Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2002 Issue 6
Data Modeling of Moving Objects
wu jin ; lu xian liang
..............page:67-69
Architecture of Internet-based Hall for Workshop of Metasynthetic Engineering
cao long bing ; dai ru wei
..............page:63-66
Algebra Operations and Optimization Techniques for XML Query
li xiao dong ; gu zuo qing
..............page:57-62,51
Study of Acess Control Algorithm in Hierachical Storage VOD Systems
rong bo ; sun jing zuo ; cai an ni
..............page:70-72
The Analysis of the Granularity Problem of Labels Associated with the Storage Object in MLS Relational Database
cheng wan jun ; zheng jun ; peng cheng bao ; zhang xia
..............page:73-75
The Design and Apphcation ofthe Vulnerability Database
yang fan ; jiang jian chun ; qing si han
..............page:76-79
Multi-level Data Warehouse Architecture and Update Algorithm of Double Channels View
xiong zhong yang ; huang hai long ; zhang yu fang ; ou ling
..............page:79-81
The Technical Infrastructure of Digit Library Based on XML
guo jing feng ; chen ling ling
..............page:82-83
Automonitor of Electronic Commerce Website
lin qiang
..............page:84-85
Research on Key Techniques of Semantic Web
li qing shan ; chen ping
..............page:86-89
EDF Algorithm for Traffic Flows' QoS Guarantees
wen jun ; lu xian liang
..............page:90-91
Towards Next Generation P2P Based Information System
huang hong yong
..............page:92-93,89
Elliptic Curve Algorithm and its Application of WTLS
zuo ; zhou ming tian ; yang guang zhi
..............page:94-95,101
Indirect Learning Based on Rough Set Theory
mi ju sheng ; zhang wen xiu
..............page:96-97,104
Study Based on Genetic Glgorithms for Constrained Optimization
yu wen ; li ren hou
..............page:98-101
A Regularization Method with Spinning Function Parameters and its Application in Restoring Degraded Image
zeng san you ; kang li shan ; dong wen yong
..............page:125-126,32
A Quick Peer Group Filtering for Mixed Noise Removal in Image
cao gang ; you zhi sheng ; liu zhi fang ; xu xin
..............page:127-129
A Survey of Persistent Programming Languages
lu hong ; xu bao wen
..............page:130-133
An Analysis of Architecture Implementation of a Specific Rule-based System
liu xiao jian ; chen ping ; cai xi yao
..............page:134-136,116
Cross Complation Techniques for the Support of Multiple Objects——Comparison and Analysis of GCC and Zephyr Infrastructure
dai gui lan ; zhang su qin ; tian jin lan ; jiang wei du ; dai jun
..............page:137-139,120
On the Classification of Software Connectors and their Applications
yan chang hao ; liu yun sheng ; zhang wen bin
..............page:140-142,72
Formal Description of UML Sequence Diagram
li jing feng ; li zuo ; chen ping
..............page:147-148
A Neural Network Method for Analyzing the Units Importance of System
dong zhen ya ; dai kui ; wang lei
..............page:149-151
On An Improving Strategy for the PageRank Algorithm
liu yue ; cheng xue qi ; li guo jie
..............page:55-56
Research on Web Document Cleaning
zhang bo ; wang ji cheng ; wang qiang ; zhang fu yan
..............page:52-54
Research on Price War of Electronic Commerce
zhou jin ; lu zeng xiang ; lu hai ming ; li yan da
..............page:47-51
linux shi windows xx de ke xing ma ?
sun yu fang
..............page:24-32
The Middleware in the Computing Grid
wu xiu chuan ; ju jiu bin
..............page:19-23
Gird Computing Research and Future Direction
wang yu feng ; yang shou bao
..............page:16-18
Task Scheduling and Monitor of Cluster in the Advanced Computational Infrastructure
fang xing ; li san li ; wang xiao ge ; huang zhen chun ; he chuan
..............page:13-15,23
The Development of Research on Secure Operating Systems (1)
shi wen chang ; sun yu fang
..............page:5-12
Collaborative Filtering
cai deng ; lu zeng xiang ; li yan da
..............page:1-4
Chinese Traditional Medicine Identification Classifier Using Corresponding Relative Distance Computing and Genetic Algorithm
zhang li xin ; zhao yan nan ; cai shao qing ; yang ze hong ; liu hong yu ; wang jia qin
..............page:102-104
NPA Algorithm and it's Modification
wang guo sheng
..............page:105-107
A Fuzzy Logic System Based on FANNC
liu jun ; shao dong ; chen zhao qian
..............page:108-110
A Reasoning Method to Realize Situation Assessment
cheng yue ; wang bao shu ; li wei sheng
..............page:111-113
A New Algorithm for Clustering Analysis Based on Genetic Algorithm
zhang wei ; liao xiao feng ; wu zhong fu
..............page:114-116
Research and Design of Decision Support System Based on Web
xiao chun yan ; wu bin ; shi zhong zhi
..............page:117-120
The Research for a New Method of Building Decision Trees
guo jing feng ; mi pu bo ; liu guo hua
..............page:121-122,129