Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Control & Automation
1008-0570
2010 Issue 6
A Service-oriented Component for Content Management
ZHAO Xiao-yan REN Yong
..............page:198-200,211
Research of Free open-source encryption software True Crypt
WANG Chao-feng JIANG Mei SONG Ga-zi
..............page:66-68
A Dynamic Routing Algorithm for MPLS Traffic Engineering
HUANG Zhen-jian CAI Qun-ying
..............page:147-148,146
Persistent Layer Optimization of "Institute R&D Life Cycle Management System"
ZHANG Hui JIANG Chun ZHANG Xiao-yi WANG Fang-xiao
..............page:44-45,40
The Approach for Attributes Reduction Based on Rough Set Theory
FAN Chi-jie CHEN Li-min XIA Chun-yan
..............page:222-223,228
WCDMA Physical Layer on Radio Interface Measurements
WANG Yong SU Tian-zhu CHENG Yun-fei
..............page:17-19
The design of control privilege for campus network users based on option 82 and 802.1x
WU Jiang JIANG Shao-jie FENG Wen LIAO Rong
..............page:102-104,121
Building a secure Apache service through OpenSSL in window environment
ZHENG Hua LIU Li-na LI Xiao-nan
..............page:80-81
A Framework of Requirement Analysis Based on Insider Threat
ZHANG Yua
..............page:64-65,51
GPU based real-time rendering for point-based models
LIU Wu DING You-dong HUANG Dong-Jin
..............page:193-195,187
Active Object Pattern Application Research on the NMS Adapter
DING Chun-pei HUANG Di-ming
..............page:100-101,48
MIMO Equalization Based on Sphere Detection
HUANG Jing-jing SONG Gao-jun LI Shuang-fei
..............page:212-214
Data Modeling in the Data Warehouse Construction
LIN Xiang-yang GAO Zhan
..............page:183-185
Design and Implementation of SIP Though NAT Based on PDA
LONG Shou-yang CHEN Ming-song CHEN Feng
..............page:139-141
Network Traffic Anomaly Detection Based on Wavelet_AR
KUANG Zhong-lin WU Bin
..............page:73-75
Research and Application of Decision Support System Model Based on SQL Server 2008
YU Ming-hui HU Yao-min
..............page:178-180,192
Classifier Selection for intrusion detection
ZHANG Xin-dong KANG Jun-jian CHEN Yi-ying LI Wen-bin
..............page:82-83,124
A model of system based on mobile service
LI Chuan-wei LI Dong
..............page:127-128,217
Credit Card Fraud Detection Model Using Support Vector Machine
LI Gui-yang GUO Tao LIU Fang
..............page:69-70
An Improved scheme on SET protocol
ZHANG Zhen-de WANG Guo-cai TAN Long-wen
..............page:151-153
A Study of Semantic Web Service Discovery Framework
BI Yong-ze SHEN Qi
..............page:105-107
Applying of J2EE Middleware Technology in the E-Government System
ZHANG Zi-shi JIN Yi-fu
..............page:156-158
Path-wise test data generation framework and application
JIA Song-tao ZHANG Hong-wei
..............page:190-192
Research of materialized view maintenance based on Hibernate
KE Xi-wei WANG Lian-hui
..............page:161-162,214
Threats,Risks and Controls of SIP-based VoIP
WANG Tao HUANG Bing LI Ping-an LIANG Xiao-peng
..............page:137-138,141
tou gao xu zhi
..............page:7
Remote Authentication Scheme Based On Dynamic Password and Dynamic ID
TAN Long-wen WANG Guo-cai ZHANG Zhen-de
..............page:93-94,13
A Research of Deep Web Data Sources Focused Crawler Based on Ontology
ZHANG Su-zhi LI Li-na
..............page:27-29
Cost Benefits Analysis Of Automated Testing Plan
SHI Yong-li CHEN Yuan-yan LUO Xiao-shu JIANG Zhi-gang
..............page:218-219,228
Based on the robustness of the design of group key agreement scheme
CHEN Xue-zhao YANG Jie
..............page:84-85,110
Research on Multiplex Role Approval Component of EIS Based on Business Rule
YAN Zhi YE Bai-long SHEN Ye-ye LI Hao
..............page:32-34
SNMP-WEB-based Distributed Network Management System Design and Implementation
LI Xiao-bin LI Shu-zhen
..............page:142-143,146
The Research of 3D Model Data Network Transmission for Collaborative Design
HOU Shou-ming PAN Ya-feng SHEN Zhi-guang ZHAO Wei
..............page:20-21,203
Design of Multimedia System with a Home Gateway Powered by the OSGi Platform
DENG Lian-yong LU Yi-qin
..............page:95-97
Personal Web Service Based on Users’ Browse Behaviors
BAO Lei YANG Tian-qi
..............page:125-126,56
The Research Based On JZEE Component Assembly Technology
LIU Gao-song WU Yong-jun
..............page:35-37,8
Application of barcode technology in motorcycle assembling workplace
YANG Xian-gang HE Yu-lin LIU Dao-shuang PENG Zhen
..............page:3-5
An Automatic Question Answering System Using DotLucene
ZHAO Hui LI Chun-ming SHENG Xiao-zhong
..............page:166-168
Preliminary Study of Urban Disaster Early Warning System
PAN Feng DU Zhong-you XIAO Peng ZHANG Jian
..............page:52-53,68
Levenberg-Marquardt-based Neural Network for Corporation Credit Rating
LIU Yi-jun XIE Jun-yuan LI Bing-zhang YE Fei-yue
..............page:226-228
Research on Semantic Web Service discovery model based on Agent
PENG Zhi-ping FU Wen-jing YANG She-tang LIU Kun
..............page:30-31,19
The MTSP problem solving based on GA
QIU Jun-lin ZHOU Yong-quan ZHANG Ya-hong
..............page:224-225,211
Disease-related Protein Subnetwork Search Based on Greedy Algorithm
FAN Zhen-jie WANG Wei
..............page:188-189,217
Design of the Two-Step Network Information Filtering System
LIU Hui SHEN Feng-xian
..............page:111-113
Research on Architecture of Electronic Commerce
JIANG Bo
..............page:76-77
Recognition and protection against Malicious code system based on core net
OUYANG Wan-bin YIN Hong-dong
..............page:59-61
Research of unmanned distributed netted Radar and its key technique
HU Lei YAN Shi-qiang ZHAI Chang-sheng ZHAO Yao
..............page:46-48
An Approach to Analyzing Inter-Class Data Dependence of programs with Exception Propagation
ZHANG Yan-mei JIANG Shu-juan YUAN Guan
..............page:201-203
Design and Implementation of Web OS Based on Flex
JIAO Ning LU Xiao LIU Xiang-ping DU Juan
..............page:129-130,185
Internet intrusion detection model based on integrated intelligence
YANG Qun CAI Le-cai MO Zai-feng YAO-Xing-yan
..............page:89-90,97
The design of a filesystem in userspace using Fuse
WU Yi-min LIU Wei-an
..............page:159-160,168
The Reliability Study of The Certificates Model based on CSPN
HUANG Guang-qiu GONG Ye-zhen
..............page:22-24
Tibetan Phoneme Phonics MCAI Designing Based on Constructivism
CAI Zhi-jie CAI Rang-zhuoma
..............page:220-221,234
Use of Association Mining in Classroom Teaching Evaluation
XUE Xiao-feng
..............page:174-175,171
Design and Realization of Personalized Learning System Based on WEB Mining
WANG Hai-yang ZHANG Yan XU Jing
..............page:114-115,118
Research of SPIN routing protocol based on colored Petri net
SONG Guang-wei LI Xiang-yang PENG Xue-liang
..............page:98-99,88
Research on Data Consistency in Peer-to-Peer Platform
WANG Jian-yun
..............page:149-150
Apriori algorithm based on the application of Web-based Intrusion Detection System
XIAO Gui-yan ZHOU Man-yuan
..............page:71-72,113
A Forward-secure Anonymity Signature Scheme Based on Ring Signature Idea
ZHOU Zhang-xiong MAO Ming
..............page:62-63,61
PDM System Application Architecture Based on Ontology
LIU Chuang TAO Xue-heng
..............page:49-51
Generation of Geodesic B-Spline Curve
DU Hong-yun TANG Yue-hong WANG Jun-hai DU Jin-long
..............page:229-231
Design of a new E-Government Data Exchange Model
LI Dong-rui LI Mei
..............page:154-155,158
Moderate Access Control Model based on RBAC and Its Application
ZHANG Su ZHANG Xiao-yan
..............page:135-136,231
Design and Implementation of E-mail Monitoring and Auditing
WU Gang WANG Xu-ren ZHANG Xin-jie
..............page:131-132,107
Bloom Filter Based on Value Hashing Method
ZHANG Sheng-hua QIN Zheng SONG Yong ZHANG Zhong-zhi
..............page:91-92,5
Pairwise Covering Test Data Generation Based on Solution
CUI Dong-hua LI Jun-shi QIAO Su-qin
..............page:196-197,192
Based on VLAN technology in campus network construction
FENG Dong-zhu YANG Deng
..............page:133-134,185
Research of DRM Application Based on Trusted Computing Platform
LIU Man-hua LU Ke
..............page:232-234
The Research of Smart Home Application server Based on SOA
HAN Yan-guo HE Xiao-jian
..............page:38-40
Sensor network database design and application of parallel computing
GAO Zhong-xin
..............page:172-173,165
Research on Workflow management for Manufacturing Grid
XIE Lei XIE Hua
..............page:144-146
Pitch Period Detection Based on the Combination of Residual of LPC and SCMDSF
WU Guang-li YU Hong-zhi
..............page:25-26,29
The Research and Design of the Collaborative Plotting System Based on XMPP
LIAN Lan-ping QIU Jian-wei
..............page:41-43
Research and Realization for Building Desktop Application Using Web Technologies
JIANG Hai-yun WANG Shi-tong
..............page:116-118
Method of real-time detecting DDoS attacks in IPv6 network
ZENG Ji-xia XIE Dong-qing
..............page:54-56
Design on QoS Structure of IMS FMC based Home Network Gateway
YAO Gang ZHANG Wu WANG Jin-lin
..............page:11-13