Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chinese Journal of Computers
0254-4164
2002 Issue 4
The Construction of Rank Distance Abridging Codes
du wei zhang ; chen ke fei
..............page:445-448
Corruption-Based TCP Rate Adjustment in Wireless Networks
xu chang biao ; long ke ping ; yang shi zhong
..............page:438-444
The Choice of B-spline Biorthogonal Wavelets According to Time-frequency Resolution Property
zhang yi rong ; xian ming ; xiao shun ping
..............page:430-437
A Unsupervised Character Classification Based on Similarity Measure in Fuzzy Model
lu da ; qian yi ping ; xie ming pei ; pu zuo
..............page:423-429
Mining of Association Rules Based on the Operators of Set of Item Sequences
mao guo jun ; liu chun nian
..............page:417-422
Method Invocation Localizing Optimization in Parallelizing Object-Oriented Language
yu zuo ; zuo wan zuo ; xie li ; sun zhong xiu ; guo min yi
..............page:409-416
Parallelism Analysis Based on Generalized Method Invokation Model
yu zuo ; yang xue lin ; zuo wan zuo ; xie li ; sun zhong xiu
..............page:403-408
Parallel Algorithms for Solving Large Scale Nonlinear Systems of Equations Based on Dawning1000A
yang geng ; wang shao zuo ; shen jin long
..............page:397-402
An Extendible Look-Up Table of Twiddle Factors for FFT
li qing ; wang neng chao ; zheng chu guang
..............page:392-396
An Asynchronous BSP Model and Optimization Techniques
liu fang ai ; liu zhi yong ; qiao xiang zhen
..............page:373-380
Fibonacci Series-Based Multicast Algorithm
gu nai jie ; li wei ; liu zuo
..............page:365-372
An Improved Mobile Agent Communication Algorithm
feng xin yu ; tao xian ping ; cao chun ; li xin ; zhang guan qun ; lv jian
..............page:357-364
A Chaotic Sequence Encryption Method
wang xiang sheng ; gan jun ren
..............page:351-356
A Threshold Key Escrow Scheme Based on ElGamal Public Key Cryptosystem
cao zhen fu ; li ji guo
..............page:346-350
Dynamic Security of Group Key Distribution and Its Solutions
li xian xian ; huai jin peng ; liu xu dong
..............page:337-345