Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2009 Issue 11
Research on Dynamic Web Services Composition Based on BPEL and QoS
zhang wen bo ; shi wei feng
..............page:72-75
Analysis and Simulation to Existence of Nash Equilibria in a TCP Game
feng jian ; wang shu tian ; lin ri guang
..............page:76-79,84
Research on New Network Simulator NS-3
zhang deng yin ; zhang bao feng
..............page:80-84
Research on Basic Elements of Granular Computing
li hong
..............page:89-93
Study of Semantic Reasoning Based on Ontology Description Logic
wang jin huan ; li bao min
..............page:94-96,100
Research on Analysis and Simulation of SCTP
xia yun ; sun li juan ; ye xiao guo ; xiao fu
..............page:27-30
A Hybrid PSO Algorithm Based on Chaos Optimization
zou yi ; zhu xiao ping ; wang xiu ping
..............page:18-22
Analysis and Suggestion on the AH and ESP in IPSec
lan ji ming ; chen lin
..............page:15-17,22
Research and Application of Supplier Selection Based on AHP and FCE
liu ning ; gao fei yan
..............page:11-14,162
Dimension Reduction Method of Support Vector Machine Based on Gram-Schmidt Process
feng jia ce ; ye ming ; wang hui wen
..............page:7-10
Hyperspectral Image Compression Employing Target Detection
song shi gang ; zhan yong jian ; li gang
..............page:1-3,158
Trust Model Based on Recommendation in Mobile Ad Hoc Networks
tan chang geng ; li jiang
..............page:68-71,75
Improvement and Application of BP Neural Network Forecasting Algorithm
wang xiao min ; liu xi yu ; dai fen
..............page:64-67
Dynamic Web Service Composition Based on Petri Nets
mao wei wei ; yu su ping
..............page:61-63,67
Buffer Management Technologies for High-Layer Protocol
shi jian ; lei yong mei
..............page:53-56,60
Research on Microscopic Lane Changing Model Based on Fuzzy Control
lin ; jiang zuo ; chai gan
..............page:250-封3
Analysis and Accomplishment of ESB Technology in Digital Campus Environment
zheng kai ; nie rui hua ; liang zhuo ming ; liu xue wen
..............page:246-249,封3
Implementation of Driver\'s Fatigue Detection System Based on TMS320DM643
ren xiao qing ; wang min ; zhou xiao hai
..............page:242-245
A Study on Method to Implement VoIP System in Heterogeneous Networks
xiao wei ; zhou wen an ; ma fei ; song jun de
..............page:238-241,245
Improved Linguistic Weighted Maximum Operator Based on Two-Tuple Linguistic Information Processing
bao guang yu ; lian xiang lei ; he ming ; xiao deng hai
..............page:49-52
Intrusion Detection System Based on Flow Load Balance
lu lei ; wang feng
..............page:135-138
Fusion of PCA and LDA for Intrusion Detection
zhang rui xia ; wang yong
..............page:132-134,138
A (t,n) Threshold Adjustment Scheme Based on IBE
yu chang guo ; yang geng ; li da wei
..............page:128-131
Fuzzy Identity-Based Broadcast Signature Algorithm
zhu li ; yang geng ; chen wei
..............page:123-127
Analysis and Research on Key Technologies to Next Generation Internet
xu jing ming ; bao yun
..............page:119-122
Research on Energy-Saving and Reliable Routing Protocol Based on LEACH and PEGASIS
wang guo fang ; li la yuan
..............page:115-118,127
Implementation of Geographic Information Service in National Science & Technology Infrastructure
wang xi you ; cao wei fang ; cheng zhen lin ; dong hui
..............page:111-114,166
Design and Realization of Instruction Components Based on .NET Environment
cheng bin ; li li wei ; he wen xue
..............page:108-110,170
A Study on an Integrated Quality Assessment of Sequence Iris Image
zhang li yun ; huang jian ; xue zheng yu ; zhao xin
..............page:104-107
Realization Method of a Triviariate Box Spline
li ling ; lu you
..............page:45-48
Texture Synthesis with Local Variation Based on Feature Matching
ye yong kai ; yu ji guo ; gu yao lin ; cao xiao long
..............page:42-44,48
Two Swarms Cooperative Artificial Fish-Swarm Optimization Algorithm
zhang chuang ye ; mo yuan bin ; he deng xu
..............page:38-41
Research on Text Classification Method of SVM and K-means
jin you li ; zhou ming quan ; wang xue song
..............page:35-37,41
Technology of Auto-Get Character Database in Numerical Input Method
zhou ke lan ; zhang yu hua
..............page:31-34
Application of Apriori Algorithm in Tax System
wang min ; liu xi yu
..............page:175-178
A Study of Object Detecting and Tracking Based on Video Sequences
liu xiang ; wu jin ; zhu yuan bo ; kang xiao jing
..............page:179-182
QoS Simulation and Research of Ad hoc Network Based on NS-2
wang jian qiang ; wu chen wen ; li xiao jun
..............page:183-186
Comparison and Analysis of Web Applications Based on Struts and Integrated Framework
song yang ; ma guang si ; lu zuo
..............page:187-190
Research of Database of Equipment Maintenance Material Management Based on RDB
meng xiao hong ; ma yong sheng ; jiang liang zhou ; zhao zong tao
..............page:191-194
RAR "Solid Reality" Encoding Research
sun wen ge ; liu li zhu ; zhang wen hua
..............page:101-103,107
Simulation Analysis of Influence of Initial Chirp on Propagation of Optical Signal
yuan zhong bao ; zhu jun ; liu zhi chao
..............page:171-174
Mixed Software Reliability Module Based on Testing Cases and Time Domain
zhang ling ; yuan na ; ma yong gang ; huang peng
..............page:167-170
Research and Application of Heterogeneous Data Integration Based on SDO
zheng lei ; cao bao xiang
..............page:163-166
A Model of Servers Cluster System Based on Mobile Agent
wang chun zhi ; wang zuo
..............page:159-162
Detection Mechanism of DoS Attacks in Peer-to-Peer Networks Based on Support Vector Machine
wu min ; wang ru chuan ; wang zhi ping
..............page:151-154
A Merkle-Based Anonymous Authentication Scheme in P2P Networks
cheng chun ling ; gao bing zhen
..............page:147-150,154
Key Distribution and Subscriber Addressing Optimization for Conditional Access System
hu ge ; ren sheng bing ; wang guo jun ; wang xi e
..............page:143-146
Research and Design Web-Based Security Audit Log System
zhou zuo feng
..............page:139-142,146
Visual Simulation of Attitude Control of Satellite Based on Open Inventor
zhang long hui ; song yang ; tang jun ; liang dong
..............page:214-217,221
Crane Scheduling Research Based on Multi-Agent and Evolutionary Algorithms
chen ling ; yan nan nan
..............page:210-213
Research of Extracting Battlefield Key Events
shen da chuan ; luo zuo ; wang jian xin ; qi yu
..............page:202-205,209
Design of CAN Repeater Based on ARM7
yu tao ; liu xiao ming ; zhong yuan hong
..............page:198-201
Research on Cloud Simulation Based on DirectX
hao jin liang ; chen lei ; lou gao ming ; hou jian
..............page:195-197,201
Simulation Model of Aggregated Equipment Combat Units\' Mission Maintainability Based on Mobile Aerial Defense Mission
feng hui juan ; yu yong li ; zhang liu ; liu wen wu
..............page:230-233,237
Real-Time Shadow Rendering Using GPU
liu shuang ; shen zuo chun ; di cui ping
..............page:226-229
Analysis and Research of AJAX Applications Based on GWT
chen ling ; wang jian dong
..............page:222-225,229
Research on Intelligent Monitoring System on 0.4kV Voltage Network
yang hong bo ; zhou chun lai ; mou chun ming ; li hong mei
..............page:218-221