Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2006 Issue 6
Prosody Model for Mandarin Text-to-Speech System
WANG Zhi-wei;SHAO Yan-qiu;ZHAO Yong-zhen;LIU Ting
..............page:79-81,104
Research on Replica Management of Disaster Recover System Based on Cluster Server
WU Lu;LI Wei-hua;LI Zhong-hua
..............page:76-78
Handwritten Digit Recognition Method Based on Combination Features
XIA Guo-en;JIN Wei-dong;ZHANG Ge-xiang
..............page:170-172
Multi-resolution Model Construction Method Based on Half-edge Collapse
CHEN Jing;LIU Xu-min;FAN Yan-ge
..............page:173-176
Methods for Enhancing ATPG Efficiency of Dynamic Current Testing
ZHANG Xin;KUANG Ji-shun
..............page:82-84
Optimized Block Cipher Mode of Operation
WEN Feng-tong;WU Wen-ling;WEN Qiao-yan
..............page:102-104
Combined Analysis Method for Security Protocols
CHEN Qiang;HUANG Lian-sheng;ZHAO Xiu-wen
..............page:105-107,155
Threshold Group Signature Scheme Based on Williams Scheme
LIU Feng;ZHANG Jian-zhong
..............page:108-109
UDDI Access Control for Virtual Enterprise
GONG Wen-fang
..............page:110-113
Accessing XML Data with LDAP
CUI Zhi-gang;ZHANG Wen-kai;CAO Yuan-da;TAN Yu-an
..............page:114-115
Design of Security Scheme in Videoconferencing System Based on Selective Source Encryption
LI Wei;XU Zheng-quan;XU Yan-yan;YAO Ye
..............page:129-132
Dynamic Password Authentication Based on Event-synchronous and Challenge/Response Technology
LIU Zhi-gui;ZANG Ai-jun;LU Rong-jie;ZHENG Xiao-hong
..............page:133-134
LSM Framework Research and Implementation of Security Logging
ZHANG Hao;LIU Nai-qi
..............page:135-137
Lawful Interception Architecture of GSM
YANG Zhong-xiu;PING Ling-di;PAN Xue-zeng
..............page:138-140
Research on Visualization of 3D Geological Body Using Direct Volume Rendering
YIN Hao;DAI Guang-ming;HONG Xiong
..............page:162-164
Image Encryption Means Based on Rijndael
CHEN Qiao-lin;LIAO Xiao-feng;CAO Chang-xiu;LUO Pu
..............page:165-166
Study and Realization of Content-based Web Retrieval System for Wallpaper
WANG Yong-liang;CHEN Xin-du;LIU Qiang;CHEN Xin
..............page:167-169,172
New High-speed Scanline Algorithm for Filling 8-adjacent Connection Area
LIU Wan-chun;LIU Jian-jun;ZHU Yu-wen;CHEN Xiao-chun
..............page:177-179
Geometric Data Transfer Method for Privacy Preservation in Clustering Data Mining
HUANG Wei-wei;BAI Wen-yang
..............page:180-181,184
Latency Analysis of an Improved Floating-point Fused Multiply-add
JIN Zhan-peng;SHEN Xu-bang;TIAN Fang-fang
..............page:85-87,120
Research of J2EE-based Workflow Management System
LI Hong;ZHANG Yong-jin;WANG Liang
..............page:90-92
Research and Design of Transport Protocol in Disaster-tolerate System RPR
LING Zong-hu;LI Xian-guo;LIANG Yong
..............page:93-95
Convergence Analysis of Clonal Selection Algorithm
YU Ying;HOU Chao-zhen
..............page:96-98
Model of Security Policy Selection Based on Utility
PENG Jun-hao;XU Guo-ai;YANG Yi-xian
..............page:99-101
Search Method of Semantic Web-based Networked Manufacturing Resources
FAN Li-lin;WANG Xiao-dong;QU Xi-long
..............page:182-184
Recognition Method of TCM Pulse-Conditions Based on Wavelet Packet Analysis and BP Neural Networks
GUO Hong-xia;WANG Bing-he;ZHANG Li-qiong;SHI Yi-min
..............page:185-187
NN Knowledge Based to TCM Tongue Diagnosis Eight Principal Syndromes
WU Yun;ZHOU Chang-le;ZHANG Zhi-feng
..............page:188-189,198
Heterogeneous Data Source Synchronization with SyncML
LI Xin-hui;HOU Zi-feng;HE Zhi-qiang
..............page:190-192,195
Designing of Synchronization System in Mobile DBMA
JING Shu-feng;ZHONG Xi-chang;ZHANG Ni
..............page:193-195
Secure Threshold Group Signature Scheme
HUANG Mei-juan;ZHANG Jian-zhong
..............page:116-117
Research on Energy-awareness of Wireless Sensor Networks Based on Network Layer
DU Ke-jun;ZHOU Xing-she;LI Zhi-gang
..............page:74-75,137
Power Management Analysis in Energy-aware Real-time Systems
XING Jing-yu;ZHANG Li-chen
..............page:71-73
Research on Algorithm of Text Watermarking Based on Understanding Semantic Incompletely
ZHAO Min-zhi;SUN Xing-ming;XIANG Hua-zheng
..............page:118-120
Mining Frequent Patterns in Network Intrusion Detection
ZHAO Guan-jun;DING Hong;WANG Ze
..............page:121-123
Security Issues of Softswitch-based Clustered Multimedia Server and Solutions
XU Peng;LIAO Jian-xin;WU Nai-xing;MA Xu-tao
..............page:124-126,140
Improved Scheme for One-time Password Authentication
GAO Xue;ZHANG Huan-guo;SUN Xiao-mei
..............page:127-128,132
Remote Monitoring System Based on ARM and GPRS Network
JI Wei-ping;LUO Fei;CAO Jian-zhong;CHENG Xin-hui
..............page:196-198
Real-time Diagnosing Platform for Distributed OSEK-compliant System on Vehicle
HUANG Dong;SUN Xiao-min
..............page:199-201,204
Application of BP Neural Networks to Fault Diagnosis of Turbocharging System of Diesel Engine
SUN Xin;DING Xiang-qian;SHI Shuo
..............page:202-204
Research on Simulation of 3D Motion for 6-DOF Manipulator
CHEN You-ping;MA Zhi-yan;YUAN Chu-ming;ZHOU Zu-de
..............page:205-207
Design and Implementation of Pen-based Interface Design Tool Based on Scenario Design Method
HAN Shuang-huan;TIAN Feng;DAI Guo-zhong
..............page:208-210,213
WebTextMiner:Chinese WebTextMining System
WEI Song;ZHONG Yi-xin;WANG Xiang-ying
..............page:211-213
University Human Resource Web Site with Automatic Matching and Audio/Video Communication Functions
ZHANG Zhong-sheng;HUANG Dong-jun
..............page:214-215,218
Implementation of Authority Management in Multi-view ASP System
CHEN Hui;CHEN Xin-du;LIU Qiang;CHEN Xin
..............page:216-218
Research and Design of Extensible Knowledge Database Model Applied to Intelligent Chinese Search Engine
RAO Yi-ning;LIU Qiang;DU Xiao-li;YE Peng
..............page:223-226
Relationship of Universal Operation Model in Universal Logic
LUO Min-xia;HE Hua-can;MA Ying-cang
..............page:26-27,44
Research and Design of P2P-based Live Media Streaming System
HAN Jun-wei;WANG Shao-feng
..............page:227-229
Measurement Method of Gnutella-Like Peer-to-Peer Network
LIU Gang;FANG Bin-xing;HU Ming-zeng;ZHANG Hong-li
..............page:230-232
Research on FPGA-based VPN Security Gateway Design
KE Xiang-dong;HUANG Jian-hua
..............page:233-235
Real-time Traffic Capturing and Information Extracting of Raw Traffic Data Based on LIBPCAP
HU Wen-jing;LI Ming;LIU Jin-gao
..............page:236-238,241
Wireless Embedded Home Gateway in Smart Home System
QIN Bo;WANG Lin;SHAO Feng-jing;YU Lei
..............page:239-241
Research and Implementation for H.323 NAT Traversal
WANG Zhi-bing;CHUI Hui-juan;TANG Kun
..............page:242-244
Design and Implementation of Network Model Based on Multiplexing of TCP
DOU Ling-yun;LU Xian-liang;DUAN Han-cong
..............page:245-247
Application Service System Apply in Agent and CORBA
CAI Rui;HE Yan-xiang;PENG Min;WEI Fu-ru
..............page:248-250
Research of Border Routing Technique for Broadband Satellite Networks
YANG Fa-yi;ZHAO Jun-suo;BAI Jian-jun
..............page:251-253,257
On SCP Overload Control of Mobile Intelligent Network in Multi-service Environment
ZHANG Qi-zhi;LIAO Jian-xin;MA Xu-tao;LEI Zheng-xiong
..............page:254-257
Research on Application of Network Processor in Network Simulation and Test
WANG Jing-yu;ZHU Xiao-min;LIAO Jiao-xin
..............page:258-260
tou gao xu zhi
..............page:封三
Electromagnetism-like Mechanism with Its Application
WANG Xiao-juan;GAO Liang;CHEN Ya-zhou
..............page:67-70
Slope-based Elimination Multi-Objective Evolutionary Algorithm
ZHENG Bin-bin;LI Yuan-xiang
..............page:64-66
Application Research of Intelligent Multi-Agent Technology in Spline Finite Strip Method
LI Guo-chang;LIU Cai;JIA Guang-min
..............page:62-63
Distributed Multi-sensor Track Fusion Algorithm Based on Dynamic Weight
HU Zhen-tao;LIU Xian-xing
..............page:59-61
Program Control Structure Generation Algorithm for Compiling Optimization Testing
ZHU Dan-feng;ZHAO Chen;CHEN Wei
..............page:55-58
Possibility Fuzzy Clustering Approach with Weighted Features
LUO Jian-jun;GUAN Tao;FENG Bo-qin
..............page:52-54
Research on Trust-based Access Control Model for Grid Computing
WANG Dong-an;ZHANG Fang-zhou;NAN Kai;YAN Bao-ping
..............page:49-51,54
Table-driven Technique for Code Selection with SIMD Instruction
ZHAO Chang-zhi;LIU Chun-lin;HU Ding-lei;Chen Shu-ming
..............page:45-48
Response Time Computation for Preemptive Threshold Scheduling of Periodic Tasks' Requests
BIN Xue-lian;YANG Yu-hai;BIN Ya;JIN Shi-yao
..............page:41-44
Grid Resources Optimization Strategy Based on Utility Function
CHEN Dong-e;YANG Yang;LIU Li
..............page:38-40
Research on Spyware and Security Technology of Privacy Information on Internet
HU Zhong-wang;LIU Wei-dong
..............page:144-147
On Detection of Dominant Points on Curves of Object Contour
LIU Yong-kui;LIU Xiang-dong;WANG Chun-xia
..............page:148-152
Method for Segmenting Local Regions in Texture Image
XUE Lian-feng;LIU Yun-fei
..............page:153-155
Application of Bitmap Method in Electrical Impedance Tomography
LIU Xiao-dong;YANG Guo-sheng;DONG Xiu-zhen;FU Feng;SHUAI Wan-jun;XU Can-hua;ZHEN Cheng
..............page:156-157
Hole-filling Method for Reconstruction of Triangular Mesh
CHENG Xin;ZHOU Ming-quan;GENG Guo-hua;LI Chun-long
..............page:158-159,176
Realization of Wavelet Image Manipulation Enhanced Algorithm Based on ADSP
WU Ming-zan;WANG Zhi-gong
..............page:160-161,164
New Method of Design Hierarchical Support Vector Machine Multi-class Classifier
ZHAO Hui;RONG Li-li;LI Xiao
..............page:34-37
Efficient Algorithm to Optimal Set of Uncorrelated Discriminates Vectors
CHEN Fu-bing;WANG Wen-sheng;XIE Yong-hua;YANG Jing-yu
..............page:31-33
Research of Association Rule Hiding Algorithm
DING Xiao-gang;HUANG Wei-wei;BAI Wen-yang
..............page:28-30
Data Mining Technology for DNA Sequence Segmentation
QIU Hong-jun;MAO Guo-jun;LUO Chun-yu
..............page:23-25
Comparative Study on Concurrency Control
XIAO Mei-yang;YE Xiao-jun
..............page:19-22
Study of Security and Privacy Aspects in RFID System
WANG Lian-qiang;LV Shu-wang;HAN Xiao-xi
..............page:16-18
Research and Development on Internet Worm Containment Technology
ZHOU Tao;DAI Guan-zhong;MU De-jun
..............page:13-15,30
Summary of Text Automatic Proofreading Technology
ZHANG Yang-sen;YU Shi-wen
..............page:8-12
Survey of Research on Native XML Databases
FENG Jian-hua;QIAN Qian;LIAO Yu-guo;LI Guo-liang;TA Na;ZHOU Li-zhu
..............page:1-7