Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2009 Issue 2
Study on Conditions and Development Trend of Audit Software
CHEN Wei;QIU Robin
..............page:1-4,25
Feature Set Splitting for Co-training in Text Categorization
ZHANG Bo-feng;SU Jin-shu
..............page:142-145
Locality-based Data Reorganization Framework
FU Xiong;WANG Ru-chuan
..............page:146-151
Semantic-based 3D Model Retrieval Using Ontology
RUAN Jia-bin;YANG Yu-bin;LIN Jin-jie;WEI Wei
..............page:152-154,185
Concurrency Control Strategy of Embedded Mobile Real-time Database
WU Ha;CHEN Wei;LU Yan-sheng
..............page:155-157,166
Studies on Control Method Based on Flexible Logic
FU Li-hua;HE Hua-can
..............page:158-161,189
Decomposition Method for Burst Mode Asynchronous Controllers
RUAN Jian;WANG Zhi-ying;WANG Lei;LI Yong
..............page:162-166
Instantiation Method of Business Service Utilizing Inherited Relationship
ZHANG Peng;HAN Yan-bo;WANG Jing;CHEN Wang-hu;DING Wei-long;Gao Jing
..............page:137-141
RSA-based Proxy Ring Signature Scheme
CHEN Ke;MIAO Fu-you;XIONG Yan
..............page:132-136
Analysis and Improvement of a Mutual Authentication Protocol
LIAO Zhen-lan;WU Kai-gui;XIE Qi;DAI Ting-he
..............page:129-131,151
FERED:Fairness Enhancement RED
WU Hang-xing;MU De-jun;GONG Xian-wu;PAN Wen-ping
..............page:122-124
Analysis and Comparison of the Kerberos Protocol's Versions
ZHOU Ti;WANG Jin-ying;LI Meng-jun;LI Zhou-jun
..............page:119-121,128
Semantics Based Formal Model for Security Protocols
HAN Ji-hong;FAN Yu-dan;WANG Ya-di;GUO Yuan-bo
..............page:114-118,136
Fair Contract Signing Protocol Based on Publicly Verifiable Secret Sharing
LIU Wen-yuan;ZHANG Shuang;ZHANG Jiang-xiao
..............page:111-113
Design and Simulation of the MANET Accessing Internet Model
LI Xin;LI Zhe
..............page:107-110
Research on the Trust Management Model for Pervasive Computing
XU Wen-shuan;XIN Yun-wei;LU Gui-zhang;CHEN Qiu-shuang
..............page:103-106,113
Resource Allocation Model Based on End-system Bidding Game
TAO Jun;LU Yi-fei;WANG Chui-han
..............page:99-102
Model for Trust Web Service Discovery Based on Non-function Attribute Decision-making
HU Xu-dong;ZENG Guo-sun;CHEN Bo
..............page:95-98
Web Traffic Classification Based on Semi-supervised Clustering
LU Wei-zhou;YU Shun-zheng
..............page:90-94
Jitter-constrained Shaping Algorithm
HAO Jun-rui;YU Shao-hua
..............page:85-89
Novel Software Block Cipher Using Dynamic S-box and P-box
CHEN Li-ke;ZHANG Run-tong
..............page:78-81
Enhanced ON/OFF Dynamic Traffic Model and its Simulation
SHI Hai-bin;ZHU Guang-xi;ZHU Peng;LIN Hong-zhi
..............page:75-77
TARSB:Topology Adaptation Based on Relative Search Betweenness in P2P Networks
WANG Yi-lin;TAO Ye;CHEN Jian-zhong;LU Sang-lu;CHEN Dao-xu
..............page:70-74,89
Peer-to-Peer Network Model with Three-tier Topology Based on Auto Clustering
LI Jiang-feng;ZHOU Xing-ming;ZHANG Chen-xi
..............page:66-69
Model of Controlling the Hubs in P2P Network
YANG Chun;LIU Yu-hua;XU Kai-hua;CHEN Hong-cai
..............page:62-65,81
Control Speed Token to Decrease Maintains Cost of P2P Network
WANG Xiang-hui;ZHANG Guo-yin
..............page:59-61
Design and Simulation of Asynchronous Transfer System on P2P VoD
PENG Zhao;YANG Zong-kai;CHEN Jing-wen;ZHU Zi-zhen
..............page:55-58
Research on Geographic Search Engine Based on Ontology
DUAN Lei;LI Qi;MAO Xi
..............page:172-174
Q-CFIsL.A Fast Algorithm for Mining Closed Frequent Itemsets and Building their Lattice
LI Xue-ming;YU Chun;ZHANG He;JIANG Hong
..............page:175-178,193
Canonical LR Parsing Algorithm Based on State Backtracking Technique
WANG Qiang-hua;HOU Hong;GENG Guo-hua
..............page:179-180,198
Method for Ontology Extraction Based on Unknown Structure Web
QIANG Yu;HU Yun-fa
..............page:186-189
New Definition of Non-parametric Transform for Stereo Matching
LU Si-jun;TANG Zheng-min;GUO Long-yuan;LU A-li
..............page:190-193
Stochastic Sample Based Algorithm for Learning Bayesian Networks
HU Chun-ling;HU Xue-gang
..............page:199-202
Rough Clustering Algorithm Based on Data Field
LI Xue;MIAO Duo-qian;FENG Qin-rong
..............page:203-206,244
Applied Research on Clustering Algorithm Using Density Biased Sampling Technology
YU Bo;ZHU Dong-hua;LIU Song;ZHENG Tao
..............page:207-209,264
Inclusion Degree Theory among Concepts of Formal Concept Analysis
QU Kai-she;LIANG Liang;LIANG Ji-ye;LI De-yu;CHEN Hong-xing
..............page:210-213,219
Image Encryption Algorithm Based on Coupled Toggle Cellular Automata
XIA Xue-wen;LI Yuan-xiang;ZENG Hui
..............page:214-219
Voice Activity Detection Method Based on Selected Sub-bands Vector Distance
WU Wen-juan;GU Hong-bin;PAN Xiu-lin
..............page:220-221,237
Experiment and Analysis on Dynamic Probabilistic Particle Swarm Optimization Model
NI Qing-jian;XING Han-cheng;ZHANG Zhi-zheng;WANG Zhen-zhen
..............page:222-226
Image Segmentation Method Based on Custom Color Space Model
CAO Yu;ZHAO Jie;YAN Ji-hong
..............page:265-267
Study on MATLAB Based Stone Relief Image Digital Rubbing Technique
ZHU Xiao-li;WU Zhong-fu;LI Ying
..............page:268-270
Isomorphic Researches on Convex Hull and its Special Properties Based on Algebra View
ZHOU Qi-hai;LI Yan;HUANG Tao;SUN Xie-zhi
..............page:271-274
Virtual Robot in Network——"SoftMan" Security and Authorization Design
WANG Hong-bo;MA Zhong-gui;ZENG Guang-ping;TU Xu-yan
..............page:275-277,286
Research on an Hierarchy Fault Detection Method for Distributed Object-oriented Environment
LI Qi-lin;ZHEN Wei;ZHOU Ming-tian
..............page:278-281,295
Multi-dimensional Evaluation Technique of Software Services
ZHANG Yan-sheng;BAI Xiao-ying;HUANG Guan-li;YAN Qun
..............page:282-286
Fuzzy Model of Interval Speed Continuous Petri Nets
LIAO Wei-zhi;PENG Yue-ying;GU Tian-long
..............page:234-237
On Properties of Fuzzy Bidirectional Associative Memories Based on Triangular Norms
ZENG Shui-ling;YANG Jing-yu;XU Wei-hong
..............page:238-240,267
Colored Occurrence Net Model of Flight Delay Propagation Chain
WANG Shan-shan;WANG Jian-dong;DING Jian-li
..............page:241-244
Teleoperation System for Outdoor Mobile Robot
BAI Bing;WU Xiao-wen;LIU Hua-ping;HE Ke-zhong
..............page:245-247,274
Design and Realization of Space Science Demonstrate Research Simulation System
SONG Ping;ZHANG Zhong-min;LIU Bo;MENG Xin
..............page:248-250,260
Cluster Analysis Based Robust Mesh Watermarking Approach
WANG Yan-wei
..............page:251-256
Ear Recognition Using KDA/GSVD and SVM
ZHAO Hal-long;MU Zhi-chun;ZHANG Xia;DUN Wen-jie
..............page:257-260
Face Recognition Based on Dynamic Principal Component Subspace
ZOU Jian-fa;GONG Xun;WANG Guo-yin
..............page:261-264
Metrics for Large-scale Software Systems Based on Complex Networks
WANG Shu-sen;GU Qing;CHEN Tao;CHEN Dao-xu
..............page:287-290,302
Multi-granularity Object-oriented Software Estimation Model
MAO Ming-zhi;CHEN Li
..............page:291-295
Algorithm for the Generation of Unconstrained Edges Based on the Decision-to-Decision Graph
YE Jun-min;WANG Jun-jie;DONG Wei;QI Zhi-chang
..............page:296-298
AOP Weaving Method Based on Domain Feature
LI Miao;BAI Yong;ZHANG Bo
..............page:299-302
Survey on TCP Fairness in Wireless Local Network
HUANG Jia-wei;WANG Jian-xin
..............page:42-46
Analysis and Comparison of Routing Protocols for Wireless Sensor Networks
ZHAO Qiang-li;JIANG Yan-huang;XU Ming
..............page:35-41
Survey of Robust Optimal Solutions in Evolutionary Algorithms
ZHENG Jin-hua;LUO Biao;LI Jing;WEN Shi-hua;LI Wang-yi
..............page:30-34,58
Survey on Emergence Mechanism of Network Formation for Inter-hierarchy Simulation
HUANG Xiang-zhao;FEI Qi;OU Yang-min;MAO Zi-jun
..............page:26-29
Overview of Software Reliability Engineering
ZHENG Yan-yan;GUO Wei;XU Ren-zuo
..............page:20-25
Survey of Network Security Management
FU Xiao;CAI Sheng-wen;XIE Li
..............page:15-19,54
Content Delivery/Distribution Networks:Overview
LIU Yu;ZHU Guang-xi;YIN Hao;LIU Xue-ning
..............page:11-14,46
Browsing RDF Data:State of Art Survey
WU Hong-han;QU Yu-zhong
..............page:5-10,41