Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2009 Issue 4
System Structure Study of Business Intelligence Integrated Text Mining
GE Yu-xiang;XIONG Li
..............page:1-4,8
Efficient Data Access of Multi-Channel Broadcast in Mobile Environment
DUAN Hong-liang;LEI Xiang-dong
..............page:5-8
Attribute Reduction Based on Tabu Search in Rough Set Theory
DING Hua-fu;LIANG Jian-zhong
..............page:9-12,16
Transplant of U-Boot and μClinux Based on S3CA4B0X
GUO Jian-lei;YANG Hou-jun
..............page:13-16
Target-Associated Detection of Image Sequences Based on FPGA
YANG Fen;CHANG Qing
..............page:17-19,24
Research of Technology in Software Reverse Engineering
YAN Xiu;LI Long-shu
..............page:20-24
Distributed Inverted Index and VSM Algorithm Based Complex Peer-to-Peer Search
LI Xiang;WU Guo-xin;GUO Jing
..............page:25-27,187
Research of a Real-Time Technology with Linux
TIAN Zhen;JIANG Xin-hua;CHEN Xing-wu
..............page:28-30,34
Distributed Associational Rules Data Mining Based on Web Service
JU Li-wei;JIANG Hao;PU An-jian
..............page:31-34
A Study on GMM Optimization with Clustering for Improving Speaker Recognition
WU Qing-qi;LIN Jiang-yun
..............page:35-37,40
A Method of Color Histogram of Image Retrieval
ZOU Wu;LI Long-shu;ZHOU Shan-shan
..............page:38-40
Research on Knowledge Transfer-Based ERP Implementation Methods and Strategy
LI Sheng-yun;XIONG Li
..............page:41-44,47
An Effective Algorithm for Image Registration
LIU Zhong-yan;ZHOU Bo;CHE Xiang-qian
..............page:45-47
Research and Implementation of XQuery
HUA Shan-shan;XIE Xuan-yang
..............page:48-50
Multi-Thread Analysis about Java Program Based on Petri Net
GUO Juan;XU Zhi-cai;FANG Xian-wen
..............page:51-53
A Fast Security Cyberspace Situational Awareness Algorithm
SHI Ming-ruo;JIANG Zhong-hua;YAN Fang
..............page:163-165
Mobile-Agent Intrusion Detection System Based on P2P Theory
SUN Ming-song;LI Qing;LIU Xin
..............page:166-169
Access Control Systems Based on SOA and PKI/PMI
ZHOU Guang-ming;ZHAO Li-li;PENG Chang-gen
..............page:170-173
Evaluation of Variation in Dynamic Handwritten Signature
CHANG Hao
..............page:174-176
A New Image Encryption Method Based on Phase and Amplitude of Fractional Domain
WANG Yin-hua;WANG Li-ping
..............page:177-179,183
An Access Control Model under Matrix Organization
ZHANG Yi-fei;XU Lei
..............page:180-183
Development of Infrared Auxiliary Diagnosis System of Charged Equipments
WANG Fu-tian;TANG Jin;LUO Bin
..............page:184-187
Aspect-Based Component Model and Its Assembly and Implementation
XIE Wu-ping;XUE Jin-yun;WAN Song-song
..............page:160-162,165
Research in Complex Motion Tracking on Segmentation
QING Bo;YANG Chen-hui;CHEN Tao
..............page:157-159,173
Hierarchical Reinforcement Learning with MAXQ Method
PANG Shi-huan;ZHU Xiang-bing;ZHANG Qi;TANG Ping-ping
..............page:154-156,169
Design of Scientific and Technological Resource Sharing Platform
ZENG Xi;WANG Zhuo-hao;ZHOU Ming-quan
..............page:149-153
Use Busybox to Make Cramfs Root Filesystem
CHEN Li-ding;YANG Jun-hui;CHEN Wei-xin
..............page:146-148,153
Image Classification Mining Based on Rough Set
LI Long-shu;ZOU Wu
..............page:143-145
Research on Key Technologies of IP Multicast
BAO Huai-zhong
..............page:138-142
A Survey of Spatial Clustering Research
MA Cheng
..............page:134-137,142
A Method of Moving Object Detection and Tracking of Mobile Robot
LIU Wei;WANG Jian-ping;ZHANG Chong-wei
..............page:105-108,111
Face Detection and Normalization Based on Localization of Human Eyes
JIN Yan;TAO Liang
..............page:95-97,104
Design and Realization of Web Application Based on Struts+Hibernate
LI Fa-ying;ZHU Hai-bin
..............page:91-94
Workflow Simulation Based on Stochastic Petri Net
XU Chun-xia;JIANG Hao
..............page:87-90,94
Compare Diameters of Directed and Undirected Double Loop Networks
DING Lei;FANG Mu-yun;GAN Li
..............page:80-82,86
Hot Trend Prediction of Network Forum Topic Based on Wavelet Multi-Resolution Analysis
ZHANG Hong;ZHAO Bing;ZHONG Hua
..............page:76-79
Research and Design of MIS Based on UML
WANG Gui-sheng;XIA Yang
..............page:69-72
Research on Workflow Failure Recovery
ZHANG Meng;HOU Xiu-ping;WANG Ye;ZHAO Yun-feng
..............page:65-68,187
Iris Normalization Algorithm Based on Line Extraction
GUO Qiao-li;FAN Xiao-yong
..............page:57-60
Design and Realization of TET LCD Controller Based on NiosⅡ
ZHENG Jian-ling;YUAN Liang;JIAO Wen-cheng;YUAN Jian-dong;JU Zheng-quan
..............page:192-195
Research and Design of Edge Detection Based on FPGA
FU Mai-xia;XING Chao;LIAN Fei-yu;WANG Peng
..............page:196-198
Design of Ethernet in Substation Automation System
YANG Kuo-wu;ZHOU Zon-xi
..............page:199-201,205
Research of Medical Information Text Categorization Based on KNN Algorithm
XU Xing;ZHANG Qi-rui
..............page:206-209
A Simple Method for Medical Image of Rigid Registration
LUO Fen
..............page:210-212,216
Application of Genetic Algorithms in Multi-Objective Flexible Job-Shop Scheduling
ZHU Wen-long;DING Hua-fu
..............page:217-219,223
Research on Cutting Knowledge Points in Intelligent Computer Aided Instruction
LI Yue-min;WANG Hao;ZHAO Sheng-hui;JI Cheng-chao
..............page:220-223
Study on Text Categorization Based on Genetic Algorithm and Fuzzy Clustering
YU Shui-ying;DING Hua-fu;FU Zhi-chao
..............page:131-133,142
Web Service Composition Modeling Based on Colored Petri Net
YING Hong;WU Yu;GUO Jiao
..............page:128-130
Research and Improvement on LZW Lossless Compression Algorithm
XU Xia;MA Guang-si;YU Tao
..............page:125-127
A Watermarking Algorithm Based on Wavelet Transformation
WANG Wei-jing;ZHAO Yuan-yuan
..............page:122-124
Research of Builder of Virtual Scene Described Document Based on X-VRML
HAN Li-hui;NIU Lian-qiang
..............page:119-121
Analysis of H.264 Motion Estimation Algorithm
YU Fei;HUANG Shi-tan
..............page:115-118
A Method of β Value in Variable Precision Rough Sets Model
ZHOU Ai-wu;ZHOU Shan-shan;ZOU Wu
..............page:112-114,118
Study of Minimum Spanning Tree Routing Algorithm in LEACH
TANG Qi-tao;TAO Tao;WU Hai-bo
..............page:109-111
3D Reconstruction of Shoe-last Based on Binocular Stereo Vision
WANG Jian-wen;WANG Min
..............page:224-226,230
Clock Synchronization and Retaining in Local Area Network
LI Xue-jun;XIE Jian-wei;YU Feng-kun
..............page:227-230
Research of Load Equalization Question in Information Construction of New Countryside
DING Ren-yuan;LI Yang;MA Yu-bao
..............page:234-238
Complete Intrinsic EHW Design Based on Handel-C
YANG Yi;FANG Qian-sheng;FAN Qing-chun
..............page:239-241,245
Design and Realization of Wireless Network System Based on ZigBee
XIONG Lei;DONG Kui-yong;QIAN Wei;GE Lei
..............page:242-245
Using Virtual Machine Technology to Perform Complex Network Experiment
WANG Tai-cheng;CAI Yong
..............page:246-249,封3
Bandwidth Management in Campus Network Based on DPI Technology
NIE Rui-hua;HUANG Wei-qiang;WU Shi-yi;LUO Hui-qiong
..............page:250-封3