Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2009 Issue 10
The Analysis of Share Price Based on Sentiment Orientation Research of Public
TANG Yang;TANG Dian-zhang
..............page:1-5,10
Design and Implementation of P2P Traffic Monitoring System
XU He;WANG Ru-chuan
..............page:6-10
Mobile Robot Topological Map Building Based on Thinning Algorithm
WANG Na;MA Xin
..............page:11-13,17
Design and Implementation of an EasyWord Editor Pen-Based on User-Centered
CAI Ping;SHEN Zhi-tao;HUA Qing-yi
..............page:59-61
Design of Web Software System Transaction Processing Model
TIAN Chong;LI Xing-guo
..............page:62-65,69
Research and Design of NAT Traversal Scheme in P2PSIP System
WANG Nan;SUN Bao-suo;WANG Yue-ping
..............page:66-69
The Human-Computer Interaction Technology of Virtual Simulation System Based on 3DMouse
WANG Hai-dong;ZHU Wen-hua;SU Yu-peng
..............page:18-21,25
Research on BP Neural Network Model for Corporation Credit Rating
CAI Qiu-ru;LUO Ye;LIU Yi-jun;YE Fei-yue
..............page:117-119
A New Method for Research on Extraction of Power Lines in Aerial Inspection System
CAI Ke;YANG Zhong;HUANG Xiao-ning;FANG Ting
..............page:113-116
A General Scheme for Video Tracking System
LIU Wei-guang;LI Guang-xin
..............page:110-112,116
Research on E-business Based on Lightweight J2EE Framework
HENG You-yue;LIU Feng;ZHONG Hong
..............page:106-109
Research of a Model of Web Information Acquisition Based on Topic_ Ontology
BAI Zhan-sheng;XU De-zhi;PENG Jia-hong;CHEN Guang-yi
..............page:102-105,109
Algorithm for Multi-Segment Image Contour Following Based on Multithreading
SU Cheng-shun;LI Zhen-pei
..............page:99-101
A Background Modeling Method of Maximum Margin Clustering
JIANG Zhong-min;ZHAO Jian-min;ZHU Xin-zhong
..............page:96-98,101
Research on Using XML to Construct CLIPS\' Knowledge Base
HUA Shan-shan;XIE Xuan-yang
..............page:93-95
A Design and Realization Supporting On-line Upgrade and Backward of Twice Bootloader
HAN Yan-fen;WU Yuan-ming;WANG Si-yao;YUAN Qiu-hong
..............page:89-92,95
Research on RFID Data Push Technology Based on Pushlet
LIANG Chang-yong;ZHANG Yi-yuan;ZHANG Jun-ling
..............page:85-88
A New Least Interference Path Algorithm for MPLS Traffic Engineering
XU Jing-cai;WANG Xin-hua;XUE Jian;YUAN Fang-bing
..............page:77-80
Algorithm for Mining Frequent Patterns Based on Circular Orthogonal Linked List
DUAN Yang-guang;WEI Yu-ke
..............page:73-76
Shadow Detection Method Based on Gradient Feature
YE Li-yan;ZHAO Jian-min;ZHU Xin-zhong
..............page:70-72,76
Research on the Consistency of the Judgment Matrix in AHP
LI Ling-juan;DOU Kun
..............page:131-133
An Adaptive Post-Processing Deblocking Algorithm
ZHANG Xin;TIAN Feng-chun;HUANG Yang-fan;JI Yan-li
..............page:127-130
Image Recognition in 2-D Bar Code Based on QR Code
WANG Wen-hao;ZHANG Ya-hong;ZHU Quan-yin;SHAN Jin-song
..............page:123-126
Research of Network Management Performance Optimization Based on AntNet
XIE Hui;WU Xiao-ping;ZHANG Yong-yu
..............page:120-122,126
A Host-Based P2P-Traffic Detection and Control Scheme
WU Min;WANG Ru-chuan
..............page:26-29
Study on Mobile IPv6 Network Access Authentication Strategy Based on Hierarchical Management
MA Tong-jie;CHEN Shu-yu;CHEN Xiao-wen
..............page:22-25
An Analysis of MD2 Animation File Format
SUN Hai-ying;PANG Ming-yong
..............page:54-58
Huffman Coding Based on a Top-Down Approach
WU Chen-hui;WANG Ying-hui
..............page:51-53,58
Research and Design on Dynamic Modeling Mechanism of Flexible Workflow
CAO Jian-hui;LI Feng
..............page:47-50
Formal Description of Operation Plan Based on XML
FAN Qing-yun;LIU Dong-bo;RUAN Qi-ming;WANG Xiao-ming
..............page:204-206,210
A Reliable Message Transfer Mechanism
XIA Sheng-ming;YIN Bao-lin
..............page:30-32,36
Interestingness Research of Association Rules in Incremental Mining Data
XIANG Zhe;LIN Guo-long;YANG Bin
..............page:33-36
Improvement and Simulation of Bottleneck Ramp-Metering Algorithm
XU Chen;JIANG Min;CHAI Gan
..............page:37-39,43
Evaluation of Quality of Teaching Based on Granular Computing
LI Ping;WU Tao;WANG Qiong-zhi;ZHANG Shuai
..............page:40-43
Research on Satellite Network Control System Structure
XIE Hui-ting;SUN Li-juan;XIAO Fu;WANG Guang-hui
..............page:207-210
E-government System Development Based on Multi-agent Technology
MO Yong-xin;SUN Hong-bing
..............page:200-203
Research on the Application of Design Patterns in SUPL Locating Agent on SET
DING Liang;LI Ling-juan
..............page:197-199,203
Study of Satellite Networks Simulation in Walker Based on NS2
LIN Ping;WANG Ru-chuan;XU Xiao-long
..............page:189-192
A Peer-to-Peer Identity Authentication Technology Based on PKI
HE Feng;WANG Ru-chuan
..............page:181-184,188
The Analysis and Design of Online Examination System
CHEN Hui-hui;ZHANG Xin-yan
..............page:214-217,221
Application of Mobile Agent Based on Model-Driven in Network Fault Management
ZHI Yong;HUANG Hai-ping;WANG Ru-chuan;SUN Zheng-lin
..............page:222-225
Research on Post Detection Integration Methods for the Telemetry Spread Spectrum Receiver
LIU Xiao-ming;LIU Sha;WU Hao-wei
..............page:226-229
Research on Integration of Healthcare Enterprise Based on Agent Technology
ZHANG Chun-fei;ZHENG Shan-hong;LI Wan-long
..............page:250-封3
Design and Achievement of Dynamic Statistical Chart Based on OWC
ZHANG Cheng-cai;CHANG Jing;YE Wei
..............page:247-249,封3
Design and Realization of a Type of Interpreter for Experiential Knowledge
YUAN Xiao-zheng;MAO Ning;CHEN Qing-xin;CHEN Chen
..............page:242-246
Integrated Identity Management in Power Enterprise Application System Based on SPML
ZHU Jie-qiong;DUAN Bin;ZOU Ji-chang;CUO Hua
..............page:238-241,246
A Force Visual Feedback Method Based on Spring Model
ZHOU Yue-fei;ZHANG Xiu-shan;YUAN Kai
..............page:230-233
A Novel Geographic Routing Applied in Ad Hoc Networks
HUANG Ji;ZHOU Ji-peng
..............page:145-148
A New Method of an Improved PCNN Model for Image Segmentation Based on Fuzzy Entropy
ZHAO Yong;CHEN Li-chao;ZHANG Ying-jun;LI Xin-huan
..............page:141-144
A Recognition and Tracking Method in Vision-Based Multi-touch Technique
QI Ting;WANG Feng
..............page:138-140,144
Research and Implementation of Semantic Retrieval Technology Based on Ontology
WANG Ji-dong;ZHANG Yu;LI Na
..............page:134-137
An Efficient Electronic Cash Model Based on Group Signature
WANG Da-xing;TENG Ji-kai
..............page:174-176,192
A Freshness Attack for A(0) Protocol and Improved Scheme
TANG Zheng-yi;LI Jun-tao;LI Xiang
..............page:164-166
Unknown Virus Detection Based on Exceptional PE File Structure
FAN Zhen;YANG Qiu-xiang
..............page:160-163
Information Collection of Website which Achieve Identity Authentication Based on JSSh
WAN Jiu-shi;LI Xiang;LIN Xiang
..............page:156-159
Research of Airport Anti-Intrusion System Based on SOA Architecture
WANG Xing-wu;ZHANG Quan-bing;XU Yan
..............page:152-155
Research on Resource Allocation of Combinatorial Auction in Grid Based on Improved Ant Colony Algorithm
BAO Na;ZHANG De-xian;SUN Ao-bing;WANG Fei
..............page:149-151,155