Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2005 Issue 2
A Survey on Access Control for Web Services
XU Feng;LIN Guo-Yuan;HUANG Hao
..............page:1-4
Modeling and Correctness Checking of Petri-Net-Based Workflow
ZHOU Fu-Ming;WU Bin;GU Qing;CHEN Dao-Xu
..............page:121-124
Agile Software Development and an Atipical Case
LIN Hai;XU Xiao-fei;PAN Jin-Gui
..............page:125-128,132
On Evaluating System of DBMS Security
WANG Yi-Chao;FENG Yu;WANG Shan
..............page:5-8
Research of Requirement Based Computer Forensics Process
SUN Bo;SUN Yu-Fang;ZHANG Xiang-Feng;LIANG Bin
..............page:13-19
An Artificial-Immune-Algorithm-Based QoS Multicast Routing Algorithm in IP/DWDM Optical Internet
WANG Xing-Wei;CHEN Ming-Hua;CHENG Hui;HUANG Min
..............page:25-27,44
Algorithms for Resource Reservation and Allocation with Limited Availability
LI Bo;SHI Bing-xin;SHEN Bin
..............page:28-30
A Framework for Ontology-Based Knowledge Management in P2P System
SUN Bao-Jun;WANG Xin-Jun
..............page:31-32,35
CACF:A Communication-Oriented Framework for Client Applications
SONG Jie;LU Xian-Liang;HANG Hong
..............page:33-35
Research on Internet 3A Access Paradigm and Related Technologies
HOU Zhi-qiang;LIU Dong-hua;HE GE;XU Zhi-Wei
..............page:36-39
Design and Realization of an Authentication System Based on PAM
LI Da-Zhi;QING Si-han
..............page:63-65,79
Storage and Backup of PKI's Certificate Based on LDAP
HE Zhao-Hui;LI Qi;QING Si-han
..............page:66-68
An Integrated Way to Filter Spam
XU Ji;GONG Jian
..............page:69-72,86
An Anti-Spam E-mail Filtering Method Based on Bayesian
ZHAN Chuan;LU Xian-Liang;ZHOU Xu;HOU Meng-shu;YUAN Lian-Hai
..............page:73-75
The Convergence of Grid and Web Services-WSRF and WS-Notification
LIU Hui-Bin;DU Zhi-Hui
..............page:76-79
Analysis of the Current Status of Architecture Description Languages
TIAN Li-Cong;ZHANG Li;ZHOU Bo-Sheng
..............page:109-113
A Requirements Modeling Language of Embedded Real-Time Software
SHU Feng-Di;WU Guo-Qing
..............page:114-120
A Review on Separation of Concerns
HE Li-Li;JIN Chun-Zhao;FENG Tie;ZHANG Jia-chen
..............page:129-132
A Frequency Sensitive Dynamic Replication Management Mechanism
ZHOU Xu;LU Xian-Liang;HOU Meng-shu;ZHAN Chuan
..............page:133-136,165
An Improved Workflow Process Definition Method Based on Template
YIN Jun;PAN Jin-Gui
..............page:137-139,146
CMMI Based Software Risk Management
WANG Tian-Qing;PAN Jin-Gui
..............page:140-141,155
Considerations of Numerical Software Libraries Design for High Performance Computing
XIE Li-Gang;YAO Ji-Feng;CHEN Yu-Rong
..............page:142-146
A Real-Time Interactive Prototype System of Distance Learning
ZHONG Yan-ru;ZHAO Xin-You
..............page:147-149
How to Write Effective Rewrite Programs
FENG Su
..............page:150-152
Designing of the Small Satellite's Ground Synthesis Simulation and Test System
ZHU Zhi-Lin;ZUO Tian-Jun;WANG Zhu-ping;CHENG Ping
..............page:153-155
Research for the CBD-Based Testing Method
CAO Yah-Yuan;ZHANG Wei-Qun
..............page:156-158
Non-Interference Models in Computer Security
ZHOU Wei;YIN Qing;GUO Jin-Geng
..............page:159-165
Task Distribution Balancing for Distributed Storage Networks of Video Information
CHEN Jin-Cai;ZHANG Jiang-ling;FENG Dan
..............page:45-47
iSCSI :The Future of Network Storage
CUI Xue-Zhi;WANG Dong-Yan
..............page:48-49,52
A Protocol of Secure Multi-Party Multiplication Based on Signcryption
ZHANG Hua;CHEN Zhi-xiong;XIAO Guo-Zhen
..............page:50-52
Secure Routing for Mobile Ad-hoc Networks
JIANG Ting-Yao;LI Qing-Hua;LI Peng
..............page:53-55
Study on Packet Sampling
GAO Wen-yu;CHEN Song-Qiao;WANG Jian-Xin
..............page:56-59
Quantum Analysis of Modern Cryptosystems
LU Xin;FENG Deng-Guo
..............page:166-168
A New Access Control Model--TBPM-RBAC
WANG Yu;QING Si-han
..............page:169-172
Research on Automatic Construction of Program Flow Graph for Assembly Embedded Software
WANG Wen-Yong;WANG Xue-Dong;XIANG Yu;TANG Ke;LIU Li-Mei
..............page:173-175,201
A Programming Technology Based on OGSA in Grid Environment
LI Ji;HUANG Xiao-yong;ZHANG Wei
..............page:84-86
Survey of Atomicity in Electronic Payment Protocol
LIU Yi-Chun;ZHANG Huan-Guo;WANG Li-Na
..............page:93-96,113
Content-Based Multimedia Indexing and Retrieval System of Scientific Databases
CHEN Feng-lian;YAN Bao-Ping;LI Jian-hui;HU Liang-Lin
..............page:97-99
Using MPEG-7 DDL to Represent Users' Query Needs
Fu Liang;XUE Xiang-Yang
..............page:100-105
A Spatiotemporal Chaotic Binary Sequence Based on Coupled Map Lattices Model and its Performance Analysis
PENG Jun;LI Xue-ming;ZHANG Wei;LIAO Xiao-Feng;Eiji Okamoto
..............page:196-198,232
Design of Enterprise GDSS Based on MAS
LI Gang;ZHONG Yuan-Chang;HAN Feng-Qing;WANG Yue
..............page:199-201
A Data Mining Method on Software System
ZHONG Zhi;YIN Yun-Fei;ZHANG Shi-chao
..............page:202-205
PFTM:A Frequent Subtrees Mining Algorithm Based on Projection
YANG Pei;ZHENG Qi-Lun;PENG Hong;LI Ying-ji
..............page:206-209
A Fast Algorithm Based on Trans-Tree for Mining and Updating Frequent Itemsets
RUAN You-Lin;LI Qing-Hua;YANG Shi-Da
..............page:210-212
The Collision Detection Algorithm Based on Compressed AABB Trees
PAN Zhen-Kuan;LI Jian-Bo
..............page:213-215
A Novel Feature Descriptor Based Local Information for Image Retrieval
HUANG Chao-Bing;YU Sheng-Sheng;Zhou Jing-li
..............page:216-218,234
Unsupervised Image Segmentation Based on Markov Quadtree
GUO Xiao-Wei;TIAN Zheng;Lin Wei
..............page:219-223
Relevance Feedback in Freehand Sketchy Shape Recognition
WANG Qiang;SUN Zheng-Xing;LI Man-Wu;JIANG Wei
..............page:224-228
Multi-Focus Image Fusion Based on Wavelet Transform and Local Energy
MIAO Qi-Guang;WANG Bao-shu
..............page:229-232
The Operation Model of Space Logics on Proposition Objects
MAO Ming-Yi;HE Hua-Can;CHEN Zhi-cheng
..............page:176-179
The Extension of the Bayesian Network Based on Independence
PENG Qing-song;ZHANG You-sheng;WANG Rong-gui
..............page:182-184,223
Research on Knowledge Chain Model
XU Huan-Liang;LI Xu-Rong
..............page:185-187,192
Heterogeneous Knowledge Integration for Supply Chain Systems
XU Qi;Robin Qiu
..............page:188-192
Keyword Extraction Based Automatic Construction of Hypertext
LU Xu-Qing;TANG Jie;LI Juan-zi;CAI Yue-Ru
..............page:193-195,228