Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2005 Issue z1
Research on the application of network storage in the U.S. army
Jia Lianxing;Wang Honghai;Li Chenhui
..............page:154-157
A dynamic replication model base on minimal access cost of wide-area storage virtualization
Pang Liping;Zhu Chubo;Wu Song;Xiong Muzhou
..............page:150-153
A pattern growth algorithm for frequent patterns mining
Hou Junjie;Li Chunping
..............page:272-274
Description logics based on interval fuzzy theory
Hu He;Du Xiaoyong
..............page:275-277
The semi-automatic construction of the semantic element representation base
Fang Miao;Gao Qingshi;Yu Zubo
..............page:278-281
A support vector domain classification algorithm with gray information
Zhao Yinggang;He Qinming;Chen Qi
..............page:282-284
A secret image sharing scheme based on Lagrange interpolating polynomial
Lu Chao;Yu Meisheng;Liu Yanfang
..............page:285-288
Research on a trust network storage security system based on the third-party structure
Huang Jianzhong;Xie Changsheng;Cao Qiang;Luo Dongjian
..............page:158-160
Research on zero-copy technology in RAID
Liu Ruifang;Wan Jiguang;Tan Zhihu
..............page:161-163
Matrix clustering-based collaborative filtering algorithm
Gao Fengrong;Xing Chunxiao;Du Xiaoyong;Wang Shan
..............page:257-260
Markov model prediction based cache management policy
Lu Yanmin;Chen Hong
..............page:261-264
Program diagnosis method based on operator matrix model
Fan Zhaofu;Jiang Yunfei
..............page:268-271
PR-tree: a multidimensional distributed index for peer-to-peer systems
Guo Peng;Wang Bin;Wang Guoren;Zhang Ende
..............page:221-225
Design and implementation of MAISE CRAWLER based on mobile agent
Shi Ke;Zhou Libing;Tao Wenbing
..............page:226-228,246
The construct and use of semantic tree of Web pages
Zhao Yanbin;Li Qinghua;Zhao Feng
..............page:229-231
A data stream operator scheduling algorithm for multiple goals
Gao Yuan;Yu Ge;Li Fang fang;Yu Yaxin
..............page:232-234
Load shedding strategies for multi-join in wireless sensor networks
li lin ; yang xiao chun ; wang bin ; yu ge
..............page:235-238
A dynamic data declustering method in parallel data warehouse
Dai Wenhai;Chen Hong
..............page:239-242
Research on computation of dwarf-based semantic compression data cube
Yin Ying;Zhang Bin;Zhao Yuhai
..............page:243-246
An efficient image indexing method based on adaptable fuzzy clustering
Zhang Qin;Kang Daxiang;Tao Wenbing;He Ruhan
..............page:247-248,256
Document fragmentation for XML streams based on Hole-Filler model
Huo Huan;Hui Xiaoyun;Wang Guoren;Wang Bin;Han Donghong
..............page:249-252
A generic framework for storing specific streaming data
Liu Yunsheng;Deng Huafeng;Dai Yichen;Ma Chaowu
..............page:253-256
The research on comparisons of OCL 2.0 expression semantics
Li Shenghong;Miao Huaikou
..............page:182-185,201
Supporting test design reuse by architecture based modeling
Chu Wang;Qian Depei
..............page:186-188
An overview of aspect oriented programming and its related technical issues
Lin Zhiqiang;Wang Yi;Mao Bing;Xie Li
..............page:189-192
Graph-based algorithm of Web services composition
Liu Feng;Tan Qingping;Yang Yanping
..............page:202-204
DBF: an enhanced bloom filter for supporting data management in distributed environment
Fan Junmei;Wang Bin;Wang Guoren;Guo Peng
..............page:205-208
A new lightweight index SUA for biological sequence analysis
Wang Di;Wang Guoren;Chen Baichen;Wu Qingquan;Wang Bin;Han Donghong
..............page:209-212,225
Research and implementation of full text index on Chinese in PostgreSQL
Zhan Jiang;Feng Yueli;Wang Shan
..............page:213-216
A study on storage schema of large scale ontology based on relational database
Li Man;Wang Yan;Zhao Yiyu;Du Xiaoyong;Wang Shan
..............page:217-220
The design and study of storage network adaptor based on virtual interface
Chen Jianxi;Lu Hongtao;Feng Dan
..............page:146-149
Verifying Web services substitution using Pi-calculus
Liao Jun;Tan Hao;Liu Jinde
..............page:168-171
A dynamic software watermarking algorithm
Xu Haiyin;Chen Haibing;Feng Dan;Li Dan
..............page:172-174
A WAP connecting sever integrative business management platform
Zeng Dezhi;Zhu Pei;Luo Guiming
..............page:175-178
Open infrastructure for context-aware in pervasive computing: design, implementation and application
Zhang Xianggang;Chen Dongyi;Liu Jinde
..............page:179-181
An improved feedback approach for trust negotiation
Liao Zhensong;Jin Hai Qiang;Weizhong
..............page:289-291,299
A scheduling model for mix real-time tasks based on cooperative environment
Pang Liping;Li Shicai;Chen Hanhua;Yuan Pingpeng
..............page:121-123
A compiler-directed real-time dynamic voltage scaling algorithm for low power
Liu Zhe;Yi Huizhan;Yang Xuejun
..............page:117-120
Revised stride data value predictor design
Xiao Yong;Zhou Xingming
..............page:114-116
Research on the keytechniques of reliable microprocessor designs
Chen Wei;Dai Kui;Liu Fang
..............page:111-113
An improved approach towards the model of IRBAC2000
Liao Zhensong;Jin Hai;Qiang Weizhong
..............page:292-295
Research on the trust enhancement for general-purpose computer
Ren Jiangchun;Dai Kui;Wang Zhiying
..............page:296-299
Virtual tertiary storage system RAT with fast response performance
Wang Fang;Zeng Lingfang;Feng Dan;Xia Peng
..............page:138-141
Semantic data integration based on privacy protection
Li Yuhua;Lu Zhengding;Sun Xiaolin;Li Ruixuan
..............page:128-130,134
Research on media storage technique based on CAS
Zhu Ligu;Xie Changsheng;Zhou Shizheng
..............page:124-127
An anti-spam filtering algorithm based on cost minimization
Zou Lei;Lu Yansheng;Cui Dexuan;Hu Rong
..............page:352-355
Research on simulation of fire plan evaluation of artillery troops
Liu Xiping;Yao Yiping;Qu Qingjun;Xie Wuqin
..............page:356-359
Learning content management system architecture and key technologies
Zheng Li;Liu Zhaohong;Wang Xuan
..............page:360-363
Study on BT model in CAN
Huang Rui
..............page:367-370
Geometry- invariant image watermarking based on self-recognition watermark pattern
Ling Hefei;Lu Zhengding;Zou Fuhao;Yu Yanwei
..............page:371-374
Extension for KQML in Agent-based workflow management system
Xu Jinying;Xu Xishan;Ji Lei
..............page:375-378
Research on instant share locking mechanism in real-time collaborative plotting system
Zhan Zhiguo;Jin Hai Yuan;Pingpeng
..............page:379-382
Research on file cache replica policy and its performance in GDSS system
Wang Wei;Jin Hai;Wu Song;Xiong Muzhou
..............page:142-145
A method of anomaly detection oriented specific network service
Ren Huicai;Luo Junzhou;Wei Shuxi
..............page:313-316
The overview of consistent space modeling in collaborative AR
Chen Xiaowu
..............page:317-321
Study of eGOMS model for human computer interaction in VR
Wang Hui;Dai Guozhong;Xuan Yuming;Zhang Fengjun;Wang Danli;Fu Xiaolan
..............page:322-325
Extracting volume distribution feature from 3D models
Dai Wenjun;Pang Mingyong;Wu Gangshan;Zhang Fuyan
..............page:326-330
Research of video encryption in wireless environments
Zou Yuanzhi;Huang Tiejun;Gao Wen
..............page:331-334
VATT: velocity adaptive target tracking algorithm for wireless sensor networks
Liu Zhongyi;Zhang Xiaowei;Chen Xiangqun
..............page:335-338
Digital halftone based on image scrambling technology
Wan Bo;Wang Quan
..............page:339-341
Development and research of three-dimension DEM software
Fu Hong;Shang Hui;Yu Jianqun
..............page:342-345
Application of an embedded system based on chaotic control in trigging circuit for digital oscilloscope
Yuan Jimin;Li Xiaoling;Jiang Bin;Gu Tianxiang
..............page:346-347,359
Research and application of visualization technology based on real-time computation
yao yan zhong ; cao zuo ; xiao li ; li wei
..............page:348-351
An improved algorithm for multiple patterns matching
Yin Lihua;Fang Binxing
..............page:300-303
A method of fault injection software testing based on EAI model
Zeng Fanping
..............page:304-305,316
Multi-policy secure database system architecture
Xu Zhen;Zhang Min;Feng Dengguo
..............page:306-309
Research to a dynamic application transitive trust model
Li Xiaoyong;Shen Changxiang
..............page:310-312
Checkpointing of parallel applications through differential memory functions
Xue Ruini;Chen Wenguang;Zheng Weimin
..............page:107-110
GDSS-based global network file system
Ma Junguo;Jin Hai
..............page:104-106,110
An improved branch prediction algorithm based on the perceptron
Zhang Yu;Pan Guoteng;Xie Lunguo
..............page:101-103
An intelligent QoS multicast routing algorithm in NGI
Wang Xingwei;Gao Nan;Wu Tieyan;Huang Min
..............page:97-100
Large scale networks dynamic routing protocol based on aggregation tree model
Tan Guozhen;Han Ningning;Liu Yi;Yao Hengwei
..............page:94-96
Research of search schemes based on P2P networks
Liao Xiaofei;Jin Hai
..............page:86-89
An improved graph-coarsening algorithm in multilevel partition for network topology
He Hui;Hu Mingzeng;Zhang Hongli;Pei Xiaofeng;Yang Zhi
..............page:82-85
Density control-based routing algorithm for sensor networks
Zhang Jin;Cheng Jing;Lu Shaofei;Shen Yamin
..............page:79-81
Researches on large-volume content distribution algorithm based on P2P network
Chen Haitao;Huang Zunguo;Gong Zhenghu
..............page:73-75
An intelligent QoS unicast routing algorithm for NGI
Wang Xingwei;Wang Junwei;Huang Min
..............page:69-72
A new CAC scheme based on package loss ratio guarantee
Xu Libo;Zhang Sanfeng;Yu Kun;Wu Guoxin
..............page:65-68
Analyzing and improving the MAC fairness in wireless ad hoc networks
Zhang Lei;Dou Wenhua
..............page:61-64
The intentional stance model of open agent society
Zhang Hongjun;Li Qinghua
..............page:57-60
Research on unique node naming algorithm in wireless sensor networks
Tang Bo;Zhou Mingtian
..............page:54-56
Hierarchical structure of grid QoS
Luo Junzhou;Wang Xiaozhi;Song Aibo;Zhu Ye;Wu Zhiang
..............page:51-53
Multisite job scheduling models in computaional grid environment
Zhang Weizhe;Hu Mingzeng;Li Bin;Gao Lei
..............page:48-50
Replica management research in AMS experiment
Ma Teng;Luo Junzhou;Wang Xiaopeng
..............page:45-47
Research on mechanisms of session management in interactive grid
Pang Liping;Wang Hui;Yuan Pingpeng
..............page:42-44
Characterization for communication pattern of message-passing application
Zhai Jidong;Sheng Tianwei;Shang Haifeng;Chen Wenguang
..............page:39-41
The design and implementation of database grid: GridDaEn-DAI
Su Yun;Xiao Nong;Li Zhigang;Liu Bo
..............page:29-33
Research and application of fault tolerance framework for grid service based on OGSA
Kuang Ping;Jin Hai;Yuan Pingpeng;Chen Hanhua
..............page:25-28
Scientific data organization and management in numerical simulations
Chen Hong;Xia Fang;Song Lei;Zheng Weimin
..............page:22-24
A P2P-based high performance computing platform
Luo Fei;Jin Hai;Zhang Qin;Zhang Hao
..............page:18-21
Study on equipment grid service chain sharing technology and method
Wang Yuexuan;Wu Cheng;Ni Wancheng
..............page:15-17
Research on statistical and analyzing technology in grid simulation environment
Zhang Qin;Xie Xia;Huang Jin;Li Shengli
..............page:8-10
Research on resource co-allocation model in the grid
Lu Guoming;Han Yongguo;Sun Shixin
..............page:1-4