Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2008 Issue 1
On the Statistical Independence of Boolean Functions
HE Liang-Sheng
..............page:83-86
Research and Development of Buffer Overflow Vulnerability
LI Yi-Chao;LIU Dan;HAN Hong;LU Xian-Liang
..............page:87-89,125
A Rough Set Theory Based Genetic Algorithm
YAO Qian;CHEN Sun;XIE Li;ZHANG Jun
..............page:198-201
Research on Threat-based Dynamic Alerts Management
SHI Jin;LU Yin;XIE Li
..............page:94-96,111
Research on Malware Secure Virtual Execution Environments
CAO Yue;LIANG Xiao;LI Yi-Chao;HUANG Zhan
..............page:97-99
An Algorithm for Digital Image Information Hiding Based on LSB
LIU Hong-Yi;WANG Ji-Jun;WEI Yue-Qiong;SU Qin;HUANG Tao;ZHANG Xian-Quan
..............page:100-102,125
Efficient Routing Technique for Publish/Subscribe System Based on Information Partitioning
LU Peng;LIU Xu-Dong;LIN Xue-Lian;WANG Bin
..............page:103-107
The Architecutre of Remote Data Backup Based on Multicast of Fibre Channel
QIN Lei-Hua;YU Sheng-Sheng;ZHOU Jing-Li;ZHANG Zong-Ping
..............page:108-111
Hierarchical Updating Method Based on Rough Sets Theory in View Maintenance
LI Wen-Hai;FENG Yu-Cai;MA Xiao-Ming;YIN Jian-Zhang
..............page:121-125
Research and Improve for the Parent/Child Structural Join Algorithm
WANG Zhi-He;XIE Bin
..............page:126-127,139
A Typed Formal Model for Web Services Composition
GU Xi-Wu;LU Zheng-Ding
..............page:128-134
Automatic Synthesis of Composite Service
QIAN Hai-Bo;QIAN Zhu-Zhong;LU Sang-Lu;CHEN Dao-Xu
..............page:135-139
Applying Agent to Web Services: a Survey
XU De-Zheng;BAI Xiao-Ying;DAI Gui-Lan
..............page:140-143,150
Social Exchange-based Negotiation in e-Commerce
LI Li-Xin;QIU Yu-Hui
..............page:144-146
Goal Programming in Migrate Workflow
WU Xiu-Guo;ZENG Guang-Zhou;HAN Fang-Xi;WANG Rui
..............page:147-150
Research on the Multi-issue and Multilateral Negotiation Model Based on SOA
BAI Wei-Hua;LI Ji-Gui
..............page:151-153,175
The Design of Virtual Enterprise Architecture and the Hierarchical Simulation's Research
CAO Bao-Xiang;XIA Xiao-Na
..............page:154-156,167
Research of Ontology-based Universal Digital-museum Construct Platform
LIANG Jian-Ping;WANG Shu-Juan;LI Ji-Gui
..............page:157-159
A Committee Machine with Two-layer Expert Nets
JIN Jian;HUANG Guo-Xing;LIANG Dao-Lei;Bao Yu
..............page:160-163,180
Research on Virtual Tasting Perception System of Artificial Fish Based on Fussy Neural Network
meng xian yu ;yin yi-xin; yin zuo xin ; ban xiao juan ; tu xu yan
..............page:164-167
A Survey of the Research about Data Mining Technology Based on Fractal Dimension
NI Li-Ping;NI Zhi-Wei;WU Hao;YE Hong-Yun
..............page:187-189
Outliers Mining via Weighted Multidimensionality Scaling
WEI Lai;WANG Shou-Jue;XU Fei-Fei
..............page:190-192
Research on Algorithm for Mining Global Closed Itemsets
CHEN Jian-Mei;ZHU Yu-Qian;SONG Shun-Lin;GUI Chang-Qing;SONG Yu-Qing
..............page:193-195
Study of a Multicast Key Management Scheme Based on the Generalized Cat Map
YANG Jun;QIN Bo-Ping;LEI Kai-Bin
..............page:80-82,107
The Computer Algorithms of Finding Shortest Distance Pair of Points in Space
HU Jin-Chu;ZHANG Xiao-Hong
..............page:233-235
Indoor Skin-Modeling for Vision-based Interface
LIU Jing;SUN Zheng-Xing
..............page:236-239
Color Image Hybrid Coding Based on RGB Color Space
CHEN Yu-Tuo;HAN Xu-Li;YU Ying-Lin
..............page:240-245
A New Image Coding Using Contourlet Transform and Human Visual System
YANG Hong-Ying;JIN Hai-Bo;WANG Xiang-Yang
..............page:250-254
An Authenticated Group Key Management Protocol Withstand Interrupted Attack
CUI Guo-Hua;ZHENG Ming-Hui;SU Li
..............page:77-79
A Novel Quantum Key Distribution Protocol on 4-dimensional Hilbert Space
LI Shu-Hai;WANG Yu-Min
..............page:75-76,86
Application of Coupled Bidirectional Toggle Cellular Automata on Data Encryption
ZHAO Xue-Long;LI Qian-Mu;PING Ping;LIU Feng-Yu
..............page:71-74
Research on MVL k-out-of-n: S System
ZHENG Ji-Ping;QIN Xiao-Lin;SUN Jin
..............page:67-70
Clark-Wilson Modeling of Secure ARP
CHEN Xiao-Yan;HE Ye-Ping;XU Zi-Yao;DENG Ling-Li
..............page:64-66
The Design and Implementation of a Route Monitoring and Analysis System
TANG Min;SHI Xin-Gang;YU Xing;YIN Xia
..............page:56-59
An Approach to Allocate Bandwidth for Computer Networks Based on Distributed Network Resources
WANG Jian-Hua;JI Wei-Dong;ZHANG Jun
..............page:54-55,120
A Semi-fragile Watermarking Algorithm Based on Integer Wavelet Transform for Medical Images
WANG Bin;HAN Guo-Qiang;CHEN Wei-Na;QIN Zheng
..............page:258-260
Safety Measures for Web Server Based on HTTP Fingerprinting
XU Yuan-Chun;GUO De-Xian;LUO Jie
..............page:261-263
Data Transform Software Development Study for RP Based on Industiral CT Slicing Image
DUAN Li-Ming;SONG Jun;NIE Xuan
..............page:263-265
Study on Behavior Consistency of System on Component Evolution
LUO Yi;LI Xing-Yu;GUANG Lian-Wei;HU Hao;LU Jian
..............page:266-270,300
Learning Bayesian Network Structure Based on Bernoulli Distribution
SUN Yan;LU Shi-Pin;TANG Yi-Yuan
..............page:168-170
Parameter Learning in Bayesian Network under Incomplete Evidence Input
LIU Zhen;ZHOU Ming-Tian
..............page:171-175
Multi-value Intuitionistic Fuzzy Sets
ZHANG Shan-Wen;LI Xiao-Man;LEI Ying-Jie
..............page:176-177,245
Research on Flexible Probability Logic Operator Based on Schweizer Operator
WANG Wan-Sen;HE Hua-Can
..............page:178-180
An Operation Formalization of Knowledge Points in Course-ware
XIAO Kun;LI Xiao-Jian;CHEN Shi-Hong
..............page:181-183
Knowledge Discovery Research on Multi-agent Information System
WANG Yong;HUANG Guoa-Xing;WANG Yu;PENG Dao-Gang
..............page:184-186,192
A Crypto-based Immunization Model against Malicious Code
CHEN Ze-Mao;SHEN Chang-Xiang;WU Xiao-Ping
..............page:288-289,293
Compositional Schedulability Analysis of Timing Constraint Petri Nets
LI Peng;LI Xun;GU Qing;CHEN Dao-Xu
..............page:290-293
From Fluid Stochastic Petri Nets to First-order Hybrid Petri Nets
LIAO Wei-Zhi;GU Tian-Long;DONG Rong-Sheng
..............page:294-297
Parallel Processing of Minimization Algorithm for Determination Finite Automata
SUN Yu-Qiang;LI Yu-Ping;WANG Hai-Yan;CHEN Ji-Guang
..............page:298-300
Constructing and Implementation of Verylong Type in C++
YANG You;LI Xiao-Hong;SHANG Jin
..............page:301-封3
Research on Security of Binding Update to Correspond Nodes in Mobile IPv6
WU Kai-Gui;XIE Qi;ZHU Zheng-Zhou;WANG Jie;LIAO Zhen-Lan
..............page:45-47,50
The SSF Model Based on Partly Calls Model
REN Li-Yong;ZHANG Yu;LU Xian-Liang
..............page:42-44,74
An Energy-efficient Routing Protocol Applied in Underwater Sensor Networks
ZHANG Jian;HUANG Ben-Xiong;ZHANG Fan;TU Lai
..............page:38-41,195
Validate and Analyse for WSN Arithmetic Based on Novel Multi-level Minimal Dominating Clustering
LUO Guang-Chun;LU Xian-Liang;LI Jiong
..............page:34-37
New Method of Mapping Irregular IP Cores to 2-d NoC Architecture
LI Guang-Shun;WU Jun-Hua;MA Guang-Sheng
..............page:31-33
Multi-channel Based Power Control for Mobile Ad hoc Networks
FU Rui-Xue;LI Dong-Shang;XIANG Yong
..............page:27-30
Design and Implementation of the Self-organization Network Simulation Platform
LIU Jun;LI Zhe;YUE Lei
..............page:24-26,30
Survey on Fairness Research of Internet Congestion Control
ZENG Zhen-Ping;WANG Bin-Wen
..............page:19-23
The Evolution and Application of Color-coding
LIU Yun-Long;WANG Jian-Xin;CHEN Jian-Er
..............page:15-18,33
Web Navigation Prediction Based on Markov Model——A Survey
LIN Wen-Long;LIU Ye-Zheng;JIANG Yuan-Chun
..............page:9-14
The Research on the Model of Union of Information Sharing and its Application in the Agriculture
LIN Le-Yu;LIU Lei;WANG Shi;ZHENG Yu-Fei;FENG Qiang-Ze;CAO Cun-Gen
..............page:1-8,23
Change Risk Analysis for Component-based Software
MAO Cheng-Ying;ZHANG Jin-Long;LU Yan-Sheng
..............page:274-277
Study of Interactive Caching in Cluster Computing
WEI Wen-Guo;CHEN Chao-Tian;YAN Jun-Hu
..............page:278-280
A Fuzzy Analytical Hierarchy Process Based Quantitative Test Effect Evaluation Methodology
LU Ying-Hai;YANG Zong-Yuan
..............page:285-287,297
Research of Text Feature Words Clustering Based on Niche Hybrid Genetic Algorithm
DAI Wen-Hua;HE Ting-Ting;JIAO Cui-Zhen
..............page:202-203,223
A New Multivariate Decision Tree Algorithm
LIANG Dao-Lei;HUANG Guo-Xing;JIN Jian
..............page:211-212
Flexible Decision Planning Based on Formal Concept Analysis
LEI Yu-Xia;CAO Bao-Xiang;WANG Yan
..............page:213-215,235
Keyword Spotting Based on Restricting Model and Acoustic Confidence Measure
ZHENG Tie-Ran;ZHANG Zhan;HAN Ji-Qing
..............page:216-218
A Fast String-matching Algorithm
LIU Yu-Long;LIU Xiao
..............page:219-220
Using Temporal Information in Topic Detection
ZHAO Hua;ZHAO Tie-Jun;ZHAO Xia
..............page:221-223
An Intelligence Project Bid Evaluation Model Based on Multi-Agent
DING Ming-Yong;DAI Chun-Yan;YANG Yong-Bin
..............page:224-226
A System for Case-and Constraint-based Conceptual Design Method for 3D Scenes
JIANG Lan;YUE Xiao-Li;FENG Bai-Lan;LI Liang-Jun;CAO Cun-Gen
..............page:227-232,249