Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2003 Issue 10
Solutions on RTP Protocol to Optimize Realtime Voice Transport
chen hua ; you zhi sheng ; hong mei ; fei xiang dong ; yang hua kun
..............page:93-94,97
Technical Analysis of Workflow System in Siebel
yang chao jun ; yang nai ding ; zhang ya li
..............page:95-97
Optimization Design Method Based on NN and GA
sun quan ling ; hu ping ; lu jin gui
..............page:98-99
A Secure Implementation of WWW Service
lin zuo ; jing ji wu ; li zhi ; ye bo ; li dan yang
..............page:100-102
HTN-based Supply Chain Optimization Strategy
gu chang xing ; feng zhi yong
..............page:103-105
Mobile Software Development on the BREW Platform
xu jiang wei ; chen ping
..............page:89-92
A Port-scanning Detection Method Based on Fuzzy Set Theory
ji zhi gang ; cai li dong
..............page:87-88,92
Abstract State Machine in Embed Software
xiong zhen yun ; ruan jun bo ; jin hui hua
..............page:84-86
Implementation of a Web-based LDAP Directory Service
yu jian ; zhang hui ; zhao hong mei
..............page:82-83,86
Web Service-based Network Management
gong xin hao ; xiong qi bang
..............page:78-81
Web-based Application Stress Testing
jiang chang hua ; zhu min ; chen you guang
..............page:75-77
Plant Data Acquisition and Remote Publication System Based on DCE
zhang bing ; liu yi qun
..............page:72-74
Realization and Application of 3D Terrain Visualization
hu zhuo zuo ; yang guo dong
..............page:70-72
A Method of Improving Availability of Cluster System and Implementation
zheng wei ; guo cheng cheng
..............page:67-69
Robust Motion Segmentation by Clustering Motion Trajectories
wang hong bin ; li hua
..............page:1-3
Analyzing the Peer-to-Peer Computing Technology
zhou shi jie ; qin zhi guang ; liu jin de
..............page:4-7
Network Traffic Prediction Based on a Periodic Traffic Model
he jun feng ; xie gao gang ; yang jian hua
..............page:8-11
Technologies Analysis and Realization in the H.323 Stack of the VoIP Gateway
bai yi zhi ; huang yong feng ; li xing
..............page:15-17
Analysis and Implementation of a Hybrid Multi-level PKI Trust Model
yu sheng sheng ; long chun ; zhou jing li ; hu zuo feng
..............page:18-20
Research on Component Application Server of CORBA
wang shan ; chen song ; zhou ming tian
..............page:21-23
Research on Video Compression Algorithm at Low Bit-rate
li xiao meng ; wang jian jun
..............page:24-26
A Policy-driven Mobile Agent Security Model
su ling ; xiong qi bang
..............page:27-29
A New Method of Lines Tracking Based Hough Transform
chen zhen ; gao man tun ; yang sheng yun
..............page:30-32
Security Policy Model Implemented on Security Architecture
huang xin fang ; li liang ; zhao lin
..............page:33-35
Research on Internet Active Queue Management Algorithm
qu yan guang ; liu yun chao
..............page:36-38
Design and Implementation of A Software Metrics Tool Based on Abstract Syntax Tree
niu jia hao ; huang zhi qiu ; zhang jing ; liu jia
..............page:39-41
Formal Specification,Designing and Verification of Secure Protocol
wang na ; wang ya di
..............page:42-45
Firewall Technology and Vulnerability Analysis
cheng zuo zuo ; wang qing xian
..............page:46-48
A Workflow Model Based on Object and ECA Rules
gong lei ; wang hai yang ; huang fu jie
..............page:48-50
Application of Clustering Method in Image Recognition
shen jian ping ; shen jie wen ; zhu hong ming ; xia jiong xian
..............page:51-52
A SCC Protocol of Dynamic Processing in Real-time Database System
cui wen jing ; jia zhi ping
..............page:53-54,58
Analysis on the Storage System of Web Proxy Cache Squid
ma jun chang ; gu zhi min
..............page:55-58
Research of Knowledge Acquisition System Based on Patent
huang xue an ; zhang you yun
..............page:59-61
Research and Practice of OSPF Protocol Performance Test
shao bing ; li yue peng ; zhao bao hua
..............page:62-63,66
Study of Dynamic Data Migration Based on Autonomous-distributed Video Server
liu zhi ming ; tao yang ; peng yu xing
..............page:64-66
Building a Meteorological Warning System Based on J2EE
chen li sheng ; song yuan qing ; zhu xiao ping
..............page:106-108
Research and Implementation of Illegal Web Page Filtering
zhou wei cheng ; ma su xia
..............page:108-110
Realization on a New Kind of Data Warehouse Architecture
zhang lei ; zhong yong
..............page:111-113
A Universal Decoding Network of Linear Block Codes Based on RBF Neural Network
peng yan ni ; cao chang xiu ; zhou shi ji
..............page:114-116
A Heuristic Algorithm to Mining Simplified Rules and Its SQL Implementation
liu fa sheng ; yang hui
..............page:117-118,123
Research of AAA Based on Diameter Protocol
zuo zuo ping ; chen neng gan
..............page:119-120,125
Automatic Batch Printing of Bills Based on XML and Web Browser Control
xu xiao yuan ; zuo hua qing
..............page:121-123
Reconstructing a Common Program to an Automation Server
sun guo yong
..............page:124-125
Access Control Technology in Workflow System
dong qiao yu ; ou yang zuo ; liu yu shu
..............page:126-128
Implementation of USB Host in Embedded Systems
peng xiang yu ; hu hao ; xu guo zhi
..............page:129-130
Implementation of the Unpacking of DICOM File with Lossless Compression Method
zuo ying hong ; cao bo yan
..............page:131-133
XML-based Web Information Publication System
ren xiao lin ; gui shi wei ; wu qi zong
..............page:134-137
A Network MPEG2 Stream Player Based on DirectShow
zheng jing jing ; gao sheng fa
..............page:138-139,142
Implementation of Coding Style Inspecting Tools for C/C + +
chen dan wei ; li jun ; liu ji xing
..............page:140-142
Using STL to Manage Event List of Discrete Event Simulation
xu chi ; lv jian wei ; liu zhong hua
..............page:143-144,147
Developing Application Server Using Avalon Framework
xu lu qiang ; liu wei guang
..............page:145-147
Design of Software for Stack Smashing Detection
yang rong ; yang zuo
..............page:148-150