Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2008 Issue 8
New Artificial Im/nune Algorithm for Storage Security
CA Tao;JU Shi-guang;ZHONG Wei;NIU De-jiao
..............page:60-64
Research on QoS Monitoring for Public IPv6 Network Bearer Service sLA
CHENG Wei-qing;GONG Jian
..............page:54-59
Model of Service Scheduling Based on Market Mechanism and Semantic
WANG Gang;QIU Yu-hui;PU Guo-lin
..............page:180-182,212
Audit Evidence Gathering Method Based on Data Matching
CHEN Wei;Robin Qiuz;LIU Si-feng
..............page:183-187,194
Comparison and Analysis on Subtle Motifs Discovery Algorithms in DNA Sequence
WANG Jian-xin;YANG De;HUANNG Yuan-nan
..............page:188-194
Predicting Protein-protein Interaction through Computing Based on Data Grid
XIE Jiang;ZHANG Wu;MEI Jian
..............page:195-197
Oligopoly Equilibrium Price of Price Competition Game with Reserved Utility in General Networks
HONG Yong-fa;XU Juan;JIANG Chang-jun
..............page:198-201
Digital Earth and its Application in Malaria Disease Dynamic Evolvement
ZENG Xiao-yu;LI Qi;YIN Qi-dong
..............page:202-205
MlegaL Information Flow Control On RBAC Model
GE Fang-bin;YANG Lin;WANG Jian-xin;DING Li
..............page:65-68,89
Network Security Situation Awareness Model Based on Heterogeneous Multi-sensor Fusion
LIU Xiao-wu;WANG Hui-qiang;LIANG Ying;LAI Ji-bao
..............page:69-73
Design and Implementation of FPGA-based TOE System
WANG Sheng;SU Jin-shu
..............page:74-76
Walk among Contact Areas Query Mechanism for Sensor Networks
LIU Zhi-qiang;JIANG Ze-jun;WANG Li-fang;CHEN Fu
..............page:77-83
Measurement and Analysis of Choking/Unchoking in BitTorrent
CHENG Wei;WU Chan-le;LEI Ying-chun;JIANG Qi;YANG Li-tang
..............page:84-89
Research of Scheduling of Independent Tasks onto Heterogeneous Computing Systems
ZHOU Yang;JIANG Chang-jun;FANG Yu
..............page:90-92,97
Time Delay Analysis of Datalink System Message Transmission Based on Queue Theory
REN Pei;ZHOU Jing-lun;LUO Peng-cheng;WANG Wen-zheng
..............page:93-94,128
Research on Resource Scheduling Strategies for Gird Based on GridSim
LI Jiong;LU Xian-liang;DONG Shi
..............page:95-97
Cryptanalysis of Two Provably Secure Blind Signature Schemes
HU Xiao-ming;HUANG Shang-teng
..............page:98-100
Approach for Resolution of Exceptional Conflicts in Authorization
ZHANG Ming-sheng;YANG Jing
..............page:101-103,115
Application of Web Service Composition in Net Administration
JIANG Dong
..............page:106-108
Research On the Dominance-based Rough Set Approach
JIA Xiuyi;YU Shao-yue;SHANG Lin;CHEN Shi-fu
..............page:109-111,137
Improved Hybrid Quantum Genetic Algorithm
WANG Bao-wei;WANG Hong-guo;LIU Le;WANG Xi
..............page:112-115
Study on Class Incremental Learning Algorithm Based on Hyper-sphere Support Vector Machines
QIN Yu-ping;LI Xiang-na;WANG Xiu-kun;WANG Chun-li
..............page:116-118
Functional Network Construction Method and Approximation Theory Based on Polynomial Basis Functions
zhou yong quan ; liu xiao ji ;zhang ming; zhang ming
..............page:119-121,164
Application of Speech Recognition System Based on Algebra Algorithm
LI Yuan;DENG Hui-wen
..............page:122-124
Study on the Seal Input of the Automatic Seal-identifying System
LIE Wen-juan;HE Yi-gang
..............page:129-130,153
Knowledge Acquisition Algorithm Based on Attribute Core
ZHU Zhen-guo;ZHAO Yi;LI Yong
..............page:131-133
Research on Adaptive Text Fuzzy Clustering Based on Genetic Algorithm
DAI Wen-hua;JIAO Cui-zheng;HE Ting-ting
..............page:134-137
Representation and Reasoning of Fuzzy ER Model with Description Logic
ZHANG Fu;MA gong-min;YAN Li
..............page:138-144
Heuristic Algorithm for Solving the Container Loading Problem
CHEN Duan-bing;HUANG Wei-qi;SHANG Ming-sheng;FU Yan
..............page:145-148
Support Vector Description Multi-class Classifier Based on Improved PCM
ZHANG Yong;CHI Zhong-xian;XIE Fu-ding
..............page:149-153
Cluster Analysis Based Oil the Chaos Immune Evolutionary Algorithm
YANG Jiu-jun;DENG Hui-wen;TENG Zi
..............page:154-157
Development of Handover Algorithm in MIPv6 and Research on its Security
HUANG Song-hua;SUN Yu-xing;HUANG Hao;XIE Li
..............page:48-53,83
Virtual Distributed Probing Model for IPv6 Router-level Topology Discovery
LIU Zhen-shan;WANG Qing-xian;LUO Jun-yong
..............page:46-47,76
AARP:An Applicable Authenticated Routing Protocol
TIE Man-xia;LI Jian-dong;WANG Yu-min
..............page:42-45
Overview of Data Gathering in Wireless Sensor Networks
XIE Wen-bin;XIAN Ming;BAO Wei-dong;CHEN Yong-guang
..............page:35-41
Hybrid Cluster-based Routing Protocol in Wireless Sensor Networks
LI Jie;CHEN Zhi-guo;LI Zhi-yuan
..............page:32-34,73
Clustering Algorithm for Wireless Sensor Networks Localization
WANG Shan-shan;YIN Jian-ping;ZHANG Guo-min;CAI Zhi-ping
..............page:29-31,59
Simulation Model for P2P Networks
YANG De-guo;WANG Hui;WANG Cui-rong;GAO Yuan
..............page:26-28,41
Ontology Storage on the Semantic Desktop
YU Xiang-yu
..............page:158-160
Study of User Semantic Model in Semantic Grid Portal
ZHOU Zhu-rong;QIU Yu-hui;DENG Xiao-qing
..............page:161-164
Mapping OWL Ontologies to Relational Database Schema
ZHU Ji-feng;MA Zong-min;LU Yan-hui
..............page:165-169,205
Fuzzy Extension of OWL Ontology Lang, mge
ZHAO De-xin;FENG Zhi-yong
..............page:170-171,175
Ontology Based Project Management Information Integration
HAN Zong-bai;FEI Qi
..............page:172-175
Description Logics Based Conceptual Graphs Reasoning
WANG Jun;WANG Ji-jun;GAN Dan;JIANG Yun-cheng
..............page:176-179
Moving Object Detection Based on Two-dimensional PCA
WANG Lu;WANG Lei;ZHUO Qing;WANG Wen-yuan
..............page:206-207,217
Research on the Common Framework of 3D Reconstruction Computation for Computer Vision
XU Xiao-wei;WANG Zhi-yan;ZHANG Yan-qing;LIANG Ying-hong;CAO Xiao-ye
..............page:208-212
Trapezium-based Non-symmetry Anti-packing Representation Method for Binary Images
HUANG Wei;CHEN Chuan-bo;ZHENG Yun-ping;WU Xue-li
..............page:213-217
Study on the Finger Vein Feature Extraction Algorithm
LIU Jia-ling;YU Cheng-bo
..............page:218-219,226
Two Step Algorithm for Motion Human Body Silhouettes Extraction
LI Hong-bo;XIANG Nan;SONG Jun;WU Yu
..............page:220-222
Location Algorithm of the Laser Spot Center Based on Dynamic Gradient
LAN Zhang-li;YAN Guo;YANG Xiao-fan;ZHOU Jian-ting
..............page:223-226
New CBIR System Based on the Improved Clustering Image Retrieval
ZHANG Zhi-qiang
..............page:227-228,264
Image Annotation and Retrieval Based on Bayesian Theory
ZHANG Yuan-qing;BAO Jun-jie;KUANG Hang;ZHONG Hong
..............page:229-231
Multi-directions Gray-scale Morphology Edge Detection Algorithm
WANG Guang-yong;WANG Lin-lin;WANG Zuo-cheng;SONG Hua
..............page:232-234,243
Algorithm of Image Compression Based on Orthogonal Wavelet Packet
QIN Huan-chang;WEI Jia-ru
..............page:235-237
Digital Image Scrambling Algorithm Based on Chaotic System
DENG Shao-jiang;ZHANG Dai-gu;PU Zhong-liang
..............page:238-240
Image Restoration Method Based on the Improved Genetic Algorithm
ZHAO Jin-shuai;LU Rui-hua
..............page:241-243
Res earch on Secure Data Transmission for Ad Hoc Networks
LU She-jie;CUI Guo-hua;CHEN Jing;LIU Zhi-yuan
..............page:21-25
Survey of Graph Grammars
HAN Xiu-qing;ZENG Xiao-qin;ZOU Yang;ZHANG Kang
..............page:10-16
Research of Constrained Triangulation
CHEN Yu;WANG Xiang-hai
..............page:6-9
Survey on Smart Space Research
YU Yi;YI Jian-qiang;ZHAO Dong-bin
..............page:1-5,20
Method for the Identification of Rules in the Nerve Net with Complex Property
HE Xiao-qin;ZHANG Xiang-hua;BAI Yong
..............page:244-246,272
Parallel Research of Sequential Pattern Data Mining Algorithm
WANG Zong-jiang
..............page:249-251,257
Survey of Education Resource Merger
XIAO Kun;CHEN Shi-hong;HU Ying
..............page:258-261
Method of Software Defect Data Analysis and its Implementation
LIU Hai;HAO Ke-gang
..............page:262-264
Behavior Protocols Recovery Based on Dependency Analysis
HUANG Zhou;PENG Xin;ZHAO Wen-yun
..............page:265-268,276
Reverse Engineering of UML2. 0 Sequence Diagrams Using Static and Dynamic Information
LIANG Ruo-ying;CHEN Ping;HU Sheng-ming;LIU Peng-fei
..............page:269-272
Interactive Requirements Elicitation Methods to Support MDA and Assistant Tools
YU Bin;ZHANG Chen;HAO Ke-gang
..............page:273-276
Soundness Analysis of Distributed Real-time and Embedded Software Based on Petri Nets
CHEN Li-qiong;SHAO Zhi-qing;WANG Xiu-ying;FAN Gui-sheng
..............page:277-280,299
Design of Database System Dependability Benchmarking Tools
YE Xiao-jun;WANG Jian-min
..............page:281-283
Quality of Service in Large Scale Publish/Subscribe Systems
DONG Biao;CHEN Jin-hui;SUN Ya-min
..............page:284-286
gong zuo liu guan li xi tong de she ji yan jiu
wang li fang ; wang zuo
..............page:300-301