Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2005 Issue 1
A Study of Chinese Text Summarization Based on Thematic Area Discovery
hu zuo ; he zuo zuo ; ji dong hong
..............page:177-181
Component Based General-Purpose OS Kernel,Good or Bad?
li hang ; guo jing lin ; liu xi yang ; chen ping
..............page:130-131
Detecting Feature Interactions Based on Component Composition Mechanisms
hu jin zhu ; fei li juan ; li min
..............page:128-129,137
Research on Application of Fuzzy Concept Lattice in Knowledge Discovery
qiang yu ; liu zong tian ; wu qiang ; shi bai sheng ; li yun
..............page:182-184
Mathematics Properties of HS Principal Curves
wang zhen ; miao duo qian ; zhang hong yun
..............page:185-186
A Method Based on Principle Curves for Minutiae Extraction in Fingerprint Images
tang qing shi ; miao duo qian ; zhang hong yun
..............page:187-189
A Method of Virtual Human Skin Deformation Based on Generalized Cross-Sectional Contour
li yan ; wang zhao qi ; mao tian lu
..............page:190-193
RAH: A Texture Based Image Retrieval Algorithm Based on the Histogram of Image Power Spectral
ding ling ; wang chong jun ; yang yu bin ; chen shi fu
..............page:194-197,201
Automatically Testing for the Web Application
zhou xiao yu ; xu lei ; xu bao wen ; chen huo wang
..............page:125-127
The Policies of Performance Optimization of Entity Beans in Web Application Server
yang bo ; zhang wen bo ; fan guo chuang ; chen ning jiang
..............page:120-124
Authentication Mechanism Study in Grid Based on Virtual Organization and Mobile Agent
chen hong wei ; wang ru chuan ; han guang fa
..............page:70-73
Research on Immune Recognition Model and Algorithm for Unknown Viruses Detection
bao xin long ; ma jian hui ; luo wen jian ; cao xian bin ; wang zuo fa
..............page:74-76,94
he Minimum Criteria of Covert Channels' Existence and its Application
wang chang da ; ju shi guang ; yang zhen ; guo dian chun
..............page:77-79
On the Analysis of Secure Protocols with Temporal Properties
dong rong sheng ; peng xun ; guo yun chuan ; gu tian long
..............page:80-85
A Survey on the Database Access Controls
zhao bao xian ; qin xiao zuo
..............page:88-91
SPINE :A Lightweight Persistent Object Manager
song jie ; lu xian liang ; han hong
..............page:92-94
Policy Management in Secure Group Communication
yin qing ; cai yan rong ; wang qing xian
..............page:67-69,161
Research on Database-Based Management Technology for Image Data
zhu tie wen ; chang lei ; li zuo ; miao qian jun
..............page:95-97,115
On the Matchmaking Mechanism of Web Services Based on Agent Technology
bian zhao juan ; ren xiao zuo ; tao xian ping ; lv jian
..............page:98-100,107
Scheduling Schemes of Server Channel for Streaming Media-on-Demand:A Survey
zuo shao hua ; li zi mu ; cai qing song ; hu jian ping
..............page:101-105,110
The Formal Description of Check Information and its Applications
jin bing yao ; ma yong jin ; luo hong bo ; wu zhang xing
..............page:106-107
Research on Secure Electronic Payment System
fu xiong ; cheng wen qing ; lang wei min ; tan yun meng ; xiong zhi qiang
..............page:108-110
The Concept and Approach for Digital Image Watermarking and Copyright Protection
sang jun ; liao xiao feng
..............page:111-115
A Crop-resistant Digital Watermarking Algorithm Based on Chaotic Map
gao zuo zuo ; liao xiao feng ; sang jun
..............page:116-117,124
Design and Implement of a Tool for Pairwise Testing Data Generation
zhou xiao yu ; nie chang hai ; xu bao wen ; chen huo wang
..............page:118-119,154
Research of IPv6 Service Technology
zhang yun yong ; zhang zhi jiang ; liu yun jie ; li guo jie ; li zhong cheng
..............page:8-12
A Kind of Internet Access Server for Devices with Serial Interface
wang xiao ying ; zhao hai ; ruan guan chun ; zhang wen bo
..............page:34-36,52
Research on Service Management Based on Mobile Ad hoc Network
jiang yue qiu ; liu yong bing ; zhao lin liang ; wang guang xing
..............page:28-30,63
Network Management and Topology-Generation Based on Control Domain in Mobile Ad Hoc Network
wen ying you ; liu zhi guo ; wang guang xing
..............page:25-27
Study on NPSNET-V,a Platform for Distributed Virtual Environments
xue xiao ming ; jing wan jun ; liu jin de
..............page:21-24
Krylov Subspace Methods and Parallel Computation
li xiao mei ; wu jian ping
..............page:19-20,40
A Collision-free MAC Protocol for Wireless Ad Hoc Networks Based on TD-SCDMA
pang bo ; xu lei ming ; xiang yong ; shi mei lin
..............page:13-18
Speech Recognition Methods over Internet
han ji qing ; zhang lei ; zheng tie ran
..............page:175-176,181
A Novel Dynamic Clustering Algorithm Based on Tabu Search
zhong jiang ; wu zhong fu ; wu kai gui ; yang qiang
..............page:172-174,189
An Estimation Algorithm for Number of Clusters Based on Tabu Search
liu yong guo ; zhang wei ; chen ke fei ; liao xiao feng
..............page:168-171
An PAM Algorithm Based on Data Field
yu jian qiao ; zhang fan
..............page:165-167
Study on Evaluating Data Classifying Quality Based on Mutual Subsethood
wu cheng mao ; fan jiu lun
..............page:159-161
Web Fuzzy Clustering and its Application
liu mao fu ; he yan xiang ; peng min
..............page:155-158
Making Decision under Real-Time, Unpredicted Environments :a Multi-Layer Model
yang yang ; chen xiao ping
..............page:151-154
A Negotiation Model Based on Bayesian Learning
an bo ; tang liang gui ; li shuang qing ; cheng dai jie
..............page:147-150,158
AgletBlackboard:an Extension of the Coordination Mechanism in Aglets System
zhou zuo ; zhou yu ; tao xian ping ; lv jian
..............page:138-141,171
Survey Propagation:An Effective Algorithm for Solving SAT
li shao hua ; zhang jian
..............page:132-137
Survey of Web Usage Mining
guo yan ; bai shuo ; yu man quan
..............page:1-7
Image Stitching Based on Line Matching
zhang xian quan ; tang zhen jun ; lu jiang tao
..............page:221-223
The Technology Analyse of Choosing UDP in BACnet/IP
chen heng zuo ; wang bo ; liu wan min
..............page:64-66
Improvement on Pervasive Computing Based on OSGI
xiong jiang ; ying hong
..............page:61-63
Grid Computing Environment Study for Remote Sensing Image Processing
shen zhan feng ; luo jian cheng ; zheng jiang ; chen qiu xiao ; ming dong ping
..............page:58-60,66
Study on the QoS of Input Buffers in Broadband Switches
yu ying ; zhao dong feng
..............page:56-57
Study of the Policy to Assure the Quality of Real-time Services on Ethernet
huang zhou song ; lei zhen ming
..............page:53-55
Beamed Broadcasting in Wireless Mobile Ad Hoc Network
he jian hua ; sang ba ; cheng wen qing ; fan zhen
..............page:45-47
Dynamic Load-Balancing Strategy for Content Delivery Network
xu wei dong ; wang kang
..............page:41-44
Fair Bandwidth Allocation Algorithm for Multiple Service Classes
liu wei ; yang zong kai ; le chun zuo ; he jian hua
..............page:37-40
Freehand Sketch Recognition Based on Temporal Stroke Information
yin jian feng ; sun zheng xing ; qiu qing hua ; jiang wei
..............page:198-201
Research Progress on Wavelet-Based Image Watermarking
wang xiang hai
..............page:202-207,216
Wavelet-Domain Hidden Markov Overlapping Tree Model and Artifact Evaluating
guo xiao wei ; tian zuo ; lin wei
..............page:208-211,223
Discusses on Problems of Orthonogal Wavelet Transform of Finite Length Signal
chen zuo ; han bo tang
..............page:212-213
LOD Terrain Rendering Algorithm
zhu zhi hui ; zhang jia hua ; shen hong hui
..............page:214-216
Study on Color Raster Images Vector Conversion
zhang yuan ke ; cao bao xiang
..............page:217-220