Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2009 Issue 5
New Research Framework for Automatic Recovery of Design Pattern
ZHOU Xiao-yu;XU Bao-wen
..............page:124-128
Study on Software Cost Model Based on Multi-version Calibration
SU Xi-bong;WU Zhi-bo;YANG Xiao-zong;LIU Hong-wei
..............page:129-132
Pre-determined Distance Testing for Hardware and Software Testing
ZHU Jing-fen;XU Shi-yi
..............page:133-137
Acceleration Testing Method of Safety-critical Software with Testing Resource Constraint
ZHANG De-ping;NIE Chang-hai;XU Bao-wen
..............page:138-141
FC-Index:A Compact Structure for Indexing XML Data
REN Yong-gong;WU Jia-lin;FAN Dan
..............page:142-144,190
Meta Information Model for Reusing Software Architecture
YE Peng;YING Shi;YUAN Wen-lie;YAO Jun-feng;LUO Ju-bo
..............page:145-150,186
Research on Formal Model and Implementation for WS-CDL
LIANG Zhi-yuan;ZHANG Wei-qun;HUANG Juan
..............page:151-153,162
Incremental Process Mining with New Model Update Method
MA Hui;TANG Yong;WU Ling-kun
..............page:154-157
Hybrid Broadcast Strategy on Real-time Environment
WU Hai;SHI Lei;LU Yan-sheng
..............page:158-162
Algorithm for Rewriting Active XML Schema
MA Hai-tao;ZHU Yan;HAO Zhong-xiao
..............page:163-165,168
Transactional Memory Synchronization Semantics Research Based on OpenMP
TIAN Zu-wei;LI Yong-fan
..............page:166-168
Research of the Basic Educational Resource Planning Based on Ontology
LI Li;LI Ji-gui
..............page:169-171,182
Research on Emotion Mining of Textual Music Review
SHE Li;XIA Hu;FU Yan
..............page:172-176
Terminology Extraction Based on Statistical Word Frequency Distribution Variety
ZHOU Lang;ZHANG Liang;FENG Chong;HUANG He-yan
..............page:177-180
Analysis for Policy of Component-based Software Rejuvenation
WANG Ping-tao;XU Man-wu;LIU Zhi-jun
..............page:121-123,180
Analysis and Application of XML Security Technology
GU Yun-hua;FU De-sheng;WANG Xing
..............page:118-120,141
Implementation of Secret Communication with Covert Channels in Network Traffic
LI Li-ping;WANG Jian-hua
..............page:115-117,176
Analysis for the Effect of Wireless LAN MAC Mechanism on TCP Performance
SONG Jun;JIN Yan-hua;LI Yuan-yuan;LI Lin
..............page:111-114
Stream Media Intrusion Detection through Interacting Protocol State Machines
LIU Yan;ZHONG Guo-hui;LIU Yu;WANG Fu-rong
..............page:108-110
Collaborative Alert Analysis Based on Security Ontology
XU Hui;XIAO Min;XIAO De-bao
..............page:104-107,157
Dynamic (t,n) Threshold Secret Sharing Scheme Based on Circle Properties
GE Li-na;TANG Shao-hua
..............page:99-103
Research on Fast Arithmetic of Elliptic Curve over GF(3m)
DUANMU Qing-feng;WANG Yan-bo;ZHANG Kai-ze;LEI Feng-yu
..............page:96-98,114
Novel Chaos Block Cipher Algorithm
ZHANG Xiang-hua
..............page:92-95
Study of Congestion Control Characteristic on Muiti-TCP Protocols and Multi-links
CHEN Xiao-long;ZHANG Yun;LIU Zhi
..............page:88-91,103
Channel Feedback Algorithms Based on Opportunistic Beamforming MIMO Systems
LIANG Xue-jun;ZHU Guang-xi;SU Gang;WANG De-sheng
..............page:85-87,95
Novel Clustering Algorithm in Ad hoc Network and Performance Evaluation
GAO Li;MU De-jun;ZHANG Li;ZHANG Guo-qing
..............page:82-84,128
Data Rate Control for Power-constrained Wireless Networks
LI Yun-zhao;DING Yi;LIU Wei;YANG Zong-kai;CAI Wen-li
..............page:79-81,110
Research on Load Balancing Based on Stackelberg Game Theory for Multi-Homing in Heterogeneous Wireless Networks
CHEN Qian-bin;ZHANG Bao;TANG Lun;WANG Cai-xia;LI Yun
..............page:76-78
Network Security Risk Fusion Model Based on Data Field
FU Jian-ming;YU Qiao-li;YANG Can
..............page:72-75
Probabilistic Density-based Clustering of Uncertain Data
XU Hua-jie;LI Guo-hui;YANG Bing;DU Jian-qiang
..............page:68-71
Secure Key Management of Mobile Agent Based on TPM
WU Xiao-ping;ZHAO Bo;ZHANG Huan-guo
..............page:65-67,78
Research on QoS Scheduling Strategies for Remote NCS
WU Chun-xue;GUO Xian-hui
..............page:56-59
Research on Anonymous and Authentic Communications in Mobile Ad Hoc Networks
ZHOU Yao;PING Ping;XU Jia;LIU Feng-yu
..............page:51-55,71
Research on Proxy-based Application Layer Multicast Architecture
CAO Ji-jun;SU Jin-shu
..............page:45-50
Heterogeneous Energy Adaptive Coverage Control Protocol in Wireless Sensor Networks
MAO Ying-chi;LIANG Yi;ZHOU Xiao-feng
..............page:39-44
Buffer Strategy of High Speed and Continuous Data Stream in Huge Sensor Networks
WANG Hai-shan;KANG Jian-bin;GENG Li-zhong;MA Cheng;XIONG Jian-ping;JIA Hui-bo
..............page:36-38
Study and Implementation of Napt-Pt Based on Mix-mapping Mechanism
CHEN Hang;TAO Jun;WU Qiang
..............page:33-35,64
Low-complexity Deficient-rank Orthogonal Random Beamforming Algorithm
WANG De-sheng;ZHENG Zhi-kai;LIU Ying-zhuang;ZHU Guang-xi;LIN Hong-zhi
..............page:30-32,50
Research on P2P Bootstrapping Mechanism
TANG Jiu-yang;LI Liu;TANG Da-quan;XIAO Wei-dong
..............page:27-29,44
Survey on Formal Analysis of Kerberos 5
ZHAO Qian-qian;LI Zhou-jun;ZHOU Ti
..............page:21-26
Survey of Broadcast Scheduling for Multi-item Queries in Wireless Environment
ZHANG Zhuo-yao;SUN Wei-wei;YU Ping;QIN Yong-rui;SHI Bo-le
..............page:16-20,38
Overview of Data Dissemination Protocols in Wireless Sensor Networks
SHI Gao-tao;ZHAO Zeng-hua
..............page:12-15
Image Retrieval Based on Color and Texture
XU Hui-ying;YUAN Jie;ZHAO Jian-min;ZHU Xin-zhong
..............page:282-286
Survey of Congestion Control Technology for Wireless Sensor Networks
LIU Hui-yu;WANG Jian-xin;ZHOU Zhi
..............page:7-11,59
Data Mining Applications on the Software Engineering Tasks:A State of the Art
MAO Cheng-ying;LU Yan-sheng;HU Xiao-hua
..............page:1-6,26
Axiomatization of Covering Rough Sets
YANG Yong;ZHU Xiao-zhong;LI Lian
..............page:181-182
Maximal Robust Controlled Invariant Set of Nonlinear System Based on Hybrid Systems Model
LI Jian-qiang;FANG Min;PEI Hai-long;YIN Jian-fei
..............page:183-186
GP Predicate Algorithm Based on the Improved Computing of Embedding Dimension and Time Delay
LU Wei;WANG He-yong;YAO Zheng-an;LI Lei
..............page:187-190
Rough-set Based Spectral Clustering
ZHENG Ji;MIAO Duo-qian;WANG Rui-zhi;ZHONG Cai-ming
..............page:193-196
Initialization Method for Intuitionistic Fuzzy Clustering Based on Density Function
SHEN Xiao-yong;LEI Ying-jie;CAI Ru;LEI Yang
..............page:197-199
GrC-based Rough Set Model
CHEN Ze-hua;XIE Gang;XIE Jun;XIE Ke-ming
..............page:200-202,233
Overview of the Manifold Learning Algorithm
ZHOU Zhun;YANG Bing-ru
..............page:234-237,264
Novel HNC Conceptual Tagging Model for Corpus
XIE Fa-kui;ZHANG Quan
..............page:238-240,268
Fitness Function Applied to Chinese Text Clustering
ZHU Zheng-yu;LI Li-pei;LUO Ying;ZHOU Zhi;ZHU Qing-sheng
..............page:244-246,272
Geometrically Robust Image Watermarking Using Modified Zernike Moments
WO Yan;HAN Guo-qiang
..............page:247-250,281
Human Recognition Based on Feature Fusion of Ear and Face
MU Zhi-chun;DUN Wen-jie
..............page:251-253,261
Image Fusion Algorithm Based on the Neighboring Relation of Wavelet Coefficients
ZHOU Zhi-guang;WANG Xiang-hai
..............page:257-261
Feature Fusion Algorithm for Facial Expression Recognition
CHEN Feng-jun;WANG Zhi-liang;XU Zheng-guang;WANG Yu-jie;LIU Wen-ding
..............page:262-264
Feistel Network Image Encryption Algorithm Based on Chaotic Map and S-box
GENG Gui-hua;LIAO Xiao-feng;ZHAO Liang;XIAO Di
..............page:265-268
Surface Reconstruction Based on Scattered Point Sets
WANG Shu-zhong;ZHANG You-sheng
..............page:269-272
JPEG2000 Digital Image Encryption Algorithm Based on Chaotic System
DENG Shao-jiang;LI Yan-tao;ZHANG Dai-gu;YANG Ji-yun
..............page:273-275
Effects of Record Resolution on II Three-dimensional Reconstruction Resolution
WANG Hong-xia;WU Chun-hong;YANG Yang;WANG Qian-qian
..............page:279-281
CD-ROM Data Encryption and Decryption Method Based on CD Image File
XIAO Fei;WANG Yun-qiong;LI Ying-song;LI Bi-jin
..............page:299-301
New Rough Leader Clustering Algorithm
YIN Gang;MIAO Duo-qian;DUAN Qi-guo
..............page:203-205,219
Multi-objective Satisfactory Optimization Based on the APSO
YUAN De-guo;WEI Zi-lin;CHENG Yan-rong;LU Ting-jin
..............page:206-210
Left and Right Language-based Optimizing State Transition Systems
LIU Jian-guo;YUAN Zhi-bin
..............page:211-213
Symbolic Model Checking Algorithm for Temporal Epistemic Logic CTL * K
CHEN Bin;WANG Zhi-xue
..............page:214-219
Particle Swarm Optimization Based on Time Varying Coefficients and Social Cognitive Simulation
QU Yan-wen;ZHANG Er-hua;YANG Jing-yu
..............page:220-222
Research on Group Modeling in the Pervasive Environment
WU Rui-juan;ZHOU Xing-she;WANG Hai-peng;WANG Zhu
..............page:225-228
Extraction Algorithm and Repairing of Ontology Mapping Based on Reasoning
ZHANG Qing-jun;XU De-zhi;CHEN Jian-er
..............page:229-233
Stream Parallelism Analysis for Multimedia Benchmark
ZHOU Li-ping;AN Hong;XU Guang;WANG Yao-bin
..............page:287-290
Design of a 32-bit Embedded CISC Microprocessor
WANG De-li;GAO De-yuan;Zhang Jun;WANG Dang-hui
..............page:291-294,298