Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2006 Issue 10
Study on Groundwater Data Sharing Based on Metadata
ZHU Yun-qiang;ZHU Shao-xia;YU Meng-liang
..............page:73-75
Research on Component Selection Process in CBD
WANG Min;WU Guang-mao;TIAN Lin;ZHANG Chong-gang
..............page:70-72
Application Research on Evaluation Methods of Software Project Risk
ZHANG Jun-guang;LV Ting-jie;MA Xiao-ping
..............page:76-77,81
Fine-grained Extensible Access Control Policy for Resource
TANG Cheng-hua;HU Chang-zhen
..............page:82-85,92
Fast Algorithm for Mining Maximum Frequent Patterns
WANG Yun-peng;HU Xiu-lin;RUAN You-lin
..............page:86-88
Analysis and Design of PE's Operation Autonomy
LI Wei;XIAO Xiao;SHEN Xu-bang
..............page:89-92
Research and Application of Network Security Information Correlation Technology
HAN Zheng-ping;CAI Feng-juan;XU Rong-sheng
..............page:93-94,100
Research on Taxonomy of DDoS Attacks and Defense Mechanisms
WANG Qian;WANG Lei;XIE Shou-sheng
..............page:110-112
Multi-signature with Some of Proxy Signer Based on Elliptic Curve
YU Cheng-zun;WANG Cai-fen;LIU Jun-long;JIA Ai-ku
..............page:113-115
New Design of Dynamic Authentication Based on PKI
ZHANG Qiu-yu;LIANG Shuang;WANG Huai-jiang
..............page:116-118
MP3 Audio Selective Encryption Scheme Based on Data Sensitivity
GE Long;LIAN Shi-guo;SUN Jin-sheng;WANG Zhi-quan
..............page:122-124,127
Analyzing Digital Image of Carbonate Rock Pore System by New Approach
ZHAO Yong-gang;CHEN Jing-shan;ZHAO Ming-hua;ZHAO Yong-peng;ZHOU Yue-zong
..............page:169-171
Design and Implementation of Atomic Break Data Backup System
WEN Wei-ge;WANG Hao;XUE He;ZENG Lei-jie
..............page:125-127
Security Model for Mobile Systems with Location Failures
YU Wan-tao;HU Guang-rui
..............page:128-129,132
Network Security Study Based on Content Audit and Filter
ZHU Ye-hang;DAI Guan-zhong;MU De-jun;LI Yan-ling
..............page:130-132
Design and Implementation of XACML Access Control Model Based on AC
TANG Cheng-hua;HU Chang-zhen
..............page:133-136
Security Engineering for Data Acquisition System Based on CC Security Assurance Requirements
XIANG Dong;WANG Run-xiao;QIN Xian-sheng;JIANG Xiao-peng
..............page:137-139,143
Full Security Design for Tourism Information Applying System
LI Ying;HU Xiang-yi;LV Shu-wang
..............page:140-143
Research on 3D Surface Finite Element Mesh Generation Technology Based on STEP
WANG Yu-huai;LU Yan-lin;ZHOU Xiao;HUANG Jian-fang
..............page:144-145,153
Weighted Algorithm Based on Surface Normal Approximation
LEI Li-ping;ZHENG Yu-qi
..............page:146-147,150
Fingerprint Matching Algorithm Based on Bifurcation Ridge Comparability
YIN Xin-chun;WANG Qiu-ping;CHEN Chun-xia
..............page:148-150
Research on Bridge Extraction from High Resolution Remote Sensing Image
LUO Jian-cheng;MING Dong-ping;SHEN Zhan-feng;WANG Min;SHENG Hao
..............page:151-153
Fast Segmentation Algorithm of High Resolution Remote Sensing Image
CHEN Zhong;ZHAO Zhong-ming;GONG Peng
..............page:154-155,185
Algorithm for Automatic License Plate Recognition System
LI Bo;ZENG Zhi-yuan;ZHOU Jian-zhong;LUO Qin
..............page:156-158,162
Wavelet-based Non-negative Matrix Factorization with Sparseness Constraints for Face Recognition
OUYANG Yi-biao;PU Xiao-rong;ZHANG Yi
..............page:159-162
3D Environment Recognition Using Omni-directional Camera from Moving Vehicle
SUN Long;HU Mao-lin;ZHANG Chang-yao
..............page:163-165
Research on Mobile Objects Index in Spatio-Temporal Database
LV Jun-long;LIU Zhao-hong;LI Yan;GE Jun-wei;Hae-Young BAE
..............page:166-168
Design and Realization of Data Exchange Center Based on XML and J2EE
HU Liang-ya;XIAO Wei-dong;HE Xiao-ye
..............page:203-204,207
Simplified Realization of Embedded TCP/IP Protocol Stack Based on ARM Core
XU Hai-jun;LIU Jin-gang;WANG Yi-hua
..............page:251-253
Open DSS Model Based on Grid and Agent Technology
WANG Zhi-wu;CHEN Xue-guang;LIU Xia;ZHANG Yan-hui
..............page:257-260
Introduction of Algorithms and Performance Research of Softwares for Motif Discovery
ZHU Ji;YANG Hua;NIU Bei-fang;LANG Xian-yu;LU Zhong-hua;CHI Xue-bin
..............page:66-69
Available Time Index in TDBMS
LIU Yun-sheng;YOU An
..............page:63-65
Privacy Preserving Clustering by Isometric Transformation
ZHANG Guo-rong;YIN Jian
..............page:95-97
Design and Implementation of Agent-based Network Vulnerability Scanning System
MA Jie;CHEN Xin-meng;XIANG Guang-li
..............page:98-100
Improved Effective Message Encoding Technique
WANG Jiang-feng;BAO Wei-dong;HUANG Jin-cai
..............page:101-102,106
Further Improvement of a Threshold Proxy Signature Scheme
XIE Qi;YU Xiu-yuan
..............page:103-106
Investigation on Schema of Cooperation of DL-IPSec and Firewall
DAI Ren-dong;WANG Shang-ping;WANG Xiao-feng;HOU Hong-xia
..............page:107-109
Approach for Constructing Software Component Repository Based on UDDI
CAO Hong-hua;YING Shi;DU De-hui;MA Yu-tao
..............page:200-202
Server-Based Computing Technology and Its Application on ASP Platform
JU Wen-jun;SUN Lin-fu
..............page:205-207
Design and Implementation of Application Platform of Cone Beam Computed Tomography Based on Framework and Component Technology
HUANG Kui-dong;ZHANG Ding-hua;MAO Hai-peng;CHENG Yun-yong;LIU Jing;WANG Kai
..............page:208-211
Applying Ontology to Conceptual Modeling of Complex Sentences
HU Jin-zhu;LUO Xuan;XIAO Ming;WANG Lin;YAO Shuang-yun;LUO Jin-jun
..............page:212-213,228
Research on Key Technology of Isokinetic Resistance Apparatus Based on Windows
TAN Jun-zhe;WANG Shu-jie;WANG Jian-guo
..............page:214-215,222
Network Management of ForCES Routers Based on SNMP
JIN Rong;WU Xiao-chun;WANG Wei-ming
..............page:216-218
Design and Implementation of Traffic Flow Measurement Infrastructure Based on Libpcap
LI Ruo-lin;WANG Jin-yi;TAO Zhi-yong;CHEN Qi;NAN Kai;YAN Bao-ping
..............page:219-222
Project on Handle-based ENUM Technology
FENG Tao;YAN Bao-ping;ZHU Xiao-lian
..............page:223-225
Study of Data Search in DHT P2P Networks
LI Yun-di;FENG Yong
..............page:226-228
Novel Adaptive MAP Selection Algorithm for Hierarchical Mobile IPv6
HU Xiao;SONG Jun-de;SONG Mei
..............page:229-231
Implement Technique Research of LBS Application of Push Type
CAO Hai-bing;XIA Ying;GE Jun-wei;BAE Hae-young
..............page:232-233
Method and Implementation of Ethereal Plug-in under Windows Platform
SHI Mei-hong;MAO Jiang-hui;YAN Wei-wei;WU Dai-ming
..............page:234-237
Mobile and Multi-homing Solution Based on Host Identity Protocol
YU Shi-cai;LI Chang-xing;SONG Jian;SUN Wei
..............page:238-240
Fast IP Lookup Algorithm for IPv6-Middle Hash Table
HUA Wei-chen;HONG Mei;ZHANG Xiu-qiong
..............page:241-243,247
Research on ENUM and Its Performance
WEN Hong-guan;MAO Wei
..............page:244-247
Simulation Platform Design of Communication Systems Based on MATLAB
LI Yu-ling;ZHANG Yan-hua
..............page:248-250
E-commence Software Usability Quality Evaluation Method and Process
YUAN Yu-yu;ZHANG Yang-yang
..............page:60-62,65
Effective Recognition Algorithm for Digits Based on Combination Features
KONG Yue-ping;ZENG Ping;LI Zhi-jie;ZHENG Hai-hong;XU Pei-pei
..............page:172-173,182
Color Image Fusion Algorithm Based on IHS and Wavelet Transformation
TANG Guo-liang;PU Jie-xin;HUANG Xin-han
..............page:174-176,179
Algorithms and System Implementation for Transect Biodiversity Significance Tests
ZHANG Peng;QI Yan-hong;ZHANG Zhi-guo
..............page:177-179
Application of Support Vector Regression in Prediction of Railway Passenger Volume Time Serial
XIA Guo-en;ZENG Shao-hua;JIN Wei-dong
..............page:180-182
Application Research of Computer Aided Sneak Circuits Analysis
ZOU Rong;LI Xue-feng;LIN Yun
..............page:57-59
Adaptive Dynamic Prefetching Policy on Object-Based Storage Device
GONG Wei;FENG Dan;QIN Ling-jun
..............page:54-56
Network Inspection Agent Allocation Scheme in Mesh Wireless Network
DING Xu-yang;FAN Ming-yu;LUO Hui-qiong
..............page:52-53
QoS-aware Grid Computing Economics Model
LIU Li;YANG Yang;CHEN Dong-e
..............page:50-51,72
Role-based Permission Assignment and Access Control System
WANG Shu-da;LI Tao;YANG Jie;HU Xiao-qin;WANG Dan-dan;HUANG Rui
..............page:183-185
AUV Mental Logic
LIU Hai-bo;GU Guo-chang;SHEN Jing;KONG Xiao-dong
..............page:186-188
Study of Personalized Tutoring System Based on Agent
ZHANG Xiao-bo;HAN Yong-guo;LIN Yong;LIU Guang-qi
..............page:189-190,211
Research on Task Modeling Methods for User Interface Design
ZHAO Zhong-lei;QIN Zheng
..............page:191-193,197
Research on Desktop Inter-Process Communication of Open System
CHEN Hua-qing;WU Jian
..............page:194-197
Application of PCI Bus in Dual-spectrum Detection System
YU Xiao;YAN Feng;ZHANG Qiu-e;SUI Yong-xin;Yang Huai-jiang
..............page:198-199,202
Self-optimization Model for Concurrency Control
SHI Lei;BAI Wen-yang
..............page:33-35
New Genetic Algorithm with Adaptive Population Size
HE Hong;QIAN Feng
..............page:30-32
Technological Frame of Spatial Data Cube
ZOU Yi-jiang;YANG Xiao-ping
..............page:27-29
Rough Set Reduction Analysis Based on Merging
WANG Jia-yang;CHEN Song-qiao;LUO An
..............page:25-26,35
Research on Memory Leak Faults Testing Method Based on Pointer Analysis
ZHANG Wei;LU Qing-ling;LI Mei;GONG Yun-zhan
..............page:22-24
Overview of Guide to Software Engineering Body of Knowledge
WAN Jiang-ping;AN Shi-fang;HUANG De-yi
..............page:1-3
Survivability Analysis Based on Constrained Markov Decision Processes
ZHAO Kai;XIN Yang;YANG Yi-xian
..............page:44-45,49
Strategy to Form Agent Coalition Based on Relation Web Model
WEI Wei;LIU Hong
..............page:41-43
Semantic Model Driven Approach for Data-attribute Matching
WANG Ke-fei;ZHANG Shu-sheng;ZHOU Jing-tao;ZHAO Han
..............page:39-40,59
Method of Solving Independent Number Based on DNA Algorithm
SUN Chuan;ZHU Xiang-ou;LIU Wen-bin
..............page:20-21,24
Survey on Corner Detection
ZHAO Wen-bin;ZHANG Yan-ning
..............page:17-19,38
Survey of Monitoring and Early Warning Technology for Internet Worms
XIE Feng;MENG Qing-fa
..............page:14-16
Review on Blind Watermarking Against Geometric Attack
GENG Min;LI En-ping;LIANG Hua-qing
..............page:11-13
Survey of Ubiquitous Personalized Multimedia Service Technology
YU Zhi-wen;ZHOU Xing-she;YU Zhi-yong
..............page:6-10
Review Study on Mobile Commerce
HUANG Wei;WANG Run-xiao;SHI Nan;WANG Dong-bo
..............page:4-5,32