Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2006 Issue 3
A Policy-based Intrusion Prevention System
MAO Gong-ping;XIONG Qi-bang
..............page:126-127,130
One Solution for Virtualization of SAN
LUO Bin;LI Shu-you;SONG Bin-heng
..............page:214-215
Research in Hetrogeneous Data Sharing Based on Manufacturing Grid
GUO Xiao-hui;ZHANG Jing;LI Jun-huai
..............page:216-218
Tactics of SQL Remote Query Message Based on Modification Frequency
LIU Guo-qiang;LIU Wei-guo
..............page:219-221
Simulation System of Emergent Water Dispatch Based on Web
MA Wei-gang;KONG Ke;YAO Quan-zhu;XIE Jian-cang
..............page:186-188
Research and Implementation of ASP-based Workflow Management System
SHAO Hong-wei;ZHANG Guo-jun;ZHU Hai-ping
..............page:193-195
Research on 3D Displaying Platform Based on ASP Pattern
LI Jun-yong;WU Lei;CHEN Xin-du;ZHUANG Lin-yuan;HE Bo
..............page:196-198
Net-based IA Product 3D Digital Customized System Research and Implementation
LU Ling-she;LU Chang-de;YU Sui-huai
..............page:199-201
Design of Uigur Edition Evermore Office: Design of Multiple Language Mix Typography
DONG Jun;XU Chun;LI Xiao;MIAO Cheng
..............page:202-204
A Workflow Management System Supporting Distributed Workflow Model
LI Ning;LIU Hou-quan
..............page:205-207,213
Research of Web Services-based Heterogeneous Databases Integration
PAN Zhe-xin;TONG Li-juan
..............page:208-210
A Method of Web Information Filter Based on Metadata and Ontology
LIU Jin-hong;LU Yu-liang;XIA Yang;ZHANG Min;HU You-zhi
..............page:211-213
Wireless Data Acquisition System Based on GPRS for Heating Net
LU Jian-gang;LU Kui-jun
..............page:222-223
Design and Implementation of Traffic Analysis System
SHEN Hua-lin;ZHANG Hui;XU Tong-ge
..............page:251-253
Research of Security Detection Based on Bayesian Classifiers in Ubiquitous Computing
TAO Li;GUO Cheng-xia;CAO Qi-ying
..............page:128-130
Research of Security Mechanism Based on Policy of Mixed Access Control
WANG Jian-jun;NING Hong;PENG Dai-wen
..............page:131-132,135
Communication Security of 802.11 WLAN
CHEN Yi-tian;LAI NGAI MING
..............page:123-125
Automatic Generation of Network Attack Graph
SUN Liang;LI Dong;ZHANG Tao
..............page:119-122
Design and Implementation of IPSec-based MPLS IP VPN
REN De-ling;WEI Wei
..............page:116-118
Implement Certificates Distribution of CA Based on B/S and C/S Mode
HUANG Rui;LI Tao;WANG Shu-Da;WANG Zhi-ming;DING Yong-lei;LIU Ying-na
..............page:113-115
Design of Intelligent Community Management System Based on MapX
ZHONG Luo;LI Bing;XIA Hong-xia;XU Jun-jie
..............page:111-112,115
Security Control Patterns for Info-Net
WANG Yu;LU Yu
..............page:133-135
Spherical Parameterization of Triangular Meshes and Its Application
LIU Ze-yi;YANG Wei-wei;LIU Xiao-li;PENG Xiang
..............page:138-140,147
A New Segmentation Method for Cells
GUO Ning-ning;ZENG Li-bo;WU Qiong-shui;ZHANG Yan;LIU Qian;CHANG Jing
..............page:141-143
Study of Preprocessing Electronic Map in Oracle Spatial before Searching a Shortest Path
ZHOU Peng;ZHANG Jun;SHI Zhong-ke
..............page:144-147
Adaptive Facial Animation of Speech Synchronization
XU Ying;HE Ben-yang
..............page:148-150
Decompress Image with User's Identity
LI Xiu-zhen
..............page:151-152,177
Medical Image Fusion Algorithm Fitting Human Visual Properties
LV Xiao-qi;ZHANG Bao-hua
..............page:153-154,157
Image Text Location Based on Color Edge and SVM
XU Jian-feng;LI Shao-fa
..............page:155-157
Realization of Image Morphologic Transform Based on Delphi Language Programming
REN Guo-quan;XU Yan-shen;ZHANG Pei-lin
..............page:160-161
Compare Research on Two Classes of 3D Surface Reconstruction Methods Based on Cone Beam Computed Tomography
HUANG Kui-dong;ZHANG Ding-hua;WANG Kai;MAO Hai-peng;LIU Jing
..............page:162-164
Study for Within-Class Average Face Method Based on PCA in Face Recognition
HE Guo-hui;GAN Jun-ying
..............page:165-166,169
A Novel Approach for Camera Self-calibration Based on Parallel Lines
YIN Yan;ZHAO Rong-chun
..............page:170-171
A Scrambling Scheme of Image Based on Semi-space Domain
LI Tao;TIAN Yan;ZHANG Jian;LIU A-jun
..............page:172-174
A Non-traditional Deflection-rectify Algorithm for LPR
JIANG Zhi-hua;CHEN Ji-rong;WANG Wei
..............page:175-177
Use Workflow to Schedule Updating and Maintaining of Data Warehouse
LIU Zhong-wei;CHEN Hong
..............page:178-180
RS Data Extraction Based on IDL and VB
ZHU Yu-wei;SHI Bing;HUANG Yong;JIAO Zhi-yang
..............page:181-182,201
Research on Ration Predetermining Model in Computer Aided Time Quota Ration System Based on Primitives
JIANG Xiao-peng;WANG Run-xiao;GAO Lin;CAO Lan-jing
..............page:183-185
CSCW User Interface Design Based on ALV Model
HE Jia-hang;SHI Wei-feng;XIA Zheng-hua;SONG Xiao-lin
..............page:224-226,230
USB Storage Device Auto-mounting Management and Realization in Linux Kernel
XIE Lian;GU Ming;LIN Guo-en
..............page:227-230
Schema Driven User Interface Generation
PENG Shi-xin;DONG Li
..............page:231-233,253
An Optimized Reflection Technique in Web Application Server
LI Dong-bing;GUO Xiang-feng;CHEN Ning-jiang
..............page:234-236
Research of Timing Constraints Consistency on Web Service Composition
LI Jing-xia;HOU Zi-feng;ZHAO Hui-juan
..............page:237-239
Design and Implementation of Web Information Filtering Arithmetic Based on Mobile Agent Technology
SHI Hao-bin;WEI Tie;LI Wei-hua;WANG Wan-cheng
..............page:240-241,244
Study and Design of Mobile Message Oriented Middleware
ZHU Xin-zhong;XU Zhou-wang;XU Hui-ying
..............page:242-244
Identifying and Tracebacking Short Message Spam
ZHANG Yan;FU Jian-ming
..............page:245-247
A P2P Download Model for Embedded System
WANG Guan-ying;ZHU Gui-lin
..............page:254-256
Study on Technique of Incremental Mining in Telecommunication Network Alarm Databases
SHAN Xin;ZHU Yong-xuan;GUO Jun
..............page:257-260
Study on End-to-End Security Based on TETRA
LI Hui;NIU Xin-xin;YANG Yi-xian;ZHOU Xi-zeng
..............page:108-110
Electronic Business Security Based on Super SET Protocol
ZHANG Guo-quan;SONG Ming-qiu;DENG Gui-shi
..............page:105-107,110
A Security Solution for E-Government Based on Internet
WANG Zhi-ming;LI Tao;HU Xiao-qin;LIU Ying-na;HUANG Rui
..............page:102-104
Design and Implementation of Alert Information Correlation Model
PEI Jin-ze;HU Hua-ping;HUANG Chen-lin
..............page:98-101,104
An Internet Intrusion Detection System Cooperating with Firewall
WANG Li-hui;LI Tao;ZHANG Xiao-ping;YANG Pin;YANG Jie;LIU Sha
..............page:95-97
Research and Implementation of Science Database Metadata Registry System
ZENG Wei;LI Jian-hui
..............page:73-75
A New Method about Sub-health's Diagnose and Inference
WEI Yuke;WANG Ren-huang;LI Jing-bo
..............page:70-72
Resource Modeling Oriented Generalized Manufacturing Capability
HAO Jing-hui;SUN Shu-dong;SHA Quan-you
..............page:60-63
ERP-based Quality-driven Product Development
SHEN Ji-min;TONG Shu-rong;WANG Ke-qin
..............page:17-19
Comparison and Analysis of Several Server-side Scripting Language Based on Web Development
WANG Zhi-jun;SUN Yue-xia;ZHANG Su-qing;WANG Wen-jie
..............page:14-16
Study and Comparison of Congestion Control Algorithms in Wireless Sensor Network
LI Ling;ZHOU Xing-she;LI Shi-ning;LI Zhi-gang;ZHENG Yong
..............page:11-13
Congestion Control Algorithm's Research in High Bandwidth-delay-product Network
LU Li-qiong;CHEN Yuan-yan;WU Dong;LUO Xiao-shu;YAN You-biao
..............page:8-10,59
Research on Vulnerability Database Technology
XU Liang-hua;SHI Hong;MA Jun;ZHU Lu-hua
..............page:5-7
Development and Research of OODB
WANG Gong-ming;GUAN Yong;ZHAO CHUN-jiang;WANG Rui
..............page:1-4,34
Word Sense Disambiguation Algorithm Based on Semantic Information
GONG Yong-en;YUAN Chun-feng;WU Gang-shan
..............page:41-43,52
Instance Learning in Automatic Construction of Domain Ontology
LIU He-huan;LIU Chun-nian
..............page:38-40
Study on Extracting Sub-ontology from Multiple Ontology
LIU Wen-bin;XIE Qiang;ZHANG Lei
..............page:35-37,40
Knowledge Acquisition of Tongue Diagnosis: An Ontology-based Approach
CAO Yu-feng;CAO Cun-gen
..............page:31-34
A Method of Designing Dynamic Multiple Digital Watermarking
TANG Ming;WANG Li-na;ZHANG Huan-guo
..............page:28-30
Research on Signal Extended Methods in Wavelet Transform
YUAN Li-hai;SONG Jian-she
..............page:25-27
Formal Research of Electronic Payment Protocol Based on pi-like Calculus
GU Yong-gen;LI Guo-qiang;WANG Guo-jun
..............page:22-24
Layers of Cooperation Filtering Scheme that Examining Virus and Spamming
QIAN Chang-ming;LU Jing;HUANG Hao
..............page:92-94,97
An Efficient Hierarchical Way of Merging Different Public Key Infrastructures
PAN Heng;LI Jing-feng;ZHU Yue-fei
..............page:89-91
A Fast Algorithm for Median Filtering in Multiform Window
CAO Zhi-hua;SONG Bin-heng
..............page:85-88
A Method for Hardware/Software Partitioning of Embedded System in Two-level
LI Na;FANG Yan-jun;LI Hong
..............page:82-84
Rotation Resilient Watermarking Algorithm Based on Frequency Domain
DING Ying;YUAN Yuan;YUAN Dao-hua;LI Bing-fa
..............page:79-81,84
Topology Description Language for Interconnection Network in Parallel Computer: TOD
LI Qiang-guo;YU Yang;HE Kai;LI Tao;YANG Yu-lu
..............page:76-78
Algorithm of Vector Route Planning Based on Raster Method
WANG Wei-hong;GU Guo-min;QIN Xu-jia;LI Yan-yan
..............page:57-59
Analysis of Generating Statecharts Algorithms from Scenarios
WANG Hong-yuan;ZHANG Ke;ZHANG Jia-chen
..............page:55-56,63
Simulation Study on a Sort of Fault Diagnosis Method of Push-pull Circuits
LUO Zhi-yong;SHI Zhong-ke
..............page:53-54,72
Research and Implementation of LFB in ForCES Architecture
GAO Ming;WANG Wei-ming
..............page:50-52
Characteristic and Application of Convolutional Codes
WEI Qin-fang;WANG Lin;YU Ge-fei;ZHAO Hun-yu
..............page:47-49
Research on Evaluating Structural Similarity between XML Documents
YAN Li-guo;HE Fei
..............page:44-46