Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2009 Issue 12
Conformance Test Selection Based on Availability
xing zuo ; ye xin ming ; xie gao gang
..............page:132-137
Credal Network Inference Reduct Algorithm Based on d-separate
zuo ying ; wu qi zong ; cui chun sheng
..............page:191-193
Dual Video Watermarking Technique Based on Energy Difference Ratio and Spread Spectrum
fu de sheng ; wang jian rong ; sun wen jing
..............page:259-262
EPN-based Approach for E-learning Resource Composition
gao ; li hua ; wu zhong fu
..............page:167-170
Performance Analysis of Webit Quad-core Processor
wang jia liang ; zhao hai ; li peng ; liu zuo
..............page:235-237,277
Adaptive Hierarchical Fuzzy Inference-based Modulation Recognition Algorithm
chen zuo zuo ; wang hong yuan
..............page:183-186
Corner Detection Algorithm for Image Mosaic
feng yu ping ; dai ming ; zhang wei ; wang mei jiao
..............page:270-271,293
Security Model for Mobile Agent-based Network Management
chen zhi ; wang ru chuan
..............page:89-92,107
Algorithm for Predicting the BGP Routes in iBGP Routing of Route Reflection Graph
xu zuo ; wu jing ; gao yuan
..............page:97-99,128
Density-based Clustering Protocol for Wireless Sensor Networks
qiao jun feng ; liu san yang ; cao xiang yu
..............page:46-49
Negative Operator Embedded Clonal Selection Algorithm for Grid Intrusion Detection
yang ming hui ; wang ru chuan
..............page:37-40,45
Coordinated Multi-point Concurrent Testing for Routers and Subnetworks
zeng hua ; luo zuo
..............page:100-103
Network Protocol Conformance Testing: An Overview
zhu xue feng ; xu jian jun ; zou biao ; zhang zhe ; sun lei
..............page:5-7,36
Research and Development of Sequential Pattern Mining (SPM)
wang hu ; ding shi fei
..............page:14-17
Design of High Availability in Carrier Grade Operating System CGEL
wang ji gang ; zheng wei min ; xie shi bo ; zhong wei dong
..............page:18-21
Survey of Digital Image Super Resolution Reconstruction Technology
xiao su ; han guo qiang ; wo zuo
..............page:8-13,54
Research and Simulation of the Multi-mode Signals Synchronization Strategy
pan cheng sheng ; liu fang ; feng yong xin
..............page:50-54
Approach for Discovering Association Rules from Log Ontologies Based on Hybrid System
sun ming ; chen bo ; zhou ming tian
..............page:187-190
Analysis and Comparison of the Macro-topology between Large-scale Software and AS-level Internet
li hui ; zhao hai ; ai jun ; li bo
..............page:146-150
Correlation Properties of T-intuitionistic Fuzzy Subgroups
cheng tao ; mi ju sheng
..............page:214-215,226
Infrared Face Recognition Method Using Blood Perfusion and Sub-block DCT+FLD in Wavelet Domain
xie zhi hua ; wu shi zuo ; fang zhi jun
..............page:290-293
Indexing of Moving Objects in a Constrained Network
song guang jun ; hao zhong xiao ; wang li jie
..............page:138-141,150
Secure Access Authentication Scheme in Mobile IPv6 Networks
zhang zhi ; cui guo hua
..............page:26-31
P2P Networks Proactive Immune Mechanism Based on Multi-mobile Agent
xu xiao long ; wang ru chuan ; xiao fu ; chen dan wei
..............page:22-25,59
Accident Information Interaction in the Virtual Team Based on Multi-agent
yang chun ; liu jian gang
..............page:164-166
Clustering Based on Evolutionary Algorithm in the Presence of Obstacles
wang zuo ni ; bian zuo zuo
..............page:197-198,222
Recommender System Model Based on Isomorphic Integrated to Content-based and Collaborative Filtering
li zhong jun ; zhou qi hai ; shuai qing hong
..............page:142-145
3D Positioning Model and Algorithm Based on Wireless Sensor Networks
nie wen hui ; ju shi guang ; xue an rong
..............page:55-59
Application of Utility Theory in Investment Optimizing of Information Security
chen tian ping ; zhang chuan rong ; guo wei wu ; zheng lian qing
..............page:70-72,123
Research of the Reducing Token\'s Frequency Method in Token-routing High-speed Fibre Channel Switch Network
liu jun rui ; chen ying tu ; fan xiao zuo ; kang ji chang
..............page:81-84
Combining ODCS and SIFT for Fast Color Object Identification
li hai tao ; wu pei liang ; kong ling fu
..............page:257-258,266
On Primitive Subscription Management and Matching in Publish/Subscribe Systems
qi feng liang ; jin zuo hong ; chen hai biao ; long zhen yue
..............page:111-114
ROI Coding Method Based on Selecting Subband and Bit plane Shift
xia chun yu ; wang xiang hai
..............page:272-277
New Binarization Algorithm for Given Object Extraction
li liang hua ; luo bin jie
..............page:282-284
Research on Link Utilization Inference Technology Based on the Multiple Source Network Tomography
duan zuo ; cai wan dong ; tian guang li
..............page:85-88,114
Research of Network Intrusion Detection Model Based on Artificial Immune
zhang yu fang ; xiong zhong yang ; sun gui hua ; lai su ; zhao ying
..............page:108-110
New Algorithm of Image Rotation Matching Based on Feature Points
wu ding xue ; gong jun bin ; xu hong bo ; tian jin wen
..............page:248-250,262
Saturated Assignment Algorithm with Ordered Static Priority
wu wei ; ni shao jie ; liu xiao hui
..............page:41-45
Towards a Dynamic-attribute-based Multi-domain Usage Control Model
xu chang zheng ; wang qing xian
..............page:73-75,80
Research of DNS Worm in IPv6 Networks
xu yan gui ; qian huan yan ; zhang kai
..............page:32-36
Personalized Curriculum Origanization Method Based on Knowledge Topic Ontology
zhu zheng zhou ; wu kai gui ; wu zhong fu ; chen yi xiong ; gao
..............page:124-128
Layered Multi-description Coding Based on P2P Video Streaming
huang xiao tao ; zhang wei ; zhu hua ; lu zheng ding
..............page:65-69
MPR Election Frequency Based Extended OLSR Protocol in Wireless Mesh Networks
shen cheng ; lu yi fei ; xia qin ; wang zuo han
..............page:93-96,137
Algorithms for Longest Path: A Survey
wang jian xin ; yang zhi biao ; chen jian er
..............page:1-4,31
Study on Compression Algorithm of Cruise Missile Image Based on Wavelet Code
chen sheng lai ; zheng ai min ; li tao
..............page:263-266
Data Integration Method of Collaborative Development for Complex Product
zhou jian ; zhu yao qin ; tang wei qing
..............page:129-131,166
Delay-oriented Routing Approach for Backbones with the Interference
zhang li dong ; zuo guang cheng ; yin hao ; chen qiang
..............page:104-107
Design of Model Service System for Digital City
zhang zi min ; li zuo
..............page:151-153
Research on Semantic Query in Hybrid P2P Networks
liu zhen ; deng su ; huang hong bin
..............page:60-64,69
ji suan ji ke xue tou gao xu zhi
..............page:封2
Color Cerebrovascular Image Skeleton Extraction Algorithm Based on Level Set Model
wu jian ; cui zhi ming ; xu zuo ; cao zuo zuo
..............page:278-281
Weighted Truth-valued-flow Inference Algorithm
he ying si ; deng hui wen
..............page:223-226
Fire Simulation with GPU-based Particle System
qiu yu feng ; zeng guo zuo
..............page:238-242
Intuitionistic Fuzzy S-rough Decision Models and Application
hu jun hong ; lei ying jie
..............page:194-196,234
Enhancement of Detail Characters within Medical Image
jiao feng ; bi shuo ben ; geng huan tong
..............page:267-269
Worm Detection Immune Model Integrating Innate and Adaptive Immunity
zhang jun min ; liang yi wen
..............page:119-123
"Bamboo" Simulation Based on Improvement Fractal Algorithm and Displacement and Texture Mapping
luo yan ; wu zhong fu ; guo xuan chang
..............page:285-289
Image Watermarking Scheme in Wavelet Domain against Geometrical Attacks
lou ou jun ; wang xiang hai ; wang zuo xuan
..............page:251-256
Performance Evaluation Method for Asynchronous Circuit Based on Static Data Flow Structure
jin gang ; wang lei ; wang zhi ying
..............page:231-234
Off-line Handwritten Character Recognition Based on Hierarchical Classification
wang yun peng ; miao duo qian ; yue xiao dong
..............page:203-209
Process Model for Multimedia Task Management and its Formal Descriptions
ruan feng ; dong zuo ; chen jin hui
..............page:161-163,186
Design and Implement on a Backward Reasoning Algorithm Based on Fuzzy Petri Net
yang jin song ; ling pei liang
..............page:158-160
Knowledge Reduction of Set-valued Information Systems Based on Dominance Relation
chen zi chun ; liu peng hui ; qin ke yun
..............page:176-178,193
Immune Cloning Particle Swarm Optimization for Wave Impedance Inversion
nie ru ; yue jian hua ; deng shuai qi ; liu yang guang
..............page:199-202,209
Logical Paragraph Division Based on Semantic Characteristics and its Application
zhu zhen fang ; liu pei yu ; wang jin long
..............page:227-230,256