Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Applications and Software
1000-386X
2006 Issue 3
A NEW SKELETONIZATION ALGORITHM BASED ON REGULATED MORPHOLOGY
Yan Qisheng;Wang Shitong
..............page:116-117,136
THE ANALYSIS OF THE SECURITY OF ACCESS USED IN IIS
Shao Chun;Huang Shangteng
..............page:118-119,136
A ROBUST ALGORITHM OF IMAGE CORNER DETECTION BASED ON THINNING EDGES
Zou Qiongbing;Zhou Dongxiang;Cai Xuanping
..............page:110-112
AN IMPROVED QUICK SEARCH ALGORITHM FOR STRING MATCHING
Li Xuemei;Dai Liuling;Tong Xinhai;Wang Xiong
..............page:108-109,130
AN ALGORITHM CONCERNED DYNAMIC DISCOVERY OF WEB SERVICES BASED ON ONTOLOGY
Zhang Yiwen;Wang Hao
..............page:105-107
A CO-EVOLUTION PSO-BASED ALGORITHM APPLIED TO THE LEARNING OF CLASSIFIER
Dai Hongtao;Wang Xiaoping
..............page:103-104,107
AN IMPROVED METHOD OF DEVELOPING ASP.NET SERVER COMPONENTS
Wu Ji;Gu Jingwen
..............page:33-35
THE METHODS AND DESIGN PATTERNS OF OO
Yang Liping
..............page:36-38,91
THE OBJECT_ORIENTED PROPERTY OF JAVA VIRTUAL MACHINE
Zhang Guangmin;Pan Xiping;Tu Jie
..............page:39-41
DESIGN AND IMPLEMENTATION OF THREE PARTIES FTP SYSTEM BASED ON WEB SERVICE
Zhang Hongtao;Zheng Qilong;Zhang Hong;Yao Zhen;Xu Yinlong;Yao Zaiyong
..............page:42-44,53
A P2P MODEL BASED ON POWER-LAW
Yu Hao;Yu Feng;Zhang Zhongneng
..............page:45-48
IMPLEMENTATION OF ODM BASED ON MVC FRAMEWORK
Xiao Yu;Weng Huiyu
..............page:49-50,75
IP FAX TECHNOLOGY AND THE STUDY ON ITS SECURITY
Cui Yeqin;Gao Jianguo;Liu Yugui
..............page:120-122
MASTER AND USE SNORT TOOLS FOR INTRUSION DETECTION
Li Xiaofang;Yao Yuan
..............page:123-124,141
ECC-BASED AUTHENTICATION AND KEY AGREEMENT PROTOCOL FOR MOBILE COMMUNICATION
Deng Fangmin;Xu Chunxiang;Zhang Juan
..............page:125-126,130
RESEARCH ON SECURITY OF WIRELESS JAVA BASED ON CLDC
Yang Jianqiang;Chen Tianhuang;Yuan Lei
..............page:127-130
AMBIGUITY ELIMINATOR NIDS
Wei Shuxi;Luo Junzhou
..............page:131-133
RESEARCH ON PATTERN CLASSIFICATION OF DCG BASED ON NN
Wang Jinjun;Jin Dengnan
..............page:83-85
THE TOPOLOGICAL DATA INTERCOMMUNICATION AMONG SYSTEMS REALIZED BY VC++
Huang Nan;Liu Guangchang
..............page:78-80
HIGH-CAPACITY VOIP GATEWAY BOARD DESIGN AND KEY TECHNOLOGY
Chen Shurong;Xu Kaiyu
..............page:76-77,88
A ROUTING PROTOCOL BASED ON CLASSES OF CONCURRENT EVENTS FOR WIRELESS SENSOR NETWORKS
Zeng Ziwei;Su Xiao;Han Peng;Mao Dilin
..............page:72-75
A NEW DATA TRANSMISSION METHOD FOR VOD SYSTEM BASED ON P2P NETWORK
Bai Xiaofei;Sun Jifeng
..............page:71-72,107
AIR FIRE FIGHTING SIMULATION SYSTEM BASED ON DIS
Qin Chaoyong;Yuan Shizhong;Wang Xinghong
..............page:69-70,107
A PARALLEL ASSOCIATION RULE ALGORITHM FOR EARTHQUAKE REGION-CORRELATION
Wu Shaochun;Wu Gengfeng;Wang Wei;Xing Dianyong
..............page:20-21,80
CONSTRUCTION OF THE VIRTUAL EXPERIMENTAL PLATFORM OF ELECTRONIC CIRCUITS BASED ON SPICE
Mao Song;Dong Yabo;Zhu Miaoliang
..............page:17-19
STUDY OF SECURE TECHNIQUES ON REMOTE DATABASE ACCESS AND DATA TRANSMITTING
Hao Liming;Yang Shutang;Lu Songnian
..............page:15-16,48
COMPONENT AND TRUST DOMAIN BASED SECURITY CONTROL FOR INFO-NET
Wang Yu;Lu Yu
..............page:10-11,41
EXPLORATION IN HOW TO USE SDL TOOLS IN VXWORKS
Yang Kai;Wang Qunsheng
..............page:100-102
STUDY AND IMPROVEMENT OF EMBEDDED OPERATING SYSTEM MEMORY MANAGEMENT MECHANISM
Sun Yihui;Chen Kai;Bai Yingcai
..............page:98-99,115
A FAST ALGORITHM TO DETECTING RUNWAY FROM REMOTE SENSING IMAGES
Ying Long;Song Haina;Su Yi
..............page:94-97
IMAGE RETRIEVAL SYSTEMS BASED ON DATA HIDING
Zheng Qiumei;Sun Xuhua
..............page:92-93
VIDEO IMAGE STABILIZATION BASED ON DIAMOND SEARCH MOTION ESTIMATION
Zhu Lei;Xia Yuren
..............page:89-91
RESEARCH ON INTERVAL-VALUED PRODUCTION RULE AND FUZZY REASONING METHOD
Liu Daohua;Yuan Sicong;Yang Kai;Wang Fazhan
..............page:86-88
DISTANCE FUNCTIONS OF ASSOCIATION RULE BASED ON TAXONOMY INFORMATION
Liang Min;Ruan Beijun;Zhu Yangyong
..............page:7-9,14
THE RESEARCH AND APPLICATION OF SYSTEM CALL REDIRECTION
Xie Jinbin;Wang Chen;Zhang Shensheng
..............page:4-6
INTELLIGENT DETECTION SYSTEM OF SLEEP APNEA SYNDROME BASED ON BP NETWORK
Pan Junjun;Zhang Yanning;Luo Gang;Zhang Jinnong
..............page:64-66
THE DESIGN OF THE PLC NETWORK CONTROL SYSTEM OF FIELDBUS-BASED AND CONFIGURATION SOFTWARE
Shi Yiping;Zhao Minyuan;Liu Qizhong;Bai Yingcai
..............page:31-32
THE CALCULATION OF THE GLOBAL TRUNCATION ERROR BOUNDS OF EULER METHOD
Zhong Lanxiang;Zhang Wanxu;Song Yongming
..............page:137-138
DESIGN AND REALIZATION OF LONG-PLAYING REAL-TIME AUDIO TRANSFER
Li Guodong;Huang Chuan;Li Li
..............page:142-144
A GRAPHIC DESCRIPTION APPROACH FOR CORBA ARCHITECTURE
Chen Yi;Cao Min
..............page:28-30
APPLICATION OF BIST IN THE EMBEDDED SOFTWARE TEST
Ling Lianghe;Ding Zhigang;Zong Yuwei
..............page:25-27,91
RESEACH OF SCHEDULING INPUT-QUEUE ALGORITHMS WITH CROSSBAR
Wei Lihua;Tang Yuhua
..............page:22-24,66
A MULTI AGENT BASED ELECTRONIC DOCUMENT EXCHANGE SYSTEM
Deng Jiewen;Guo Heqing
..............page:54-55,97
SECURITY DESIGN OF E-GOVERNMENT BASED ON SOFTWARE AGENTS
Su Jindian;Guo Heqing;Gao Ying
..............page:56-58
FAULT-TOLERANT REAL-TIME COOPERATIVE EDITING SYSTEMS
Wang Shubin;Zhu Fei;Lu Qiang
..............page:61-63
THE SECURITY RESEARCH OF MOBILE AGENT APPLICATION FOR MOBILE DEVICE
Mu Hong;Wang Ruchuan;Xu Xiaolong
..............page:1-3,63