Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2007 Issue 10
Performance Research of Multi-user Diversity Technologies Based on Diversity Gain and Energy Gain
GUO Jin-Huai;ZHAO Xiong-Wei;XU Xiao-Jian;YU Hong-Yi
..............page:59-61
The Design and Realization of Hierarchical Network Simulation System
QIU Jie;WANG Chen-Liang
..............page:62-64
Real-time Scheduling for Cooperative Tasks in Sensor Networks
HU Kan;LIU Yun-Sheng
..............page:65-69
Research Development of Topology Control Strategies for Wireless Ad Hoc Networks
WANG Fang-Wei;ZHANG Yun-Kai;DING Zhen-Guo;MA Jian-Feng
..............page:70-73
Research on Model and Implementation Authentication of SPI Calculus Specifications
XU Dong-Hong;QI Yong;HOU Di
..............page:80-83
Availability Analysis and Improvements for WAPI
TIE Man-Xia;LI Jian-Dong;WANG Yu-Min
..............page:84-87,102
Secure Routing for Mobile Ad hoc Networks
LIU Jing;FU Fei;XIAO Jun-Mo
..............page:88-89,109
Analysis and Primary Implementation for IEEE 802.11 MAC in STA
LU Jia;YANG Shi-Zhong
..............page:90-91,136
On the Principle of Information Transfer in Covert Channel
LIU Zhi-Feng;JU Shi-Guang;WANG Chang-Da;ZHOU Cong-Hua
..............page:92-95,142
Structured Data Extraction Based on Web Page Tags
REN Zhong-Sheng;XUE Yong-Sheng
..............page:133-136
A Sharing Prefix XQuery Query Engine over XML Stream
SUN Dong-Hai;ZHANG Yu;WU Xiao-Yong
..............page:137-142
Management of Metadata Distribution Information Cache in BWMMS
YANG De-Zhi;XU Lu;ZHANG Jian-Gang
..............page:143-145,158
An Implementation of Metadata Cache in Object-based Storage System
ZHOU Gong-Ye;WU Wei-Jie;CHEN Jin-Cai
..............page:146-148
Design of Mandatory Access Control in Spatial Database Management System VISTA
SHI Hua-Ji;LI Xing-Yi;SHAO Xue-Jun;JU Shi-Guang
..............page:149-151
A Logic Based Access Control Model
RUAN Hong-Yi;PENG Zhi-Yong;LEI Jian-Jun
..............page:152-154,172
A Mandatory Access Control Model for XML Database
FENG Xue-Bin;HONG Fan
..............page:155-158
An Access Control Model for Web Services
HAN Tao;GUO He-Qin;GAO Ying;LI Dong;LIU Zhuang
..............page:159-161,216
A Method of Workflow Scheduling Based on Colored Petri Nets
XIAO Zhi-Jiao;CHANG Hui-You
..............page:162-165
Design of Ontology Mapping Framework
ZHENG Li-Ping;LI Guang-Yao;LIANG Yong-Quan
..............page:166-167,180
Intelligent E-learning System Based on Fuzzy Emotion Recognition Model
XIE Ying-Gang;WANG Zhi-Liang;PING An;Masatake Nagai
..............page:168-172
Analysis of Authentication Protocols Based on Strand Space and State Transition
DENG Miao-Lei;QIU Gang;ZHOU Li-Hua
..............page:96-98
An Agreement Analysis Method of Security Protocol Based on Authentication Test
ZHOU Qing-Lei;WANG Feng;ZHAO Dong-Ming
..............page:99-102
Improvement of Authentication Test in Application
LI Xiao-Le;DONG Rong-Sheng;GUO Yun-Chuan
..............page:103-105,123
An Improve LSB Hide Algorithm Based on Multi-Transformation
XU Jiang-Feng;LI Hao;YANG You
..............page:106-109
A Provable Secure Threshold Signature Scheme Based on GDH Group
PENG Chang-Gen;ZHANG Xiao-Pei;LI Xiang;LUO Wen-Jun
..............page:110-111,148
Function Restricted Bézier Curve and its Application in Embroidery CAD
LI Rong-Ping;LUO Jun-Jie;WANG Chong-Jun;CHEN Shi-Fu
..............page:247-249
Research of Identity-based Key System Scheme for Wireless Sensor Network
CHENG Hong-Bing;FEI Guo-Zhen
..............page:116-119
A Scanning Detection Algorithm Based on Finite Machine of Protocol Status
DENG Yi-Gui;WANG Kang;QIU Quan-Jie
..............page:120-123
FuseGrid-based Data Semantic Framework
PANG Xiong-Wen;QI De-Yu;LI Yong-Jun
..............page:124-128
An Expanded NT Algorithms Removing All Crowns
CHANG Le;WANG Jian-Xin;CHEN Jian-Er
..............page:173-176,191
Multi-core Architecture Simulation: A Survey
YU Zhi-Bin;JIN Hai
..............page:8-13
Adaptive Resource Allocation Scheme for Multiuser MIMO/OFDM Downlink with Channel Estimation Error
HAN Feng;LIU Ying-Zhuang;ZHU Guang-Xi;LU Xiao-Feng
..............page:52-55
An Approach to the Available Bandwidth Measurement for Network Paths Based on Packet Queuing
ZHU Shang-Ming;GAO Da-Qi;ZHUANG Xin-Hua
..............page:48-51,58
Analysis of IP Flows Rate in Large-scale Networks
WU Hua;ZHOU Ming-Zhong;GONG Jian
..............page:40-47
A Multilayer Framework and Optimal Model for Traffic Grooming in Optical Transport Networks
SU Yang;XU Zhan-Qi;LIU Zeng-Ji
..............page:36-39,64
The Construction and Resource Locating of the Semantic P2P Grid Based on Description Logics
LU Zheng-Ding;SUN Xiao-Lin;LI Rui-Xuan;WEN Kun-Mei
..............page:33-35,39
A Multi-routing Model for Wireless Ad Hoc Networks
CUI Guo-Hua;LU She-Jie;CHEN Jing;LIU Zhi-Yuan
..............page:27-32
A Survey of Cross Layer Design for Ad Hoc Wireless Networks
LU Xian-Ling;SUN Ya-Ming;ZHOU Ling;YU Ji-Ming
..............page:24-26,32
Research and Development of Service Discovery Problem in Pervasive Computing Environments
XU Wen-Shuan;XIN Yun-Wei;LU Gui-Zhang
..............page:14-18
Test UML Statechart Properties by Using Dynamic Description Logic
LIU Ya-Jun;KANG Jian-Chu;LV Wei-Feng
..............page:268-271
A Survey about UML Statecharts Testing
ZHANG Tao;GU Qing;CHEN Dao-Xu
..............page:264-267,280
Research and Development on the Secure Architecture of Terminal Based on Trusted Computing
LIU Wei-Peng;HU Jun;FANG Yan-Xiang;CHEN Chang-Xiang
..............page:257-263,封4
TURBO Codes in Digital Watermark Robust Algorithm Application
HU Yan-Wei;QIN Zheng
..............page:254-256,298
Robust Video Watermarking Algorithm with Correlative Context
TIAN Jie;ZHANG Xin-Fang;WANG Tong-Yang;WU Jun-Jun;CHENG Ming
..............page:250-253
Several New Advances of Logical Markov Decision Processes and Relational Markov Decision Processes
WANG Zhen-Zhen;XING Han-Cheng;ZHANG Zhi-Zheng;NI Qing-Jian
..............page:1-7,23
The Research of Risk Evaluation Method of Modularization and Hiberarchy of Information Security
HUANG Qin;ZHANG Yue-Qin;LIU Yi-Liang
..............page:309-封3
Optimization Design of RSA Modular Multiplication Hardware
WU Dong-Feng;LI Hua;ZHOU Ying
..............page:306-308
Research of Low Power Design Techniques for Multi-core and Multithreading Microprocessor
ZHANG Jun;FAN Xiao-Ya;LIU Song-He
..............page:301-305
An High Integrated Direct Digital Frequency Synthesis System Design on FPGA
WANG Qing-Dong;XIE Chang-Sheng;WANG Hai-Wei
..............page:299-300,305
Construction of Cooperative Web Courseware Authoring System Based on Ontology
CHENG Jing;QIU Yu-Hui;YANG Ming
..............page:295-298
A Survey on Computer-assisted Audit Techniques (CAATs)
CHEN Wei;ZHANG Jin-Cheng;QIU Ro-Bin
..............page:290-294
Study of Ontology-based Software Testing Knowledge Management Model
HE Jian-Ying;YAN Hai-Hua;LIU Chao
..............page:281-283,289
Queuing Network Model-based Software Performance Prediction During Analysis and Design in USDP
XU Zhong-Fu;CHEN Yong-Guang;YANG Jian-Hua;PENG Hu
..............page:272-277
A Mean Shift Tracker with the Ability to Track Object with Changing Appearance
ZUO Jun-Yi;ZHAO Chun-Hui;LIANG Yan;PAN Quan;ZHANG Hong-Cai
..............page:244-246,253
Combined Fractal Image Compression Based on DCT and Variance
ZHOU Yi-Ming;ZHANG Chao;ZHANG Zeng-Ke
..............page:241-243
Water Wave Animation Based on the Physical Model
QIN Pei-Yu;CHEN Chuan-Bo;XIE Hong-Tao;XIA Hui;LV Ze-Hua
..............page:238-240
Computer Animation Based on Artificial Intelligence and Artificial Life
ZHANG Shu-Jun;BAN Xiao-Juan;CHEN Yong;CHEN Ge
..............page:233-237
The Design and Realization of Communication Facilities in Multi-Agent System Development
YOU Ming-Ying;LI Yi-Cai;PENG Jun
..............page:230-232
Personalized Web Search System Based on Rough Sets
SHI Lei;XI Lei;DUAN Qi-Guo
..............page:228-229,249
Arithmetic of Deriving Html Tags Influence Factor from Docment Collections
DENG Jian-Xun;XING Yong-Kang
..............page:226-228
A Novel Iterative Point Matching Algorithm Based on Affine Parameter Estimation
TAN Zhi-Guo;SUN Ji-Xiang;TENG Shu-Hua
..............page:221-225
Multiplicative Weights Update Analysis of Set Multicover
CUI Peng;QIAN Li-Yan
..............page:219-220,237
Optimize of NonLine System Based on Genetic Arithmetic
LI Xian-Li
..............page:217-218,232
Dissimilarity Metric and Clustering for Hierarchy Variable
YANG Pei-Ying;WANG Da-Ling;YU Ge;CHEN Dong-Ling
..............page:214-216
Sample Reduction Strategy for Support Vector Machines with Large-Scale Data Set
LUO Yu;YI Wen-De;WANG Dan-Chen;HE Da-Ke
..............page:211-213
Fusion Classifiers Based on Universal Combination Operation
LIN Wei;HE Hua-Can;JIA Peng-Tao
..............page:204-207
Outlier Detection Algorithms and their Availability to Data Streams Mining
SUN Yun;LI Zhou-Jun;CHEN Huo-Wang
..............page:200-203,225
The Study of Parallel Clustering Algorithm for Cluster System
ZHOU Bing;FENG Zhong-Hui;WANG He-Xing
..............page:195-199
A Outlier Mining Algorithm Based on Principal Component Analysis
WANG Hong-Chun;PENG Hong
..............page:192-194
From Data Mining to Chance/Sign Discovery
ZHANG Zhen-Ya;CHENG Hong-Mei;WANG Xu-Fa
..............page:188-191
The Research of Vague-Rough Sets Based on Triangle Model
LIANG Jia-Rong
..............page:185-187
The Review of Ant Colony Algorithm Based on TSP
GUO Ping;YAN Wen-Jin
..............page:181-184,194
A New Move Set for Protein Folding in Lattice Model
LI Xiao-Mei
..............page:177-180