Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2004 Issue 7
An Improved Architecture of DWT and the Application in Infrared-Image Compression
liu xiao ming ; huang zhi yong ; shi jian feng
..............page:203-205
Algorithm for Effective Space in the Problem of Goods Loading
zhao peng ; wang yong ; zhang qian ; yang xiu tai
..............page:206-208
A Method of Compressing Repeated Segments in System Call Sequences Executed by the Process
huang mei zuo ; yang shou bao ; zhang lei ; li hong wei
..............page:91-93
Design of Fussy Intrusion Recognition Engine
xu hui ; qi yong ; zhang hong ; liu feng yu
..............page:87-90
Template Generation of Sketchy Graphic Arrangement Based on Genetic Algorithms
zhang li sha ; sun zheng xing
..............page:196-199
Integrating Multi Dependency Structure of Bayesian Network Based on Generalized Relation Model
li wei hua ; liu wei yi ; zhang zhong yu ; guo xiang wen ; zhang yan feng
..............page:192-195
Descriptin Logic DLSR(DP) for Spatial Reasoning
liu ya bin ; chen gang
..............page:188-191
An Genetic_Enhanced Core Attributes Based Reduct Method
guo ping ; liu tan ren ; liu ran ; he qiong
..............page:185-187
The Clustering Based on the Equivalent Dissimilarity Degree Matrix
zhao ming qing ; jiang chang jun ; tao shu ping
..............page:183-184
Research on Parallel Mining Model of Association Rules
yuan ping ; zhang wei
..............page:181-182,205
An Approach to Generate Test Cases Based on UML Sequence Diagrams
jiang ze fan ; wang lin zhang ; li xuan dong ; zheng guo liang
..............page:131-136
A Usability Maturity Assessment at Chinese Software Enterprises
liu zheng jie ; chen jun liang ; zhang li ping ; zhang hai zuo
..............page:127-130
The Design and Realization of the Role-Definition Tool of CMM Based CPMS Platform
tan ning zuo ; xu ping ; gu qing ; chen dao xu
..............page:123-126
The Iterative Global Instruction Scheduler
yang shu zuo ; xue li ping ; zhang zhao qing
..............page:118-122
A Study of Dynamic Compilcation
cui hui min ; dai gui lan ; wang sheng yuan ; zhang su qin
..............page:113-117
The Application of Workflow Technology in OA System Based on ASP.net
ou yang ; li yan
..............page:110-112
New and Hot Point Technologies in Electronic Commerce
liang ru bing ; li ji gui
..............page:107-109,195
Review of Error Resilient Video Coding Techniques
hu fei ; long qing zuo
..............page:104-106,152
An Overview of Data Aggregation in Sensor Networks
bi yan zhong ; sun li min
..............page:101-103,117
Design of Architecture of ONet-An Object Database Management System
dong ying tao ; chen qi ; yu rui zuo
..............page:94-97
Design and Application of Information Integration Framework under Grid Environment
zhang hui huang ; liu sheng ; zhang guo yi ; li mu chu
..............page:98-100
Design of A Multi-strategy Topic Specific Web Crawler
wang chao ; zhu zuo ; li jun ; pan jin gui
..............page:84-86,208
State-of-the-Art :Cross-Language Information Retrieval
zhang jun lin ; qu wei min ; du lin ; sun yu fang
..............page:16-19
A Survey of Digital Rights Expression Language
li hui ying ; zhao jun ; di yu qing ; zuo yu zhong
..............page:12-15
The Protection Mechanism for Digital Evidence Collecting System and its Future Trend
sun bo ; ji jian min ; sun yu fang ; liang bin
..............page:9-11
Copyright Protection of MP3 Music Based on Digital Bacteria
zhang ping ; huang jun cai ; yang fan ; li ying ge ; zuo ; zhou ming tian
..............page:77-79,90
Research on User-Role Assignment Based on Role Restrictive Conditions
ye chun xiao ; fu yun qing ; wu zhong fu
..............page:73-76,83
A New D-OCSP Mode Based on Distributed Environment
su rui dan ; rong xiao feng ; wang ning ; zhou li hua
..............page:70-72
Comprehensive Risk Assessment of the Network Security
zhao dong mei ; zhang yu qing ; ma jian feng
..............page:66-69
Research on Security Architecture Model of Grid Computing System
fang xiang ming ; yang shou bao ; guo lei tao ; zhang lei
..............page:63-65
Research of Active Mode of Network Management Based on Out-of-Line Agent
tao yang ; wang guo liang ; zhang jing
..............page:60-62
Hierarchical Document Clustering Based on SAT Model
li qu ; long zuo
..............page:178-180
A Chinese Conception Sets-Generating Algorithm Based on Association Rule
zhao xin ; cai zhi ; hong liu ; cai qing sheng
..............page:175-177
The Research of Parallel Correlation Dimension Calculation
jiang ting yao ; li qing hua ; yang jing hua
..............page:169-170,封四
FIPA Agent Communication Specifications Analysis
zhang de tong ; zhou ming quan ; geng guo hua ; zheng xia
..............page:166-168
Ontologies in Multi-Agent Systems
liu zhi zhong ; wang huai min ; cong guang nian
..............page:163-165,187
Design and Implementation of Hardware Abstraction Level of High-Performance Router
wu mei juan ; wei jin wu ; chen shu zuo ; yue jian
..............page:156-158,191
Design and Implementation of ACL Based Discretionary Access Control Mechanism in Secure Operating System
sun ya zuo ; shi wen chang ; liang hong liang ; sun yu fang
..............page:153-155,162
A Generic Audit Framework for Secure Operating
xia nai ; mao bing ; xie li
..............page:148-152
Web Service Support in TP Monitor
ding xiao ning ; zhang zuo ; jin zuo hong
..............page:144-147
Research of Mobility Issue in Open System
zhong guo xiang
..............page:141-143,147
The Design and Implementation of the Object-Oriented Software-Testing Engine
ma xue ying ; yao zuo ; ye cheng qing
..............page:137-140
Research on the Evaluation Model for the Request Dispatching and Selecting Algorithm in Web Cluster
liu an feng ; chen zhi gang ; yan chao kun ; li deng
..............page:57-59,69
A Survey of Power Control in Ad Hoc Wireless Networks
wang qing shan ; zhang xin ming ; ma tao ; tang he
..............page:52-56
An Overview of Quality of Service Multicast Routing for IP-networks:Problems and Solutions
wu xiao quan ; ji zuo quan ; gui zhi bo
..............page:48-51
A Basic Weak Fair Exchange Protocol for Resource in P2P Networks
zhou shi jie ; qin zhi guang ; zhang xian feng ; liu jin de
..............page:45-47
Hierarchical Mobility Management-Based Flow Transparent Mobile IPv6 QoS Solution
chen yang ; yang shou bao ; he tao ; sun wei feng
..............page:41-44
Cost-Efficient QoS Routing Protocol for Ad Hoc Wireless Networks
zhang wen zhu ; li jian dong ; wang zuo
..............page:35-40
A MPLS Network Aggregation Scheme Based on LER Dominating Set
yang zong kai ; ma zuo zuo ; tan xian si ; he jian hua
..............page:33-34,47
Design of Biological Network Wireless Framework and its Key Technologies
gao lei ; ding yong sheng ; zhang xiang feng ; ren li hong
..............page:29-32
Survey of the Peer-to-Peer System Based on Semantic Routing
liu ye ; du qing wei ; yang peng
..............page:26-28
Network Characters of Coloring Problems
zhu meng zuo ; cai qing sheng
..............page:23-25,32
A Taxonomy of Authenticated Dictionary Based on Time Constraints
zhou yong bin ; qing si han ; xue yuan ; liu juan
..............page:20-22
Research and Development of Trusted Computing
zhou ming hui ; mei hong
..............page:5-8
An Overview of UML 2.0
ma hao hai ; shao wei zhong ; ma zhi yi
..............page:1-4,8