Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Applications and Software
1000-386X
2007 Issue 10
DISTRIBUTED NETWORK INTRUSION DETECTION SYSTEM BASED ON MULTI-AGENT
Zhang Hong;Lu Yi
..............page:29-30,71
AN EFFCIENT UNIVERSAL HOLE CUTTING ALGORITHM OF OVERSET GRID
Liu Xin;Lu Linsheng
..............page:26-28,52
A VEHICLE-CANDIDATES VIDEO DETECTION METHOD BASED ON SEGMENTATION OF COLOR ROAD AREA
Chen Zhaoxue;Guoming;Shi Pengfei
..............page:31-33,36
DESIGN AND APPLICATION OF AN HSM-BASED REUSABLE SOFTWARE FRAMEWORK
He Wei;Jin Yuanping;Jin Xin
..............page:34-36
RESEARCH ON APPLICATION OF DM4 DATABASE TO HOMEMADE E-GOVERNMENT PLATFORM
Li Xiufang;Su Jiazhi;Jia Shixiang;Li ali
..............page:37-38,41
RESEARCH ON XML & SOAP-BASED INFORMATION EXCHANGING PLATFORM
Zhang Qiyong;Wang Dong
..............page:39-41
WEB SERVICE BASED AUTHORIZATION ACCESS CONTROL METHOD
Feng Xiang;Gan Ling;Ni Kai;Zhang Chao
..............page:58-59,114
DICOM IMAGE PROCESSING TECHNOLOGY IN CT
Ji Gang;Zhang Jianxun
..............page:62-64
LOCATION BASED PKI MODEL
Wang Yi
..............page:81-83
DESIGN OF USER MODE FILE SYSTEM BASED ON LINUX
Zhou Qiang;Li Shanping
..............page:87-89
INDIGO FRAMEWORK ARCHITECTURE
Li Yawei
..............page:94-95,178
CALLING GENERIC DLL FROM INSIDE THE MATLAB ENVIRONMENT
hu jin ; yao chun ; su min
..............page:145-146,180
STUDY ON OPTIMIZATION OF DESIGN TYPE EXPERIMENT OF ELECTRONIC CIRCUITS BY USING EDA TECHNOLOGY
Huang Qinyi;Ren Guoyan;Cheng Minsha
..............page:147-148,151
MODELING BPM PROCESS BASED ON OBJECT-ORIENTED PETRI NET
Zhou Xuequan;Xu Tao;Jiang Lihong
..............page:149-151
A SCALABLE ARCHITECTURE FOR DISTRIBUTED VIRTUAL ENVIRONMENTS
Chen Xuefeng;Liu Songpeng;Zhang Shiyong
..............page:152-155
TECHNOLOGY OF THE REALIZATION OF WEB SEARCH ENGINE BASED ON .NET
Jiang Zhigang;Ye Yong
..............page:156-157,168
DESIGN AND IMPLEMENTATION OF THE RECONFIGURABLE RFID INFORMATION GATHERING SYSTEM
Zhu Weiping;Sheng Huanye;Wang Dong
..............page:44-45,86
INTEROPERABLE PLATFORM OF DIGITAL RESOURCE BASED ON OAI PROTOCOL
Zhang Peiyi;Feng Yan;Chen Yimin
..............page:46-47,77
APPLICATION OF ENHANCEMENT TECHNOLOGY TO SUBTRACTION FUNCTION OF DSA
Wang Qun;Chen Xiaosong;Cui Zhiming
..............page:48-49,69
STRATEGY OF QOS MULTICAST ROUTING OPTIMIZING BASED ON ANT COLONY ALGORITHMS
Cui Mingyi;Zhang Xinxiang;Su Baiyun;Zhang Rui
..............page:50-52
AN APPROXIMATE ARC-LENGTH PARAMETERIZATION METHOD FOR BéZIER SPLINE CURVES
Bai Hongwu;Ye Zhenglin;Shi Mao;Wang Shuxun
..............page:53-55
RESEARCH ON INTEGRATION OF WEB SERVICES BASED ON SPRING FRAMEWORK
Zhu Zhengxiong
..............page:128-129,132
THE FLEXIBLE DESIGN FOR DYNAMIC QUERYING IN ERP
Zhang Jing;Zhao Lei;Yang Jiwen
..............page:130-132
A SORT-FIRST ARCHITECTURE BELONG-DETERMINING POLICY BASED ON ROUND-BALL
Huang Xiaosheng;Gu Jingwen
..............page:67-69
DESCRIPTION OF COMPONENT DEPENDENCIES IN DYNAMIC CONFIGURATION MODEL
Chang Hai;Cao Min;Zhu Shaojing
..............page:70-71
RESEARCH ON THE TECHNIQUE OF IDS ANTI-DECEIT AIMING AT IP FRAGMENT ATTACK
Zhou Mingchun;Yang Shutang
..............page:22-25
RESEARCH ON AN IMPROVED IMAGE AUTHENTICATION ALGORITHM BASED ON ASYMMETRIC WATERMARK
Ai Jieling;Yang Shutang;Lu Songnian;Chen Jianning
..............page:19-21
INTELLIGENT PROGRAM SELECTION BASED ON BAYESIAN NETWORK
Zhang Zhiling;Wu Gang;Xiao Jun;Xia Yuren
..............page:16-18
RESEARCH ON BUSINESS INTELLIGENCE MODEL BASED ON AGENT
Xu Na;Zhao Wenyun;Pen Xin
..............page:13-15,64
THE IMPLEMENTATION OF THE CONNECTION BETWEEN OpenPBS AND GLOBUS Toolkit4.0
Wang Yulan;Zheng Yanheng
..............page:78-80
RESEARCH INTO APPLICATION OF IMAGE MOMENT ALGORITHM TO TERMINAL GUIDANCE OF TELEVISION GUIDANCE MISSILE
Zhong Yongbing;Feng Jinfu;Nie Guangshu
..............page:135-136,160
MONITORING ONLINE SUMMARY OF THE PPPOE USERS WITH MRTG
Yang Maoyong
..............page:137-138
DESIGN OF ADAPTIVE NETWORK CAI BASED ON MULTI-AGENT
Ma Wenlong;Qu Youtian;Zhang Jinwei
..............page:141-142,218
CENTRIFUGAL PUMP CAD OF SOLID-FLUID TWO PHASES FLOW BASED ON THEORY OF BOUNDARY LAYER
Wang Liangshen;Chen Yan;Yu Jingnuo;Qu Yanguo;Zhu Yucai;Qiu Tian
..............page:143-144
THE XPATH OPTIMIZATION SCHEME BASED ON 4-DIMENSIONAL INDEX STRUCTURE AND SQL LANGUAGE
Fang You;Pan Yinrong;Hu Youhua
..............page:101-103,111
DESIGN OF PRIVILEGE FACTOR IN MATERIALIZED VIEWS SELECTION
Wang Weihao;Zheng Ning
..............page:104-106,175
LUNG EDGE DETECTION BASED ON MULTI-RESOLUTION ANALYSIS
Wan Shouhong;Gong Yuchang;Li Xi
..............page:109-111
A REAL-TIME IMPLEMENTATION OF LIGHTING EFFECTS IN VIRTUAL STAGE SYSTEM
Weng Lewei;Zhong Yiping
..............page:115-116,163
REALIZATION OF DYNAMIC FIGURE OF THE COBWEB THEOREM
Su Hongshun
..............page:117-119
AN INVESTIGATION ON LOW-LEVEL REQUEST-PROCESS MECHANISM OF ASP.NET WEBFORMS
Wang Tao;Yang Jiwen;Qian Peide
..............page:120-121,155
A REVIEW OF SOA
Ling Xiaodong
..............page:122-124,199
MINING WEBLOGS TO IMPROVE THE FILM CLASSIFICATION ON VOD SYSTEM
Weng Xiaolan;Sun lei
..............page:125-127
RESEARCH ON THE GRID-BASED CONTENT TRANSMISSION TECHNOLOGY
Fang Cheng;Liu Xuezheng;Zheng Weimin
..............page:10-12,89
THE INVESTIGATION FOR THE PKI SECURITY LEVEL ASSESSMENT MODEL BASED ON KNOWLEDGE BASE
Lü Bijun;Xiao Xiaochun;Zhang Gendu
..............page:4-6,25
DESIGN OF A DYNAMIC USER-LEVEL BINARY TRANSLATION SYSTEM
Wu Hao;Guan Haibin;Liang Alei
..............page:1-3
AUTOMATIC CHINESE WORD SEGMENTATION ALGORITHM WITHOUT DICTIONARY BASED ON CNET MODEL
Liu Longfei;Chen Bin;Dang Rong
..............page:219-221
THE TREND OF WIRELESS SENSOR NETWORK NODE DESIGNING BASED ON THE VIEW OF SENSOR
Wang Man;Ling Xiaodong;Fang Yun;Liu Ciping;Pei Jun;Chen Ling
..............page:158-160
IMPROVEMENT AND REALIZATION OF MENEZES-VANSTONE CRYPTOSYSTEM OF ELLIPTIC CURVES
Meng Fansheng;Jiang Rongan;Zhao Mingwei
..............page:190-191,194
A NOVEL INTER MODE DECISION METHOD FOR H.264 ENCODING
Wang Shuhui;Lin Tao;Lin Zhenghui
..............page:161-163
RESEARCH ON CONSTRUCTING TECHNOLOGY OF SPHERICAL PANORAMIC IMAGE
Yang Yan;Wang Xuerui;Dai Qing;Fu Jiangliu
..............page:164-165,187
SIMILARITY MEASURE-BASED IMAGE RETRIEVAL
Song Yan;Liu Fang-ai
..............page:166-168
A HIGH-EFFICIENT INCREMENTAL UPDATING ALGORITHM FOR MINING ASSOCIATION RULES
Sun Shichao;Liu Hanbing;Ji Lixin
..............page:169-170,183
AN IMPROVED GENETIC ALGORITHM AND ITS APPLICATION
Pu Ruoang;Li Zhihua;Song Guoxin
..............page:171-172,221
APPLICATION OF SUMMARY HIERARCHIES TO DATA STREAMS CLUSTERING ALGORITHM
Chen Chunyan;Zhang Wei
..............page:176-178
THE 3D MODEL OF MELON AND FRUIT BASED ON BLINN ALGORITHM
Liu Gelin;Lu Ling
..............page:179-180
AN ALGORITHM FOR MAXIMAL EIGENVALUE OF POSITIVE MATRIX
Lu Chengbo
..............page:181-183
DESIGN AND IMPLEMENTATION OF AN IMPROVED RSA ENCRYPTION ALGORITHM
Yang Deshan;Lu Kuijun
..............page:188-189,215
CONSTRUCTING EMBEDDED LINUX SYSTEM BASED ON INTEL IXP425 NETWORK PROCESSOR
Yang Ping;Chen Jiming
..............page:216-218
RESEARCH ON LARGE CAE SOFTWARE ANSYS AND STRENGTH TEST CONTRAST
Wang Xuewen;Yang Zhaojian;Duan Lei
..............page:212-215
STUDY ON WEB DOCUMENT CLASSIFICATION BASED ON KNN
Niu Qiang;Wang Zhixiao;Chen Dai;Xia Shixiong
..............page:210-211
CONTROL THE 3D MODELS INTERACTIVELY IN OPENGL
Sun Nifang;Yang Zhiqiang;Chen Cheng;He Bin;Gong Peizeng
..............page:207-209
PETRI MODEL AND VALIDATION FOR MPI PROGRAM
Sui Dan;Wang Lisheng;Ye Qing
..............page:205-206,209
A NEW BEHAVIOR TRUST MODEL BASED ON GRID ENVIRONMENT
Hu Dongping
..............page:200-201
THE DESIGN AND IMPLEMENTATION OF CHECKING PASSWORD SYSTEM BASED ON MULTI-THREADS
Luo Haiping;Liu Hong;Liang Qijun
..............page:198-199
RESEARCH AND IMPLEMENTATION OF A TECHNOLOGY OF TROJAN HORSE BASED ON INTERNAL PENETRATING IN LAN
Tian Lei;Li Zhenhai;Chen Lin;Li Shichao
..............page:195-197,204
MODELING ATTACK SCENARIO WITH CAPABILITY
Zhang Lianhua;Zhang Renlong;Bai Yingcai
..............page:192-194