Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2002 Issue z1
A Technique of Designing Approximation Schemes for NP-Hard Problems in Euclidean Space
zhang hong liang ; zhu da ming ; ma shao han ; wang shou qiang
..............page:117-119
On Combination of Artificial Neural Network and Fuzzy System
ma chang jie ; chen shou yu
..............page:115-116,111
Research of Agent-oriented Personalized User Profile
xiao li ying ; li jian hua ; tan li qiu
..............page:123-124,122
The Property of Bézier Curves with Negative Parameter and its Application
xiao ming yu ; han xu li ; ma zhen jun
..............page:125-126,130
Forming the Original Eigenvalue from Imitating Dynamic Digital Input by Mouse
shi yue xiang ; cai zi xing ; sun guo rong ; meng zu qiang ; li mei yi
..............page:127-130
Research on Configurable ORB Middleware
xing yan ; wang xiao lin ; zeng guang zhou
..............page:131-133
An Improved Prototype Pattern Selection Algorithm
Fang Xiuduan;Liu Binhan;WANG Weizhi
..............page:134-136
Application of Network-based Intrusion Detection System
guo jian cheng ; luo wen jun ; li xiang
..............page:137-139
Research on Speech Segmentation Algorithm in Speaker Recognition
he zhi yuan ; hu qi xiu ; xu guang zuo
..............page:140-143,139
A Method of Mutation Probability Self-adaptation in Evolutionary Computation
li mei yi ; cai zi xing ; shi yue xiang ; sun guo rong ; meng zu qiang
..............page:144-145,114
Mining Frequent Episodes in Sequences
li hong ; chen song qiao
..............page:146-147,154
A Method of Data Classification Based on Parallel Genetic Algorithm
meng zu qiang ; cai zi xing ; sun guo rong ; li mei yi ; shi yue xiang
..............page:148-151
An Algorithm for Computing the Solution Set of SAT Problems
zeng zhen bing
..............page:152-154
Admission Control Algorithm for Guaranteeing Real-Time Anycast Flow
Weijia Jia;Zhang Chuanlin
..............page:155-159
Research of Attacking System on Network Security based on Finite Turing Machine
zhang feng ; qin zhi guang
..............page:160-162
A Mixed Evolutionary to Find All Optimum Mixed Solutions of Multi-modal Functions
gao han ping ; kang li shan ; chen zuo ping
..............page:163-165
An Algorithm of Mining Classification Rules Based on Genetic Algorithm and Neural Network
xu de qi ; wang zhen yu ; you bing ; du wei jie
..............page:169-171
Subjective Bayesian Network Algorithm Based on Non-deterministic Knowledge
ling qun ; cai zi xing
..............page:172-173,151
The Algorithm of Real-Time Seek-Route Engine Implement Technology Research
zhao jian min ; zhu xin zhong
..............page:174-177
Traffic Signal Control Using Genetic Algorithm
zhang zong hua ; zhang wei ; zhao lin
..............page:178-181
Design and Implementation of the Security Subsystem in Payroll Management System
Zeyad M.Ali Alfawaer;GuiWeihua;Chen Xiaofang
..............page:182-184,159
On-line Test for Train Communication Based System
ZENG Xiaoqing;Masayuki Matsumoto;Kinji Mori;XU Fucang
..............page:185-187,162
Design the Data-WareHouse of Hospital Infomation System
tang lian zhang ; zong zhi jian
..............page:188-190
Design Pattern and Application of Application Framework
zhao fang ; wei qun
..............page:191-193
A Intelligent Long-distance Teaching System Based on Agent
sun guo rong ; cai zi xing ; meng zu qiang ; shi yue xiang ; li mei yi
..............page:194-197
A Portraying Algorithm Based on Parallel Objects
zhang lian ming ; chen zhi gang
..............page:198-199,171
Design Patterns and MFC Programming
fang cheng ping ; li lian
..............page:200-203
The Integration Design of Inventory Manager in ERP System
xie jian ; zhong bo ; sun xiao qiang
..............page:204-206
Creation and Realization of the Relation Model of Notes Document Database
zhou feng ying ; wang yi feng ; wen chang geng
..............page:207-208
The Application of the Object-Oriented Database
li hai lin
..............page:213-215
The Design and Application of J2EE and XML-Based E -Government Network
li xue ping ; liu tian ping
..............page:216-218,181
A Tunable Activation Function of Recurrent Neural Networks Symbol Computation Model and Apply
zhou yong quan ; he deng xu ; dai zuo jie
..............page:112-114
A New Routing Algorithm for the Shuffle-Exchange Permutation Networks(SEP)
chen bao xing ; xiao wen jun
..............page:106-108
Ackermann Functions --A Survey and Empirical Study
Li Yunpeng;LAI Rong;SONG Fangmin
..............page:103-105
Routing on Metacyclic Graphs
Wenjun Xiao
..............page:101-102
The New Arithmetic of the Face Segmentation
li xue jun
..............page:96-98
The Combined System of Reasoning and Arithmetic Based on First-order Logic
zhou qing ; wu li hua
..............page:92-95,105
Method and Implementation of Data Flow Analysis among Actions in Action Calculi
jin ying ; jin cheng zhi
..............page:90-91,61
Program Optimization by Partial Evaluation and its Implementation
liao hu sheng ; gao hong yu ; wang zhong
..............page:87-89
Research of Tutoring Strategy for An Intelligent Tutoring System
shi yue ; lin zhu ying ; zhang ren jin
..............page:219-221
The Research of Mobile Agents Technique Applying for Information Retrieval
ma liang li ; zhang zhi xiang ; zuo ke rong
..............page:221-222,215
Research and Application of SAPI-based Speech Recognition
hu wei ; luo wen jun ; li xiang
..............page:223-224
Opportunities, Applications and Suggestions for Data Mining
cai jing feng ;john durkin; cai qing bo
..............page:225-228
VPN Group Digital Signature and Identity Authentication Scheme Based on Elliptic Curves Cryptosystem
yang xiao yuan ; zhou xuan wu ; han yi liang ; zhang zuo
..............page:229-230,206
Application for the Mobile Communication Billing Monitor System Based on Multi-Agent
wang you ci ; hu xiang ling ; li jian hua ; tan li qiu
..............page:231-232
Construct Personal Firewall Software Based on Linux system
gong de liang
..............page:233-235,197
PSP is the Favorable Guarantee for the Upgrade of the Corporation's CMM
liu lian ; liu ning
..............page:236,190
Web Learning Oriented Construction of knowledge conceptual Network
luo san ding ; sha sha ; shen de yao
..............page:237-239
Content-Based Image Retrieval and Relevance Feedback issues in it
deng bao song ; wu ling da
..............page:240-241,228
A New Text Location Approach Based Wavelet
Weihua Li;Zhen Fang;Shuozhong Wang
..............page:242-243,284
A Data Mining System Combined With E-Commercial
zhou qing hua ; qi zhi chang
..............page:244-245,260
The Case-Based Reasoning for PCSMSCBR Design
zeng wen ; huang yu ji
..............page:246-249
Research of Decision Analyse System of Mobile Telecom
dai bin ; xiao dao ju ; liang xian yu ; liao zuo xi
..............page:250-252
A New Technology of Upload Files On Browse/Server
zhang jian zhong ; zhang ya ping ; su zhi xing ; yuan xiao yi
..............page:253-255
Design and Implementation of Court MIS Based on B/S Mode
wang jian xin ; jiang nan
..............page:255-257
Connection Strings Property on ADO Connection Object
Girigi Deogratias;Wu Min;Cao Weihua
..............page:261-264,281
The History and the Current Situation on the Research of MAS
wang zuo li ; yin jian ping ; zhao jian min ; mao xiao qing
..............page:265-267
Study on Key Technologies of Cluster-Based Web Server
li hong rui ; hu zi fei ; pan qing
..............page:209-212
Research on Network QoS
tang le le ; yin jian ping ; liu xiang hui ; zhao jian min
..............page:268-269,278
Rotating Dynamics Theory :Thinking Spacetime
wen gui hua ; wen jun
..............page:270-271,293
Double Layer Computing Model of SMP-Cluser
zhu ding ju ; zuo zhao zuo
..............page:272-274,290
The Algorithms for RNA Secondary Structure Prediction
li heng wu ; zhu da ming
..............page:275-278
On Multiple-valued Logic for Incomplete Information Databases
mao yu guang ; xu jie pan ; zhu wu
..............page:279-281
Improvement of Java Class Libraries Based on Design Patterns
cao feng ; cai zi xing
..............page:282-284
The Fluid Stochastic Petri Net Models of Re-entrant Lines
wang you zuo ; zheng ying ping ; xie xiao xuan
..............page:285-287
The Design and Implement of A Mobile Agent System Based Privilege Management
jiang li ; zhuang yi ; zuo bin ; sun yu xing
..............page:291-293
Study on the Denotational Semantics-based Semantics of XML
wen shu huai ; li zhen fang
..............page:294-296
Fuzzy algorithm for covered with sphere neighborhood
jiang qi qiang ; ye shao zhen
..............page:297-299
Security of the Internet Transactions
Felix Musau;Shengbing Ren;Shouyi Yu
..............page:83-84,72
On Components and Features of Event Causation
gan hong hua ; pan yun he
..............page:80-82
A Study of DAG Graph Optimal Path Problem on Time Constrained
liu shan ; song yi
..............page:78-79
Researching on a Fuzzy Clustering Method Using Reduction Operator
ren sheng bing ; yu shou yi ; chen song qiao
..............page:76-77,56
The Research on Derivative Procedure in Data Mining Based on Data Warehouse
yang wen chuan ; huang tao
..............page:73-75
On Automatic Statistical Method of Strokes of Chinese Characters
sun xing ming ; chen huo wang ; yin jian ping ; jing xin hai
..............page:70-72
Research on Fingerprint Classification Approaches
zhou zuo ; yin jian ping ; zhu en ; zhao jian min
..............page:66-69
Video Retrieval Technology Based on Content :An Introductory Review
lei zhen ; wu ling da
..............page:62-63,75
Pansystems Relativity:Soft Observation and Relativity of Observation
li yong li ; lin he ; meng ying jie ; liu xing hui
..............page:59-61
A New Research on Similarity Measures between Vague Sets
pei zhen kui ; xu jiu yun ; chen ji dong ; song ji zhi
..............page:57-58,51
Research on Type of Role Inheritance in RBAC Model
chen juan juan ; hu jin zhu
..............page:52-53,44
On Deliberate Adaptation
chen xiao ping
..............page:49-51
Natural Language Understanding Semantic Neural Network
zhou jing ye
..............page:1-4
Ranking and Clustering the Result Set of Text Retrieval by Principal Component Analysis
zhang yun tao ; gong ling ; wang yong cheng
..............page:45-46
The Application of the Theory of Inheritance in the Semantic Knowledge Repository
wang ai jun ; wan jian cheng
..............page:42-44
Researches on equivalence class of autonomous linear automata
zhu yun fei ; luo zhu kai
..............page:38-39,48
A Mechanism Based on Main and Vice Process
li zuo ; xu de qi ; chen wang hu ; du wei jie
..............page:36-37,33
Research on Hierarchical Co-evolutionary Methods Based on Genetic Algorithm
chen qiu lian ; li tao shen ; wu heng ; zhou dong
..............page:34-35
On Sheffer Functions in Partial K-Valued Logic
liu ren ren ; chen jian er ; chen song qiao
..............page:30-33
Generalized Mapping Model of Natural Computation
gong tao ; cai zi xing
..............page:27-29
Planning Graph and Artificial Intelligence Plan
liu ri xian ; jiang hui na ; gu wen xiang
..............page:23-26
Future of Pattern Technique
xiao bin ; zuo ke rong ; yu li jun
..............page:17-18,26
Nine-Leaves-Star-Tree Problem in Computational Biology
zuo jun feng ; zhu da ming ; ma shao han
..............page:15-16,29
Studies in Object-Oriented Logic
ning ai bing ; xiong xiao hua ; luo jie
..............page:12-14
C(n,k): A New Family of Interconnection Networks of Fixed Degree Three
du ni ; xiao wen jun
..............page:10-11,22
Mathematical Foundation of Description Techniques in Software Engineering
sun ning ; zuo ke rong
..............page:5-7,9