Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Shanghai Jiaotong University
1006-2467
2004 Issue 1
The Vortex Lattices of Anisotropic Superconductors in the BCS Mechanism
xu long dao ; wu ji hong
..............page:143-145
The Intersection Problems of Simple Three-Fold Triple Systems of Order v
li liang ; shen zuo
..............page:146-148
xia qi dai fa biao lun wen zhai yao yu bao
..............page:33,38,46,51,70,74,86,90,102,106,110,115,124,129,13
Attribute Certification Based Online Reputation System
lu chun xia ; wang ying lin
..............page:5-8
Dielectric Interaction Between the Particles with Composite Structure
bai jian zhong ; liu ping
..............page:138-142
Real Domain WZ Algorithm for Solving Linear Equations with Complex Coefficients
li shi guang ; zhou gang ; cai liang bin
..............page:135-137
Effect of Unequal Countercurrent Blood Vessels on the Temperature Distribution Due to HIFU
chen zuo ; bai jing feng ; chen ya zhu
..............page:130-134
Counter-Ion Distribution in a Sphere Kernel-Shell with Different Couplings
wu zuo ; li wei hua ; ma hong ru
..............page:125-129
Effect of N2 Partial Pressure on the Microstructure and Mechanical Properties of Magnetron Sputtered NbN Thin Films
han zeng hu ; hu xiao ping ; tian jia wan ; li ge yang ; gu ming yuan
..............page:120-124
Characteristics of Surface Acoustic Waves Propagating on LGS, LGT and LGN Substrates
zhang guo wei ; han zuo ; ji xiao jun ; shi wen kang
..............page:116-119
Influence of B,Si Slagging Elements on Microstructure of Light Beam Alloying Layer
dan ji guo ; ding jian chun ; ren jia lie
..............page:111-115
A Cheater Detectable Visual Cryptography Scheme
yan hao ; gan zhi ; chen ke fei
..............page:107-110
A New Method of Using (k,n)-Threshold Scheme to Realize Any Access Structure
li qiang ; yan hao ; chen ke fei
..............page:103-106
A Neural Network Learning Algorithm Based on Fuzzy Deduction
zhou zuo ; ren qing sheng ; qi fei hu
..............page:96-98,102
An Efficient Search Scheme in Peer-to-Peer Network
li zhen wu ; yang jian ; shi ming hong ; bai ying cai
..............page:91-95
An Interactive Scenario Language and Its Application
wang zhen jie ; yin zhi hong ; xiao zheng guang ; ding peng ; sheng huan zuo
..............page:87-90
An Improved Proxy Multi-Signature Scheme
zhou hong sheng ; tie ling ; li jian hua ; ni you sheng
..............page:83-86
An Electronic Cash System with Multiple Banks Based on Proxy Signature Scheme
zhou hong sheng ; wang bin ; tie ling ; li jian hua
..............page:79-82
A Novel Decentralized Location Algorithm for Peer-to-Peer Networks
bai hai zuo ; jiang jun jie ; wang wei nong
..............page:75-78
Learning Fuzzy Rules by Evolution for Mobile Robot Adaptive Navigation
zhang wen zhi ; lv tian sheng ; wang le tian
..............page:66-70
Segmentation and Surface Reconstruction of Scattered Data in Reverse Engineering
hu zuo ; xi jun tong ; jin zuo
..............page:62-65
Design and Implementation of a Distributed High-Performance Web Crawler
zhang ling ; ye yun ming ; song zuo ; yu shui ; ma fan yuan
..............page:59-61
π-Net:A New Modular High Level Petri Net
cao mu liang ; wu zhi ming ; yang gen ke
..............page:52-58
Robot Performance Skill Learning and Merging for Tasks in Contact States
wang qin ; yang ru qing ; zhang wei jun
..............page:47-51
A Complete Algorithm for Attribute Reduction Based on Discernibility Matrix
wang bing ; chen shan ben
..............page:43-46
Fast Generation of the Topological Information in STL for Mesh Simplification
zhang bi qiang ; xing yuan ; ruan xue yu
..............page:39-42
User Modeling Based on Weighted Concept Network
xu huan qing ; wang yong cheng
..............page:34-38
Critical Path Analysis for Structure Optimization of Workflow
zhang xiao guang ; cao jian ; zhang shen sheng ; fu qian
..............page:29-33
A TCAM-Based Two-Dimensional Prefix Packet Classification Algorithm
wang zhi heng ; li xiao yong ; bai ying cai
..............page:9-13
Event Condition Action Rule Based Intelligent Agent Architecture
zhou xiao jun ; zhang shen sheng ; cao jian ; dai kai yu
..............page:14-17
A Novel Learning Algorithm for Synergetic Pattern Recognition
chen wei gang ; qi fei hu
..............page:18-20,25
Realization of a Multilingual Investment Information Extraction System
li fang ; sheng huan zuo ; zhang dong zuo
..............page:21-25
A New Method to Detect Intrusions Using System Calls
pan feng ; ou yang ming guang ; wang wei nong
..............page:26-28,33