Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2002 Issue 9
Research of Internet Measurement Infrastructure
zhou zuo gang ; xu ying
..............page:104-106
Evaluation Model of Reliability Index on Communication Network based on Hamming Neural Networks
zhou zhong ding ; sun qing hua ; liang xiong jian
..............page:107-109
A New Model of Secure Gateway
chen bing ; wan zuo ; wang li song ; ding qiu lin
..............page:110-111,109
Block Cipher Counter Mode's usage in Ipsec and Performance Analysis
xu xi lei ; ye cheng qing
..............page:112-112,38
Agent Technologies for GIS
huang xiao bin ; li zuo
..............page:113-115,98
Research on Meta Data Model based on XML Data Dictionary
xu peng ; xie xiao qin ; wang ke hong
..............page:116-118,68
Research on File Integrity Check in Intrusion Detection System
chen zuo ; yang shou bao
..............page:101-103
The Research of a Certified E-Mail Protocol
liu dai ; xu man ; xie jun yuan
..............page:99-100,20
Weak Serializable Concurrency Control for Real-Time Broadcast Environments
dang de peng ; liu yun sheng
..............page:94-95,85
Technology Providing QoS Guarantees under Mobile Environments
huang kui ; sun li min ; wu zhi mei
..............page:91-93,79
Design of a QoS Guaranteed Distributed P2P VOD System
liu peng ; du zhi hui ; li san li ; chen yu ; zhu zi yu ; huang zhen chun ; gu lei
..............page:86-90
A New Classifiable Algorithm of Fingerprint Template Based on Backpropagation Neural Networks
cai jun ; zhao jian min ; zhou hong xiao ; ren de guan
..............page:80-81
Implementation of Voronoi Diagram by Ressmble Delaunay Triangulation
ren yong gong ; liao shi zhong
..............page:78-79
An Efficient Algorithm of Face Image Recognition Using Moment Feature Based on The Wavelet Transform
cui xin chun ; zhang wen long ; gong jian
..............page:76-77,46
Search Engines and Meta Search Engines on Internet
peng hong hui ; lin zuo zuo
..............page:1-12,32
The Research on a Large-Scale Text Clustering Algorithm based on Clustering Features
tang chun sheng ; jin yi hui
..............page:13-15
Research and Development of the Information Technology Security Evaluation Criteria
liang hong liang ; sun yu fang
..............page:16-20
Petri Nets Based Synchronization Model for Distributed Real-Time Simulation System
xu jian feng ; hu ning ning ; zhu qing bo ; hu ning ; xie li
..............page:21-25
An Algorithm of Global State in a Distributed System
chen ning ; wang zhong ren ; ding xiang rong
..............page:26-29,35
A New Evolutionary Algorithm for Solving Non-linear Planning Problem
gao han ping ; kang li shan ; chen zuo ping
..............page:30-32
A Method Based on Separating Hyper Surface and Its Applications in Massive Data Classifying
ren li an ; he qing ; shi zhong zhi
..............page:33-35
Application of Multi-agent Tracking Plan Recognition in Situation Assessment
cheng yue ; wang bao shu ; li wei sheng
..............page:36-38
Agent-based System--a Case Study and Developing Toolkits
zhang de tong ; zhou ming quan ; geng guo hua
..............page:39-41,43
A Study of Goal Programming Based on Multiobjective Evolutionary Algorithms
liu hai lin ; liu yong qing
..............page:42-43
The Study and Implementation of Predict Algorithm Based on Gray Theory
peng zuo ; shen ya jun
..............page:44-46
An Application of Genetic Algorithm in Multi-Objective Decision-Making
shi lian shuan ; da lin ; rong wei dong
..............page:54-55
The KDD of Characteristic Rules Based on Attribute Values Classification
yin shi qun ; zhang wei qun
..............page:56-58
Asymmetric Watermark Based on Spread Spectrum
zou zuo xiang ; li jin tao
..............page:63-65
A New Visible Watermark Embedding Algorithm Based on DWT
liu ting ; huang ji feng
..............page:66-68,142
A Novel DTW
qian xiao jun ; zhou jian hui ; pan xue zeng ; ping ling zuo
..............page:69-70,62
Edge Detection Study of Color Image Based on LIP
zhao jing xiu ; lin zuo cai ; yang xiu guo ; zhao jia gang ; zhang jing yuan
..............page:71-72,58
Research on Web-based Multiple Data Source Integration System
dai qing yun ; fan pei ; li gang ; dong yi sheng
..............page:119-120,封四
A Study of Architecture Digital Library Based on Tamino and XML
li lei ; xing chun xiao ; feng jian hua ; zhou li zhu
..............page:121-125
Fuse Research of OOA in Relation Database System Method
wang ying hui ; zhou ming quan ; geng guo hua
..............page:126-128
Study on An E-Commerce System Based on DNA Model and COM Technology
nie rui hua ; ji yi mu ; huang fu yuan ; liang zuo
..............page:129-131
Organization Model and Implement on Information Resource for Campus-Network
li xiao ; li li xin ; qiu yu hui
..............page:132-133,131
An Improved Multistage Chaotic Encryption System
peng jun ; zhang wei ; liao xiao feng ; wu zhong fu
..............page:137-139,145
Enforcing Mandatory Access Control in Linux Kernel
zhang zhi wen ; zhou ming tian
..............page:143-145
Design and Implementation of PDF System based on Web
chen ming ; wang yan li ; liu xun
..............page:146-148
User-Centred Design for Software Development
zhang li ping ; liu zheng jie ; chen yan
..............page:151-153