Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Applications and Software
1000-386X
2006 Issue 4
SEMANTIC NETWORK KNOWLEDGE REPRESENTATION BASED ON ATTRIBUTE PETRI NET
Zhou Ruqi;Meng Yueping;Chen Changpin;Luo Yinghui
..............page:78-80,131
DESIGN AND IMPLEMENT ATION OF BUSINESS SYSTEM BASED ON SUN ONE PLATFORM
Xia Biyu;Liu Guangchang
..............page:81-82,131
A METHOD OF CONSTRUCT ISOLINE FOR GEOLOGICAL STRUCTURE
Chen Yonghui;Lu Detang;Huang Feng
..............page:83-84,119
THE IMPLEMENTATION OF P2P NETWORK MODEL USING JAVA
Cai Xiong;Miao Huaikou
..............page:76-77
A STUDY ON PHASE REGULATION OF TRAFFIC SIGNAL CONTROL BASED ON PETRI NETS
Wang Ruozheng;Cao Liming;Wang Xiaoping
..............page:71-72,97
DESIGN AND IMPLEMENTATION OF EQUIPMENT MANAGEMENT SYSTEM BASED ON MIDDLEWARE
Wang Yonghong;Wang Zhijian;Ai Ping
..............page:66-68,125
RESEARCH ON APPLICATION OF DDDS ALGORITHM FOR ENUM SYSTEM
Hong Li;Wang Shunye;Zhang Yang
..............page:63-65
THE STUDY AND IMPLEMENTATION OF A P2P-BASED STREAMING SYSTEM
Dong Xiaojian;Wang Yinjiang;Zhou Qiang;Ling Li
..............page:41-43
STRUCTURE ANALYSIS OF JAVA CLASS FILE AND ITS VERIFICATION
Ni Guojun;Pan Xiping;Song Tao
..............page:51-53,86
THE STUDY OF BATTLEFIELD AWARENESS AND DATA DISSEMINATION SYSTEM
Huang Jianhua;Zhu Cailian
..............page:54-55,77
RESEARCH OF DATA PERSISTENCY IN J2EE
Xu Changsheng;Dai Chao;Xie li
..............page:56-57,75
A CONSTRAINT USER-BASED WORKFLOW AUTHORIZATION MODEL
Huang Xiaoyu;Zhong Huiling;Bi Lingyan
..............page:58-59
A MATRIX CONTROL MECHANISM FOR CONGESTION CONTROL IN WIRELESS SENSOR NETWORKS
Chen Haiguang;Gu Gangfeng
..............page:60-62
SHORT MESSAGE REAL-TIME PARALLEL SENDING ALGORITHM BASED ON THREAD
Fang Yonglong;Zhou Shumin
..............page:87-89
ELECTROMAGNETIC CATAPULT'S SIMULATION WITH THE FINITE ELEMENT METHOD BASED ON ANSOFT
Zhao Keyi;Li Zhiyuan;Yang Qiuxue;Lv Qing-ao;Liu Bin
..............page:132-133
APPLICATION OF MSCOMM AND MULTI-THREAD IN DATA ACQUISITION SYSTEM
Wang Jianxin;Yan Jun;Zeng Yonghua;Zhang Shu
..............page:134-136
DESIGN AND ANALYSIS CONTROLER OF LINEAR FUZZY PID
Maimaitireyimu Abulizi
..............page:137-138,144
A FAST RECONSTRUCTION ALGORITHM OF ARTERY BASED ON GEOMETRY FEATURE
Pan Junjun;Zhang Yanning;Zhao Rongchun;Cui Changcong
..............page:90-92,102
A LOAD-BALANCED AND ENERGY-AWARE ROUTING METHOD FOR MOBILE AD HOC NETWORKS
Wang Wei;Zhang Liang;Cheng Mingding
..............page:93-94,141
THE ALGORITHM FOR ATTRIBUTED GRAMMAR EVALUATOR BASED ON LR ANALYSIS AND BACKFILLING TECHNIQUE
Wang Qianghua;Zhou Mingquan;Geng Guohua
..............page:100-102
DENIABLE AUTHENTICATION SCHEME FOR SECRET COMMUNICATION
Cheng Jicheng;Yang Shoubao
..............page:103-104
A HIGH ROBUST GRAY LEVEL WATERMARKING SCHEME ON THE DWT DOMAIN
Li Fang;Luo Ping;Wang Daoshun
..............page:1-2,16
RECOGNITION OF WOOD DEFECTION BASED ON SUPPORT VECTOR MACHINE
Ye Ning;Wang Houli;Xu Zhaojun;Ding Jianwen
..............page:3-5
A NEW IMAGE DE-NOISING METHOD BASED ON MULTI-WAVELET
Dong Weijun;Zhou Mingquan;Geng Guohua
..............page:6-7,136
RESEARCH ON MULTICAST ROUTING PROTOCOLS FOR AD HOC NETWORKS: SITUATIONS,ISSUES AND TRENDS
Guo Yonghong;Li Guangsheng;Mao Qirong;Zhan Yongzhao
..............page:8-10,65
RESEARCH ON INTERNET INFORMATION HARVESTING
Liu Yan;Luo Junyong;Wang Qingxian;Chang Bin
..............page:13-16
NETWORK COMMUNICATION BETWEEN DIFFER FLATS FOR POLOIDAL FIELD POWER SUPPLY CONTROL SYSTEM OF HT-7U
Chen Feiyun;Weng Peide;Fu Peng;Long Feng
..............page:17-18,62
DESIGN AND IMPLEMENTATION OF GROUP SECURE COOPERATIVE MULTI-SESSION SYSTEM
Xuan Wenxia;Dou Wenfeng;Chen Hui
..............page:21-22,112
AN IMPROVED DYADIC WAVELET TRANSFORM IMAGE DE-NOISING
Han Liping;Zhang Wenmei;Yin Wangbao
..............page:23-24
RESEARCH ON THE METHOD OF GDSS MODEL MANAGEMENT BASED ON SEMANTIC WEB AND RBAC STRATEGY
Guo Xiaoyan;Chen Maogou;Wang Shufeng;Wu Gengfeng
..............page:25-26,89
THE RESEARCH ON SOFTWARE ARCHITECTURE RECOVERY BASED ON PATTERN MATCHING
Yang Qing;Zhang Liping
..............page:27-29,107
RESEARCH ON AUTOMATED SOFTWARE TESTING BASED ON UML
Huang Long;Yu Hongmin;Chen Zhiming
..............page:30-31,116
AN INITIAL EXPLORATION OF THE MINE SCENE SIMULATION TECHNIQUE
Fu Yongming;Wang Yunjia
..............page:34-36,59
RESEARCH FOR THE UNIVERSITY INFORMATION SYSTEM SHARING BASED ON GRID SERVICES
Wang Wei;Zheng Yanheng
..............page:37-38,75
A ROBUSTNESS DIGITAL WATERMARKING SCHEME BASED ON HVS AND MFMD
Shen Jiahua;Yang Mingfu
..............page:105-107
A DESIGN FOR CERTIFICATES AND PRIVATE KEYS ROAM SYSTEM
Jia Zhongtian;Li Daxing
..............page:108-109,122
SECURE APPLICATION AND RESEARCH OF WIRELESS MOBILE COMMERCE BASED ON J2ME
Yang Xiong;Zhao Yuandong
..............page:110-112
A FRAMEWORK FOR DISTRIBUTED COOPERATIVE UPDATE ON XML DATA
Yao Liang;Cao Liming;Wang Xiaoping
..............page:113-116
DESIGN AND IMPLEMENTATION OF A SIMPLE SNIFFER BASED ON ROW SOCKET
Qiu Ju;Chen Ruoshan
..............page:117-119
MODELING NETWORK INTRUSION DETECTION USING ROUGH SET DATA MINING AND ENSEMBLE LEARNING
Wang Yanfang;Zhang Lianhua;Bai Yingcai
..............page:120-122
BUILDING A MYSQL MEMBERSHIP PROVIDER FOR WHIDBEY
Gong Chibing
..............page:123-125
GREY SYSTEM THEORY RESEARCH AND ITS APPLICATION IN PATENT FORECAST
Xu Jin;Wang Yinglin
..............page:126-128
RESEARCH FOR DETECTING AND TRACKING OF HUMAN MOTION TARGET IN VIDEO-BASED SEQUENCES
Wei Juanli;Zhai Sheping;Wang Wancheng
..............page:139-141
IMPLEMENTATION OF J2EE BASED ASP PLATFORM
Liu Ming;Jiang Chaohui;Li Yanhua;Xie Yuefang
..............page:142-144