Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2010 Issue 1
Effective Trust-based Topology Evolution Mechanism for P2P Networks
HU Jian-li;WU Quan-yuan;ZHOU Bin
..............page:95-98,166
Research on Call Semantic of Datalog Logic Program and its Application
ZHONG Yong;GUO Wei-gang;ZHONG Chang-le;LIU Feng-yu;LI Ning
..............page:170-175
News Video Automatic Retrieval Method Based on Multiple Keywords
ZHOU Sheng;HU Xiao-feng;LUO Pi
..............page:181-183,188
Word Sense Disambiguating Method Based on Concept Relativity
MIAO Jian-ming;ZHANG Quan
..............page:208-210
Shape Image Retrieval Based on Compensation Mechanism under Minimum Circumscribed Circle
SHU Xin;WU Xiao-jun;PAN Lei
..............page:279-281,293
Research on Modeling of Exploratory Analysis Model for C2 Organization
LIU Zhen-ya;LUO Xu-hui;XIU Bao-xin;ZHANG Wei-ming
..............page:261-264
Edge Detection Based on GPU
ZHANG Nan;WANG Jian-li;WANG Ming-hao
..............page:265-267
Research on the Realization of Anti-collusion Fingerprinting
ZHOU Guo-rui;SUN Shi-xin;WANG Wen-jiang
..............page:28-33
Investigating the Role of Vaccine Operator in Artificial Immune System for Network Intrusion Detection
FANG Xian-jin;LI Long-shu;QIAN Hai
..............page:239-242,270
Distributed Energy Balancing Routing Algorithm in Wireless Sensor Networks
LIU Xiang-wen;XUE Feng;Li Yan;YU Hong-yi;HU Han-ying
..............page:122-125
Semantic Solution to Conflict of Information Integration
QU Zhen-xin;TANG Sheng-qun
..............page:167-169
Research on Role-based Access Control with Spatial Character
ZOU Zhi-wen;CHEN Chang-qian;JU Shi-guang
..............page:189-191,196
Dual Description Logic for the Relations in Databases
MA Dong-yuan;SUI Yue-fei
..............page:197-200
Present Research and Developing Trends on Industrial Control Network
HU Yi;YU Dong;LIU Ming-lie
..............page:23-27,46
Research on System Software of Trusted Smart Space Based on SOA
MING Liang;KUANG Xiao-hu;HUANG Min-huan;JIN Qi
..............page:34-38
Parameter Optimization Based on Orthogonal Test Design in Speech Recognition System
HAN Zhi-yan;WANG Jian;WANG Xu
..............page:214-216,250
Pronominal Anaphora Resolution within Chinese Text Based on Fuzzy Rough Sets Model
LI Fan;LIU Qi-he;LI Hong-wei
..............page:245-250
Hybrid Monotonic Inclusion Measure on Intuitionistic Fuzzy Sets
YAO Yan-qing;MI Ju-sheng
..............page:255-257,274
Research on Dynamic Grid Workflow Model of ITS
YANG Hao-lan;LI Hua;LI Shi-chang;GAO Min;WU Zhong-fu
..............page:130-132,137
New Algorithm for Text Segmentation Based on Stroke Filter
SHI Zhen-gang;GAO Li-qun
..............page:287-289
Simulation of Precipitation Phenomenon Based on Particle System Method
TAN Liang;LUO Yi-fan
..............page:271-274
Research on Deployment of Locating Unit in Ubiquitous Computing
LI Hai-cheng;ZHANG Rui;ZHOU Yan
..............page:142-145
Application of Network Coding in Real-time Tactical Data Muiticast
ZHANG Li-dong;QIN Guang-cheng;LI Zhen;YIN Hao
..............page:138-141
Study on Intrusion Intention Recognition Based on the Probabilistic Inference
PENG Wu;YAO Shu-ping
..............page:79-82,157
Research of Multi-level Security Policy Model Based on Information Flow
WANG Hui;JIA Zong-pu;SHEN Zi-hao;LU Bi-bo
..............page:75-78
k-DmeansWM:An Effective Distributed Clustering Algorithm Bused on P2P
LI Liu;TANG Jiu-yang;GE Bin;XIAO Wei-dong;TANG Da-quan
..............page:39-41
Design and Implementation of a Standard Identity-based Authentication Protocol on Wireless Sensor Network
WANG Wei-hong;CUI Yi-ling;CHEN Tie-ming
..............page:72-74,141
Method of Network Security Situation Awareness Based on Artificial Immunity System
LIU Nian;LIU Sun-jun;LIU Yong;ZHAO Hui
..............page:126-129,200
Implementation of Anycast Service in Ad Hoc Network Based on Mobile IPv6
WANG Xiao-nan;XU Jiang;YIN Xu-dong
..............page:133-137
Artificial Gene Regulatory Networks Construction Based on Complex Network
ZHANG Lu-wen;XIE Jiang;CHEN Jian-jiao;ZHANG Wu
..............page:211-213,221
Ant Colony Optimization Algorithm with Path Smoothing and Dynamic Pheromone Updating
GAN Rong-wei;GUO Qing-shun;CHANG Hui-you;YI Yang
..............page:233-235
Research on Modeling Action with Uncertain Results Based on Probability Interval
TIAN Zun-hua;ZHAO Long;JIA Yan
..............page:201-203,207
Image Asymmetry Computing Algorithm Using Affine Transformation
SONG An-ping;DING Guang-tai;ZHENG Han-yuan;ZHANG Wu
..............page:275-278
Adaptive Key-frame Extraction Based on Affinity Propagation Clustering
XU Wen-zhu;XU Li-hong
..............page:268-270
Survey on Routing Algorithms of Mobile Ad Hoc Networks
ZHANG Peng;CUI Yong
..............page:10-22,38
Localization Problem of Faulty Links Based on Simple Network Tomography
ZHAO Zuo;CAI Wan-dong
..............page:108-110,117
Aspect-oriented Architecture Description Language Based on Temporal Logic
NI You-cong;YING Shi;ZHANG Lin-lin;WEN Jing;YE Peng
..............page:146-152,162
Research on an Artificial Immune System-based Storage Anomaly Detection
HUANG Jian-zhong;PEI Can-hao;XIE Chang-sheng;CHEN Yun-liang;FANG Yun-fu
..............page:42-46
Nearest-neighbor Query Algorithm Based on Grid Partition of Space-filling Curve
XU Hong-bo;HAO Zhong-xiao
..............page:184-188
Review of Statistical Shape Prior-based Level Set Image Segmentation
DONG Jian-yuan;HAO Chong-yang
..............page:6-9
Role Based Integrity Control Model for Operating System
LIU Zun;WANG Tao;LI Wei-hua
..............page:87-90,210
Statistical Thresholding Method for Infrared Images
LI Zuo-yong;LIU Chuan-cai;CHENG Yong;ZHAO Cai-rong
..............page:282-286,298
Simulation Algorithm for "Bamboo" Distributional Pattern by Improved Particle System
LUO Yan;WU Zhong-fu;GUO Xuan-chang;ZHOU Shang-bo
..............page:294-298
MFALM:An Active Localization Method for Dynamic Underwater Wireless Sensor Networks
YANG Kui-wu;GUO Yuan-bo;WEI Da-wei;JIN Yong-gang
..............page:114-117
tou gao xu zhi
..............page:封2
CAER:A Content-based Adaptive Event Routing Algorithm
ZHENG Li-ming;WANG Yi-jie;ZHENG Zhong;LI Xiao-yong;TAO Ke
..............page:103-107
Frequency Assignment in Asynchronous FH Networks with Cosite Constraints
YUAN Xiao-gang;HUANG Guo-ce;NIU Hong-bo;GUO Xing-yang
..............page:60-63
Research on Architecture of Grid Computing System
ZHANG Huan-jiong;ZHONG Yi-xin
..............page:55-56,102
Robust Road Detection Based on Vision Dynamic Modeling
SHI Lei;JIN Zhong;YANG Jing-yu;WANG Yu
..............page:290-293
Text Classification Algorithm Based on Adaptive Chinese Word Segmentation and Proximal SVM
FENG Yong;LI Hua;ZHONG Jiang;YE Chun-xiao
..............page:251-254,293
New Research Advances in Technologies of Semantic Web Search
YE Yu-xin;OUYANG Dan-tong
..............page:1-5
Tag Mesh Networking to Resolve Shadow Area in the RFID Communication
GOU Hao-song;GOU Jing-song
..............page:99-102
Research on Normalization of XML Schema with XML Strong MVD
YIN Li-feng;HAO Zhong-xiao
..............page:192-196
Composite P2P Storage System Based on Group Management
YANG Lei;HUANG Hao;LI Ren-fa;LI Ken-li
..............page:64-67
Biclustering Method for Detecting Scaling Patterns with Genetic Rough Algorithm
LI Gang;MIAO Duo-qian;WANG Rui-zhi
..............page:225-228
Novel Security Protocol and Strand Space Analysis
PI Jian-yong;YANG Le;LIU Xin-song;LI Ze-ping
..............page:118-121,180
Security Routing Algorithm Based on Shortest Delay for Cognitive Radio Networks
XUE Nan;ZHOU Xian-wei;LIN Lin;ZHOU Jian
..............page:68-71
Watermarking Protocol for Piracy Tracing
HU Yu-ping;ZHANG Jun
..............page:91-94
Issues Regarding ε in Formal Language and Automata Theory
CHEN Wen-yu;WANG Xiao-bin;CHENG Xiao-ou;SUN Shi-xin
..............page:243-244,264
Predictive Control and Proportional Delay Guarantee in Web QoS
GAO Ang;MU De-jun;HU Yan-su;PAN Wen-ping
..............page:57-59
Research on Dynamic Role-based Access Control Based on Trust Mechanism in Grid Environment
DENG Yong;ZHANG Lin;WANG Ru-chuan;ZHANG Mei
..............page:51-54,107
Selected Ensemble of Classifiers for Handling Concept-drifting Data Streams
GUAN Jing-hua;LIU Da-you
..............page:204-207
Formally Analyzing Security Protocol Using Approximation of Tree Language
LIU Nan;ZHU Wen-ye;ZHU Yue-fei;HEN Chen
..............page:176-180