Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2002 Issue 4
A Method of Bi-directional Authentication for Mobile IPv6
he tao ; yang shou bao
..............page:98-99
Research on Mobility Management in GPRS and Mobile IP
liu hai peng ; zhang gen du
..............page:100-102
The R&D Status of the Interworking between CORBA and TMN
shi bing ; fang liang ; zhang shu fang ; zhou ming tian
..............page:103-105,99
Load Balance in Web Server Cluster and its Implementation
zeng jie ; hu yong pei ; lu xian liang
..............page:106-110,92
A Factoring Algorithm for Reliability Evaluating of Distributed Networks with Imperfect Nodes
sun yan rui ; cui li yan ; zhang xiang de
..............page:111-113,71
Study in the Mechanism of the E-mail Worm Virus
wu zuo
..............page:116-118
Mobile Query Oriented Mail Message Passing Algorithm Researching
zhao yu peng ; xu ming
..............page:119-123,127
Review of Error Concealment Technologies in Internet Video Communications
hu fei ; zhu guang xi ; zhu yao ting
..............page:124-127
Knowledge Management in E-business
wang zuo ; zhu qing sheng ; fu he gang ; wu zhong fu
..............page:128-129,134
Data Models for Spatial Database
zhang rui ; chen wei he ; wang de qiang ; xie jun yuan
..............page:130-134
The Query of Topological Relationships in Spatio-Temporal Databases
zou yong juan ; qin xiao zuo
..............page:135-137
Fuzzy Set in Time Series Matching
feng hong wei ; li zhan huai ; zhang bao wen
..............page:138-140
The Research for Information Retrieval in an LDAP Directory
xu jian bo ; li ren fa ; wang zuo
..............page:141,110
D-AIMD:An Improved TCP Congestion Control Mechanism
xu chang biao ; long ke ping ; yang shi zhong
..............page:95-97,封4
Generalized B-trees are Applied in GIS
ju shi guang ; ma zheng hua
..............page:142-145
Network Behavior Researching Environment Design and Implementation
wu xiao jiang ; shuai dian xun ; liu dong lin ; deng zhi dong
..............page:93-94,63
QoS Routing Technologies in Modern IP Networks
zou ling ; shi jian
..............page:86-88,74
Policy Routing Technology
li jin ping ; gao dong jie
..............page:84-85,30
The Coding Principle of JPEG2000 with Advantages and Disadvantages
yang xiao fan ; he zhong shi ; bai sen ; chen shu yu ; zhu qing sheng
..............page:82-83
An Approach to Region of Interest Coding-Maxshift Method
zhu qing sheng ; wu zhong fu
..............page:79-81
Complex Case Retrieval Based on Intelligent Clustering
zhang ning ; gan zuo chu
..............page:75-78
Turning Thought into Action
su yun lin
..............page:72-74
Solving Job-Shop Scheduling Problem Using Good Point Set Based Genetic Algorithm
cheng jun sheng ; zhang ling
..............page:67-68
User Identification in the Preprocessing of Web Log Mining
wu qiang ; liang ji min ; yang wan hai
..............page:64-66
Source Association Rules Generation Algorithm
li xue ming ; zhang wei ; peng jun ; liu yong guo ; wu zhong fu ; liao xiao feng
..............page:61-63
Dual Space Search Algorithms for Mining Frequents
wang xiao feng ; wang tian ran
..............page:55-60
An Investigation of Association Rules Based on Spatial Statistical Analysis
lv an min ; li cheng ming ; lin zong jian
..............page:53-54,47
A CART-based Prosodic Phrasing Method for Chinese Text-to-Speech
zuo wei jun ; lin fu zong ; li jian min ; zhang zuo
..............page:50-52
Multiprocessor-job Scheduling:Models and Algorithms
huang jin gui ; chen jian er ; chen song qiao
..............page:1-3
Embedded Real-Time Software-Oriented Requirements Engineering Environment - SREE
shu feng di ; wu guo qing ; wang min
..............page:4-8,14
A Survey of Curry-Howard Isomorphism
zhang zuo ; song fang min
..............page:9-11
Electronic Voting :Theory ,Practice and Future
zheng yan fei ; chen ke fei
..............page:12-14
A Decomposition Method of Petri Net Based on the Index of Places
zeng qing tian ; wu zhe hui
..............page:15-17,23
The Analysis and Research of Memory Management
li xiao qun ; sun yu fang
..............page:18-20
Study of Process and Quality Controlling Based on Researching Secure Linux OS
gong li min ; liu yong ; shen xi ; xie jun yuan
..............page:21-23
Strategy on Optimizing Memory Size for Java Applications
xu peng ; wang ke hong
..............page:24-27
The Development of Software Component Conception
ma liang ; sun yan chun
..............page:28-30
The Design of a Visual Object-Oriente Programming Support System for JAVA
liu jian bin ; hao ke gang
..............page:31-34
A Research and Design on High-Effective Dynamic Invocation Interface
chen song ; sun ming ; zhou ming tian
..............page:35-37
An Architecture Model for QoS-Enabled ORB Based on Real-Time CORBA
wang yang ; wang zhen yu
..............page:38-40
A Decomposition Method for Directed Graph Based Geometric Constraint System
peng xiao bo ; chen li ping ; zhou ji
..............page:41-44,27
A MIS Analysis and Design Method Based on UML
wang lin lin ; hua qi bing
..............page:45-47,137
Overview on AES-Rijndael Algorithm
yang jing hui ; wang li na ; yu ge
..............page:48-49,34