Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2004 Issue 11
On the Semantic Operators for Intuitionistic Fuzzy Logic
lei ying jie ; wang bao shu
..............page:4-6
General Self-correlation of Normal Distributing Parameter
mao ming yi ; he hua can ; chen zhi cheng
..............page:1-3,10
MCAN:A Scalable Modified Content-Addressable Network
peng xiao yan ; yang shou bao ; chen dong feng
..............page:130-134
A New Micropayment Scheme Based on Scrip
cheng wen qing ; lang wei min ; yang zong kai ; tan yun meng
..............page:135-137
A Micropayment Protocol Against Overspending
ji dong yao ; feng deng guo
..............page:138-139,157
Partially Restrictive Blind Signature and its Application to E-cash
peng bing ; yang zong kai ; tan yun meng
..............page:140-143
Formal Research of Kerberos Protocol Based on Spi Calculus
li guo qiang ; gu yong gen ; fu yu xi
..............page:7-10
A Study of the Algebraic Attacks on Stream Ciphers
zhang li ; liu hai bo ; bai en jian ; xiao guo zhen
..............page:11-13
Analysis,Improvement and Implementation of I/O Support Mechanisms in Grid Computing Environments
wang bin ; xu guo shi ; luo yin ; xu zhuo qun ; ding wen kui
..............page:14-18,37
An Overview of Web Data Warehouse
han jing yu ; xu li zhen ; dong yi sheng
..............page:19-23
Research on Dynamic Routing Strategy of Nonhierarchical Telecommunication Network
wan hai ; hao xiao wei ; li lei
..............page:24-30
A Dynamic Cache Algorithm of Media Suffix Based on Batch Patching
cai qing song ; li zi mu ; zuo shao hua ; hu jian ping
..............page:31-37
On Internet Partial Route QoS Mechanism Issue
xia meng qin ; yi fa sheng ; zeng jia zhi
..............page:38-39,49
Load-balanced Routing Protocols in Ad Hoc Networks
zheng xiang quan ; guo wei
..............page:40-45
The Design and Implement of the Smart-gateway Based on Netfilter
song shun hong ; yang shou bao ; zhang huan jie
..............page:46-49
Research for the Design of Time Management Services in RTI Based on Multicast
li yong jun ; liu bu quan
..............page:50-52
Analysis on TCP Vegas/RED Based on Fluid-flow and Packets
deng xiao heng ; chen zhi gang ; zhang lian ming
..............page:55-59
Quantization with 16-BIT Arithmetic for H.26L
zhang jian
..............page:60-62,69
A Solution to the Self-Protection of a Security Audit System
dong zhen xing ; chen long ; wang guo zuo ; dong an bo
..............page:63-65
A Method of Enforcing Multilevel Security Policy in Computer Networks
zhang zhi wen ; zhou ming tian
..............page:66-69
Proxy Signature Schemes Based on Signature of Zero-Knowledge
tan zuo wen ; liu zhuo jun
..............page:70-72
Analysis of DARPA Test and Research of IDS Test Method
lv zhi jun ; jin yi ; lai hai guang ; huang zuo ; xie li
..............page:73-76
Intrusion Event Based Early Warning Method for Network Security
zhang feng ; qin zhi guang ; liu jin de
..............page:77-79,129
Network Intrusion Detection System Based on Rough Set Theory
wang xu ren ; xu zuo sheng ; zhang wei qun
..............page:80-82
An Intrusion Tolerant Scheme of RSA Signature Algorithm
wu zuo ; yu jian ping ; wu zhong dong
..............page:83-85
Research on Inference Problems Based on Metadata
mao qi zheng ; bai wen yang ; liu qi zhi
..............page:86-88
Research on a Double-Hash IP Classification Algorithm
shang feng jun ; pan ying jun
..............page:89-92
An Effective Incremetal Clustering Algorithm
xu bi feng ; feng shao rong ; xue yong sheng ; liu xiao feng ; weng wei
..............page:93-96
Research on Extracting Medical Diagnosis Rules Mining Based on Rough Sets Theory
jiang wei jin ; lin xiao hong
..............page:97-101
Data Source Selection Strategy Based on Probability Statistics and Quality Measurement
zhang chun hai ; liu qun ; li hua
..............page:102-104
An Implementation of Database Replication Based on Group Communication
wang yong ; jiao li mei
..............page:105-108,113
Normalizing and Updating XML Documents Based on XML Transformation
yue kun ; wu yi zhong ; wang xiao ling ; zhou ao ying
..............page:109-113
Transforming XML Data Based on Relational-Tree Model
yang wen jun ; li zuo zi ; wang ke hong
..............page:114-117,137
A Batch Strategy Supporting Condition Filtration on Data Streams
yang xing hua ; song bao yan ; ou zheng yu ; su dong ; yu ya xin ; yu ge
..............page:118-120
A Multistrategy Generic Schema Matching Approach
cheng wei ; zhou long zuo ; lin he shui ; sun yu fang
..............page:121-123
Admission Control Mechanism for Hybrid Real-Time Transactions:ACMHRTT
bai si xue ; cao zhong hua ; cheng chun lei ; xiao shui jing ; zuo chang xing
..............page:124-125,134
Architecture Research and Instance Evaluating of J2EE Application Server in Enterprise Application
tang xian lun ; chou guo qing ; cao chang xiu ; lang feng hua ; li xue qin
..............page:144-146,229
An Adaptive Algorithm of Collaborative Filtering Recommender Based on Aggregate-Neighborhood
he guang hui ; wei shu guang ; wang wei zuo
..............page:147-149
Optimizing Software Project Process Based on Risk Control
xu ru zhi ; qian le qiu ; xue yun zuo ; zhao wen yun
..............page:150-153
Using EVMS to Improve Software Process
zhao zuo xiang ; pan jin gui
..............page:154-157
Loop Invariant Code Motion in Code Generator
yang shu zuo ; xue li ping ; zhang zhao qing
..............page:158-161,165
A Location Method for Refactoring Based on Average Distance Measure
liu jian bin ; zhu xue jun ; li man ling ; guo wei bin
..............page:162-165
On Parallelizing the List Scheduling Algorithm
li qing hua ; ma dan ; zhang zuo
..............page:166-168,175
Software Testing Model Based on Formal Method
lai xiang wei ; zhang wei qun ; qiu yu hui ; zhou yan zuo
..............page:169-173
The Study on Establishing Computer Access System of the Process of Excauating Oil from Oil Well
wang jian hua ; zhang jun ; yu lan fang
..............page:173-175
Machine Translation :Past,Present,Future
dai xin yu ; yin cun yan ; chen jia jun ; zheng guo liang
..............page:176-179,184
Feature Selection in Machine Learning
zhang li xin ; wang jia qin ; zhao yan nan ; yang ze hong
..............page:180-184
Computer Supported Collaborative Learning Based on Resource
li ji gui
..............page:185-186,210
Research on Cognitive Models of Artificial Fish
ban xiao juan ; zeng guang ping ; ai dong mei ; tu xu yan
..............page:187-191
Classification by Essential Emerging Patterns
fan ming ; liu meng xu ; zhao hong ling
..............page:211-214
Research and Application of Non-rectangle Texture Mapping
wang ke ; yu sui huai ; le wan de ; lu chang de
..............page:215-217
An Image Authentication Scheme Based on Public Key and Fragile Watermarking
zhang hong bin ; yang cheng
..............page:218-221
The Discussion about Gaussian Function Based Wavelet Analysis
song jie ; fan yan bin ; cheng jin yong ; pan zhen kuan
..............page:222-223
An Ontology-Based Classification and P2P-Based Web Services Discovery Model
zhao ze yu ; xue xiang yang ; zhang cheng hong
..............page:192-195,201
Uncertainty-Based Clustering Method for Spatial Data Mining
he bin bin ; fang tao ; guo da zhi
..............page:196-198,封四
A Survey of Touching Character Segmentation Algorithms
wei xiang hui ; ma shao ping
..............page:199-201
Design and Implementation of a Communication Server in Mogent System Based on Design Patterns
ren xiao zuo ; tao xian ping ; bian zhao juan ; lv jian
..............page:202-204,207
Neural Network for Adaptive Beamforming
zhang xiao song ; ye mao ; wang yan dong ; li yi chao
..............page:205-207
The Dynamic Programming Algorithm of the Change Problem
jia chi ; wang xiang hai
..............page:208-210