Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2004 Issue 5
Research and Implementation of the Virtual High Speed Network Interface of Net-raid
zhang jiang ling ; deng yu hui ; feng dan
..............page:916-919
High-Speed Transfer of Huge Data in the Hot-swap System Using Dual-working Technology
wu tao ; feng dan ; zhang jiang ling
..............page:920-923
Fiat-Shamir Signature Protocol Against Parallel Exhaustive Search Attack
deng hong su ; wan jun ; zhao yi ming ; zhu hong
..............page:924-926
N-to-1 Protection Method on the Basis of MPLS Bandwidth Guarantee
wang hua ; tian guo hui ; sun ya min ; wang zuo
..............page:927-929
Mapping and Utilization of DiffServ to ATM
zhang bing zuo ; sun ya min ; wang ning ; bian yu lan
..............page:930-933
Research on Multibus Mixed Distributed Network Control System
yang qing yu ; shi ren
..............page:934-937
Research and Application of Network Management Based on the Component GIS
cheng xiao rong ; niu xi xian ; zhao hui lan ; hu bo
..............page:938-940
Method to Form an Agent Coalition for Problem Solving
lan shao hua ; ye dong hai ; wu hui zhong
..............page:941-944
Research of Waveform Data Sampling Method Optimized in Arbitrary Waveform Synthesizer
zhang shao bai ; wang yong yan ; pei xian deng
..............page:913-915
Research of the Theory of Model Integration Based on Model Manipulation
wang jia yang ; luo an ; ding ning
..............page:863-866
Finding Relevant Documents Using Hyperlink and Similarity Measure on the Web
wang tian jiang ; ye wei guo ; lu zheng ding ; li yong ping
..............page:859-862
Introduction of a Real Time WWW Search Engine
chen tong bing ; wang bao you ; hu jin hua ; shi bo le
..............page:855-858
Realization-Oriented Protocol Specification Language Based on Temporal Logic
liu cai xing ; xiao de qin ; zhang huan guo ; zou hua sheng
..............page:847-850
A kind of Multi-Framework Integration Policy Model
wang yu ; li zeng zhi ; xue wen ge ; wang hai ; huo qiu yan
..............page:843-846
Summary of Web Caching Technology
he zuo ; chen zhao xiong ; huang he yan
..............page:836-842
Research and Implementation on Non-Equaltity Pakcet Pair Sequence Bandwidth Mesurement Method
zhang wen jie ; qian de pei ; zuo zhong zhi ; zhang xing jun
..............page:833-835
Quick Search Algorithm of Finding Similar Sequence
zheng ; zhu ming ; wang jun pu ; cai qing sheng
..............page:785-789
Active Evolution Based Genetic Algorithm
shi liang ; li hai ying ; yang jun an ; zhuang zhen quan
..............page:790-793
Satellites Clustering Algorithm Applied to the Space Network Management
jiang yue qiu ; chen dong song ; feng yong xin ; wang guang xing
..............page:794-797
Embedded Internet Technology and Synthesis
han guang jie ; zhao hai ; wang jin dong ; guan mo
..............page:798-802
Design and Implementation of a Multimedia Conferencing System for Business Negotiation
yang wu yong ; shi mei lin ; miao chun yu
..............page:803-806
A Kind of Technology of Protocol Model Based on CSP
gu xiang ; zhao bao hua ; qu yu gui
..............page:807-810
Control and Management to I/O Path of SAN Storage System
fu chang dong ; shu ji wu ; wu zuo ; shen mei ming
..............page:811-814
Analysis of Secure Protection Based on Secure Operating System
sun bo ; zhang xiang feng ; liang bin
..............page:815-820
Research on Verification of RBAC Policies Based on Petri-net
wei ding guo ; wu shi lin
..............page:827-832
Survey of Image-Based Modeling and Rendering
qiu jian xiong ; zhao yue long ; yang rui yuan
..............page:908-912
Point-by-Point Method for Image Reconstruction Based on Compton Scatter Energy Spectral Data
wang jia jun ; zhao ran ; huang xian wu
..............page:904-907
Augmented Reality:Characteristics,Key Technology and Applications
qi yue ; ma hong mei
..............page:900-903
Method of Image Noise Reduction Based on Wavelet Transform and Data Fusion
hu yu ping ; yu sheng sheng ; zhou jing li ; han de zhi
..............page:896-899
DCT-Based Robust Public Watermarking Usino Hilbert Scanning
yang heng fu ; yang zi hua
..............page:891-895
Survey of 3D-Face-Model-Based Tracking and Recognition
duan jin ; zhou chun guang ; liu xiao hua
..............page:886-890
TDNLMS Adaptive Filter Architecture Optimization for Small Objects Detection
sang hong shi ; chen chao yang ; shen xu bang
..............page:882-885
Research of Intrusion Detection Technology Based on Sequence Pattern Mining
chen wang bin ; wang li sheng ; liao gen wei
..............page:878-881
New Algorithms for Mining Assosiation Rules
ou yang jun ; ma wen ; shen jun yi ; shi bao huai
..............page:875-877
Improved Apriori Algorithm Based on Frequent Itempair Support Matrix
ni ; xu xiao fei ; deng sheng chun ; zhao zheng
..............page:872-874
Enhancing Method for AdaBoost
li bin ; wang zi shi ; wang wei ; shi bo le
..............page:869-871
Computation of a Core for Inconsistent Information Systems
zuo de qin ; chi zhong xian
..............page:867-868