Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2006 Issue 11
Simulation of Reliability Index about ELS3
HAN Jing-ti;QIN Zheng;XU Ying-kai
..............page:134-136
Info Entropy-based Incremental Construction of Reduced Concept Lattice
CHENG Wei;LI Yun;CHEN Ling;XIE Cui-hua
..............page:131-133
Decision Support System for Grain Inventory Updating By Turns Based on Decision-Tree Method
YU Hai-hong;SUN Ji-gui;LI Ze-hai;SUN Guo
..............page:128-130,140
Rock Fracture Width Measurement Method Based on Corner Segment Algorithm
ZHAO Fang;WANG Wei-xing;JIN Wen-biao
..............page:137-140
Research on Active Network Defence Technology Based on Deception
WU Xin;HUANG Hao
..............page:92-95
Two Direction S-Rough Sets of Incomplete Information System Based on SPA
ZHANG Chun-ying;LIU Bao-xiang
..............page:96-98
Criterion Architecture for IDS Evaluation
JIANG Shao-hua;HU Hua-ping
..............page:99-101
Research and Design of Trust Model for Asynchronous Mobile Ad hoc Networks
LI Ke;JIANG Li;JIANG Ze-jun;WANG Li-fang
..............page:102-104,108
Design Mobile Commerce Security Project by Technology of J2ME and XML
LI Yong-gang;ZHOU Xiao-fei;XU Ming
..............page:105-108
Study on Security Vulnerability of IPv6
LI Zhen-qiang;ZHAO Xiao-yu;MA Yan
..............page:109-112
Design and Implementation of Mobile Data Collecting and Processing System Based on Bluetooth Technology
HE Ji;LI Xiao-an;DUAN Wei-jun;ZHANG Qian;ZHANG Meng
..............page:196-198
Research of Interoperability Test for Web Service Description
FENG Zai-wen;LIANG Peng;LIU Ying;WU Zhong-hai;HE Ke-qing
..............page:191-195
Research of Intelligent Navigation Mark Control System Based on GPRS/GPS/GIS
CAO Jian-zhong;LUO Fei;CHEN Jian-ming;GAO Yue-fang
..............page:189-190,195
Design of Single Relation Query Oriented ODBC Interface with Semantic Cache
LI Fei-long;WANG Jian-min;YE Xiao-jun
..............page:186-188
Efficient Key Management Scheme for Mobile IP Multicast
ZHAO Hui-min;ZHOU Xian-wei;YANG Jun
..............page:123-125
New Frame of Distributed Integrated Defend System
LIU Yang-qi;LU Xian-liang
..............page:121-122,125
P2P Model and Its Application in B2B EC Resource Management
XU Boyi;JIANG Li-hong;YING Li-zhu
..............page:141-142,151
Design of NN-PID Controller Based on PSO and Its FPGA Implementation
BAI Rui-lin;WANG Li-feng;WANG Jian
..............page:143-145
Mechanism of XML Information Retrieval and Optimizing Based on Ontology
HUANG Yuan-lin;HUANG Yi
..............page:146-148
Algorithm of Dynamic Vehicle Routing Base on Microscopic Traffic Model
GU Guo-min;WANG Wei-hong;LI Yan-yan
..............page:149-151
Research and Implementation of ASP Application Security Based on Three-Tier Role Authorization
LI Yan-hua;DING Xiang-qian;SHEN Mei;QIU Xiao-min
..............page:113-115
Research of PnP-PKI
ZHANG Shi-bin;HE Da-ke;LI Xiang-mei
..............page:116-120
Method and Application of Reliability Simulation Using Improved Fault Tree Analysis
YUAN Jing;HU Chang-hua;XU Rui;LONG Yong
..............page:167-169,172
Design and Implementation of Ontology-based Information Retrieval System
FU Yan-ning;JIN Long-fei;WANG Kai-feng;LIU Lei
..............page:155-157
Firewall Traffic Control Based on Network Processor
ZENG Wu;ZHANG Guo-bing;HUANG Hao
..............page:83-86
Efficient Short Signature Scheme
QIN Hui;WANG Shang-ping;LI Min;ZHOU Ke-fu
..............page:80-82
Key Algorithms of Hardware in Remote Meter Reading System Based on Multi-hop Networks
XU Hong-xing;GUO Zhong-wen
..............page:158-159,163
On-line Products Detection System Based on Network
FANG Hong-chao;PENG Xiang-qian;YU Wen-yong;CHEN You-ping
..............page:160-163
Chinese Traditional Medical Clinical Diagnosis for Coronary Heart Disease Based on Bayes Classification
SUN Ya-nan;NING Shi-yong;LU Ming-yu;LU Yu-chang
..............page:164-166
Traitor Tracing Scheme Based on NTRU
YANG Wen-feng;YANG Bo
..............page:87-88,91
Improved Algorithm of BM for Intrusion Detection
XU Cheng;SUN Wei;DAI Zheng-hui;YU Fei
..............page:89-91
DMC-based Dual Closed-loops Control under Internet Environment
LI Hong-yan;WANG Hong;GUI Chao
..............page:214-216
Network Traffic Anomaly Detection Based on Adaptive Filter Theory
LV Jun;LI Xing
..............page:217-219
VoIP System Based on Windows Peer-to-Peer Networking
FAN Xian-long;GUO Chuan-xiong;CHI Xue-bin
..............page:220-223
Advanced Dependable Grids
LIAO Kai;ZHANG Lai-shun
..............page:224-225,229
Design and Implementation of Computing Biogrid
XIAO Guo-rong;LUO Zhi-gang;ZHU Wei-lin;GUO Hua-yuan;LIU Zhi-fang
..............page:226-229
Reference View Selection Method Based on View Similarity
DONG Hai-tao;YU Mei;JIANG Gang-yi;WANG Rang-ding;YE Xien
..............page:234-235,238
New Approach to Eliminate False Minutiae in Thinned Fingerprint Image
LIU Ling-li;LI Li-juan
..............page:239-240,243
Two Methods of Using Delphi to Process JPEG Image Data in SQL Server 2000 Database
WANG Yan-fang;ZHANG Bin;LI Guo-xia;ZHAO Wei-juan;XIE Jian-zhong
..............page:244-245,254
Research on 3D Modeling Based on HOOPS Interface Technology
YAO Kun;LIU Xi-yu;LI Fei-fei
..............page:246-248
Research on Component-based Domain-specific Framework for Software Mass Customization
XU Jun;XIAO Gang;ZHANG Yuan-ming;GAO Fei
..............page:62-64
Research of Real-time VODBased on Middleware
QIN Qian-jiang;YU Zhan-wu;PAN Shao-ming
..............page:59-61
Dynamic Grid-based Method Research in Data Distributed Management
DOU Zhi-wu;DENG Gui-shi
..............page:56-58,70
Research and Design of SAR Image Automatic Target Recognition System
YUAN Li-hai;SONG Jian-she;XUE Wen-tong;ZHAO Wei-zhou
..............page:249-251
Two Approaches for 3D Reconstruction of Free-form Curves Based on BSC-spline Curves and Cubic Spline Curves
ZHAO Yan-li;WANG Zhan;GUO Cheng-hao;LIU Feng-yu
..............page:252-254
Face Feature Points Extraction Based on Refined ASM
HOU Yun-shu;FU Zhong-hua;ZHANG Yan-ning;ZHAO Rong-chun
..............page:255-257
Hardware Designs for Linear Algebra of Number Field Sieve
LIU Hai-bo;WANG Xin-mei
..............page:52-55
Performance Analysis of Random Access Algorithm with Power Capture
WANG Jin-song;LIU Bo;ZHOU We-nan;SONG Jun-de
..............page:50-51,55
Gait Detection and Recognition Based on Adaptive Background Model
WANG Xiao-mei;WANG Yang-li;NIU Ping-hong
..............page:258-260
CLOSET+:Improved Algorithm Based on CLOSET
YANG Min;ZHU Fu-xi;LIU Xiao-li;YU Yong-hong
..............page:43-46
Simple Method of 3D Information Acquisition Based on Stripe Scan Using Structured Light
YAO Ting-ting;MA Li-zhuang;YAO Li;ZHENG Zuo-yong
..............page:41-42,98
Study on Indoor Localization Model under Ubiquitous Computing
LONG Cheng-zhi;XIONG Yin;MA Yu-qiu;SHEN Shu-qun
..............page:38-40
New Method of Dispelling Absurdities of Dempster-Shafer's Rule of Combination
CHEN Zeng-ming;LIANG Chang-yong;JIANG Cui-qing;SHEN Lei
..............page:34-37
Style Studies of Software Connector
YE Jun-min;PENG Bo-tao;ZHENG Yan-yan
..............page:31-33
Search Engine Technology Based on Data Mining
YAO Quan-zhu;ZHANG Jie
..............page:29-30
Knowledge-based Search Algorithm for Tube Bending Interference Avoidance
ZHAO Feng;HE Wei-ping;QIN Zhong-bao;ZHANG Wei
..............page:65-67
Requirement Driven Approach for Building Semantic Model
ZHANG Chao;ZHANG Shu-sheng;ZHOU Jing-tao;ZHAO Han
..............page:27-28,30
Algorithm of Frequent Itemsets Mining Based on Upper Triangular Itemsets Matrix
HUANG Long-jun;DUAN Long-zhen;ZHANG Zhi-ming
..............page:25-26,40
Development Method of Domain Ontology Based on Reverse Engineering
YU Chang-rui;WANG Hong-wei;JIANG Fu
..............page:22-24
Overbooking Model of Ocean Shipping Container Revenue Management
LI Bing-zhou;WU Zhen-ye;YE Zi-rong
..............page:19-21
Study on Multi-Unit Logic Combination Decision of Concepts
ZHANG Yun-liang
..............page:15-18,21
Research on Testing Strategies and Methods for Java Multithread
ZHANG Xue-ping;BAO Dan;WANG Jia-yao
..............page:12-14
Survey of Artificial Emotion
WANG Guo-jiang;WANG Zhi-liang;YANG Guo-liang;WANG Yu-jie;CHEN Feng-jun
..............page:7-11
Overview of Generalized Artificial Life
MENG Xian-yu;TU Xu-yan
..............page:4-6,11
Analysis on Motion Estimation Based on Mesh
QU Xin;YU Ming;ZHU Qing-wen;YAO Min
..............page:47-49
Comparison of Some Classical Similarity Measures
LIU Bao-sheng;YAN Li-ping;ZHOU Dong-hua
..............page:1-3
Quick Disaster Recover Method
WANG Zhi-ming;LI Tao;LIU Ying-na;ZHAO Kui;SHEN Hong-min;XIANG Jing
..............page:78-79,82
Study of Application Framework Extension Mechanisms Based on Component
MA Zhen-hua;YANG He-biao;ZHANG Zhen-bo
..............page:74-77
Cache Replacement Algorithm for Hybrid P2P Media Streaming
YANG Chuan-dong;YU Zhen-wei;WANG Xing-gang
..............page:71-73
Study on Design of Emergency Preparedness and Response System of Urban Pollution Source
ZOU Zhi-wen;JU Shi-guang;YAO Ji-cheng;XUE An-rong
..............page:68-70
Analysis of Micali's Fair Contract Signing Protocol
WANG Zhi-ling;ZHANG Yu-qing;YANG Bo
..............page:201-204
Real-time Audio & Video Communication Based on Java Media Framework
TIAN Jing-bei;BIE Hong-xia
..............page:205-207
On PDFF Rate-based Congestion Control Scheme in High-Speed Computer Communication Networks
ZHAO Fu-zhe;ZHAN Xiao-li;GUO Ya-jun;YI Ben-shun
..............page:208-211
Research of Not Refurbishing and Updating Data Method in AJAX Web Application
LV Lin-tao;WAN Jing-hua;ZHOU Hong-fang
..............page:199-200,223
Implementation of Real-time Fault-detection Mechanism in PVM
ZHANG Guo-ping;XIA Xue-zhi;TU Kui;WAN Wen-fu
..............page:183-185,188
Research and Design on Budget MIS Access Control Policy
WANG Wen-zhan;FU Li-zheng
..............page:180-182
Improved Project for Chinese Word Segmentation under Internet Environment
ZHANG Bo;JIANG Jian-guo;WAN Ping-guo
..............page:176-179
Research and Implementation of Telecommunication-Faced Shared Information and Data Model
HOU Cheng;SHI Yin-long;LI Ke-feng
..............page:173-175,179