Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2005 Issue 11
Research on Block Partition Mode Selection Algorithm in H.264
GUO Jian-Jun;DAI Kui;CHENG Yun;WANG Zhi-Ying
..............page:25-26,45
SOLSR: A Secure Link State Routing Protocol for Ad Hoc Networks
HONG Fan;HONG Liang;FU Cai
..............page:20-24,114
Activity Based Awareness Model Research for Mobile CSCW
HU Yi-Feng;LU Dong-Ming;SHENG Yu;YUAN Qing-Shu
..............page:142-144,157
Generalized H-valuation in Logic System UL
ZHANG Xiao-Hong;HE Hua-Can
..............page:145-147
Local Search Algorithm for Solving Protein Structure Prediction Problem
LU Zhi-Peng;HUANG Wen-Qi
..............page:148-149,151
Trust-based Resource Searching Mechanism in Grid and P2P Integrated Environment
ZHOU Jin-Yang;YANG Shou-Bao;GUO Lei-Tao;WANG Li-Ping
..............page:27-30
A Survey and Design of a Grid Information Services Simulator
HUANG Jin;JIN Hai;XIE Xia;LU Peng;ZHANG Qin
..............page:36-40
A Performance Model for Domino Mail Server
WANG Lei;LIANG Yi
..............page:41-45
Recognition of Web Page Relation Based on Ontology
FAN Wen-Bin;DING Yan;PAN Jin-Gui
..............page:46-49
The Design of the Structure Model of Active Network Based IP
LI Ming;MA Yan
..............page:50-52
Solution of VOIP on Mobile Based on Bluetooth
YANG Ji-Yun;DENG Shao-Jing
..............page:53-54
Constructing Correlations in Attack Connection Chains Using Active Delay
LI Qiang;LIN Yan;LIU Kun;JU JiuBin
..............page:55-58
Security Analysis of IKE2
SHENG Hai-Feng;XUE Rui;HUANG He-Yan
..............page:59-63,123
A Method for Analysis and Design of Multicast Key Distribution
HU Ruo;QIAN Xing-San
..............page:64-69
An ID-based Group Signature Scheme
DONG Liang;XIAO Guo-Zhen
..............page:69-71
A Key Escrow Scheme to Identify Cheaters Based on PKI
ZHANG Chun-Sheng;WANG Shi-Pu;YAO Shao-Wen;ZHANG Xian-Feng
..............page:72-74,80
Definite State Machine of Honey Pot System Model
MA Xin-Xin;CHEN Wei;QIN Zhi-Guang
..............page:75-77
Network Intrusion Detection Based on Fuzzy Support Vector Machine
LI Hua;ZHANG Jian-Zheng
..............page:77-80
ETHs:A Data Stream Synopsis Maintaining Algorithm Based on Exponential Partition in n-of-N Model
QIU Hai-Yan;CHEN Li-Jun;ZHAO Jia-Kui
..............page:81-84
A Method for Automatic Schema Matching Using Characteristic of Data Distribution
LI You;LIU Dong-Bo;ZHANG Wei-Ming
..............page:85-87,103
A Dwarf-based Fast and Efficient Incremental Update Algorithm
YIN Ying;ZHAO Yu-Hai;ZHANG Bin
..............page:88-90,129
CBFrag-Cubing:An Algorithm of High-Dimensional Data Cubing Based on Compressed Bitmap
LIU Yun-Tao;BAO Yu-Bin;WU Dan;LENG Fang-Ling;SUN Huan-Liang;YU Ge
..............page:91-93,249
DVBB:A Structural Joins Algorithm on Dewey Vector Based B+ Tree Index
ZHANG En-De;WANG Guo-Ren;NING Bo;WANG Bin
..............page:94-98
A Density-based Tree Structure for Approximating Aggregate Queries
XU Jian;WU Tian-Yi;WANG Chen;WANG Wei;SHI Bai-Le
..............page:99-103
Efficient Filtering and Fragment Dissemination of Compressed XML Documents
WU Ling;YANG Dong-Qing;TANG Shi-Wei;WANG Teng-Jiao;BAO Xiao-Yuan
..............page:104-107
An Efficient Data Declustering Method RCMD in Parallel Database
AI Chun-Yu;LI Jian-Zhong;GAO Hong
..............page:108-111
Index Replication Strategy Study Based on DPB+-Tree
TANG Ji-Yong;BAI Xin-Yue;YANG Feng;HE Jian
..............page:112-114
Reverse Nearest Neighbor Search in Spatial Database
HAO Zhong-Xiao;LIU Yong-Shan
..............page:115-118
ArithBi+ --An XML Index Structure on Reverse Arithmetic Compressed XML Data
JIN Yan-Zhong;BAO Xiao-Yuan;SONG Zai-Sheng
..............page:119-123
A Dynamic Data Integration Model Based On Publish/Subscribe Communication
ZHANG Zhi-Wei;GUO Chang-Guo;CAO He-Feng;WANG Wei-Qiu;WANG Rui
..............page:124-126
Study on the Security of Network Database in Transmitting
XIONG Jiang;ZHU Jing
..............page:127-129
Analysis of the Security of Machine Readable Travel Documents
ZHU Xin-Shan;GAO Yong;WANG Yang-Sheng
..............page:130-133
Knowledge Reductions in the Bayesian Rough Set Model
WANG Hong;ZHANG Wen-Xiu
..............page:150-151
Classified Support Vector Machines Model Based on Dynamic Data
YUAN Feng-Shan;ZHU Si-Ming
..............page:152-154
Aspect Mining Using Concept Analysis
HE Li-Li;BAI Hong-Tao;ZHANG Jia-Chen
..............page:155-157
Study of Question Analysis in Question-Answering System
CAO Zhi-Juan;LI Zu-Shu;LIU Chao-Tao
..............page:158-160,230
A Fortified Search Strategy of Intensification and Diversification in Tabu Search
LEI Kai-You;WANG Fang;HE Yi;QIU Yu-Hui;LIU Guang-Yuan
..............page:161-163
Grid Workflow Research and Existing Problems
LI Wei-Hong;ZHANG Shao-Hua;ZHU Jing-Hui
..............page:11-15
Survey of IP Packet Classification Algorithms
TAN Ming-Feng;GAO Lei;GONG Zheng-Hu;XU Tian-Rong
..............page:5-10,19
Automated Reasoning Based on Tableau
LIU Quan;SUN Ji-Gui;YU Wan-Jun
..............page:1-4,15
The Roughness Measures of the Fuzzy Rough Sets
QIU Wei-Gen
..............page:164-166
Comparison with the Three Types of Discernibility Matrix
LIU Qi-He;LI Fan;YAN Jun-Hua;YANG Guo-Wei
..............page:166-169
Classifier Based on Rough Set and Neural Network and its' Application in LPR
ZHANG Nian-Qin;MIAO Duo-Qian;LI Dao-Guo
..............page:172-174
Real-time Facial Expression Recognition Based on Boosted Embedded Hidden Markov Model
ZHOU Xiao-Xu;HUANG Xiang-Sheng;XU Bin;WANG Yang-Sheng
..............page:175-178,190
Mining Sequence Pattern of Router Logs
ZHUANG Jun;GUO Ping;ZHOU Yang;ZHOU Jin;CAI Ri-Xu
..............page:179-181
An Efficient Quasi-physical and Quasi-human Block-packing Algorithm
HUANG Wen-Qi;CHEN Duan-Bing
..............page:182-186
Segmenting Conglutinate Objects Based on Morphological Reconstruction
WANG Yi-Ke;DOU Wan-Chun;ZHANG Xi-Wen;CAI Shi-Jie
..............page:187-190
Research on Role Task Distribution Based Navigation Technique in 3D GIS Grid
GAO Jin-Song;WU Chen-Han;HU Jin-Zhu
..............page:191-194
Reconstruction of Superresolution Image Using Generalized Gaussian Markov Random Fields Model
HUANG Hua;LI Jun;QI Chun;ZHU Shi-Hua
..............page:195-197
Research of GUI Abstract Description Model
ZHANG Peng;XU Peng
..............page:198-201,217
An Supporting Tool Based on Design Flowchart
DAI Qing-Han;LI Xuan-Dong;ZHAO Jian-Hua;ZHENG Guo-Liang
..............page:203-206
Research on the Configurable Multi-Mode Channel in Software Coordination Models
HAN Liang;ZHAO Jie;TAO Xian-Ping;LU Jian
..............page:207-211,246
Interface Automata A Formal System for Components Composition
ZHANG Yan;HU Jun;YU Xiao-Feng;LI Xuan-Dong;ZHENG Guo-Liang
..............page:212-217
The Design of a Software Process Modeling Language
CHEN Ying-Xin;LIU Qun
..............page:218-222
A Study on the Object-based Evolving Storage Systems
DONG Xiao-Ming;XIE Chang-Sheng
..............page:223-226
An Approach to Testing Component System Based on Structure Pattern
XU Jing;PANG Bo;WANG Qing-Ren
..............page:227-230
Performance Analysis and Optimization for Cluster System Based on HPL Benchmark
WANG Xiao-Ying;DU Zhi-Hui
..............page:231-234
Substitution Operation of Petri Nets
WU Zhen-Huan;WU Zhe-Hui
..............page:238-240
Fuzzy-Timing Petri Nets and Extended Fuzzy-Timing Petri Nets
DONG Yu-Mei;ZHANG Li-Chen
..............page:241-246
Application of Genetic Algorithms
XIAO Jun
..............page:247-248