Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2003 Issue 12
Research on the Directory Service Mechanism for Metacomputing Environment
mei xiao yong ; wang zhi gang ; li shi xian
..............page:80-82,131
Research on Document Relevancy Based on Full-Text Retrieval System
rao dai ; guo hui ; cai qing sheng
..............page:78-79,135
A Web Personalized Recommendation Method Based on Uncertain Consequent Association Rules
ding zeng xi ; wang ju ying ; wang da ling ; bao yu bin ; yu ge
..............page:69-72,88
Research on Admission Control in Distributed Video-on-Demand Systems
zhou jing yang ; zhang yang ; dan zuo ; chen dao xu
..............page:66-68,77
Research and Implement of Master-Slave Pattern Based Security Model for Mobile Agent
mu hong ; wang ru chuan ; zhang deng yin
..............page:62-65
The Study and Implement of Content Audit System on High Speed Network
wan guo gen ; qin zhi guang ; liu jin de
..............page:59-61,65
A New Method of DDoS Intrude Detection Based on Self-Similarity of Network Traffics
luo guang chun ; lin xia ; lu xian liang ; zhang jun
..............page:54-58
A Prognostic Segment-Based Sharing Recovery Mechanism
xu jie ; guo xing ting ; xia meng qin
..............page:49-53
Study on the Flexible Optimization Schedule Models of Cigarette Producing Line
liu yong mei ; chen zhuang ; cui guan xun ; he zhao quan
..............page:176-178
An Efficient Refreshment Algorithm for Materialized View Considering the Update Frequencies
wang xin jun ; hong xiao guang ; wang hai yang
..............page:86-88
A Model for Dynamic Online Bargaining
zhang hong ; qiu yu hui
..............page:83-85,107
A Survey of QoS-Aware Multicast Routing Algorithms and Protocols
huang dong jun ; cai xue lian ; wang jian xin ; chen song qiao
..............page:41-45
Migration Mechanism for the Mobile Agent Based on .Net
wang dan ; yu ge ; wang guo ren
..............page:23-26
A Survey of DNA Computing and DNA Computer
ding jian li ; chen zeng qiang ; yuan zhu zuo
..............page:19-22
Inquiring the Description of Heterogeneity among Computational Systems
zeng guo zuo ; chen zuo zhong
..............page:16-18,22
Grid Example and the Analysis of Key Technology
du jiang ; zhou nian sheng ; liu ran ; wang xiao ge ; du zhi hui
..............page:9-15
Discovering Layer-2 Topology in Bridged Local Area Networks
li tao ; shi zhi qiang ; wu zhi mei
..............page:6-8,15
The Semantic Web and it's Description Language
li li yu ; tan shao hua ; tang shi wei ; yang dong qing ; wang teng zuo
..............page:1-5
Performance Analysis of Admission Control Mechanism Based on NS-2 Simulation
wang chun feng ; lu zuo ; chen xiu zhong
..............page:38-40
Personification Algorithms for the University Timetabling Problem
chen wei dong ; li ji gui
..............page:172-175
Object-Oriented Requirements Model of Embedded Real-Time Software
xu xiao dong ; rao yun hua
..............page:169-171
A Kind of Communication Protocol in Software Developing of Embedded System
yuan shuai ; liu bo qin ; chen zhang long
..............page:166-168
Data Corruption in Memory Detection and Recovery
zhu zhi lin ; li hang ; liu xi yang ; chen ping ; zhang qi lin
..............page:163-165
The Greedy Algorithm of the Longest Nesting of d-Dimension Boxes
song chuan ming ; wang xiang hai
..............page:161-163
Research of Thread Support in Linux2.5
ding cheng ; sun yu fang
..............page:158-160,165
Impose Privilege-Divided Policy on Security-Enhanced Operation System
jin lei ; lin zhi qiang ; mao bing ; xie li
..............page:154-157,178
The Integrated Risk Evaluation Model for the MIS Project
zhang zuo ling ; li shi xian
..............page:150-153
A RISC Style Collaborative Framework for Mission Critical System
zhu zhi lin ; guo jing lin ; li hang ; liu xi yang ; chen ping
..............page:147-149
Formalizing in Software Architecture and State-Oriented Style
hu jin song ; guo he qing ; zheng qi lun
..............page:144-146,149
An Image Encryption and Decryption Algorithm Based on Chaos Sequence
chen yong hong ; huang xi zuo
..............page:139-140,143
Research on the Algorithms of High Accuracy Image Measurement and Registration System
yang dan ; liu ya wei ; zhang xiao hong ; li dong
..............page:132-135
Design and Implementation of an Adaptive User Interface for Web-Based Learning
li xiao ; wang xue fei ; qiu yu hui
..............page:129-131
An Ontology Evolution and Maintenance Model in Web Environment
wang jin ; chen en hong ; lin le
..............page:126-128,5
Algorithms for Spatial Trend Detection Based on Spatial Neighborhood Relations
wen jun hao ; li li xin ; wu zhong fu ; wu hong yan
..............page:123-125,138
Statistical Methods in the Data Mining
wei ling ; qi jian jun ; zhang wen xiu
..............page:118-119
Mining Frequent Item Sets with Multiple Convertible Constraints
song bao li ; zhang bang hua ; he yan xiang ; zhu zuo feng
..............page:115-117
Asymptotic Stability Criteria for a Two-Neuron Network with Different Time Delays
li shao wen ; li shao rong ; liao xiao feng
..............page:113-115
Measures of Roughness of Fuzzy T-Rough Sets
liu hua wen ; shi kai quan
..............page:111-112
The Research of Fuzzy Analogy in the Guess-Discovery
song kun ; cai qing sheng
..............page:108-110
The Weak Completeness of Basic Formal Deductive System UL of Universal Logic
zhang xiao hong ; he hua can ; li wei hua
..............page:103-107
The Research on Watermarking for Mobile Computing
huang xiang sheng ; yang xiao fan ; wang yang sheng
..............page:99-102
Design and Application of Enterprise Data Warehouse Based on SQL Server 2000
zhong yuan chang ; li gang ; wang yue ; yang wu
..............page:92-94
Study of User-Level Communication Interfaces VIA(2)
sun wei ping ; zhou jing li ; yu sheng sheng
..............page:31-33,53
A Survey of Routing Protocols for Mobile Ad Hoc Networks
zhang shun liang ; ye cheng qing ; li fang min
..............page:27-30