Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2004 Issue 10
Research on Classification Rules Mining System about Stellar Spectrum Data Based on Attribute Reduction
zhang ji fu ; li yin hua ; zheng lian
..............page:118-120,130
Research on Web-Based Integrated Environment for Data Warehouse
duan jiang jiao ; huang zhen hua ; chen zuo
..............page:114-117,154
Research on Metadata Management System Based on CWM
lei zuo ; ning hong ; li zuo zuo ; wang chang jian
..............page:111-113,145
The Research and Implementation of Web Service Runtime Environment
liu bi xin ; wang yu feng ; zhou bin ; jia yan
..............page:108-110
The Research on Dynamic Read/Write Replication Strategies of Data Grid
zhang yan song ; xue yong sheng ; zhang yu ; zhang jian da
..............page:104-107
Research on Database Security Model
zhang zuo ; xia hui ; bai wen yang
..............page:101-103,149
High Efficiency FP-tree Creating Algorithm
qiu yong ; lan yong jie
..............page:98-100
The Model and Implementation of Agent-Based Distributed Spatial Data Mining
zhen tong ; fan yan feng
..............page:96-97,110
Research of Anomaly Detection System Based on Data Mining
lv zhi jun ; yuan wei zhong ; zhong hai jun ; huang zuo ; zeng qing kai ; xie li
..............page:61-65
Protocol Anomaly Detection Model Based on Markov Chain
li na ; qin zheng ; zhang da fang ; chen shu yu
..............page:66-68,95
The Research of VPN Technique Application
yang yong bin
..............page:71-73
A Recoverable Off-line Electronic Payment System Based on ECC
lang wei min ; yang zong kai ; wu shi zhong ; tan yun meng
..............page:74-75,83
A Preliminary Study about Optimization of Recommendations in Collaborative Filtering Algorithms
he guang hui ; bao li shan ; wang wei zuo ; zhou ge
..............page:76-78
Introducing Temporal Accountability to the Merchant in the NetBill Transaction Protocol
peng xun ; dong rong sheng ; guo yun chuan ; cai guo yong
..............page:79-83
Research on PLM Solutions for Manufacture Enterprise
cheng tao
..............page:84-86
The Speculative Concurrency Control Algorithm in Real-Time Databases
luo qiong ; zhang li chen
..............page:87-92,181
A Framework of Data Cube Computation in ROLAP
li sheng en ; zhang shao lan ; gong jian guo
..............page:93-95
A New Cluster Validity Index for Fuzzy Clustering
hong zhi ling ; jiang qing shan ; dong huai lin ;wang sheng-rui
..............page:121-125
Key-Tree:An Approach for Enhancing Queriability of Form-Based Interface
he fan ; yang xiao chun ; yu ge ; li lin ; shi lei
..............page:126-130
An Operator Scheduling Strategy in a Data Stream System
hu zi jing ; li hong yan
..............page:131-133,137
An Efficient Collaborative Filtering Algorithm with User Hierarchy
qin guo ; du xiao yong
..............page:138-140
D(k,l)-Index:An Adaptive Structural Summary for XML Data
ding dao feng ; wu hong wei ; wang xiao ling ; zhou ao ying
..............page:141-145
Containment Algorithm for XPath Fragment in Cache Replacement Strategy
zhan xin ; li jian zhong ; xiong shu guang ; wang hong zhi
..............page:146-149
Study and Implementation on the Security Database of High Speed Boundary Router
rong ni ; han zhi wen ; gong zheng hu
..............page:150-154
Ontology Research and Existing Problems in Knowledge Engineering
gu fang ; cao cun gen
..............page:1-10,14
The Theory Base of Boosting
tu cheng sheng ; lu yu chang
..............page:11-14
A Survey on the Database Intrusion Detection
zhong yong ; qin xiao zuo
..............page:15-18
Intrusion Tolerance Technology-Survey and Direction
zhang xian feng ; zhang feng ; qin zhi guang ; liu jin de
..............page:19-22,27
The Technology of Mining Association Rules in XML Data
ju shi guang ; yan xing e ; cai tao ; xin yan
..............page:23-27
Research and Implementation of Mobile IPv6 Fast Handoff Based on Layer 2 Triggers
lin tao ; sun xiang hui ; hou zi qiang
..............page:28-31,45
A New Routing Architecture to Guarantee Quality of Service for EF Flow
li ; li dong ni ; wang guang xing
..............page:32-34
Node Localization Problem in Wireless Sensor Networks
shang zhi jun ; zeng peng ; yu hai bin
..............page:35-38
Nonlinear Behaviors and its Control in Internet Congestion
qian tong hui ; xu yue dong ; guan zhi hong ; wang hua
..............page:39-41,163
A Survey on QoS Measurement
hou meng shu ; lu xian liang
..............page:42-45
Performance Evaluation of IEEE 802.11 Wireless LAN Supporting Multi-Priority Services
zheng lin ; he jian hua ; yang zong kai ; cheng wen qing
..............page:46-49
Research on Performance of IP Storage Wide Area Network
cui bao jiang ; xiong wei ; wang gang ; liu
..............page:50-52,60
Multiplex Network Management Protocol's Petri Nets Validation and it's Performance Test
zhao jian li ; wen ying you ; zhao lin liang ; wang guang xing
..............page:53-56
Sub-System Based on Artificial Immune for Trojan Horse Detection
zhang liang ; chen lei zuo
..............page:57-60
A Comparison Study of Missing Value Processing Methods
liu peng ; lei lei ; zhang xue feng
..............page:155-156,174
An Approach to Database Schema Matching Based on Entity Classification
yu bo ; tang shi wei ; zhang peng ; tong yun hai
..............page:157-159,封四
Research and Design of Trust Management Middleware
yin gang ; wang huai min ; jia yan ; wu quan yuan
..............page:160-163
A Surevy on Reflective Middleware
zhang zuo ; ding xiao ning
..............page:164-167,192
An Introduction to Self-Adaptive Software
wang qian xiang ; shen jun zuo ; mei hong
..............page:168-171,178
Flexible Data-Document and Behavior Model Based on XML Technology
zhang shuo ; gu zuo qing
..............page:172-174
The Structure of Mobile Agent Based on Grid Computing
han guang fa ; wang ru chuan
..............page:175-178
A Software Architecture Based on High-Performance Middleware
xie jia meng ; peng hong ; lin jia yi ; zeng an
..............page:179-181
From Certainty Factor Model to Bayesian Network
wang rong gui ; zhang you sheng ; gao zuo ; peng qing song
..............page:182-188
An Algorithm of Applying Linkage Information to Retrieving Key Resources
gu jian ; huang zuo zuo ; wu li de
..............page:189-192
A New Heterogeneous Distributed Hybrid Genetic Algorithms
xiong zhong yang ; zhang lei
..............page:193-195,202
An Algorithm for Bayesian Networks Structure Learning Based on Simulated Annealing
zhang shao zhong ; wang xiu kun ; ding hua
..............page:196-199,208
A Rough Set Feature Selection Approach Dealing with Inconsistent Data
yuan gan ; zhang wei ; cai qing sheng
..............page:200-202
An Efficient Parallel Algorithm for Mining Frequent Sequences
zuo chun dong ; wu yue ; sun shi xin ; li lei ; che zhu ming
..............page:203-205
Outlier Detection Algorithms Based on Density Biased Sampling
yu jian qiao ; ge ji ke ; li zuo
..............page:206-208