Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Control & Automation
1008-0570
2010 Issue 3
An application research based on computing of semantic similarities of HowNet
XU Meng LIU Zong-tian ZHOU Wen
..............page:200-201,206
Improved algorithm for ART2 neural network
LONG Jun TAN Hai-yan
..............page:104-106
An Improved KNN Text Categorization Method Based on Clustering
LIU Hai-feng YAO Ze-qing LIU Shou-sheng SU Zhan
..............page:18-20
A novel web application tamper proof method
WEI Ruan-jie LU Hong-tao
..............page:71-73
Research and Implementation on Host System Security Structure
HOU Jia-li FENG Neng-shan
..............page:99-101
Research and Improved Algorithm of HITS Based on Web Structure Mining
FAN Cong-xian XU Ting-rong FAN Qiang-xian
..............page:160-162
Research on Internet invulnerability based on complex networks theory
DING Lin TAN Min-sheng XIAO Wei
..............page:138-139,145
Design of the Parallel Space Data Processing System
LIN Yin HEI Bao-qin
..............page:193-194
Application in CRM of Power Supply Enterprise based on the improved K-means Cluster Algorithm
MENG Jian-liang SHANG Hai-kun BIAN Ling
..............page:198-199,234
A Web Predictive Model Based on Neural Networks
HUANG Zhong-zhou LIU Quan WANG Xin-fa
..............page:202-203,231
Design and Optimization to A P2P File System in MANET
SUN Bao-suo LU Jian-de
..............page:122-124
Research and Implementation of WEB Based on AJAX
YE Xiao-ling WU Min ZHANG Ying-chao
..............page:222-223,226
Design & Implementation of a New Type Web Crawler
WANG Jiang-hong ZHU Li-jun LI Cai-hong
..............page:136-137,142
Implementation of rural tele-education on-line monitoring and statistical system
QIU Jian-ling DING Jian-rui
..............page:174-175,167
Design of improved Ad-hoc Network Intrusion Detection Agent
QU Liang HUA Ji-xue WU Fa-wen
..............page:88-90
Design of SMS value-added services based on XMPP
WANG Feng HUI Li-na XIONG Shu-hua
..............page:107-108,106
Services Access Control Model based on Extended SOAP Message
WANG Jia-lin ZHAO Feng-yu
..............page:56-58
Evaluation Model for Dynamic Security Situation Based on Information Fusion
HUANG Guang-qiu ZHU Qing
..............page:27-29
Research on Monitoring Mechanism in P2P Network Authentication System
ZHAI Guo-wei REN Xin-hua
..............page:119-121
The Research of Traverse of Merkle Tree
ZHU Juan JIN De-qiang MO Si-quan
..............page:182-183
Implement of USIM Card’s Dynamic Update Menu Based on OTA Technology
ZHOU Yun-qiang LI Dai-ping LIU Zhi-wu ZHOU Lin ZHENG Han-de
..............page:140-142
A Reusable Web Chart Framework based on XML
ZHANG Wen-qi XU Wei-jun PENG Zi-cheng
..............page:178-179,197
The Memory Data Storage Management of ARTs-EDB
GAO Jian-guo CUI Ye-qin
..............page:163-164,124
Research on Integrating Enterprise Legacy Systems into SOA
ZHANG Yu-dong
..............page:227-228,216
Digital Archives System application with AOP
XU Ping SHAO Ding-hong LI Lan-you
..............page:224-226
Study on Dynamic Management Method of the Residual Risk in Information System
WANG Ben-jian FANG Yong YANG Yan-feng
..............page:47-48
Study on Sorted Separability Based on Graphical Presentation of Multivariate Data
CUI Jian-xin XU Yong-hong HONG Wen-xue GAO Hai-bo
..............page:21-22,55
The model of Graph Collaboration based on VRML and JAVA3D
ZHANG Ya-ling GAO Ao-han ZHANG Jing
..............page:30-32
Suffix tree clustering algorithm in the meta search engine
FENG Bing-jie YANG Tian-qi
..............page:204-206
An Analysis of Secure Authentication protocol EAP-FAST
FENG Qian NIE Shui-xiang SONG Xue-yong
..............page:83-85
Study of Intrusion Detection Based on Cloud Model
JIANG Jian-bing LIANG Jia-rong WANG Long
..............page:102-103
Modeling and Realizing of the Crowd Event
SUN Xian-fu OUYANG Ning MO Jian-wen LI Zi-qing
..............page:229-231
Study of Evaluation for Product Configuration Base on Hierarchical Grey Relation Analysis
WANG Ming-tian LIU Fu-yun WEI Xing ZHI Hai-shen
..............page:61-63
A Search Algorithm for Fast Motion Estimation in accordance with Video Phone
ZHANG Yong-hui LI Lin-sheng
..............page:217-218,226
Research of Enterprise Information Systems Security Architecture
TANG Jun ZHAO Xiao-juan JIA Yi-long
..............page:43-44,37
A remote maintenance system for ERP system
LI Zhen-hao LI Lin PENG Zi-cheng
..............page:180-181,93
Evaluation Based on Fuzzy Clustering in Teaching Quality of Teacher
GUO Xiu-juan YUAN Yue FAN Xiao-ou
..............page:33-34,32
Self-certified Signcryption Scheme Based on Elliptic Curve
YU Hui-fang WANG Cai-fen WANG Zhi-cang
..............page:94-95
Research on a Distributed Trust Mechanism in P2P Network
WANG Qing-sheng ZHANG Sha-sha ZHAI Guo-wei
..............page:116-118
The implementation of method-base in social insurance system
WANG Hua PENG Li
..............page:158-159
Ocean Environment Data Sharing Grid based on OGSA-DAI
HUANG Xin QIN Bo LIU Pei-shun
..............page:45-46,221
A Trust-Based Detecting Mechanism in Secure Recommender Systems
ZHANG Qiang LUO Yuan WENG Chu-liang LI Ming-lu
..............page:68-70,63
Modeling of Web Traffic and Its Application
SHI Lei LIU Quan HUANG Zhong-zhou
..............page:11-12,29
PERT Decision-Making Systems Analysis and Design of Lane Projects in Coal Mine
GUO Xiu-fu YU Shi-wei ZHU Ke-jun
..............page:13-14,20
Data-caching Mechanism of P2P VOD MVC
LI Wen-juan XU Jie LIU Meng-juan
..............page:190-192
Decision tree algorithm use to forecast and analyse for students’ marks
WU Tong WANG Xiu-kun
..............page:209-211
A Framework of Intrusion Detection System Based on Agent Technology
DU Xian-feng QIANG Zan-xia
..............page:96-98
WAP Electronic Commerce Payment System Based on Linux
HE Han-hua
..............page:35-37
Study on Multilevel Comprehensive Safety Evaluation Method for Amusement Ride
LIN Wei-ming XIAO Yuan YE Jian-ping E Li-jun
..............page:51-52,58
Measurement and control system exploiting of evaporating and condensing in tube based on Forcecontrol
WANG Wei TAO Le-ren TAO Hong MIAO Hua ZHANG Li-jun
..............page:59-60,192
Opportunistic Routing in MultiHop Wireless Networks
WANG Shi-cheng HU Xiao-peng WANG Ze-yong GAO Xiao-rong WANG Li
..............page:134-135
An Integrated Multimedia Communication Network System Based on WLAN in the Underground Mines
TANG Chun-xia YANG Chun-hua WANG Li-guan
..............page:1-2,55
An Optimal Method for Detection Model in Collaborative Recommender Systems
MA Lin SU Yi-dan MO Jin-ping
..............page:207-208,231
The Design and Implementation of a Web Services-based Distributed File System
LI Ping HU Li-shuan SUN Xue XIANG Cai-hong
..............page:212-213,197
Network Security Situation Assessment Based on Vague Sets
GU Ying-yan YAO Shu-ping
..............page:78-79,85
Research on A Security Model for Multi-communication Based on XML
QIAO Jia-xin MA Ji DUAN Kai-yu
..............page:91-93
Application and Research of Workflow Technology in Coordination Office System
LI Hao YE Bo-long DENG Jun
..............page:176-177
Research of Based-SIP NAT Transversal
ZHANG Kun ZHANG Jing-chun SHAN Ji-feng
..............page:111-112,95
On Purchasing Portfolio of Power Suppliers Based on CVaR
WANG Rui-qing WANG Xian LI Yu-zeng
..............page:38-40
Research on the Algorithm for the Solution to the Maximum Network Flow Problem
SUN Ze-yu DING Guo-qiang CHENG Zhi-qian
..............page:143-145
An Adaptive Video Watermark Algorithm based on DCT Transform
ZOU Min LIN Jia-jun
..............page:80-82
Integration of Enterprise Application Based on SOA
LI Hong-qi WU Zhuang
..............page:53-55
Implement Offline Browser Based On Java
XIA Xiao-yang JIANG Chun-hua
..............page:109-110,101
tou gao xu zhi
..............page:1
Intelligent Decision Support System for risk management of collaborative projects
ZHANG Hong-guo XU Hong-guo
..............page:23-24,121
The key technology to realize controllable CERNET provincial area network
DUAN Xiao-rong HUANG Chuan-hua YAN Zhi-hui
..............page:128-130
An Improved RED Routing Queue Algorithm Analysis and Research
WU Bo LI La-yuan
..............page:131-133,127
The Design and Implementation of Interactive Costume Exhibition System Based on Virtools
LIU Jing-yan HUAI Yong-jian SHUAI Li
..............page:195-197
A protocol analyse based IRC botnet detection method
YU Hong-peng LIU Ze-hong ZHANG Ming-hui
..............page:154-155
A New Protocol for Safe Electronic Voting System
JIN Yi-li ZHONG Yong
..............page:76-77
An Improved Design of clone TPM detecting
YIN Zhi-xi YIN Si-qing
..............page:219-221
Research on Armored Equipment System Warfare Efficiency Evaluation Based on ADC-AHP
LIANG Dong CHEN Chang-yi FAN Yan-ping BAI Yan-qi
..............page:15-17
Design and Implement on Security Access Control System Based on TNC
HAN Li XIE Qiang
..............page:74-75,118
The Design of IM Based on Symbian OS and SIP
ZHANG Ke ZHOU Xin-zhi
..............page:49-50
A New Identity Authentication Scheme Based on Smart Cards
HU Ming ZHANG Xiao-bing WANG Yan
..............page:41-42,40
Research of Fuzzy clustering based on quotient space
LU Bin ZHAO Xiao-min JIN Ran-ran
..............page:8-10
On P2P Search Methods Based on Mobile-Agent
WANG Long
..............page:152-153,98
Storing XML Document Holding The Restriction Information
WANG Kun-ming DONG Guo-qing
..............page:156-157
Assessing Production Management System of Carbon Electrode Factory Based on Intranet
BAI Gui-mei LI Ming-zhao QIN Zhan-jun
..............page:64-65,73
The campus network building based on VOIP technology
YANG Jie CHEN Xue-zhao
..............page:146-147,17
Fit MC/DC for test case generation method based on binary tree
ZHANG Yu ZHANG Bo WANG Jun-jie CHEN Yuan
..............page:171-173
Opiomization for continuous function based on pattern search
QIN Ying-bo HU Jin-song
..............page:184-185
An Adaptive Algorithm for Surface Reconstruction on Scattered Data
WANG Lian LI Hui LI Ze-yu WANG Yong-wen
..............page:186-187,157
Software Reuse Based on DSSA
LIU Yan-yan LUO Ke-lu
..............page:188-189,234
An improved clustering method for shot segmentation
SHEN Yong-jun ZHANG Feng GUO A-di TIAN Xi-wei
..............page:6-7,10
University Enrollment Plan Decision Support System Based on Fuzzy Mathematics
DUAN Dan-qing CHEN Qi-yuan YANG Wei-ping
..............page:3-5