Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2008 Issue 4
Approach of Model Checking for Exception Handling Based on EHA
YANG Hou-Qun;HE Zhong-Shi;CHEN Jing
..............page:280-282
System Design of Platform to Project Management Based on CMM
ZHANG Wen-Tao
..............page:276-279
Research on Integration Method of Legacy Systems Based on Service-oriented Architecture
XIONG An-Ping;WANG Hua-Jing;QU Zhong
..............page:273-275,282
Research on Key Problems in Adaptive Component Design and Implementation
MAO Fei-Qiao;QI De-Yu
..............page:268-272
Temporal-logic-based Model for Chain of Trust of Trusted Platform
LI Li;ZENG Guo-Sun;CHEN Bo
..............page:265-267
Research on Flexibility Metrics in Software Architecture Level
GAO Hui;ZHANG Li
..............page:259-264
Representation of User Interface Relation Model Based on And/Or Logic
LIANG Wei-Sheng;LI Lei
..............page:203-204,210
Pattern Recognition Method Based on the Attribute Computing Network
XU Guang-Lin;FENG Jia-Li;LIU Yong-Chang
..............page:200-202
A New Algorithm to Solve the MCSP
XU Wei-Zhi;WANG Hong-Guo;YU Hui;YANG Hai
..............page:197-199
Multidimensional Fuzzy Reasoning Method Based on Weight of Fuzzy Neural Network
LIU Wen-Yuan;ZHANG Qing-Da;WANG Bao-Wen;SHI Yan
..............page:193-196
A Stereo Matching Algorithm Based on Directional Cost Aggregation
LU A-Li;TANG Zhen-Min;YANG Jing-Yu
..............page:186-189
On the Properties and Constructions of Correlation-immune Boolean Functions
XIAO Hong;ZHANG Wei-Guo;ZHOU Yu;XIAO Guo-Zhen
..............page:190-192,202
A Technique for Evaluating Services Based on Improved Bayesian Voting Algorithm
ZHANG Yan-Sheng;BAI Xiao-Ying;JIANG Chang-Zheng
..............page:255-258,272
An Anonymous Authentication Method for Toll Personalized Service
LIU Jing-Sen;DAI Guan-Zhong
..............page:248-251
Design and Application of a Hybrid Database System with Snapshots
ZHOU Peng;YANG Dan;EO Sang-Hun
..............page:241-243
A Method for Multiple Morph Targets Tracking Based on Region Growing
CHEN Heng-Xin;FANG Bin;TANG Yuan-Yan;WEN Jing
..............page:238-240,243
Irregular Block Matching Video Segmentation Method Based on the Local Pyramid Graph
PENG Xiao-Ning;YANG Ming;ZOU Bei-Ji;CHEN Shu
..............page:233-237
Hierarchical Citrus Canker Recognition Based on HMAX Features
ZHU Qing-Sheng;ZHANG Min;LIU Feng
..............page:231-232,279
Application of Mean Shift Algorithm in Mode Seeking of Background Pixel Values
LIANG Ying-Hong;WANG Zhi-Yan;CAO Xiao-Ye;XU Xiao-Wei
..............page:228-230,237
Research and Realization of Velocity Interpolation Algorithm along Implicit Curves
LI Dan;LU Zheng-Ding;XU Hai-Yin;HU Li-An
..............page:225-227,254
Digital Watermark Research Based on Fingerprint Feature Data
FENG Mao-Yan;FENG Bo;SHEN Chun-Lin
..............page:222-224
Face Recognition Based on Gabor Wavelet and S-ISOMAP
FENG Hai-Liang;LI Jian-Wei;HUANG Hong
..............page:219-221
Rough Set Based on Fuzzy Neural Network for the Application in Prediction of Stock Market
YE DeQian;MA Zhi-Qiang;LI Guo;JIANG Huang-Pu
..............page:168-169,183
Research on the Mutual Information and Ontology Based Collaboration Retrieve Model
ZHOU Zhu-Rong;QIU Yu-Hui;XIA Lei
..............page:165-167,177
Semantic Matching of OWL-S Service Ontology Based on Semantic Grid
PU Guo-Lin;YANG Qing-Ping;QIU Yu-Hui;WANG Gang;GE Ji-Ke
..............page:162-164
Two-class Text Categorization Method Based on Naive Bayes and GA
WAN Di-Fei;FAN Xing-Huan;WANG Guo-Yin
..............page:160-161,173
Design of a PCA and Hierarchical Method Classification Software
JIANG Bin;YI Zhen-Ping;MA Shao-Han
..............page:216-218
Representation of Spatial Relations Based on Region Extension and Shrinking Calculus
LIU Yi-Song;ZHAN Yong-Zhao;SUN Ya-Min
..............page:211-215
Research of Flexible Planning Algorithm and System Implement Based on Heuristic State Search
LI Yang;CHEH Jia-Yu;HAN Cheng-Shan;SUN Yan;GU Wen-Xiang
..............page:207-210
An kNN Algorithm Based on Vector Angle for Multi-label Text Categorization
GUANG Kai;PAN Jin-Gui
..............page:205-206,封3
Tolerance Relation Based Assignment Reduction in Incomplete Information Systems with Fuzzy Objectives
WANG Fu-Gui;LI Ru;QIAN Yu-Hua;YIN Zhi-Zhou;CAO Fu-Yuan
..............page:174-177
A Regression SVM Selection Ensemble Approach
ZHANG Yu;WANG Wen-Jian;KANG Xiang-Ping
..............page:178-180
The Model Research of Support Vector Machines in the RNA Secondary Structure Prediction
HE Jing-Yuan;HE Zhong-Shi;ZOU Dong-Sheng
..............page:181-183
NetLogo-based Model for HIV Therapy
ZHAO Chun-;ZHONG Ning;HAO Ying
..............page:283-284
Design of Security Management Platform Based on Publish-subscribe System
ZHANG Ji-De;QU Er-Qing;HE Zhi-Fang
..............page:288-291
Technique of Reviews Extraction Apply to Online Shopping System
ZHAO Jun-Qin;YANG Dan;YU MIAO;CHEN LIN
..............page:292-293
Study on the Approaches of Dynamic Attendance in Video Sequence
WANG Gang;ZHOU Ji-Liu;HE Kun;YANG Zhu-Zhong;WU Jun-Qiang;LANG Fang-Nian
..............page:294-封3
Research and Implement of MetaData Model for Information Semantics Sharing
HUGAN Hong-Bin;ZHANG Wei-Ming;DENG Su;LIU Zhen
..............page:124-128
A Novel Method for Improving the Precision in Internet End-to-End Delay Measurements
PAN Qiao;PEI Chang-Xing;ZHU Chang-Hua
..............page:109-111,128
Dynamic Limited Feedback and Quantization Algorithm Based on Multiuser MIMO-OFDM System
LIANG Xue-Jun;ZHU Guang-Xi;CAO Xi
..............page:106-108,134
Local Timestamp-based Adaptive Clock Method for TDM over Ethernet
DAI Jin-You;YU Shao-Hua
..............page:102-105
Design and Verification of a New Kind of Integrated Ordnance Initiation Control System
LIU Ting;FU Yu-Zhuo;XIE Kai-Nian;ZHAO Feng
..............page:97-101,118
Comparative Study of IPv4,IPv6 and IPv9
HE Wen-Hua;CHEN Zhi-Gang;HU Yu-Ping
..............page:94-96
Design of an USB2.0 - ATA Bridge IP Core
LI Mei-Feng;DAI Guan-Zhong;HU Wei;MIAO Sheng;ZHANG De-Gang
..............page:91-93
WiMAX Based Optimal Real-time Service Bandwidth Scheduling Strategy
ZHU Peng;ZHU Guang-Xi;LIN Hong-Zhi;SHI Hai-Bin
..............page:88-90
Discussion of SSH Buffer Overflow Loopholes and Security Ward
SONG Yang-Qiu
..............page:85-87,90
Design of a Synchronous Buffer in Video Conference
ZHANG Yan-Feng;WANG Cui-Rong;ZHAO Yu-Hui;GAO Yuan
..............page:82-84
Applications of LDPC Codes in Meteor Burst Communications
SUN Rong;LIU Jing-Wei;WANG Xin-Mei
..............page:78-81
Performance Analysis of Routing Protocol for Ad Hoc Network under TCP Transmission
REN Xiao-Ping;CAI Zi-Xing;CHEN Ai-Bin
..............page:74-77
TCP Admission Control of Dynamic Connection-oriented Pricing
DONG Yong-Qiang;HUANG Yi-Ming
..............page:70-73,81
Safety Research of Instruction Detection System Based on Snort
YUAN Hui
..............page:122-123,138
A Cross-layer Method for Multi-traffic QoS Guaranteed Transmission in OFDM-systems
LIU Jian;ZHU Guang-Xi;LI Li;GUO Lei;WANG Ling
..............page:115-118
New Analysis Method for Self-similar Network Traffic Based on the Differential Analysis
LI Li;YU Li;ZHU Guang-Xi;BAI Yun
..............page:112-114
Predictive Queries Algorithm Based on Probability Model over Data Streams
LI Guo-Hui;CHEN Hui;YANG Bing;XIANG Jun;CHEN Gang
..............page:66-69
Research on Formal Description and Verification of Semantic Web Service Composition
CHENG Yong-Shang;WANG Zhi-Jian
..............page:40-43
Research of Anti-jamming Characteristic for BOC Signal
YANG Li;BO Yu-Ming;TIAN Ming-Hao
..............page:33-35,59
3-gated: Dynamic Scheduling Scheme Based on Load Adaptation over WLAN
LI Yan;ZHU Guang-Xi
..............page:28-32
Survey of Service Discovery Protocols for Mobile Ad hoc Networks
SU Jian;GUO Wei
..............page:23-27,43
Dynamic Alliance Based on Genetic Algorithms in Wireless Sensor Networks
ZHANG Shi;ZHANG Zhe;ZHU Ji-Chang
..............page:20-22,50
Research on the Grid Resource Discovery Service with P2P/Web Service
CHEN Fu;YANG Jia-Hai;YANG Yang;XIONG Zeng-Gang
..............page:16-19
Method for Feature Selection Based on Granular Computing
SUN Li-Jun;MIAO Duo-Qian
..............page:14-15,39
Research and Advancement of Classification Method of Imbalanced Data Sets
GAO Jia-Wei;LIANG Ji-Ye
..............page:10-13
Overview of the Traffic Matrix Estimation Research
JIANG Ding-De;HU Guang-Min
..............page:5-9,13
Research on Resource Description and Discovery in RFID Networks
YAN Xin-Qing;YIN Zhou-Ping;XIONG You-Lun
..............page:1-4
Particle Swarm Optimization Based on Number-theoretic Method
MI Li-Bo;TAN Li-Wei
..............page:149-150
Study on Fuzzy Granular Space Based on Normalized Equicrural Metric
TANG Xu-Qing;ZHU Ping;CHENG Jia-Xin
..............page:142-145
Research of Intrusion Detection System Based on Improved Rough Neural Network
XU Yuan-Chun;TAN Xiao-Ping
..............page:63-65
Study on Immune Mechanism Based Intelligent Spam Filter
WANG Lei;DONG Han;YIN Cai-Yan
..............page:60-62,65
Efficient Concurrency Control for Mobile Real-time Transactions in Data Broadcast Environments
LI Guo-Hui;YANG Bing;XIANG Jun;CHEN Hui
..............page:54-59
NoC Process Elements Mapping Using Genetic Algorithm
SUN Rong;LIN Zheng-Hao
..............page:51-53,84
A Novel Concept-based Image Retrieval Method
CHEN Shi-Liang;LI Zhan-Huai;YUAN Liu
..............page:139-141,153
Attribute-based Fast Incremental Algorithm for Building Relative Reduced Concept Lattice
QU Li-Ping;LIU Da-Xin;YANG Jing
..............page:135-138
Text Sentiment Classification Based on Phrase Patterns
LI Dun;CAO Fu-Yuan;CAO Yuan-Da;WAN Yue-Liang
..............page:132-134
A Class of Strict-t-morms-based Propositional Logic
LUO Min-Xia;HE Hua-Can
..............page:129-131
Web Services Secure Frame Based on PKI/PMI
WANG Xiao-Jun;ZHOU Xiao-Feng;WANG Zhi-Jian;SHEN Zu-Yi
..............page:48-50
Weak Atomicity and Correctness Criterion of Web Transaction
GUO Yu-Bin;TANG De-You;XI Jian-Qing;LI Xi-Ming
..............page:44-47