Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Science
1002-137X
2000 Issue 4
bai zhe xiu lai tong chuan du shu rong fen xiang gong qiu suo < ji suan ji ke xue > de ying xiang yin zi lie ju ji suan ji lei qian mao
..............
page:95
Database Access Technology in Three-tiers Architecture
xiong zhong yang ; zhang yu fang ; wu zhong fu
..............
page:95-97
A Kind of Implementatioa of Outer Join Optimizaton
feng yu cai ; huang lin zuo
..............
page:93-94,61
The Design and Implementation of A Agents-based Workflow Model
chen shan guo ; gao ji
..............
page:90-92,49
On the Power-Line Communication:An Overview
huang rong hui ; zhou ming tian ; zeng jia zhi
..............
page:85-89
ODP Viewpoint of VOD System
he yan xiang ; huang hao ; zhang ge ; shi li ; li chao
..............
page:82-84,81
Analysis of the Practicality of Parallel Communication Algorithms
chen xiang chuan ; wang guang rong ; zheng shi rong
..............
page:78-81
The Cooperative Cache Techniques Used in PARFSNOW++
zhao xin ; chen dao xu ; xie li
..............
page:73-77
A New Algorithm for Blind Image Restoration
liu jie ping ; yu ying lin
..............
page:70-72
The Research on Plant's Realistic Modeling Method
mao wei qiang ; geng wei dong ; pan yun he
..............
page:67-69
Analysis about Current Research on Theory of Planning
liu gui quan ; chen xiao ping ; fan zuo
..............
page:62-66
The Study of Mobile Agent Technology
dong hong bin ; shi chun yi
..............
page:58-61
Data Preprocessing in Ddta Mining
liu ming ji ; wang xiu feng ; huang ya lou
..............
page:54-57
A Study of Frequent Cyclic Association Rule
huang yi min
..............
page:50-53
Boosting Naive Bayesian Learning
wang shi ; gao wen
..............
page:46-49
Clustering Method in Data Mining
wang shi ; gao wen
..............
page:42-45
Visualization Model for Chinese Text Mining
lin hong fei ; gong da yue ; zhang yue ; yao tian shun
..............
page:37-41
Text Mining on the Internet
wang wei qiang ; gao wen ; duan li juan
..............
page:32-36
Web Mining
wang shi ; gao wen ; li jin tao
..............
page:28-31,41
qian jin zhong de mian xiang dui xiang ji shu ji di san shi yi jie mian xiang dui xiang yu yan yu xi tong ji shu guo ji xue shu hui yi zuo di san jie zhong guo mian xiang dui xiang ji shu ying yong xue shu hui yi
lv jian ; fei xiang lin ; wang jing ying
..............
page:26-27,69
wei lai ruan jian de hu huan ji isfst-99 di si jie wei lai ruan jian ji shu guo ji xue shu hui yi
lv jian ; fei xiang lin
..............
page:23-25,72
Self-Tuning Software
su yun lin
..............
page:21-22,8
An Analysis Method of Petri Nets Based on Linear Logic
gao mei mei ; wu zhi ming
..............
page:18-20
The Study of Operating System Architecture
pan qing
..............
page:14-17
The Parallel Query Executor Based on the Stream Mechanism
chen hong ; wen ji rong ; wang shan
..............
page:9-13
Research of Java Instruction Set Architecture
dai kui ; qin ying ; chen hu ; hu shou ren
..............
page:5-8
An Adaptive Importance Sampling Theory Based on The Generalized Genetic Algorithm
dong cong ; guo xiao hua
..............
page:1-4