUAN Jian;SHAN Xiu-ming
..............page:44-47
QoS Routing Protocol for Wireless Sensor Networks Based on Strip of Area
CHENG Zhen;LI La-yuan;YANG Shao-hua;ZHANG Peng
..............page:87-89,104
Simple and High Precision Fast Motion Estimation Algorithm
LU Ji-yuan;CHAO Hong-yang
..............page:282-285
Clustered Microcalcification Detection in Digital Mammograms Based On an Active Learning with Support Vector Machine
FENG Jun;JIANG Jun;Ip Ho-Shing Horace;WANG Hui-ya
..............page:237-241,245
Using Co-classification Approach to Detect the Type of Cancer
LU Xin-guo;CHEN Dong;DU Jia-yi;HOU Juan
..............page:232-236
Fast Vehicle-logo Location Based on Local Symmetrical Character
XIAO Fei;WANG Yun-qiong;LIU Li-mei;ZHAO Yang
..............page:298-300,封3
Improvement of Web Information Extraction Algorithm Based on HMM
ZHU Wei-hua;LU Yi;LIU Bin-bin
..............page:203-206
Research on Hierarchical Security Model of Web Services Composition
SHANG Chao-wang;YANG Zong-kai;LIU Qing-tang;ZHAO Cheng-ling
..............page:113-115,153
Integrated Scheduling Algorithm of Complex Product Based 0n Scheduling Long-path
XIE Zhi-qiang;ZHANG Lei;YANG Jing
..............page:150-153
Research and Implementation of Distributed Index Based on DHT
WU Wei;SU Yong-hong;LI Rui-xuan;LU Zheng-ding
..............page:65-70
Novel Ant Colony Optimization Algorithm with Estimation of Distribution
XU Chang;CHANG Hui-you;XU Jun;YI Yang
..............page:186-188,211
Efficient Algorithm for L-system Tree Models Based on LOD
LUO Yan;WU Zhong-fu;GUO Xuan-chang;ZHOU Shang-bo
..............page:294-297
Research on BitTorrent-like Peer-to-Peer Media Streaming Systems
ZHENG Wei-ping;QI De-yu;XU Ke-fu
..............page:123-125,149
Survey on the Research of Network Visualization
SUN Yang;JIANG Yuan-xiang;ZHAO Xiang;XIAO Wei-dong
..............page:12-18,30