Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Applications and Software
1000-386X
2008 Issue 9
CALLING EJB REMOTELY ON J2EE PLATFORM
He Wentao;Luo Jianwei
..............page:193-195
DESIGN AND IMPLEMENTATION OF WIRELESS CAMPUS PORTAL WEBSITE BASED ON WAP
Liao Xiaohua;Chen Zhao;Huang Rule
..............page:191-192,216
DESIGN OF MOBILE PHONE GAME BASED ON J2ME
Cai Changan;Qiu Yadong
..............page:188-190,223
STUDY ON THE APPLICATION OF FUZZY kNN TO TEXT CATEORIZATION
Lin Yongmin;Zhu Weidong
..............page:185-187
USING VRML TECHNOLOGY TO DEVELOP 3D ROAM SYSTEM BASED ON WEBPAGE
Tian Yuan;Li Zhongyi
..............page:183-184,187
THE TOPOLOGICAL ANALYSIS OF DISTRIBUTION NETWORK GIS BASED ON HEURISTIC SEARCH
Zhao Qiang;Yang Liu
..............page:181-182,205
IMPLEMENTATION OF TECHNIQUES FOR ENTERPRISE DATA INTEGRATION SYSTEM BASED ON SSIS
Su Peng;Li Zhao;Wang Wen;Liu Xueli
..............page:179-180,202
DESIGN OF ELECTRICAL SUPERVISORY CONTROL SYSTEM FOR TRUE TRIAXIAL APPARATUS BASED ON WEBACCESS
Jiang Binghua;Ye Han;Feng Fan
..............page:212-213,235
CLASSIFICATION OF LARGE-SCALE WEB PAGES BASED ON SVM
Zhang Yue;Cao Wenjun
..............page:214-216
DESIGN OF AN APPLICATION LAYER MULTICAST PROTOCOL FOR REAL-TIME TRANSMISSION
Chen Xumeng;Zhang Wei
..............page:220-223
DESIGN AND REALIZATION OF REMOTE PAGES GENERATING SYSTEM BASED ON DATABASE
Tang Jian'gang;Lu Liyan
..............page:224-225
RESEARCH ON TEXTURE CLASSIFICATION BASED ON COMPLEX WAVELET PACKET PROBABILISTIC MODEL
Cai De;Hong Wen;Wu Yirong
..............page:226-227,232
DEMONSTRATING MANDELBROT FRACTAL GRAPHIC WITH C+ + Builder PROGRAM
Zeng Bing;Han Dongbo
..............page:228-229,271
HUMAN EYES LOCATION BASED ON TOPOGRAPHIC LABELING TECHNIQUE
Wang Juling;Ding Youdong;Fang Yuchun
..............page:230-232
ACELP TRANSPORTATION ON RISC PLATFORM AND ITS REAL-TIME OPTIMIZATION
Zhou Weikuan;Wu Baifeng
..............page:236-238,262
QUANTUM WAVELET TRANSFORM ALGORITHMS AND REALIZATION CIRCUITS
Zhu Xuanyi;Sun Li
..............page:239-241,247
RESEARCH ON MISSING DATA FOR DECISION TREE ALGORITHM
Gong Gu;Zhang Hong
..............page:242-244
A FUZZY CLUSTERING ALGORITHM BASED ON THE THRESHOLD OF CLUSTERS'INTERVAL
Xie Yu;Cheng Weiming
..............page:248-249
NEAREST POINT BISECTION ALGORITHM BASED ON KERNEL METHOD
Zhou Deqiang
..............page:250-251,262
A HYBRID ALGORITHM FOR PARAMETERS OPTIMIZATION OF FUZZY PETRI NET
Jin Wenhui;Ge Hongwei
..............page:252-254
A GENETIC METHOD FOR FUZZY PARTITION OPTIMIZATION
Cui Ying;Wu Shaobing
..............page:255-256
APPLICATION OF A FEATURE EXTRACTION SYSTEM-BASED GENETIC ALGORITHM TO QAP
Ye Jun;Lü Qiang;Han Hongbo
..............page:257-259
NEIGHBOR UNION-BASED DDoS ATTACK DETECTION AND FILTERING IN MANET
Zhao Du;Jing Yinan;Wang Xueping;Yu Jianhua
..............page:263-265,278
THE INFORMATION HIDING ALGORITHM BASED ON TWO-LEVEL DWT AND ITS REALIZATION
Chen Yanliang;Wang Bing
..............page:266-268,271
A DATA STRUCTURE-ORIENTED POLICY TRANSFORMATION TECHNIQUE
Dai Xiangdong;Chen Xingyuan;Wu Bei;Niu Xinjian
..............page:269-271
NEW CERTIFICATE REVOCATION SCHEME BASED ON ONE-WAY HASH-FUNCTION
Li Jin;Li Jie
..............page:272-273,278
A TECHNIQUE OF PRIMALITY TESTING BASED ON ELLIPTIC CURVES
Chen Yan;Wang Rui
..............page:274-275
A NOVEL ANOMALY DETECTION MODEL WITH SELF-ADAPTABILITY
Shi Zhicai
..............page:279-280,285
THE IDENTIFICATION OF CHINESE NOMINALIZATION COMPOUNDS
Chen Changxiong;Zhao Jinglei
..............page:283-285
TIMESTAMP-BASED ENTERPRISE TEMPORAL MODELING AND APPLICATION
Yang Zhaojun
..............page:174-175,211
A METHOD OF PUTTING-TOGETHER-AND-PLOTTING FOR SMALL-SHEET DRAWING
Zhang Shenglan;Yang Chaoyang
..............page:172-173
STUDY ON VOICE LOCATION SERVICE BASED ON VOICEXML METHOD
Zhou Peng;Lian Dongzhou
..............page:169-171
ON NETWORK BASED COLLABORATION FOR MULTI-OPERATOR AND MULTI-ROBOT
Hu Kuiyou;Chen Yimin
..............page:165-168
ON VBA INTEGRATION-TECH
Zhang Xiaohu
..............page:163-164,219
MULTI-DIMENSIONAL ASSOCIATION RULE MINING ALGORITHM IN AUDIT ANALYSIS
Tao Zhenhai;Xie kainian
..............page:160-162,168
CREDIT CARD FRAUD DETECTION AND PREVENTION BASED ON CONCURRENT FEEDBACK
Yang Sen;Guo Jiankui;Zhu Yangyong
..............page:154-156,171
ON SOFTWARE ARCHITECTURE MODEL BASED ON GRID COMPONENT
Pang Jin
..............page:150-151,187
CODE CLONES IN PROGRAMS AND THEIR DETECTION
Ye Qingqing
..............page:147-149,159
RESEARCH ON SOFTWARE REUSE IN THE DEVELOPMENT OF POWERBUILDER
Luo Huajie;Liu Xuguo
..............page:145-146
IMPLEMENTATION OF OPERATION AND MAINTENANCE TERMINAL BASED ON XML DATA SOURCE
Huang Xin;Zhang Yuanjian;Deng Hongbo;Pan Xiaoming
..............page:142-144
CREATING BUTTON CONTROL DYNAMICALLY BASED ON VC+ +
Li Gang;Zhao Zongtao;Li Yan
..............page:140-141
TIMED AUTOMATA DESCRIPTION OF PROCESS INSTANTIATION MODEL
Li Ming;Liu Junfei
..............page:136-137,146
PARAMETRIC APPROXIMATION OF ALGEBRAIC SPACE CURVES
He Zhimin;Fang Meie
..............page:130-132,135
DESIGN AND REALIZATION OF CHONGQING CITY CARD SYSTEM
Wang Chengliang;Chen Juanjuan;Zhou Yaxin
..............page:127-129,144
DESIGN AND IMPLEMENTATION OF A NEW PLATFORM FOR RAPID GENERATION OF WEB DYNAMIC QUERY SYSTEM
Guan Quanlong;Yao Guoxiang;Lin Liangchao
..............page:125-126,141
AUTOMATIC INDEXING ALGORITHMS FOR TEXT BASED ON DISCOURSE STRUCTURE
Zhang Meina;Chi Chengying;Zhan Xuegang;Qi Chao
..............page:122-124
RESEARCH ON THE IMPROVEMENT OF WEB SERVICES ACCESS PERFORMANCE IN EAI
Bian Xiaofan;Guo Heng
..............page:118-121
DSQL:AN SQL-LIKE QUERY LANGUAGE BASED ON DOMAIN DATA MODEL
Xu Jingrong;Zhao Lei;Yang Jiwen
..............page:115-117
INDIVIDUALIZED DRM AND DIGITAL WATERMARKING TECHNOLOGY
Li Xiaofeng;Cui Wei;Liu Yonghui;Liu Jian;Li Xuedong
..............page:112-114
A MULTI-SCALE MORPHOLOGICAL ALGORITHM FOR AFM MICROGRAPH EDGE DETECTION
Liu Weijun;Sun Xingbo
..............page:83-85
A POWER MANAGEMENT APPROACH FOR EMBEDDED LINUX BASED SMARTPHONE
Chen Xi;Chen Ying;Qi Zhengwei
..............page:80-82
RESEARCH ON CONSTRUCTION OF VIRTUAL MERIDIANS AND COLLARERALS SYSTEM BASED ON GPU
Wang Baotu;Yu Lun;Li Jianwei;Chen Guodong
..............page:61-63
THE OPTIMIZATION OF THE PAGERANK ALGORITHM OF SEARCH ENGINE
Cai Jianchao;Cai Ming
..............page:59-60,82
RESEARCH AND IMPROVEMENT ON THE REMOTE DYNAMIC PASSWORD AUTHENTICATION SCHEME
Si Jianmei;Jin Chenhui;Liu Gang
..............page:54-55
THE APPLICATION OF IMMUNE THEORY TO VIRUS DETECTION
Wei Yun;Zhang Jianlin;Xu Huijian
..............page:52-53,108
A SURVEY OF SVM IN UNBALANCED DATA SETS
Yao Chengkuan
..............page:1-2,29
A NEW ADAPTIVE ALGORITHM ON DIGITAL IMAGE INFORMATION HIDING
Si Yinnü;Kang Baosheng
..............page:49-51,121
APPLICATION OF BLIND AGGREGATE SIGNATURE TO E-CASH
Meng Chunyu;Yin Xinchun;Song Chunlai
..............page:47-48
IMAGE RETRIEVAL BASED ON MULTI-RESOLUTION AND RELEVANCE FEEDBACK
Wu Xiaosheng;Sun Junding
..............page:109-111
THE SIMULATION STUDY ON TOURIST SATISFACTION INDEX
Tang Youchun;Hu Jianpeng;Yang Yinhua
..............page:106-108
A SIMULATION MODEL FOR INVENTORY SYSTEM OF CORRELATIVE MERCHANDISES WITH SHELF-LIFE
Dai Shugui;Jiang Changhua;Pan Yinrong;Hu Youhua
..............page:99-101,111
A DYNAMIC MANAGEMENT METHOD FOR NANDFlASH IN EMBEDDED FILE SYSTEM
Wang Xinhua;Wang Jianfen
..............page:95-98
A NEW ELECTRONIC PAYMENT PROTOCOL AND ITS FORMAL ANALYSIS
Xu Yang;Wang Xueming;Xie Xiaoyao
..............page:93-94,124
DESIGN AND IMPLEMENTATION OF EMBEDDED MMS PROTOCOL STACK
Chen Huapeng
..............page:89-92
CRYPTANALYSIS AND IMPROVEMENT OF A FORWARD SECURITY DIGITAL SIGNATURE SCHEME
Liu Yali;Yin Xinchun;Chen Juewei
..............page:19-20,44
SOFTWARE EVOLUTION PROCESS EVALUATION
Wang Wei;Li Tong;Yu Yong
..............page:17-18,92
IMAGE COMPRESSION METHOD BASED ON SPIHT COEFFICIENT TREES AND SUPPORT VECTOR MACHINES
Yin Wanghong;Li Chaofeng;Zhang Junben;Wang Zhengyou
..............page:41-44
AN IMPROVED IMAGE ENHANCEMENT ALGORITHM AND ITS APPLICATION
Wang Xiaofeng;Geng Guohua;Guo Hongbo
..............page:39-40,63
THE WATERMARKING ALGORITHM OF INSTRUCTIONS STATISTICS CHARACTERISTICS WITH ERROR-CHECKING CODING
Luo Yi;Sun Xingming;Sun Guang;Ai Jieqing
..............page:36-38
IMPLEMENT THE CHANGE FROM WEB APPLICATION TO PORTLET APPLICATION BASED ON JETSPEED
Yang Chunlin;Ge Wei;Hao Kegang
..............page:33-35
BEHAVIOR-BASED NETWORK BEHAVIOR SUPERVISION SYSTEM
Yang Yuejiang;Fu Gui
..............page:27-29
THE MODEL OF ROLE-BASED SYNERGISTIC CUSTOMIZATION REPORT SYSTEM
Chen Ming;Wang Zhenwu
..............page:24-26
ON APPLYING ROLE-BASED ACCESS CONTROL IN ASP.NET 2.0
Zhou Jing;Zhang Hongqi;Zhang Bin
..............page:21-23
AMELIORATION OF RECOMMENDATION ALGORITHMIC BASED ON PAGE CLUSTERING
Zhang Haiyu;Liu Zhidu;Yang Cai;Jia Songhao
..............page:15-16,48
A SUBJECTIVE TRUST MODEL BASED ON COMMUNITY IN OPEN NETWORK
Gao Chengshi;Fu Jiangliu;Shen Changxiang;Liu Yi
..............page:12-14
AN EFFICIENT PAM CLUSTERING ALGORITHM BASED ON PDS,TIE AND PMI
Lin Jianren;Lu Peizhong
..............page:8-11
COMMUNICATION IN POWER GRID:RESEARCH AND IMPLEMENTATION
Wang Hao;Lü Qi;Yan Tao;Lu Sanglu;Chen Daoxu
..............page:5-7,26
A SINGLE SIGN-ON SYSTEM BASED ON ONE-TIME PASSWORD
Zhang Peng;Dai Yingxia;Lian Yifeng
..............page:3-4,23
THE DESIGN AND IMPLEMENTATION OF REMOTE COMMAND AND CONTROL SYSTEM FOR PORT
Wang Yishu;Hu Wenjun;Kuang Wende
..............page:76-77,105
RESEARCH ON THE INTEGRATION OF TEST TOOL BASED ON WEB
Huang Yan;Zhang Shaohua;Qin Hui;Ding Zhigang
..............page:73-75
A LOCAL WATERMARKING ALGORITHM BASED ON IMAGE ENTROPY RESISTING CROPPING
Wang Yan;Gong Shengrong
..............page:67-69,85