Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Control & Automation
1008-0570
2005 Issue 33
A Sending and Receiving SMS System of Mobile Phone Based on Java
Sun,Lipeng;Qin,Long;Zhou,Anmin;Qian,Linjie;Wang,Yumei
..............page:179-181,46
Research on Array Data-Flow Analysis
Wang,Shanshan;Zhao,Rongcai
..............page:182-183
Test Cases Selection in Regression Testing Based on Dependence Analysis of EFSM
Huang,Ruoyi;Mao,Chengying
..............page:184-185
Study on New Item Recommendation Method in Collaborative Filtering Algorithm
Ou,Liqi;Chen,Li;Ma,Yu
..............page:186-187,100
Study Status and Advance of Robust Adaptive Beamforming Algorithms
Dong,Yankun;Ge,Lindong;Zhang,Hui
..............page:188-189,29
Techniques and Realization of Procedural Abstraction in IA64 Binary Translation
Fu,Wen;Zhao,Rongcai;Su,Ming;Zhang,TianLei
..............page:190-191,40
Study and Implementation of Bit Reduction Recognition
Liu,Min;Zhao,Rongcai;Zhang,Ping;Geng,Shuang
..............page:192-194
Automatically Finding Computation and Data Decomposition Algorithm
Dong,Chunli;Zhang,Ping;Han,Lin;Lin,Hongjun
..............page:195-197
Design and Implementation of Compiler subsystem in Active Object-Oriented System
Dong,Biao;Chen,Jinhui;Zhang,Yingchao
..............page:198-200,70
The analysis of context for windows kernel mode driver
Wang,Lanying;Ju,Jingwu
..............page:201-202,197
Study Of Recurrent Neural Networks Technic in speech coding
Zhu,Wenyu;Wang,Bingxi
..............page:203-204,26
Investigation of Protection Mechanism of RPR
Zhang,Zongyao;Ge,Ning;Sun,Minghai
..............page:128-130
Analysis of scalability of the switch fabric
Zhao,Haibo;Ding,Huan;Zhao,Junpeng
..............page:151-152,90
A study of QoS of IEEE 802.11e WLAN
Chen,Yi;Li,Jun;Li,Shengxian;Yang,Hongsheng
..............page:153-155
A Method for Text Filter Based on PCA and RS
Lin,Chen;Li,Bicheng;Song,Hui
..............page:156-158
Design and Implementation of a Practical Intelligent Meta-search Engine
Hu,Liping;Hu,Liang;Gao,Wen
..............page:159-161
An Advanced Channel Time Allocation Algorithm For IEEE802.15.3 MAC Protocol
Wang,Yuanfan;Peng,Zhangyou
..............page:162-164
The design and implementation of Web applications Based Struts and Hibernate
Song,Xiuqin;Hou,Diankun;Fang,Zhongchun
..............page:125-127
The Design and Application of the LNBD
Zhang,Rongqi
..............page:119-121
A new method for automatic measuring of tumour in MRI
Lao,Li;Wu,Kai;Wu,Xiaoming
..............page:94-95
Study of J2EE/EJB Based Product Data Sharing
Wang,Xin
..............page:91-93,95
Accessing to Database with ADO Technology and LabSOL Toolbox
Zhang,Bing;Dai,Xiaoqiang;Zhu,Zhiyu
..............page:88-90
Mining Frequent Itemsets Based on pseudo-Projection of Array
Chen,Kai;Feng,Quanyuan
..............page:85-87,150
computer dynamic forensics system based on the data mining
Liu,Donghui;Wang,Shuming;Zhang,Qingsheng
..............page:82-84
A Study of Several Kinds of Target Polar Decomposition Methods in SAR
Niu,Chaoyang;Ma,Debao;Zhang,Xiangfeng
..............page:98-100
A New Salt & Pepper Noise Filter Based on Soft Morphology
Yan,Qisheng;Wang,Shitong
..............page:96-97,124
ye nei dong tai
..............page:213-223
chan pin xin xi
..............page:205-212
Study and Design of MIS of Special Equipment Inspection
Ye,Jianping;Xiao,Yuan;Shi,Linxiang
..............page:61-63
Optical Communications And Its Skills
Liu,Xuan
..............page:131-133
Far Distance Transmission of USB2.0 Bus by Controling Network Chip
Gao,Shijie;Zhu,Xiaoshan;Wu,Zhiyong;Chen,Tao
..............page:134-136
Microengine design of Network Processor
Guan,Wenjian;Xue,Zhi
..............page:137-139
Algorithms for Page Ranking Based on Text Categorization
Li,Xinli;Ma,Jun;Lv,Yue'e;Zhang,Dewei
..............page:140-142
A New Available Bandwidth Measurement Techniquefor Service Overlay Network
Wang,Ning;Luo,Junyong
..............page:143-145,57
Space-time Block Coding Based on Transmit Channel State Information for 4 Tx Antennas
Zhou,Yong;Zhang,Shuilian;Xiang,Weiwei
..............page:146-148
Integration Framework of Virtual Enterprise Information Based on Web Service and Metadata
Wu,Xueling;Zhang,Jiashu;Wang,Xiaomin;Zeng,huipeng
..............page:58-60
jca yu yi gou eis ji cheng
zhang de wen ; han ru bo
..............page:55-57
Method of Load Forecasting Based on Segmentation Grey Model
Zhao,Zhiying;Wan,Jiajie
..............page:53-54,155
A New AOP-based Exception-handling Strategy in Workflow System
Hu,Jian;Song,Binheng
..............page:50-52
Implementation of Network Intrusion Detection System Based on Density-based Outliers Mining
Huang,Guangqiu;Peng,Xuyou;LV,Dingquan
..............page:78-81
Implementation of Network Intrusion Detection System Based on Density Outliers Mining
Huang,Guangqiu;Peng,Xuyou;LV,Dingquan
..............page:75-77,81
Application of Distributed Computing with Java RMI
Zhou,Shufeng;Meng,Han
..............page:165-167
The method of requesting from remote host MAC and java application
Guo,Jianbo;Li,Zhiming;Liu,Ningning
..............page:171-172,112
XML Describing of Remote Control-instruction with Realization
Zhu,Qi;Sun,Hua;Yan,Changhong
..............page:173-174,37
Application Of Space-Time Block Code In TD-SCDMA System
Li,Hebing;Zhang,Shuilian
..............page:175-176,158
The Research and Design of a Intelligentized Grabber System for web Information
Hong,Hui;Li,Shijun;Liu,Zijing;Ou,Weijie
..............page:71-74
Application of Support Vector Machine in Bank Customer Classification
Zheng,Qipeng;Li,Xiu;Liu,Wenhuang;Li,Bing
..............page:68-70
A Off-Line Fair Electronic Payment System
Liu,Yuan;Zhang,Limin
..............page:64-65,13
Application of the Least Square Method in the AC Servo System of CAM of Foot Orthosis
Zhao,Qi;Yang,Peng;Kong,Xin;Chen,Lingling
..............page:113-114,133
Fuzzy Rule-based Area Quantization and Realization of Garment Style
Zhang,Lining;Geng,Zhaofeng;Hu,Jianpeng
..............page:110-112
An Approach to Fast JPEG Image Retrieval
Wang,Xiaojie
..............page:108-109,118
Research on the Boundary-representation in Image using Chain code
Tang,Zhenjun;Zhang,Xianquan
..............page:105-107
Image Correlation Matching Algorithm Based on statistics of pixel eigenvalue
Niu,Gang;Liang,Wei
..............page:103-104,107
Image processing of Gaussian noise and impulse noise
Zhao,Bo;Quan,Houde;Huang,Xingzhi;Luo,Fan
..............page:101-102,49
Application of Distributed Simulation in Electronic Countermeasures
Lu,Jianqi;Zhao,Yongjun
..............page:47-49
Sniffer Discovery for LAN
Zhang,Yang
..............page:33-34,194
A Novel Hybrid Anonymous Communication System
Gao,Zhishi
..............page:27-29
Analysis of E-mail's structure and application of mail filtering
Li,Ru;Li,Bicheng;Xia,Yang
..............page:24-26
Reserch And Implementation Of Host Access Control For Windows
Li,Shengxian;Wang,Quande;Chen,Yi;Li,Xianghe
..............page:21-23,161
Application of Digital Watermarking in Network Anonymous Communication
Wang,Fuliang;Li,Bin;Shi,Jinqiao
..............page:17-20
Distributed Multistep Intrusion Scenario Modeling and Abstract Description
Deng,Qihao;Kong,Donglin;Wang,Qingxian
..............page:14-16
Study on the Data Remanence and Safety Deleting method
Lu,Xinghua;Liu,Zenglang
..............page:11-13
The Research of the TCP/IP Protocol Security Based on Linux
Zhang,Yi;Dong,Yunyan
..............page:41-43
Multiple grade proxy signature scheme based on key-insulated scheme
Cheng,Huaqin;Gao,Fengxiu;Ma,Chuangui
..............page:38-40
Threshold GOST Signcryption Scheme
Chen,Ruihu;Gao,Fengxiu;Ma,Chuangui
..............page:9-10,121
Study and Implementation of VNC Security Based on OpenSSL
Li,Jianshe;Wu,Qingbo
..............page:6-8,127
Digital Watermarking Algorithm Based on Spatiotemporal Chaos
Zhang,Wei;Shan,Xiuming;Ren,Yong
..............page:4-5,43