Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2006 Issue 9
Fast Online Handwritten Digits Recognition Based on Decision Tree
JIANG Wen-li;WANG Wei;SUN Zheng-Xing
..............page:207-210,封三
A Convex Hull Algorithm Based on Convex Polygon
ZHANG Xian-Quan;LIU Li-Na;TANG Zhen-Jun
..............page:218-221
Fractal Image Compression Method Based on Pretreatment-Modification Mode
DENG Xiao-Yan;GAO Hong;SANG Bo
..............page:222-224
An Improved Face Recognition Algorithm Based on Bayes
ZHU Xue-Yi;WANG Chong-Jun;ZHOU Xin-Min;ZHANG Yao;CHEN Shi-Fu
..............page:204-206
An Algorithm of Edge Extraction of Color Face Based on Outlier Detection
SHAO Feng-Jing;SUN Ren-Cheng;GUO Zhen-Bo
..............page:201-203
Facial Feature Localization Based on Wavelet and ICA
WANG Shao-Yu
..............page:199-200,261
Spherical Harmonics Method for Object Image Synthesis under Changing of Illumination
XIAO Fu;WU Hui-Zhong;XIAO Liang;TANG Yang
..............page:195-198
Linear Combination Forecasting Model and its Application
GAN Jian-Sheng;CHEN Guo-Long
..............page:191-194
A New Definition Form of Rough Communication
WANG Hong-Kai;ZHAO Shu-Li
..............page:189-190
Weighted Rough Entropy Based on Tolerance Relation
QIU Wei-Gen
..............page:186-188
Cluster Algorithm of Go Groups Based on Mathematical Morphology
YUE Peng;LIU Hong-Tao;QIU Yu-Hui
..............page:173-174,217
Outlier Mining Model Based on ICA & SVM
PENG Hong-Yi;JIANG Chun-Fu;ZHU Si-Ming
..............page:175-177
Attribute Reductions and Attribute Features of Formal Contexts Based on a Type of Rough Sets
LI Tong-Jun;ZHANG Wen-Xiu;MA Jian-Min
..............page:178-180
Discernibility Matrix Enriching and Computation for Attributes Reduction
YANG Ming;YANG Ping
..............page:181-183,269
Roughness Measure for Fuzzy Sets
YAN De-Qin;ZHANG Li-Ping
..............page:184-185
A Method of Constructing Bayesian Networks for Situation Assessment
CHAI Hui-Min;WANG Bao-Shu
..............page:140-142
A Multi-Thread Implementation Method of BDI Agent
LIU Fang;YAO Li;ZHANG Wei-Ming;WANG Chang-Ying
..............page:143-145
A Method of Hyponym Acquisition Based on"isa"Pattern
LIU Lei;CAO Cun-Gen;WGNG Hai-Tao;CHEN Wei
..............page:146-151
Study for Document Interpretation and Automatic Abstracting Based on Analogic Sorting
TAN Wen-Rong;YANG Xian-Ze;TAN jin
..............page:152-154
Gene Expression Data Feature Selection Based on GA and Clustering
REN Jiang-Tao;HUANG Huan-Yu;SUN Jing-Hao;YIN Jian
..............page:155-156,224
A New Designing of Uniform Spline Curves and Surfaces
LEI Kai-Bin;ZHANG Wei-Qun;MA Zhi-Xia
..............page:225-228
Research of Intelligent Meta-search Technology for Domain Resources
SU Chao;CAI Ming;YAO Yu-Rong
..............page:107-109,130
Design of the WEB-MIS-Platform Based on Software Architechture
XU Shi-Lian
..............page:105-106,151
Study on Disaster Recovery System Model
WANG Kun;YUAN Feng;ZHOU Li-Hua
..............page:102-104,124
A Petri Net Extended with Price Information
LIU Xian-Ming;LI Shi-Xian
..............page:229-231
Two Sufficient and Neccessory Conditions of Time Petri Net Preserving Liveness and Boundedness
ZHAI Zheng-Li;WU Zhe-Hui;YANG Yang
..............page:232-234,283
The Petri Net Reduction and its Application in System Verification
XIA Chuan-Liang;XU Jin;ZHANG Guang-Wei
..............page:235-240,286
The Research of Feature-Oriented Reflective Real-time Application Domain Model
HUANG Jing;LU Yan-Sheng;XU Li-Ping
..............page:245-249
Simulation and Investigation of Quantum Search Algorithm System
SUN Li;XU Wen-Bo
..............page:250-252,277
Full-Automatic Static Assertion Verification for C Programs
YI Xiao-Dong;YANG Xue-Jun
..............page:253-256,273
The Research Progress of Economic-based Reserouce Management and Grid Economics
HUANG Zhi-Xing;LIU Hong-Tao;QIU Yu-Hui
..............page:110-114
An Allotted Solving Model of Distributed Network Resources
ZHANG Jun;WANG Jian-Hua;JI Wei-Dong
..............page:115-117
A Disk Scheduling Scheme with QoS Guaranteeing
LI Li;ZHANG Hong-Po;LI Hai;ZHOU Bing
..............page:118-120,221
A Survey of Digital Watermarking Based on Vector Quantization
HUANG Song;ZHANG Wei;CHEN JUN;YANG Hua-Qian
..............page:125-127
Knowledge Discovery Processing Model Based on Data Extractor
ZHENG Hong-Zhen;LIU Yang;ZHAN De-Chen
..............page:128-130
A Learning Algorithm of Euclidean Based on Functional Networks
ZHOU Yong-Quan;JIAO Li-Cheng;LI Tao-Shen
..............page:131-134
A Novel Hybrid Bayesian Classification Model
LI Xu-Sheng;GUO Yao-Huang
..............page:135-139
Research and Implementation of Super Federation Management Based on HLA
TANG Jian;WU Yue;SHE Chun-Dong;MAO Wan-Biao;ZHANG Li-Qiang
..............page:278-280
Application of P2P in Distance Education Network
WU Hua-Jian
..............page:287-290
The Implementation of Chinese Pinyin Input in Embedded Systems
LI Ming;LI Fang-Jun;ZHANG Wei-Qun;ZHOU Xian-Chun;XU Yong-Hong
..............page:293-封三
Research on the Performance of Pseudo-Random Sequences Based on Chaotic Neural Network
CHEN Jun;EI Peng-Cheng;ZHANG Wei;YANG Hua-Qian
..............page:161-163,177
A Study of Application of An Improved PSO Algorithm in BP Network
JIANG Tao;ZHANG Yu-Fang;WANG Yin-Hui
..............page:164-165,290
Bayesian Inference Based on Global Message Propagation
LIU Zhen;TAN Liang;ZHOU Ming-Tian
..............page:166-168,203
A Tabu Search Algorithm for the Multidimensional Knapsack Problems
HE Yi;QIU Yu-Hui;LIU Guang-Yuan;ZENG Shao-Hua
..............page:169-172
The Research of Performance Testing of Desktop Operating System
WU Jun-Feng;DAI Gui-Lan;BAI Xiao-Ying;YIN Ren-Kun
..............page:257-261
Consisitency Checking for UML Models
YANG Jing;ZHANG Ming-Yi
..............page:262-265
The Adversary Pattern and Attack-proof Theorem in Application Software's Security Testing
HE Hong;XU Bao-Wen;YUAN Sheng-Zhong
..............page:266-269
Research of CCM-based Application Server and Key Technologies
XU Feng;CHEN Yong;HUANG Hao;XIE Li
..............page:270-273
Determination of the Restart Dependence Based on the Access Manners of Processes
WANG Zhan;YOU Jing;ZHAO Yan-Li;LIU Feng-Yu;ZHANG Hong
..............page:274-277
A New Sequence Degree-based Clustering Algorithm and Dynamical ARMA Time Series Forecasting for I/O Requests
LI Huai-Yang;XIE Chang-Shen;LIU Yan;ZHAO Zhen
..............page:93-97
The Study of Quality of Service in Object-based Storage Device
ZHAO Shui-Qing;FENG Dan
..............page:89-92,127
NetData: An Ontology-based E-Science Workbench for Semantic Web
FAN Kuan;WU Zhao-Hui;GHEN Hua-Jun
..............page:85-88
Implementation of Electronic Seal System Based on PKI
GUO Zheng-Rong;ZHOU Cheng
..............page:83-84,88
A Security -Trust Model for P2P E-Commerce
WANG Qian;DU Jin-Jun
..............page:54-57
A Reputation-based System Model in Peer-to-Peer Networks
ZHANG Xu;MENG Kui;XIAO Xiao-Chun;ZHANG Geng-Du
..............page:52-53,73
A Novel Dynamic Replication Management Mechanism
HOU Meng-Shu;WANG Xiao-Bin;LU Xian-Liang;REN Li-Yong
..............page:50-51,114
Query Processing for Wireless Sensor Networks
XIE Lei;HEN Li-Jun;CHEN Dao-Xu;XIE Li
..............page:45-49,68
An Adaptive Internet Backbone Traffic Anomalies Detection Algorithm Based on Frequent Pattern Mining
GU Rong-Jie;YAN Pu-Liu;ZOU Tao;YANG Jian-Feng
..............page:76-80
Intrusion Detection System Model Based on Mobile Agent and Dynamic Topology
DENG Yi-Gui;WANG Kang;TU Guang-You;QIU Quan-Jie
..............page:74-75
Diagnosis of Links in ATM-Based Robust Routing Algorithm in LEO Satellite Communication Networks
ZHAO Zhi-Gang;LI Hang;WANG Guang-Xing
..............page:69-73
TDMA Protocol with Smart Antenna in Wireless Ad Hoc Networks
ZHANG Guang-Hui;LI Jian-Dong;ZHANG Wen-Zhu;ZHOU Lei
..............page:21-26
A Survey of Network Tomography Technologies
QIAN Feng;HU Guang-Min
..............page:12-17
Tracing the Source of Net-Virus
HAN Lan-Sheng;HAN Shu-Xia;Varneg Washington
..............page:8-11,82
A Spatial Sampling Method Based on DCT Applying to Scalable Video Coding
SU Shu-Guang;YU Sheng-Sheng;ZHOU Jing-Li
..............page:42-44
A Novel Mechanism of Distributed Routing Algorithm Based on Hash
YU Sheng-Ji;LI Yi-Chao;WANG Tao
..............page:40-41,44
Conformance Test Study of Border Gateway Protocol-BGP4 +
DING Xue-Lian;LI Hua;YE Xin-Ming
..............page:36-39
A New Dynamic Configuration Method of Address in Ethernet
LI Peng;JIANG Kun-Peng;LAN Ju-Long
..............page:34-35,39
Context-aware Intelligent Mobile Service Based on Semantic Web Technologies
ZOU Wen-Ke;MENG Xiang-Wu
..............page:30-33
A QoS Guarantee Mechanism Based on Weak Dynamic Resource Reservation in All-IP Mobile Network
ZHAO Yue;YANG Peng;LI Si-Zhong;LUO Xiao-Hua;WANG Guang-Xing
..............page:27-29,封四
A Survey on Network Intrusion Plan Recognition
NING Zhuo;GONG Jian
..............page:4-7,17
Research on Formal Categorical Ontologies
ZHANG Yuan;LI Shi-Xian
..............page:1-3,117