..............page:128-130,136
..............page:131-133
..............page:114-116,127
Application of Agent Technique in the Network Environment
duan peng 1; gu yu 2; fan jing 2; zhang tian-jun 2 (1. the school of mathematics and computer science; yunnan university for nationalities; kunming; 650031; china; 2. network center; yunnan university for nationalities; kunming; 650031; china)
..............page:117-119
..............page:97-100
..............page:101-104
Design and Program VRML2.0 Molecule Models
ye yan-qing 1; shao jian-long 2 (1. the school of chemistry & bio-science; yunan university for nationalities; kunming; 650031; china; 2. faculty of information engineering and automation; kunming university of science and technology; kunming; 650051; china)
..............page:120-123
Normal BZ-algebras
liu wen-hui 1; zhang xiao-hong 2 (1. department of computer science and technology; kashgar teachers college; kashgar; 844000; china; 2. department of compputer science and engineering; northwestern polytechnical university; xi an 710072; china)
..............page:73-75
..............page:108-110
..............page:86-88,96
A Time-Window Based Algorithm for Intrusion Detection
gu yu 1; duan peng 2; zhang tian-jun 1; zhou bo 3 (1. network centre; yunnan university for nationalities; kunming; 650031; china; 2. the school of mathematics and computer science; yunnan university for nationalities; kunming; 650031; china; 3. ruihai electronic; ltd.; kunming; 650031; china)
..............page:105-107
..............page:76-79,82
..............page:134-136
..............page:65-66,75
..............page:124-127
..............page:111-113