Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2010 Issue 5
Uncertain Temporal Logic Model Based on Intuitionistic Fuzzy Sets
shen xiao yong ; lei ying jie ; zhou chuang ming ; yang shao chun
..............page:187-189,273
Algorithm for Recognition Methods of Paper-cutting\'s Patterns Based on Multiresolution Fourier-Mellin Transform
wang xiao yun ; wei yue qiong ; qin fang yuan ; li guo xiang ; zhang xian quan
..............page:268-270
Improved Destriping Algorithm of Hyperspectral Images
zheng feng bin ; zhi jing jing ; gao hai liang ; lai ji bao ; pan wei
..............page:265-267
Research on Quorum System-based Framework for Distributed Access Control
xiong ting gang ; lu zheng ding ; zhang jia hong ; ma zhong
..............page:91-94,111
Research of Compiler Optimization Technology Based on Predicated Code
tian zu wei ; sun guang
..............page:130-133,138
Research on Relevance Feedback Algorithm Based on Combining Classifiers
lu xiao yan ; zhou liang ; ding qiu lin
..............page:168-170
Study on Component-based Software Safety Analysis
wan yong chao ; zhou xing she ; dong yun wei
..............page:123-126,161
Improved Algorithm for Case Feature Weight Based on Sensitivity Analysis
yang bao hua ; gu li chuan ; li shao wen
..............page:194-196,209
Researches on Similarity Measurement of High Dimensional Data
he ling ; cai yi chao ; yang zheng
..............page:155-156,227
Vector Timestamp Based Software Transactional Memory Algorithm
peng lin ; xie lun guo ; zhang xiao qiang
..............page:282-286
Extended CS Logic for Analyzing Non-repudiation Protocols
wang juan ; liu ; zhang huan guo
..............page:49-52,76
Outlier Detection Based on the Damped Model in Mixed Data Streams
su xiao zuo ; lan yang ; qin yu ming ; cheng yao dong
..............page:157-161
Secure and Efficient Identity-based Aggregate Signature Scheme
sun hua ; zheng xue feng ; yu yi ke ; zhou fang
..............page:62-65
Data Quality Model and Metrics Research at Attribute Granularity
chen wei dong ; zhang wei ming
..............page:139-142
On the Condition and the Proof of the Existence of Perfect Secrecy Cryptosystem
lei feng yu ; cui guo hua ; xu peng ; zhang sha sha ; chen jing
..............page:99-102
Research on CF Algorithm Based on Probabilistic Analysis of Discrete Rating Vector
tian wei ; xu jing ; peng yu qing
..............page:181-183
Application of Data Warehouse and OLAP in Preference Data Analysis on National College Entrance Examination and Admission
yin yuan fen ; zhang zi li ; cai hai min ; zeng zuo
..............page:162-164,177
Flexible Online Evolution Mechanism for System Software
chen hong long ; li ren fa
..............page:115-117
tou gao xu zhi
..............page:封2
Rapid PC Hardware Based Visualization Method for Large-scale Datasets
chen shi hao ; hao zhong yang
..............page:234-236
Adaptive Parameters Conditional Random Field Video Segmentation Algorithm
zheng he rong ; zuo yi ping ; pan xiang
..............page:254-256,294
Spreadsheet-like Construct for Information Convergence
wei yong shan ; han yan bo ; sun zhong lin ; zhang feng ; chen xin
..............page:134-138
Fast Image Reconstruction for Cone-beam CT Based on Minimal Cylindrical Reconstruction Region
zhang shun li ; zhang ding hua ; li ming jun ; guo xin ming
..............page:257-260
Self-adaptive Genetic Algorithm with Classification
huang li ; ding li xin ; du wei wei
..............page:165-167,250
Real-time Ordered Query Processing in On-Demand Broadcast Environments
wang hong ya ; liu xiao qiang ; he hao yuan ; song zuo ; xiao ying yuan ; le jia jin
..............page:146-150,186
Research on the Key Technologies of Media Streaming for 3G Networks
cao lei ; shen hang ; luo bin ; bai guang wei
..............page:57-61
Secure Communication Scheme of Mobile VPN Based on IKE Protocol
shu ming lei ; tan cheng xiang ; tan bo
..............page:84-86
Cloud Database Dynamic Route Scheduling Based on Ant Colony Optimization Algorithm
shi heng liang ; bai guang yi ; tang zhen min ; liu chuan ling
..............page:143-145,213
Research on Domain-independent Data Cleaning:A Survey
cao jian jun ; diao xing chun ; wang ting ; wang fang zuo
..............page:26-29
MintRoute-HNLB:A Novel Wireless Sensor Network Routing Protocol with Load Balancing
yin an ; wang bing wen ; hu xiao zuo ; yang wen jun
..............page:77-80,102
Emotional Modeling in an E-learning System Based on OCC Theory
qiao xiang jie ; wang zhi liang ; wang wan sen
..............page:214-218
Efficient Fixed-parameter Enumeration Algorithm for the 3-D Matching Problem
liu yun long ; wang jian xin
..............page:210-213
3D Information Extraction Algorithm Based on a Single Image
liu ri chen ; liu zuo guang ; yin zuo ; zhao yi ming
..............page:243-246
Efficient Certificateless On-line/Off-line Signcryption Scheme
luo ming ; wen ying you ; zhao hong
..............page:103-106
Definition of N-norm and it\'s Generation Theorem on [0,∞]Interval
fan yan feng ; he hua can
..............page:190-193,270
Face Recognition Based on Two-dimensional Maximum Difference Marginal Fisher Analysis
lu gui zuo ; lin zhong ; jin zhong
..............page:251-253,264
Logic Study of Epistemic and Rational Conditions of Some Game-theoretic Solutions
jiang jun li ; tang xiao jia
..............page:223-227
Tone Recognition Based on Support Vector Machine in Continuous Mandarin Chinese
fu de sheng ; li shi qiang ; wang shui ping
..............page:228-230
Research and Simulating of Global Optimal Path Planning of Mobile Robot Based on Ant Colony System
zhou zuo ; dai guan zhong ; cai xiao zuo
..............page:171-174
UIMMS of Maneuverable Target Tracking for Multistatic Radar System
zhao hui bo ; pan quan ; liang yan ; wang zeng fu
..............page:206-209
Security Alert Correlation:A Survey
fu xiao ; xie li
..............page:9-14,29
New Approach to Analyzing Meaning of Natural Language on Modifying Relations
tian wei xin ; zhu fu xi ; dan zhi ping
..............page:197-202,290
Overviews on Internet Emergent Behaviour Research
tang hong ; huang ding ; wu yu
..............page:34-39
New Compression Approach to Hyper-spectral Images Based on Second Order Difference Predictive
zhang wei ; dai ming ; yin chuan li ; feng yu ping
..............page:240-242,246
Recent Advances of Data Distribution Mechanisms for Live P2P Streaming
peng xue na ; li jia ; wen ying you ; zhao hong
..............page:15-20
Instruction Replication Scheme of Fault-tolerant Processor
li hong bing ; shang li hong ; zhou mi ; jin hui hua
..............page:278-281
Research of Web Service QoS Evaluation Method with Extended Owl-S Ontology
zhou min ; zhang wei qun ; lin yi jie ; shi ying
..............page:127-129,183
Security P2P Sharing Model Based on Bloom Filter
yan hua yun ; guan zuo hong
..............page:72-76
Research on Novel Test Vector Ordering Approach Based on Markov Decision Processes
wang guan jun ; wang mao li ; zhao ying
..............page:287-290
Solving Einstein\'s Puzzle with SAT
tian cong ; duan zhen hua ; wang xiao bing
..............page:184-186
Review of Semantic Web Service Composition
cui hua ; ying shi ; yuan wen jie ; hu luo kai
..............page:21-25
One Method of Requirement Mapping Based on Service-oriented QoS Model
liang quan ; wang yuan zhuo
..............page:95-98
Discrete Particle Swarm Optimization Based on Chaotic Ant Behavior and its Application
xu qing he ; liu shi rong ; lv qiang
..............page:178-180,286
EIGamal-like Public-key Cryptosystem and Digital Signature Scheme Based on 5F-L Sequence
duan mu qing feng ; zhang xiong wei ; wang yan bo ; li bing bing ; lei feng yu
..............page:68-71
Policy of Pheromone Update with Important Solution Components
bi ying zhou ; zhong zhi ; ding li xin ; yuan chang an
..............page:203-205,236
Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network
chen hao ; guo ya jun
..............page:87-90,117
Macroblock Importance Estimation Based Resynchronization Approach
qiu jin bo ; feng zuo ; yu li ; zhu guang xi
..............page:81-83,106
Research on Clock Synchronization of Ad Hoc Networks:A Survey
wang bo ; ye xiao hui ; zhao yu ting ; yan xue li
..............page:30-33,39
Automatic Abstracting System Based on Improved LexRank Algorithm
ji wen zuo ; li zhou jun ; chao wen han ; chen xiao ming
..............page:151-154,218
CT Image Segmentation Based on Support Vector Machine and Regional Growth
liu lu ; chu chun yu ; ma jian wei ; liu wan yu
..............page:237-239
Modeling Traffic Flow Based on Autonomous Agents and Cellular Automata
du xiao dan ; zhao shi bo ; zuo tao ; zhang feng li
..............page:231-233,239
Self-certified Proxy Signcryption Based on Discrete Logarithm Problem
yu hui fang ; zhao hai xing ; wang zhi cang ; wang xiao hong
..............page:66-67,71
Cost-drive Service Composition
zhu rui ; wang huai min ; tang yang bin
..............page:40-44
Dimensionality Reduction Symmetrical PSO Algorithm Characterized by Heuristic Detection and Self-learning
shao zeng zhen ; wang hong guo ; liu hong
..............page:219-222
Event-driven Middleware Platform
he jian li ; chen zuo ; gu wei zuo
..............page:107-111
Research on a Front-end Tool for Program Analysis Based on Model Checking
ye jun min ; xie zuo ; jin cong ; li ming ; zhang zhen fang
..............page:118-122,174
Abnormal Behavior Model Based on Environment Constraint
he jia lang ; xu jian ; zhang hong
..............page:112-114,142