Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2007 Issue 10
Application of the LFM-Neural Network in Evaluating Academic Staff
LIN He-ping;SU Zi-yi;CAO Zhi-sheng
..............page:98-100
A Bayesian-Based Trust Negotiation Model
ZHAO Yi-zhu
..............page:105-107
A Study of the P2P Structure and Its Search Strategies
XING Dong-mei;ZHU Hong
..............page:108-111
Research of a Software Reliability Model on the Bayes Method
LI Bao-lin;LI Zhi-shu;LI Bin;JIN Hu;WANG Li
..............page:92-94
An Extension to Generic Programming and Its Implementation in Java
XU Wen-sheng;XUE Jin-yun
..............page:89-91,94
A Semantics-Based Heterogeneous Information Integration Schema for E-Business
CHEN Wei-xing;CHEN Xin;WAN Jian-xiong;LU Juan
..............page:85-88
E-Commerce Protocol Analysis Under the Failure Environment Based on Model Checking
MA Huai-lei;GUO Hua;ZHUANG Lei
..............page:82-84,123
Development of the UML-Based E-commerce Platform
GU Ping;PANG Qiu-ben;YANG Xiao-mei;LIN Qing;LU Yu-neng
..............page:79-81
Grid Resource Allocation Based on the Discrete Particle Swarm Algorithms
LIANG Zheng-you;ZHI Cheng-xiu
..............page:77-78,127
A Grid Resource Discovery Mechanism Based on the MLON Structure
ZHANG Zhong-ping;LEI Bing-yin;LIU Xin-yuan
..............page:73-76
An Improved FP-Tree-Based Algorithm for Maximal Target Frequent Itemsets Mining
LIANG Bi-zhen;LU Yue-ran;QIN Liang-xi
..............page:70-72,81
Mining Rules in Incomplete Information Systems Based on Decision Trees
LI Hai-tao;ZHANG De-bin
..............page:68-69,100
A Method to Mine Frequent Trees in XML Documents
FU Shan-shan;WU Yang-yang
..............page:65-67,104
Research on Chinese Document Copy Detection Based on Extracting Key Words
MA Hui-dong;LIU Guo-hua;LI Xu;LIANG Peng;LIU Chun-hui;ZHANG Ling-yu
..............page:63-64,88
Discovering the Complex Matches Between Database Schemas
QIAN Ying
..............page:61-62,76
A Schema Matching Method Based on Substring Operations
WANG Cong;LIU Guo-hua;YUAN Ying;ZHANG Ling-Yu
..............page:57-60
A Database Encryption Method Based on Information Dissociation and Association
LI Xian-wei;LIU Guo-hua;YUAN Ying;MA Hui-dong
..............page:54-56,60
Decision Tree Algorithms Based on a One-Way Analysis of Variance
DING Shun-li;HONG Yun-de;YUAN Jing-bo
..............page:50-53
A Non-Monotonic Logic for the Analysis of Security Protocols
LIU Hai-yan;YANG Zhao-hong;CAI Hong-liu
..............page:1-3,46
Research of a Hybrid Intrusion Detection System Based on Particle Swarm Optimization and Artificial Immunology
GUO Wen-zhong;CHEN Guo-long;CHEN Qing-ling;LIU Yan-hua;YU Lun
..............page:4-6,10
Implementation of Verifying the Security Related Behavior Model Based on the Java Platform
LI Ze-peng;JIN Ying;ZHANG Jing;ZHENG Xiao-juan
..............page:7-10
Research on the Web Services Security Testing Technology
SHI Yin-sheng;DENG Shi-wei;GU Tian-yang
..............page:11-13,28
On the Anomaly Detection of the P2P Streaming Media Distribution System
WAN Jian-xiong;CHEN Xin;LU Juan
..............page:14-16,53
A Document Clustering Algorithm Based on Artificial Immune Networks
TONG Jian-hua;TAN Hong-zhou
..............page:17-19,49
An Information Organization and Service Framework Based on Semantic Overlay Networks
HUANG Hong-bin;DENG Su;ZHANG Wei-ming;LIU Zhen
..............page:20-25
Technical Research of a Virtual Campus Based on 3D Panoramas Navigation
YANG Lin;ZHAO Jian-min;ZHU Xin-zhong;XU Hui-ying;ZHENG Guo-qiang
..............page:26-28
Research and Development of Cultural Algorithms
ZHANG Di;YANG Yan
..............page:29-31
A Space Trimming Method for Continuous Reverse Nearest Neighbor Search
GAO Feng;ZHAO Dan-feng;LIU Guo-hua;LIU Jun-sheng;ZHANG Qi;ZHANG Yu
..............page:32-34,37
Uniform Design of the Parameters of Immune Clonal Algorithms
GAO Shang;CHEN Jian-zhong
..............page:35-37
Evolution Strategies in the Parameter Estimation of the Maximum Likelihood Method
GUO De-long;ZHOU Yong-quan
..............page:38-40,43
An Improved Page Replacement Algorithm Supporting Realtime Processes Based on Objrmap
LI Zi-qiang;ZHOU Ming-tian;WAN Ming-cheng
..............page:41-43
Improvement on a Reachability Analysis Algorithm in Timed Automata
ZHANG Song-nian;ZHUANG Lei;DU Juan
..............page:44-46
The Learning and Response Model for Iterated Prisoner's Dilemma
SONG Yi-ling;WANG Bing-zhong;ZHU Hong;CAI Sheng
..............page:115-119
Design and Implementation of a Symbol Table for the TTCN-3 Compiler
JIANG Fan;ZHANG Hui;TAN Gang
..............page:124-127
A Study of Machine Speech Synthesis Based on Chinese Rhythms
WU Bing-ya;JU Chun-hua
..............page:128-131
Analysis and Implementation of TORQUE:A High Performance Cluster Job Management System
ZHANG Yang;CHEN Wen-bo;LI Lian;LI Bing;Chen Ying-e;YAN Hao
..............page:132-134,141
Exploiting Speculative Parallelism in Irreducible Loops
DENG Zhi-gang;ZENG Guo-sun;ZHOU Jing
..............page:135-138
Service-Oriented Multi-Agent Systems
SHEN Ji-quan;MI Ai-zhong;TU Xu-yan
..............page:139-141
A Framework for Algorithms' Formal Derivation with Recursive Structures
HUA Zhi-zhang;JIE An-quan;LI Yun-qing;XUE Jin-yun
..............page:145-147,封3
A Knowledge Construction System Design Based on Knowledge Grid
SHI Chang-xian;ZHAN Jian;LI Lian;JIANG Li-li
..............page:148-151
A Study of the Passing Strategy on the Robocup Simulation Game
WANG Gang;CHEN Mu-bin;LIANG Fu-hong;ZHENG Shu-mei
..............page:101-104