Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2010 Issue 4
Research on Logging Mechanism of Self-healing Database System
xie mei yi ; zhu hong ; feng yu cai
..............page:139-142,166
Multi-keywords Query Expansion with OLCA Based Concept Tree Pruning
wang zhao long ; li xia ; xu rui fang
..............page:132-135,162
Unified Framework for Block Cipher Resembling AES Algorithm and its FPGA Implementation
yang hong zhi ; han wen bao ; dong bo
..............page:103-105
Research on HRRF Scheduling Strategy Based on TinyOS
li hai cheng
..............page:80-81,98
Research of Informationization Processing
wu zhi jun ; yang yi xian
..............page:11-14
Fine-grained Distance Controlled Localization Algorithm in Wireless Sensor Networks
zhang song tao ; jiang hong bo ; tang zhen hua ; liu wen yu
..............page:36-40,54
Anycast Routing Protocol in Wireless Sensor Networks Based on Link Quality
xu zuo ; gu yun li ; qian huan yan
..............page:99-102,116
Analysis of Digital Rubbings Key Technology
zhu xiao li ; wu zhong fu ; li ying
..............page:285-288,298
Clustering Analysis Method Based on Alert Cause
wang xiu li ; hai mo ; zhu jian ming ; zhang ning
..............page:67-70,85
Classical Optimal Planning Method Based on Prepositional Satisfiability
lv shuai ; liu lei ; jiang hong ; wei wei
..............page:192-196
Web Service Composition Architecture Based on Life Cycle
yang dan ; shen de rong
..............page:128-131
Multi-layer Centerless Hierarchical Structure in Ad Hoc Networks
wu jing ; gu guo chang ; hou guo zhao ; sun ting
..............page:110-113
Research on Multi-Agent Service Recommendation Mechanism Based on Bayesian Network
du jing ; ye jian ; shi hong zhou ; he zhe ; zhu zhen min
..............page:208-211,240
Research of Software Project Risk Management Based on Rough Set Theory
ding jian jie ; hao ke gang ; hou hong ; guo xiao qun
..............page:117-119
Impreciseness: Meaning and Property
huang ying hui ; li guan yu
..............page:167-170
Research on Virtual Tunnel Handover Method in SUPANET
gao yu ; zeng hua ; zuo jun
..............page:86-90
Face Gender Classification Based on Independent Component Analysis and Genetic Algorithm
wang zhen hua ; mu zhi chun
..............page:197-200,264
Power Load Forecasting Model Based on Knowledge Discovery
zuo quan sheng ; shi zhong zhi ; yu er zuo ; yang bin ; liu zhong yao
..............page:212-214,230
Attribute Reduction of Set-valued Information Systems Based on Neighborhood Relation
chen zi chun ; qin ke yun
..............page:205-207,280
Survey on Search Mechanisms for Unstructured Peer-to-Peer Networks
qian ning ; wu guo xin
..............page:7-10
McEliece Public-key Cryptosystem Based on the Maximum F-distance Code
han mou ; zhang hong ; ye you pei ; xu chun gen
..............page:77-79
Optimizing Support Vector Machine Parameters and Application to Fault Diagnosis
lin hui ; wang de cheng
..............page:255-257,284
Survey on Data Aggregation of Wireless Sensor Networks
kang jian ; zuo xian zhang ; tang li wei ; zhang xi hong ; li hao
..............page:31-35,58
Reliability Analysis for Flexible Workflow Supporting Exception Handle
zhang jing le ; yang yang ; zeng ming ; wang yuan zhuo
..............page:41-44
System Decision Making Method Based on Vague Bidirectional Approximate Reasoning
zhang zuo sheng ; jiang sheng yi
..............page:219-223
Algorithm for Increment Update of k-Anonymized Dataset
song jin ling ; zhao wei ; liu xin ; huang li ming ; li jin cai ; liu guo hua
..............page:146-150,170
DSmT-based Mobile Robot Map Building and Sensor Management
yang jin yuan ; huang xin han ; li peng
..............page:227-230
Vulnerability Analysis Framework for Binaries Based on Model Checking
wang chun lei ; liu qiang ; zhao gang ; dai yi qi
..............page:120-124
Differentiated Service in Web Cache Based on Proportional Hit Rate
gao ang ; mu de jun ; hu yan su ; pan wen ping
..............page:55-58
Integrated Interference Matrix Based Ant Colony Algorithm for Assembly Sequence Planning
peng tao ; li shi qi ; wang jun feng ; fang jian xin
..............page:179-182,204
Research and Design of Software Component Description Language Based on the Reconfiguration Router Unit
liu qiang ; wang bin qiang ; yuan qing hua
..............page:136-138
Automatic Analysis of Chunk-extension Sentences
wei xiang feng ; zhang quan
..............page:183-186,196
Survey on P2P Technology and P2P Traffic Managements
wang chun gang ; wang hui ; yang jia hai
..............page:1-6,10
Convex Combination Track-to-track Fusion Algorithms Based on Piecewise RTS Smoothing
chen jin guang ; gao xin bo
..............page:175-178
Self-adaptive Crossover Particle Swarm Optimization Based on Penalty Mechanism
chen jin yin ; yang dong yong ; lu zuo
..............page:249-254,284
Hybrid Systems Model and Optimization Control of Aerial Robotics
li jian qiang ; pei hai long ; lu ya hui
..............page:201-204
Security Analysis and Improvement of a Group Signature Scheme
zhang xing lan
..............page:75-76,90
Binary Image Representation Method Using Improved TNAM
fang shao hong ; zheng yun ping ; chen chuan bo
..............page:261-264
Study and Design of Adaptive Network Coding MPTCP in Wireless Mesh Networks
xia zhuo qun ; chen zhi gang ; zhao ming ; liu jia zuo
..............page:106-109,124
Research of Grid Selective Resources
li xiang ; sun hua zhi
..............page:114-116
Internet-based Distributed Software Production Line Framework
wang xiao bin ; guo chang guo ; wang huai min
..............page:125-127,131
Real-time Electronic Digital Image Stabilization System Based on Multi-core Computation
zhou yu bin ; shi yong gang
..............page:269-273,277
Data Clean Method Based on Bus Model
yang meng ning ; zhao peng ; zhang xiao hong ; li peng
..............page:224-226
Attack Feature Extraction Using Extension Matrix Theory
chen zhi xian ; huang zuo
..............page:49-51,74
Evolvement and Progress of Spatio-temporal Index
zhang lin ; tang da quan ; zhang li
..............page:15-20,26
Normality of Cryptographic Boolean Functions
wang wei qiong ; xiao guo zhen
..............page:52-54
Design and Implementation of Non-intrusive Wireless Sensor Network Tester
li tian lin ; huang fu wei ; yang zuo ; zhang zhi qiang ; sun li min ; li fang min
..............page:45-48,62
Chinese-Uyhur Sentence Alignment Based on Hybrid Strategy
tian sheng wei ; tu er gen yi bu la yin ; yu long ; jia mi la wu shou er ; yang fei yu
..............page:215-218,292
tou gao xu zhi
..............page:封2
Multi-objective PSO Algorithm Based on Escalating Strategy
xu bin ; yu jing
..............page:241-244
Software Behavior Model Based on System Calls
tao fen ; yin zuo yi ; fu jian ming
..............page:151-157
Research and Implementation of Parallel Programming Environment for Hybrid Parallel Computing System
wu hua bei ; sun ji zhou ; wang wen yi
..............page:143-145,178
Application of Non-negative Matrix Factorization in Tag Semantics Analysis
zhang lei ming ; li qiu dan ; liao sheng cai
..............page:171-174,191
Improved Interpolation Algorithm for Demosacing Bayer Pattern Images
yin yong ; hu lei
..............page:278-280
Studies on Dynamic Adjustment Mechanism of Real-time Video Streaming on Surveillance System
ba hong tao ; chen yao wu ; zhou rong
..............page:296-298
Study on Global Illumination Using Ray Tracing
zhang quan gui ; wang pu ; zuo jian zhuo ; fang li ying
..............page:27-30,44
Face Detection Based on Adaptive Tracking Window Scale
lei zhen ; wang qing hai ; wu ling da ; xue ting mei
..............page:281-284
Research on Stealth Technology of Windows Kernel-level Rootkits
gong guang ; li zhou jun ; hu chao jian ; zou yun zuo ; li zhi peng
..............page:59-62
New Algorithm for Discretization Based on Information Entropy
yue hai liang ; zuo de qin
..............page:231-233,237
Discrete Particle Swarm Optimization Algorithm for Vehicle Routing Problems
wei ming ; jin wen zhou
..............page:187-191
Survey of P2P Semantic Search
wang zhi xiao ; zhang da lu ; wang yu hong ; wang dong
..............page:21-26
Design and Implement of UAVs Testbed Based on 3D Environment
zhou zuo ; wei rui xuan
..............page:258-260,284
ASM and Color Gabor Features for Facial Feature Extraction
zhu jie ; tang zhen min
..............page:265-268
Face Detection System Design Based on Two Classifiers
zhang yong ; xue zhi mao
..............page:293-295,298
Multi-granularity Trust Model Based on Individual Experience
deng zhong jun ; wang shao jie ; zheng xue feng ; suo yan feng ; yu zhen
..............page:91-94,105
Load Balancing Algorithm in Structure P2P Systems
wei wen hong ; xiang fei ; wang wen feng ; wang gao cai
..............page:82-85
Study on Software Aging Forecasting in Markov-Model-based MBP Neural Network Methods
lin yi jie ; zhang wei qun ; zhou min ; lai qing
..............page:163-166
Leaf-TCAM: A Parallel IP Address Lookup Method and Performance Analysis
zhu guo sheng ; yu shao hua ; dai jin you
..............page:63-66
Real-time Modeling and Rendering on the Realistic of Snow Scenes
tang yong ; zhang zuo
..............page:289-292