Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2010 Issue 3
Hybrid Method for Outliers Detection Using GPLVM and SVM
tian jiang ; gu hong
..............page:245-247
Research of the Reconfigurable Router Structure with Evolutional Function
huang wan wei ; qu jing ; zuo jun zuo ; liu qiang
..............page:253-255,296
Ontology-based Knowledge Extraction of Relational Data
zhang guo qiang ; jia su ling ; wang qiang
..............page:149-151,164
Adaptive Method of Computing Data Stream Aggregation
hou dong feng ; liu qing bao ; zhang wei ming ; deng su
..............page:152-155,169
Detecting Invalid Mappings between Relational Database and Ontology
tang fu nian ; yao li ; qi xue tian ; xiao qing tao
..............page:170-174
Fuzzed of Lower and Upper Approximation in Incomplete Information System
yang zuo lin ; qin ke yun ; pei zuo
..............page:195-198
Constraint Specification of Weakly Hard Real-time Systems Based on Smooth Scheduling
zhu xu dong ; chang hui you ; yi yang ; tao qian
..............page:205-207,291
Unified Approach to Construct Quantum Error-correcting Code
qian jian fa ; ma wen ping
..............page:70-72
Dominance Relation-based VPRSM and its Application in Fuzzy Objective Information Systems
huang bing ; zhou xian zhong ; shi ying chun
..............page:227-229,241
Secure Multi-domain Policy Integration Method Based on Ontology Similarity
jin li ; lu zheng ding
..............page:121-124
Research on Program Behavior Model and Anomaly Detection Based on Multiple Abstraction
cheng xia ; wang xiao feng
..............page:86-90,143
Kalman Filter-based Adaptive Hybrid FEC/ARQ Mechanism for Wireless Media Streaming
bai guang wei ; jin yong ; zhang pi
..............page:94-98,111
Adaptive Proportional Fair Scheduling Scheme for Multi-input Multi-output Systems
tan li ; su gang ; zhu guang xi ; wang ling
..............page:67-69,93
Linkage Analysis of the Semantic Web: The State of the Art
ge wei yi ; cheng gong ; zuo yu zhong
..............page:17-21,45
Data Synchronization of Authentication Protocols
deng zuo lei ; huang zhao he ; yang lu shan ; zhou li hua
..............page:83-85
Cloud Trust Model for Wireless Sensor Networks
ma bin ; xie xian zhong
..............page:128-132
Research and Development in Backdoor Set
gu wen xiang ; li shu xia ; yin ming hao
..............page:11-16
Survey of Chinese New Words Identification
zhang hai jun ; shi shu min ; zhu chao yong ; huang he yan
..............page:6-10,16
Representation for RBAC Model in Description Logic
ma li ; ma shi long ; zuo yue fei ; yi sheng wei
..............page:29-35
Survey of Trust Management in Open Distributed Environments
guan shang yuan ; wu wei guo ; dong xiao she ; mei yi duo
..............page:22-28,35
Easing the Competition for Key Resource among Threads in SMT
yin jie ; jiang jian hui
..............page:256-261
Algorithm Based on Genetic Algorithm for Sudoku Puzzles
liu yan feng ; liu san yang
..............page:225-226,233
Generic & Semantic-based Data Extraction Approach
zhang jian ying ; sun yong jie ; wang xiu kun
..............page:178-181
Research on Improved Handoff Scheme between 3G and WLAN Networks
zhang li zhuo ; jia wei jia ; zhou shi fei
..............page:49-51,56
Enhanced Approach to Anomalous Program Behaviors Detection
xie feng ; xie li xia
..............page:64-66,101
Particle Swarm Optimization with Chaotic Mutation
zhu hong qiu ; yang chun hua ; gui wei hua ; li yong gang
..............page:215-217
Average Computational Time Complexity Optimized Dynamic Particle Swarm Optimization Algorithm
wang qin ; li lei ; lu cheng yong ; sun fu ming
..............page:191-194,288
Provably Secure Multi-identity Single-key Decryption Scheme in the Standard Model
ming yang ; wang yu min ; pang liao jun
..............page:73-75,85
Performance Research of Multi-relay Hybrid-forwarding Cooperative Transmission Scheme
yang bo ; yu hong yi ; feng qiang
..............page:99-101
Parallel Algorithm for Solving Banded Linear Systems
duan zhi jian ; yang yong ; ma xin rong ; liu san yang
..............page:242-244,270
Custom Instructions Identification Based on Code Profiling
bao shi ; ge ning ; lin xiao kang
..............page:144-148
Semantic Web Service-oriented Semantic Program Transformation Approach
wang quan yu ; ying shi ; lv guo bin ; zhao kai
..............page:175-177,181
Data Encryption Algorithm Based on Two Dimension Toggle Cellular Automata
xia xue wen ; li yuan xiang ; zeng hui
..............page:46-48,60
Affected Batches Rescheduling Algorithm for Multipurpose Batch Process
su sheng ; yu hai jie
..............page:218-220
Competitive Hopfield Network Combined with Variable Neighborhood Search for Maximum Diversity Problems
zhou ya lan ; wang jia hai ; bi zuo ; mo bin ; li shu guang
..............page:208-211,252
Stand Part Library Resource Sharing Based on Cellullar Ontology
ding bo ; sun li zuo ; liu xian guo
..............page:292-296
Novel QoS-aware Multipath DYMO Routing Protocol in Mobile Ad Hoc Networks
han bing qing ; chen wei ; zhang hong
..............page:79-82,120
Triangular Mesh Smoothing Algorithm Based on Neighborhood Similarity
he qiang ; zhang shu sheng ; bai xiao liang ; li liang
..............page:289-291
Workflow Mining Optimization Based on Hybrid Adaptive Genetic Algorithm
gu chun qin ; tao qian ; wu jia pei ; chang hui you ; yao qing da ; yi yang
..............page:234-238
Performance Analysis of Spectrum Sensing in Cognitive Radio Network
ding han qing ; yang jia zuo ; zhao zhi yuan
..............page:125-127
Path-partitioned Encoding Optimizes Twig Queries
xu xiao shuang ; feng yu cai ; wang feng ; zhou ying zuo ; zhang jun
..............page:182-187,204
Volume Clipping Simulation Based on Clipping Distance Field
xie kai ; sun gang ; yang sheng ; yu hou quan ; yang jie
..............page:265-267
Algorithm of Skin-tone Detection Based on Parameter Look-up Table
yi zuo hu ; qu dao kui ; xu fang
..............page:262-264,274
Research Advances in Interaction Testing
chen xiang ; gu qing ; wang xin ping ; chen dao xu
..............page:1-5
Self-similarity Clustering Event Detection Based on Triggers Guidance
zhang xian fei ; guo zhi gang ; liu zuo ; cheng lei ; tian yu zuo
..............page:212-214,220
Feature Weighting Based Event Argument Identification
fu jian feng ; liu zong tian ; liu zuo ; dan jian fang
..............page:239-241
Segmental Measurement Based Approach to Estimate Internet End-to-end Performance Parameter
ma zhen yuan ; zhou jie ; chen chu ; zhang ling
..............page:138-140,148
Statistical Analysis for Chinese-English Verb Subcategorization
han xi wu ; zhao tie jun
..............page:230-233
Change Detection of Multi-spectral Remote Sensed Images Based on PCA and EM Algorithm
wu ke ; niu rui qing ; wang yi ; du bo
..............page:282-284,296
Graphical Simulation Algorithm for Chinese Ink and Wash Painting Based on Berlin Noise
luo yan ; wu zhong fu ; guo xuan chang ; zhou shang bo
..............page:278-281,296
Microwave Fire Detection and System Design Based on Low-altitude Aircraft Platform
zhang lei ; lu jian hua ; liang xin gang
..............page:141-143
Monitoring Framework for Software Properties Based on Aspect-oriented Programming
lei zuo ; mao xiao guang ; wang cheng song
..............page:165-169
Structured Multi-Agent Model for P2P MMOG
luo jia ; chang hui you ; yi yang
..............page:106-111
X-ray Image Enhancement Based On Curvelet Transform
yang zhen ya ; chen yu quan ; pan min
..............page:275-277
Research on RBFCM-based Heuristic Coordination Algorithm
peng zhen ; yang bing ru ; xie yong hong
..............page:221-224
Practice-oriented Security Metric for Cryptographic Device under Electromagnetic Analysis
zhang peng ; deng gao ming ; zou cheng ; chen kai yan ; zhao qiang
..............page:61-63,72
HF Channel Simulation Algorithm Based on Improved Walnut Street Model
cao peng ; jing yuan ; huang guo ce
..............page:91-93
Incrementally Learning Human Pose Mapping Model
liu chang hong ; yang yang ; chen yong
..............page:268-270
Code Similarity Detection Approach Based on Back-propagation Neural Network
xiong hao ; zuo hai hua ; huang yong gang ; guo tao ; li zhou jun
..............page:159-164
Transport Sub-network Selection: Approaching with Bounded Degree Maximum Spanning Sub-graphs
feng wang sen ; zhang zuo ; chen ping ; cui jian
..............page:42-45
Active Detecting Method against SYN Flooding Attacks
li hai wei ; zhang da fang ; liu jun ; yang xiao bo
..............page:117-120
Moving Targets Tracking Based on Adaptive Level Set Algorithm
wang wei ; chen yi wen ; wang run sheng
..............page:271-274
P2P Super-peer Search Techniques Based on Hierarchical Quadrant Space
feng jin zuo ; chen gui hai ; xie jun yuan
..............page:52-56
Analysis of End to End Congestion Control Mechanism in Narrowband Ad hoc Networks
niu da wei ; yu wei bo ; wang hai ; guo xiao
..............page:57-60
Text Hierarchical Clustering Based on Several Domain Ontologies
zhang ai zuo ; zuo wan li ; wang ying ; liang hao
..............page:199-204
Analysis of the Indoor Positioning Systems in Pervasive Environment
liang yun ji ; zhou xing she ; zuo zhi wen ; ni hong bo
..............page:112-116,124
Application of Automated Negotiation Based on Policy in Delegation Authorization of Distributed Environment
wu xiao nian ; zhang run lian ; ma chun bo ; zhou sheng yuan
..............page:102-105
Research on New Generation Middleware Technology in the Open and Mobile Network Environment
li zuo lin ; wang min yi ; zhou ming tian
..............page:76-78,132
Method of Automatic Semantic Web Services Composition Based on AND/OR Graph
lu jin yun ; zhang wei qun
..............page:188-190,261
WDB Dam Extraction Based on Semantic Support
gao ming ; wang ji cheng ; li jiang feng
..............page:156-158,174
Immune Detector Generating Algorithm Based on Self-mutation
chen ; zhou yan zhou ; lv zhi guo
..............page:133-137