Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Applications and Software
1000-386X
2010 Issue 4
DESIGN AND IMPLEMENTATION OF P2P REAL-TIME TRAFFIC DETECTION SYSTEM
liu chao bin ; liu li nan ; yang yue xiang
..............page:51-53,73
QUALITY ASSURANCE ANALYSIS FOR EXTREME PROGRAMMING
zhou li li
..............page:167-168,248
APPLYING SENSOR MODULES OF VEGA IN INFRARED IMAGING SIMULATION
zheng xiao bao ; wang shi cheng ; liao shou yi ; zhang jin sheng ; su de lun
..............page:18-22
DESIGN AND REALIZATION OF DESKTOP AERODROME TOWER CONTROL SIMULATION SYSTEM
li zuo ; wang lin ; xu xiao hao
..............page:35-37
DESIGNING AND IMPLEMENTING SPRING FRAMEWORK-BASED EXPERT SYSTEM FOR POULTRY DISEASE DIAGNOSES
zhong chang le ; zhong yong ; ma chun quan ; li ning
..............page:87-89
A DYNAMIC LOGGING APPROACH FOR FLASH-BASED DBMS
du ming ; wang zhi jun ; le jia jin
..............page:171-173,193
ON DECODING IMPLEMENTATION OF REGULAR LDPC CODE BASED ON CUDA
yu yong sheng ; lu pei zhong
..............page:230-232,266
ON ALGORITHMS OF PATH MATCHING AND TRACE PLAYBACK AND THEIR IMPLEMENTATION
gao hai hui ; jia ke bin ; he zuo
..............page:26-28,92
ON CLUSTERING MINING-BASED INTRUSION DETECTION METHOD
mo le qun ; guo geng zuo
..............page:133-136
AN IMPROVEMENT ON WINDOW SNAPSHOT DIFFERENTIAL ALGORITHM
li chun tao ; liu bo
..............page:140-142
AN IMPROVED DISTRIBUTED ETL ARCHITECTURE
xia xiu feng ; zhang liang ; shi xiang bin ; xu lei
..............page:174-176
ON EVALUATION METHOD FOR DOMINANCE ROUGH SETS THEORY-BASED LIBRARY WEBSITES
gao jian shan ; lu shi wen
..............page:180-183
ON INCENTIVE MECHANISMS BASED ON BITTORRENT AND ITS IMPROVEMENT
li jie ; fan cong xian ; xu ting rong
..............page:184-187
ON DATA SHARING WITH COMBINED TECHNOLOGIES OF METADATA AND WEB SERVICE
cheng xiao jun ; sun jin yue ; xia yan ; qian da jun ; zhang shan
..............page:93-95,117
A CALCULATION APPROACH FOR FETCHING REDUCED NOTATION PITCH OF GUQIN AND ITS IMPLEMENTATION WITH SOFTWARE
zhuang xiong xiong ; zhou chang le ; qi jing feng ; gao song ; lv lan lan
..............page:10-12,37
NAME ENTITY RECOGNITION BASED ON COORDINATE ASCENT ALGORITHM
dai bo ; mao qi ; yuan chun feng
..............page:7-9,22
LDAP DIRECTORY SERVICE-BASED IMPLEMENTATION MODEL OF OCSP
xu lei ; li ming
..............page:283-285
AN TRACKING ALGORITHM BASED ON OBJECT CENTRE ALLOCATION AND NMI FEATURE
chen ai bin ; dong de yi ; yang yong ; cai zi xing
..............page:276-279
A SECURE IP CONFIGURATION SCHEME FOR LARGE-SCALE AD HOC NETWORK
tan qi yu ; zhou ji peng
..............page:242-244
AN IMPROVED SWITCH SCHEME OF MOBILE IPv6 AND MPLS INTEGRATION
liu zheng ; cai ming
..............page:239-241
DESIGNING AND IMPLEMENTING TIBCO BUSINESSWORKS-BASED WEB SERVICE
zheng hao ran ; wang peng ; cao huan
..............page:191-193
DEALING WITH SECURE QUERYING OF XML DATABASE
yu yi sheng ; he wen hua
..............page:137-139
TERM RECOGNITION BASED ON INTEGRATION OF C-VALUE AND MUTUAL INFORMATION
liang ying hong ; zhang wen jing ; zhang you cheng
..............page:108-110
ARTIFACT IDENTIFICATION AND SEGMENTATION FOR RADIONUCLIDE VENTILATION AND PERFUSION LUNG IMAGING
wang jing ; li su xiao ; dong jie ; jiang en yu ; zhao shu jun
..............page:249-252
DESIGN AND IMPLEMENTATION OF CITY LAND DIVISION AND REGISTRATION MANAGEMENT SYSTEM
wang fu wei ; li yan qiu ; li hong guang ; li hui ju ; wei hai ping
..............page:221-223,263
SOFTWARE DESIGN FOR UNIX-BASED FTP PIVOT SERVER
nie yan feng ; dai jian ; sun fei ; peng xiang jun
..............page:217-220
OVERVIEW OF MOBILE IPv6 HANDOVER TECHNOLOGY
xiao chang shui ; zuo mao xin ; shen ping ping
..............page:158-161
INTEROPERABILITY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORK
zhuang chun mei ; lu jian de ; wang yuan
..............page:235-238
SENSITIVITY ANALYSIS ON M/Dr/1\'/Q INPUT MATCHING QUEUING SYSTEM
zhu yu yang ; zhi lin xian
..............page:111-113,136
IMAGE SEGMENTATION AND FEATURE EXTRACTION ALGORITHM FOR BRIDGE\'S UNDERWATER STRUCTURE DEFECTS
li gang ; he zuo zuo ; zhao zuo
..............page:80-82,101
ON CAS BASED FIRM COMPETITION MODEL AND SIMULATION
shao yan hua ; shen zhao hua ; peng gang ; li zuo
..............page:149-151
ON Xen VIRTUAL MACHINE-BASED SYSTEM LOGS SECURITY
wu jia min ; peng xin guang ; gao dan
..............page:125-126,166
AN IMAGE AUTHENTICATION SCHEME BASED ON REVERSIBLE WATERMARKING
wen jia fu ; wang jia zuo ; zhang zheng bao ; tan yue hui
..............page:120-121,179
A KEY MANAGEMENT SCHEME FOR MOBILE AGENT
zhang zhi ming ; deng jian gang ; jiang chang gen ; yu min
..............page:90-92
DEVELOPMENT AND APPLICATION OF POTENTIAL RISK ASSESSMENT SOFTWARE FOR POLYMER FLOODING
zhao hui ; li yang ; cao lin
..............page:54-56,70
ON J2ME PICTURES COMPRESSION TECHNIQUE BASED ON FILE FORMATS
xu biao ; wang xiao dong
..............page:253-256
sheng ming
..............page:封4
ON VISUALISED LINE INTEGRAL CONVOLUTION ALGORITHM OF VECTOR FIELD AND ITS SYSTEM DESIGN
zhu hong zuo ; jiang guo hua ; wang bao zhi
..............page:203-206,229
ONTOLOGY-BASED TOURISM INFORMATION EXTRACTION
chen li na ; zhang hong ; ma li ; jiang yun cheng
..............page:146-148,161
ON EXPERIMENTING ADABOOST ALGORITHM IN NETWORK INTRUSION DETECTION
zhao yue ai ; chen jun jie
..............page:127-129
METHOD OF APPLICATION-LEVEL DATABASE INTRUSION DETECTION
li zuo ; zhao lei ; yang ji wen
..............page:280-282,285
IMAGE TWICE-SCRAMBLING ALGORITHM BASED ON TWO-DIMENSIONAL ARNOLD TRANSFORMS
guo lin qin ; zhang xin rong
..............page:264-266
DESIGNING TYPING CARTOON GAME BASED ON DirectDraw
dong ying ying ; wang qi feng
..............page:169-170,241
A METHOD FOR RECONSTRUCTING MULTI-RESOLUTION SURFACE FROM SCATTERED DATA POINTS
he ling xuan ; xu gang ; wu chang ming
..............page:257-260
ON DUMPING DATA OF CENTRALIZED REAL-TIME MONITORING SYSTEM FOR AIR-CONDITIONING CAR WITH IC CARD
li hai long ; zhang bao xia ; zheng hui zhi
..............page:207-208,279
A STUDY AND PRACTICE OF SMS-BASED LIBRARY SERVICES
dong xiao xia ; han wei min ; shi huai juan ; li gao hu
..............page:212-214,220
A FITTED KERNEL FUNCTION BASED CLASSIFICATION METHOD FOR IMBALANCED DATASET
ma sheng xiang ; ma jian qing ; yang ming
..............page:177-179
DS-ROUGH SET IN OBJECT-ORIENTED DATA BASE SYSTEM AND ITS APPLICATION
liu feng chun ; zhang chun ying ; zhu xiao liang
..............page:38-39,67
ON DETECTING AND TRACKING METHOD OF MOVING BODIES AND ITS REALIZATION
tan zuo ; xiao nan feng
..............page:29-31,59
ON EXPERIMENT OF STRENGTHENING HOST-BASED INTRUSION DETECTION WITH VIRTUAL MACHINE
zhang yan yan ; peng xin guang
..............page:130-132,142
ANALYZING AND DESIGNING MIXED MODEL-BASED STUDENTS\' COMPREHENSIVE APPRAISAL SYSTEM
li huai cheng ; wang long juan
..............page:156-157,187
ON EDGE THINNING ALGORITHM IN IMAGE ZOOM
kong fan ting ; hou guo qiang
..............page:261-263
METHOD OF NETWORK APPLICATION PROGRAMMING IN μC/OS-Ⅱ BASED ON LwIP
hu li rui ; wang ze lin ; hu chuan zhi
..............page:271-273
DESIGNING QoS IMAGE AUTOMATIC PROCESSING MODEL
gao wei ; he feng
..............page:152-155
A PERMISSION MODEL OF SaaS SYSTEM BASED ON RBAC
ma li lin ; li hong
..............page:42-44
LOAD-BALANCING OF NEAR-FIELD COMPUTATION IN PARALLELING MLFMA
tang hua ning ; tong wei qin ; wang xin gang ; ni wei li
..............page:274-275
ON COAL MINE SAFETY MANAGEMENT SYSTEM BASED ON AHP-FCE
li jin ming ; li run
..............page:227-229
ON LINUX 2.6 BASED EMBEDDED ASoC AUDIO DRIVER AND ITS IMPLEMENTATION
ding yong ; zhou yu ; du si dan
..............page:267-270,273
DESIGNING AND IMPLEMENTATION OF A TEMPLATE WEB PRINTING METHOD
li yong feng ; gu chuan
..............page:118-119
ON REPUTATION BASED P2P ANONYMOUS COMMUNICATION SCHEME
huo cheng yi
..............page:40-41,44
AN EMBEDDED BROWSER INTERACTIVE MODEL BASED ON IN-VEHICLE NETWORK
shu min ; li yin guo ; jiang jian chun ; di jun
..............page:57-59
ON INTEGRATION OF AJAX AND J2EE AND ITS APPLICATION
zhang ying chao ; zong lei ; ye xiao ling
..............page:106-107,145
MODELLING POLICING PERFORMANCE EVALUATION SYSTEM WITH UML AND ITS IMPLEMENTATION
duan dan qing ; yang wei ping
..............page:77-79,92
A NOVEL COMPOSITE CALIBRATION METHOD OF VIDEO CAMERA AND ITS APPLICATION IN AUTOMOBILE CRASH TEST
zhang xing ; liu yi song ; liu xiang
..............page:96-97,105
IMPLEMENTING TRANSFORMATION FROM UML MODEL TO XML DOCUMENT BASED ON XMI
xiong yong gang ; tang hui jia
..............page:68-70
ON CONTINUOUS ANTI-COLLUSION DIGITAL FINGERPRINTS
pan guang yi ; li xiao qiang ; li wei
..............page:13-17
MULTI-CLASS AUDIO CLASSIFICATION BASED ON SUPPORT VECTOR MACHINE
yu yu lian ; guo shi jie
..............page:98-101
E-CASH BASED RIGHTS TRANSFER SCHEME IN P2P NETWORKS
luo yi ming ; lai xue jia
..............page:3-6,47
ON LAYERED SERVICE AND MULTICAST FUNCTION IN VoIP NETWORK CONFERENCING SYSTEM
wang nan ; nie peng peng ; lu jian de
..............page:245-248
AN EXTENDED AFFINITY FUZZY SUPPORT VECTOR MACHINE AND ITS APPLICATION IN TEXT CLASSIFICATION
ai qing ; qin yu ping ; fang hui ; zhao zuo
..............page:45-47
ON SMALL BUSINESS CREDIT FORECASTING BASED ON DYNAMIC CLUSTERING RBF NETWORK
zhu zuo ; liang xue chun ; xiao di
..............page:102-105
DESIGN OF SPEECH-LIKE MODEM IN END-TO-END SECURE COMMUNICATION
yang dian bing ; luo xing guo ; zhang ru yun
..............page:64-67
COMMAND SYSTEM FOR EARTHQUAKE EMERGENCY RESCUE BASED ON GIS AND GPS
cai fei ; cui jian ; ding ning ; cai
..............page:83-86
APPLYING HyperXtrude IN SIMULATION OF ALUMINIUM PROFILES EXTRUSION MOLDING
huang zhen zuo ; li wen fang ; wu xi kun ; liang zuo qing
..............page:143-145
ON MDA MODEL TRANSFORMATION TECHNIQUE OF DEALING WITH DYNAMIC ACTION DESCRIPTION
chen zuo ; zhao jian hua ; zhang kang kang
..............page:162-166
ON THREE-DOMAIN ELECTRONIC PAYMENT AND AES SECURITY ALGORITHM MODEL
ren zhong xiang ; wan zuo rui
..............page:197-199,256
DESIGNING GPS HARBOUR NAVIGATION SYSTEM AND ITS IMPLEMENTATION
wang gui fu ; cai qiao ying ; yang bin
..............page:200-202
ON NEGOTIATION POLICY BASED ON AGASA ALGORITHM
xu ming ; cai hong ming ; jiang li hong
..............page:1-2,17
SIMULATION AND ANALYSIS OF JOIN LATENCY IN TAG OVERLAY MULTICAST
wang zuo ; yuan shi zhong
..............page:233-234,252
ON NETWORK SECURITY EVENT CORRELATION ANALYSIS AND ACTIVE RESPONSE MECHANISM
wen hui ; xu kai yong ; zhao bin ; wang bin
..............page:60-63
EXPANSION OF UNIFORM B-SPLINES CURVES AND SURFACES
guo qing wei ; xiong jian ; zhu gong qin
..............page:114-117
APPLYING PRINCIPAL COMPONENT ANALYSIS IN TRANSFORMER FAULT DETECTION AND IDENTIFICATION
tang yong bo ; ou yang wei
..............page:224-226,260
DESIGN AND IMPLEMENTATION OF WIRELESS SENSOR NETWORK NODE BASED ON BLUETOOTH
wu chun ; chen xue dong ; jiang hong ; chu hong yu
..............page:74-76,101