Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2010 Issue 6
Research Based on a Method of CFCM Clustering Intrusion Detection
zhao yue ; zhang wei qun
..............page:176-178,222
Ontology-based Natural Language Interface to Relational Databases
li hu ; tian jin wen ; wang huan huan ; shi yong
..............page:200-205
Evaluating Model of Cache Miss in the Filtering of XML Data
shen jie ; yin gui sheng ; wang xiang hui
..............page:196-199
New Spatial Query Language Based on GIS
xu cheng zhi ; xu cheng zuo ; qian tie yun
..............page:206-210,213
Mining Closed Composite Sequential Patterns Efficiently
zuo lei ming ; sun zhi hui ; zhang bai li ; yang ming ; yao zuo
..............page:186-190,205
Research and Implementation of Key Generation Services Compatibility Based on TCM
jiang min hui ; huang ning yu ; zhu zuo
..............page:82-85
Novel Approach of Ontology Mapping Extraction SME
xia hong ke ; zheng xue feng ; hu xiang
..............page:233-236
NpuESB:An BPM Environment Based on Enterprise Service Bus
fu ning ; zhou xing she ; xue wen ; zhang dong yi
..............page:32-35
Document Clustering Algorithm Based on Dynamic Interval Mapping
sun yong lin ; liu zhong
..............page:23-27
Review and Prospect of Tree Modeling Techniques
zhou jun ; chen lei zuo ; liu qi he ; li yan mei ; rao yun bo
..............page:17-22,35
Story Link Detection Research Based on the Dynamic Extraction of Correlative Word
zhao hua ; deng pan ; zhang jian wei
..............page:237-239,270
Replication Mechanism Based on Unstructured Decentralized P2P Network
huo lin ; fang yi ; hu he ping ; huang bao hua
..............page:78-81,85
Analysis of Profit for Internet Service Provider Based on Multipath Inter-domain Routing
li dan ; wang bin qiang ; yin zuo ; ma hai long
..............page:244-247
Research of an Efficient Power Analysis Physical Experiment Platform
li lang ; li jing ; li ren fa ; wu ke shou
..............page:75-77
Dynamic Integration of Disparate Services and Distributed Data
peng shu qing ; chen de yun
..............page:168-170,199
Novel Approach for Extracting XML Schema Definition Based on Content Model Graph
ning jing ; liu jie ; ye dan
..............page:179-185
Usage Control Model with the Ability of Character Judging
shi wei zuo ; tan liang ; zhou ming tian
..............page:86-90,96
Multi-robot Mission Planning Algorithm and its System Implementation
yu ling li ; jiao ji le ; cai zi xing
..............page:252-255
IDM-ST Coding for MISO OFDM Link
lin pei ; wang de sheng ; zhu guang xi ; zhu xiao dong
..............page:91-93,110
Intrusion Detection Algorithm Based on Simulated Annealing and K-mean Clustering
hu yan wei ; qin zheng ; zhang zhong zhi
..............page:122-124
Storage Optimization for Continuous Query over Sliding Window Based on Ladder Queue
tang xiang hong ; li guo hui
..............page:191-195
Transmission Distance Controlling Method of Wireless Sensor Networks
yin zhen ling ; wang ru chuan ; huang hai ping ; sun li juan
..............page:97-101
Key Technologies and Applications of Internet of Things
liu qiang ; cui li ; chen hai ming
..............page:1-4,10
Reliability Evaluation of the Network Storage System Based on Block Diagrams
zhang ying ; zhang yi ; wang ji lu
..............page:102-105,195
Publicly Verifiable Secret Sharing Scheme with Proactive Ability
chen yang kui ; yu jia ; hao rong ; liu hong yan ; xu yue bin
..............page:125-127
Improved Virus-evolutionary Genetic Algorithm Based on Fauna Structure
gu min ; yang feng
..............page:240-243
Research on Row Buffer Hit Prediction for Memory Access
wang de li ; gao de yuan ; wang dang hui ; sun hua jin
..............page:297-302
Face Recognition Using Kernel Maximum Scatter Difference Discriminant Analysis
du hai shun ; li yu ling ; wang feng quan ; zhang fan
..............page:286-288,302
Practical Interconnection Network RPC(k)and its Routing Algorithms
xing chang ming ; liu fang ai ; yang lin
..............page:131-135,175
Study on Delegation Revocation in Attribute Supported Delegation Model
ye chun xiao ; fu yun qing
..............page:217-219
Design of Embedded Wireless Sensor Netowrk Platform Based on uC/OS-Ⅱ
wang feng ; wang jian ; guo zhong wen
..............page:136-141,219
Research on an Adaptive Service Discovery System for MANETs
weng hai bin ; wen yuan feng ; jin zuo hong ; zhang biao
..............page:142-146
Topology Optimization Based on Small-world Model in Wireless Sensor Networks
jing wei peng ; liu ya qiu ; yang xian hui
..............page:28-31
Overview of Data Management in Wireless Sensor Networks
zhang shao ping ; wang ying hua ; li guo hui
..............page:11-16,31
Broadband Multimedia Satellite Communication System QoS Framework: Design, Simulation and Verification
feng shao dong ; bian dong ming ; zhang geng xin ; li guang xia
..............page:60-63,69
Research on Null Values in Probabilistic XML Database
zhou zhi zeng ; wang xin jun
..............page:214-216
MPI Runtime Parameters Tuning Based on Neural Network on Multi-core Clusters
wang jie ; zeng yu ; zhang jian lin
..............page:229-232
Adaptive Rate Adjustment Mechanism for Real-time Media Streaming over MANETs
wei zuo jie ; bai guang wei ; cao lei ; shen hang ; wang hua
..............page:64-69
Strategy of UDDI Superpeer Configuration Based on Vertex Weight Priority
zhou ming qiang ; wang dong ; li shuang qing ; hu jun ; zhu qing sheng
..............page:118-121
Study on Distribution Mechanism of Pervasive Computing Based on Wireless Sensor Networks
huang xiao sang ; wang ru chuan ; ye ning
..............page:111-113
Network Attack Model Based on Ontology and its Application
wang qian ; feng ya jun ; yang zhao min ; yao lei
..............page:114-117
Research of Personalized Methods of Information Retrieval
wang jun yi ; ye xin ming
..............page:211-213
Improved Particle Swarm Algorithm Based on Arnold Map
wang jun hui
..............page:268-270
Full-automatic Detection of Memory Safety Violations for C Programs
yang zuo ; zhang huan guo ; wang hou zhen
..............page:155-158,185
Flexible and Practical Scheme to Preserve Confidentiality of Sensitive Attributes in Distal Certificate
liao jun guo ; ling le zhen ; zhu bin
..............page:128-130,216
Study of Test Case Generation for Web Applications
peng shu shen ; gu qing ; chen dao xu
..............page:159-163
Research on Thin-client Oriented Web Operating Systems
ren zuo ; guan jian bo ; yin hu zhe ; wu qing bo ; dai hua dong
..............page:164-167
Application of Hypergraph in Data Mining
cui yang ; yang bing ru
..............page:220-222
Analyzing Relationship of News Video Stories:An Overview
wu ling da ; wen jun ; chen dan zuo ; yuan zhi min
..............page:5-10
Communicating in Resource-constrained Multi-Agent Systems
zhao jie ; yang liu ; li shu ping
..............page:271-272
RapidIO User-level Communication Interface Realization Based on RDMA
ji ying hui ; zhang jian dong ; cai zuo ; cai hui zhi
..............page:293-296
Anomaly Detection Method Based on Random Field for Hyperspectral Imagery
du bo ; zhang liang pei ; li ping xiang ; zhong yan fei ; chen tao
..............page:289-292
Role-based Access Control Model for Privacy Protection
yang qiu wei ; liu ling ; li ken li ; tang zhuo
..............page:46-50,121
Static Analysis of Memory Leak Fault
ye jun min ; wei peng ; jin cong ; wang jing hua ; zhang qing guo ; zhang wei
..............page:171-175
Text Sentiment Classification Research Based on Semantic Comprehension
wen bin ; he zuo zuo ; luo le ; song le ; wang zuo
..............page:261-264
Trustworthy Service Scheduling Framework Based on QoS Decomposition
sui yu lei ; zhou xing she ; fu ning ; zhan tao
..............page:70-74,167
Research on Traffic-prefer-based Multi-QoS Object Decision Layered Routing
guo pan hong ; yang yang ; tang xian ming
..............page:56-59,146
Reliability Analysis of star Network with Link Failures
liang jia rong ; hua ren jie
..............page:106-110
Novel Hierarchical Immune Algorithm for TSP Solution
wu jian hui ; zhang jing ; zhang xiao gang ; liu chao hua
..............page:256-260,264
Study on Performance of Information Security Risk Management
lu zhi gang ; pan lin ; liu bao xu ; xu zuo sheng ; jiang wen bao
..............page:40-42,55
Psychological Analysis of Trends Intelligent Network Model
jin yu chang ; qin qi wen ; an jun xiu
..............page:273-277
Key-exchange Protocols of Cognitive Radio Based on Self-certified
zhou jian ; zhou xian wei ; sun li yan
..............page:94-96
Improved Collaborative Filtering Recommendation Algorithm
wang zuo ; wang jun bo
..............page:226-228,243
QPSO-based Multi-instance Learning for Image Annotation
li da xiang ; peng jin ye ; bo qi rong
..............page:278-282,296
Rules Reduction for Decision Table Based on Cloud Model
dai jin ; he zhong shi
..............page:265-267,277
Fast Algorithm for Multi-frame Selection with Jointly Optimization of Fractional Pixel Motion Estimation
lu ji yuan ; sun shao zuo ; chao hong yang
..............page:283-285,302
Genetic Projection Pursuit Evaluation Method of Network Attack Resistance Ability
wang hui mei ; li xu ; xian ming ; wang guo yu
..............page:43-45,163