Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2007 Issue 9
A New Image Retrieval Method Based Color Edge Feature
WANG Xiang-yang;ZHOU Lu;LU Ting-ting
..............page:1705-1709
A Switching Vector Median Filter Based on CIELAB Color Space
JIN Liang-hai;LI De-hua
..............page:1700-1704
Survey of 3D Image Skeletonization
HAN Guo-qiang;TIAN Xu-hong;LI Zhi-yuan;SITU Zhi-yuan
..............page:1695-1699
A Method for Implementing DES Using Partial Reconfiguration
WANG Feng;ZHOU Xue-hai;CHEN Ai;LI Xi
..............page:1690-1694
Note on "Two New Reduction Definition of Decision Table"
XU Zhang-yan;SONG Wei;YANG Bing-ru;GAO Jing;HOU Wei
..............page:1686-1689
A Modified Differential Evolution Algorithm for Multiple-choice Knapsack Problem
HE Yi-chao;KOU Ying-zhan;CHEN Zhi-ming
..............page:1682-1685
An Algorithm Based on Social Dance Phenomenon for Function Optimization
OUYANG Xing-ming;GAO Jian
..............page:1678-1681
Web Page Segmentation Algorithm for Mobile Devices
LU Song-feng;WANG Dan-dan
..............page:1672-1677
Stack Based Matching Scheme Discovery Algorithm
YU Hong;WANG Xiu-kun
..............page:1665-1671
Construction of Scalable Application Layer Multicast Tree Based on Genetic Algorithms
DUAN Han-cong;TANG Hui;LU Xian-liang;ZHOU Xu;ZHAO Zhi-jun
..............page:1591-1595
Research of a New Windows VPN Architecture Base on Virtual Network Card
XIAO Ling;LI Zhi-tang;MEI Song
..............page:1586-1590
A Segment-check Method for Mac 802.11 over High BER Wireless Network
WANG Shao-lin;YANG Shou-bao;DONG Kuo;WANG Da-peng
..............page:1579-1585
A Logless Fast IP Traceback Scheme Against DDoS Attacks
JING Yi-nan;WANG Xue-ping;XIAO Xiao-chun;ZHANG Gen-du
..............page:1537-1542
Worm Propagation Modeling and Analysis Based on the Mechanism of Dynamic Quarantine
WU Bin;YANG Shou-bao;ZHAO Ye-hong;WANG Shao-lin
..............page:1543-1548
A Routing Protocol Based on Constrained Equivalent Delay in Sensor Networks
YUAN Lin-feng;CHENG Wen-qing;DU Xu;HAN Zhi-ren
..............page:1549-1553
A Novel Vulnerability Assessment System Based on OVAL
CHEN Xiu-zhen;LI Jian-hua
..............page:1554-1557
A Review of Recent Advances in Internet Congestion Control Research
ZENG Zhen-ping;WANG Bing-wen
..............page:1558-1565
Explicit Blocking Notification-based Ad Hoc Network MAC Protocol
ZHANG Qi-fei;LIU Wei;CHENG Wen-qing;YANG Zong-kai
..............page:1566-1571
OHQFS: a New Policies of Data Query and Search on Unstructured P2P
ZENG Bi-qing;LV Xi-hong;CHEN Zhi-gang
..............page:1572-1578
Ontology-based Integration of Multi-domain Access Control Policies
LI Rui-xuan;ZHAO Zhan-xi;WEN Kun-mei;SUN Xiao-lin;WANG Zhi-gang
..............page:1710-1714
Study of Basic Audio Semantic Analysis and Extraction Techniques for Video Data
WEI Wei;ZOU Shu-rong;LIU Feng-yu
..............page:1715-1719
DWarn+: An Enhanced Fetch Policy for SMT Processors
SUN Cai-xia;ZHANG Min-xuan
..............page:1720-1723
Design and VLSI Implementation of an Application Specific Instruction Set Security Processor
LU Rong-hua;ZENG Xiao-yang;HAN Jun;GU Ye-hua;MAI Lang
..............page:1724-1728
zheng gao jian ze
..............page:1671
A Study on UML Modeling Oriented Function Point Measurement
LI Shi-xian;CHENG Li;DU Yun-mei;TANG Lin-yan
..............page:1660-1664
BC-iDistance:Bit-code Based Optimal High-dimensional Index
LIANG Jun-jie;FENG Yu-cai
..............page:1647-1651
Flexible Mechanism Based on Ontology Substitution in Migrating Workflow System
LIU Fei;ZENG Guang-zhou
..............page:1641-1646
Study and Implementation of Scheduling Algorithm on QoS Adaptation Framework over Data Stream
HAN Dong-hong;DU Yu;WANG Guo-ren;ZHOU Rui;YU Ya-xin
..............page:1637-1640
Study on the Method of Active Deployment of Soft-sensors in Grid Monitoring System
ZHU Quan-xin;GUI Xiao-lin;HUANG Xuan
..............page:1630-1636
SGPL: a Structured Grid Programming Language for Aggregating Grid Services
XU Yu-wen;GUI Xiao-lin;LV Ji-shu
..............page:1624-1629
A Node Management Strategy for Data Grid Environments
JIANG Jian-jin;YANG Guang-wen;ZHANG Wu-sheng;WANG Ding-xing
..............page:1619-1623
TTCN-3 Based Conformance Testing of SIP
HUANG Chuan-dong;JIANG Fan
..............page:1614-1618
Technology of Data Fitting based IXP2400 Packets Sending Speed Control
AN Ke;ZHAO Rong-cai;SHAN Zheng
..............page:1610-1613
Research Advances in Key Technology of Trust Model for P2P
LIN Huai-qing;LI Zhi-tang
..............page:1599-1603
Design and Implementation of Virtual LAN
LIN Hu;ZHANG Le;LEI Wei-min
..............page:1596-1598