Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2009 Issue 7
Retrieval of 3D Models Based on Area Shape Distribution
ZHAO Peng-fei;JIN Feng
..............page:298-299,302
Gradient Mean Prediction Filtering Algorithm and its Application
SHENG Ming-lan;LAN Zhang-li;ZHOU Jian-ting
..............page:300-302
Rejuvenation Model of Server Cluster with Fluid Stochastic Petri Net
DU Xiao-zhi;QI Yong;HOU Di;LIU Liang
..............page:131-134
Service Contract-oriented Design Approach to Developing Adaptable Services
LI Jun-huai;ZHANG Jing;ZHANG Zhuo-bin
..............page:128-130,134
Approach to Modeling and Testing Web Applications Based on Functional Components
TANG Yun-ji;MIAO Huai-kou;QIAN Zhong-sheng
..............page:124-127,169
Method of Conformance Test Case Generation for C/S Model System Based on UML State Chart
YE Xin-min;WANG Pu-xin;BAI Xiang-yu;XIE Hui
..............page:117-119
Transformation from UMI Model to FSM Model
GUO Liang;MIAO Huai-kou;WANG Xi;CHEN Sheng-bo
..............page:113-116,149
Algorithm for Extracting Skeleton of 3D Human Body Model Based on Body Characteristic
CHEN Guo-dong;LI Jian-wei;PAN Lin;YU Lun
..............page:295-297
Text Segmentation Using Color and Stroke Features
HUANG Bai-gang;LI Jun-shan;HU Shang-yan
..............page:292-294
Efficient Algorithm for Mining Frequent Patterns over Offline Data Streams
HOU Wei;WU Chen-sheng;YANG Bing-ru;FANG Wei-wei
..............page:247-251,291
Application of Chaos-support Vector Machine Regression in Traffic Prediction
LUO Yun-qian;XIA Jing-bo;WANG Huan-bin
..............page:244-246
New Penalty Model for Constrained Optimization Problems
HU Yibo;WANG Yu-ping
..............page:240-243
Online Route Planning Based on Quantum Particle Swarm Optimization
GUO Jin-chao;HUANG Xin-han;WANG Yan-feng;CUI Guang-zhao
..............page:237-239
Hybrid Intelligent Prediction Model of Cobalt Concentration for Purification Process
ZHU Hong-qiu;YANG Chun-hua;GUI Wei-hua
..............page:234-236,277
Grid Service Deployment Technology Based on the Fuzzy-PID Feedback Model
YIN Feng;HE Xian-bo;LIU Tao
..............page:227-229
Approach of Web Services Composition Based on Co-evolutionary Cytokine Network
LIU Zai-qun;DING Yong-sheng;HU Zhi-hua
..............page:218-221
Method of Pre-decison on Pear Scab Based on SVR and Dynamical Feature Selection
GU Li-chuan;ZHONG Jin-qin;ZHANG You-hua;LI Shao-wen
..............page:215-217,243
FP-array-based Improved FP-growth Algorithm
TAN Jun;BU Ying-yong;YANG Bo
..............page:208-210
Classification Mining Using Association Rules Based on Rule Ranking
ZHU Xiao-yan;SONG Qin-bao
..............page:204-207
Adaptive Web Information Extraction Based on DOM Tree
LI Zhao;PENG Hong;YE Su-nan;ZHANG Huan;YANG Qin-yao
..............page:202-203,210
Weigh Matrix Based Solution Framework for Term Proximity Information Retrieval
QIAO Ya-nan;QI Yong;SHI Yi;HOU Di;WANG Xiao
..............page:197-201
Multi-strategy Based Single Document Question Answering
DU Yong-ping;HE Ming
..............page:193-196
Zernike Moments with Minimum Geometric Error and Numerical Integration Error
ZHANG Gang;MA Zong-min
..............page:188-192
Kernel Principal Component Analysis Based on Feature Vector Selection
WU Hong-yan;HUANG Dao-ping
..............page:185-187,255
Fault Classifier of Rotating Machinery Based on Weighted Fuzzy Support Vector Data Description
ZHANG Yong;ZHANG Feng-mei;XIE Fu-ding;CHI Zhong-xian
..............page:182-184,229
Polynomial Smooth Classification Algorithm of Semi-supervised Support Vector Machines
LIU Ye-qing;LIU San-yang;GU Ming-tao
..............page:179-181
Metaheuristic Strategy Based K-Means with the Iterative Self-Learning Framework
LEI Xiao-feng;YANG Yang;ZHANG Ke;XIE Kun-qing;XIA Zheng-yi
..............page:175-178
Video Semantic Content Analysis Based on Ontology
BAI Liang;LIU Hai-tao;LAO Song-yang;Bu Jiang
..............page:170-174,178
Fast Collision Detection Algorithm for Spherical Blend Reconstruction
ZHAO Wei;LI Wen-hui
..............page:164-169
Novel Prefix Encoding Scheme Based on Layered Structure
XU Juan;LI Zhan-huai;KE Xi-lin
..............page:145-149
New Group Priority Dynamic Real-time Scheduling Algorlithm
BA Wei;ZHANG Da-bo;LI Qi;WANG Wei
..............page:230-233,239
SMT Solder Joint 3D Reconstruction Technology Based on Shape from Shading
ZHAO Hui-huang;ZHOU De-jian;HUANG Chun-yue;ZHANG Shao-hua
..............page:288-291
Research on Matrix Reconstruction in RAID Controller
JIANG Guo-song;ZOU Chen;XIE Chang-sheng
..............page:262-266,294
On-line Self-adaptive System Based on Evolvable Hardware
ZHU Ji-xiang;LI Yuan-xiang;XIA Xue-wen;ZENG Hui
..............page:267-269,287
Research and Implement of Realtime of Linux Based on RTHAL
SU Shu-guang;LIU Yun-sheng
..............page:270-272
DCT Based Public Watermarking Algorithm with Visual Model
LIU Hong-jun;YANG Sheng;XIA Tai-wu
..............page:281-283
Concept Lattice Based on Dominance Relations
WANG Jun-hong;LIANG Ji-ye;QU Kai-she
..............page:161-163,201
Study on the OWL Ontology Construction Approach Based on Relational Databases
LU Yan-hui;MA Zong-min;WANG Yu-xi
..............page:153-156,226
Research on a Spatial Join Query with Keyword Search
CHEN De-hua;LIU Liang-xu;LE Jia-jin
..............page:150-152,214
Fuzzy Logic Based Metric in Software Testing
TU Ling;ZHOU Yan-hui;ZHANG Wei-qun;ZHOU Ya-zhou
..............page:141-144
Approach to QoS Driven Component Composition of Enterprise Software and Application
MENG Fan-chao;CHU Dian-hui;ZHAN De-chen;XU Xiao-fei
..............page:135-140
Self-adaptive Middleware in Ubiquitous Computing Environments
HE Jian-li;CHEN Rong;KANG Qin-ma
..............page:103-106
Dynamic Substitution of Web Services through Stateful Aspect Extension
DOU Wen-sheng;WU Guo-quan;WEI Jun;LIU Shao-hua
..............page:97-102
Method of Modeling Non-functional Properties in Software Architecture
ZHANG Lin-lin;YING Shi;ZHAO Kai;WEN Jing;NI You-cong
..............page:92-96
Design and Implement on a Live Media Streaming System Based on Peer-to-Peer and CDN
REN Li-yong;WANG Tao;DUAN Han-cong;ZHOU Xu
..............page:88-91
Multi-step Network Delay Prediction Model Based on RNN
HU Zhi-guo;ZHANG Da-lu;HOU Cui-ping;SHEN Bin;ZHU An-qi
..............page:85-87,112
Traffic Matrix Estimation Algorithm Based on Square Root Filtering
YANG Yang;ZHOU Jing-jing;YANG Jia-hai;ZHAO Wei;XIONG Zeng-gang
..............page:42-45
New Evaluation Algorithm for the Network Two-terminal Reliability
HE Ming;QIU Hang-ping;LIU Yong
..............page:40-41,59
Voxel-coding for Surface Reconstruction from Contours
WANG Ming-fu;ZHOU Yong
..............page:32-39
Brief Report of Research on Cognizing the Subarea of Evolutionary Computation
LIU Kun-qi;KANG Li-shan;ZHAO Zhi-zhuo
..............page:26-31
Survey of Applying Support Vector Machines to Handle Large-scale Problems
WEN Yi-min;WANG Yao-nan;LU Bao-liang;CHEN Yi-ming
..............page:20-25,31
Secure(t,n),Threshold Proxy Signature Scheme Without a Trusted Party
YAN De-qin;ZHAO Hong-bo
..............page:82-84
Survey of Static Analysis Methods for Binary Code Vulnerability
TIAN Shuo;LIANG Hong-liang
..............page:8-14
Survey on the Opinion Mining,Summarization and Retrieval
HOU Feng;WANG Chuan-ting;LI Guo-hui
..............page:15-19,51
Efficient Secure Routing Scheme for Wireless Sensor Networks
YAO Xuan-xia;ZHENG Xue-feng;ZHOU Fang
..............page:52-55
Robust Temporal Trust Model Using Ant Colony Algorithm in the Multi-domain Environment
WEN Zhu-mu;LI Rui-xuan;LU Zheng-ding;FENG Ben-ming;TANG Zhuo
..............page:46-51
Secure Image Steganography Based on Step-varying Quantization
HE Jun-hui;TANG Shao-hua;XING Yi-bo
..............page:56-59
Fractional Autoregressive Prediction for Long Range Bursty Traffic
WEN Yong;ZHU Guang-xi;XIE Chang-sheng
..............page:79-81,96
Novel VPN Authentication Scheme Based on Trusted Computing
QIU Gang;WANG Yu-lei;ZHOU Li-hua
..............page:76-78,140
Algorithms of Multi-sensor Data Fusion for the Mud Pulse Signal
LI Chuan-wei;MU De-jun;LI An-zong
..............page:74-75,102
NS Extension for Network Coding
LI Ling-xiong;HONG Jiang-shou;LONG Dong-yang
..............page:71-73,144
Energy Level and Link State-based AODV Route Request Forwarding Scheme Study
HAO Ju-tao;ZHAO Jing-jing;LI Ming-lu
..............page:68-70,106
Network Security Situation Assessment Based on WOWA-FAHP
LU Zhen-bang;ZHOU Bo
..............page:63-67
Design and Implement of Wireless Sensor Network Medium Access Control Protocol
SHI Wei-ren;FENG Hui-wei;TANG Yun-jian
..............page:60-62,67
Review of Security Techniques for Mobile Ad Hoc Networks
ZHANG Peng;SUN Lei;CUI Yong;HAN Xiu-feng
..............page:1-7,14
tou gao xu zhi
..............page:封2