Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2011 Issue 1
Research Summarization of Humanoid Expression Robot with Emotion
WANG Zhi-liang;WANG Wei;GU Xue-jing;ZHENG Si-yi
..............page:34-39
Model Checking of Timed Colored Petri Nets with Inhibitor Arcs
YANG Nian-hua;YU Hui-qun;SUN Hua
..............page:170-176,209
Clustering-based Improved K-means Text Feature Selection
LIU Hai-feng;LIU Shou-sheng;ZHANG Xue-ren
..............page:195-197
Research on a Bilevel R-median Facility Interdiction Model for Air Attack Formation
ZHU Yue-ni;ZHENG Zhen;LIU Wei
..............page:210-213,235
Analysis for Loop-freeness of Multipath Inter-domain Routing Based on Locator/ID Decoupling Architecture
LI Dan;WANG Bin-qiang;LIU Qiang;MA Hai-long
..............page:130-135
Algorithms for Feedback Set Problems:A Survey
WANG Jian-xin;Jiang Guo-hong;Li Wen-jun;CHEN Jian-er
..............page:40-47
Reliable Maintanace of Wireless Sensor Networks for Event-detection Applications
HU Si-quan;YANG Jin-yang;WANG Jun-feng
..............page:83-86
Internet of Things:Semantics,Properties and Category
HUANG Ying-hui;LI Guan-yu
..............page:31-33,65
Research and Implementation of Mobile SSL VPN System Based on Socks5 Proxy
YU Ding-guo;SHU Ming-lei;TAN Cheng-xiang
..............page:119-121,144
Real-time Detection of Malicious Web Pages Based on Statistical Learning
WANG Tao;YU Shun-zheng
..............page:87-90,129
Software Reliability Metrics Selecting Method Considering Software Integrity Level
LI Hai-feng;MENG Ling-zhong;LU Min-yan;YIN Yong-feng
..............page:145-149
Reuleaux Triangle-based k-coverage Algorithm in Wireless Sensor Networks
XING Xiao-fei;SUN Ze-yu
..............page:66-68,86
Trust Pattern Verification Based Trustworthy Judgment Method of Explanatory Web Text
HUANG Shuai-biao;ZENG Guo-sun;WANG Wei
..............page:177-180,206
Analysis on Ad Hoc Routing and QoS in Heterogeneous Wireless Networks
PEI Xue-bing;WANG Qing-ping;ZHU Guang-xi
..............page:94-99
Research on Workflow Access Control Temporal Policy Combine in Multi-domains
TANG Zhuo;LIU Guo-hua;LI Ken-li
..............page:125-129
Wireless Sensor Network Management Technology
ZHAO Zhong-hua;HUANGFU Wei;SUN Li-min;DU Teng-fei
..............page:8-14
Autonomic Dependability Evaluation of Autonomic System for Service-oriented
ZHANG Hai-tao;WANG Hui-qiang
..............page:158-161
Application of PKI in Spatial Information Networks
REN Fang;MA Jian-feng;ZHONG Yan-tao
..............page:51-53
Efficient Scheme of (t,n) Threshold Group Signature
LIU Dan-ni;WANG Xing-wei;GUO Lei;HUANG Min
..............page:110-112
Program Chopping Approach for Java Program
JIANG Cao-qing;YING Shi;NI You-cong;GUAN Hua
..............page:150-155,161
Intelligent Question-answer System Uniponse Based on Requirement
ZENG Cheng;CHEN Gui-sheng;DU Gang;LIN Chen
..............page:181-184,194
Cartesian Product Rough Model of Approximation Spaces and Decomposability
WU Ming-fen;CAO Cun-gen
..............page:225-228,245
Secure RFID Communication Protocol in Supply Chains
DENG Miao-lei;HOU Ying-chun;WEI Bao-jun
..............page:62-65
Real-time Scheduling Algorithm TC-LSF Used for the Switch Network
LIU Jun-rui;CHEN Ying-tu;FAN Xiao-ya
..............page:122-124
Static Analysis of Soft Errors Effect in Register Files for Program Reliability
XU Jian-jun;TAN Qing-ping
..............page:290-294,封3
Shape Recognition and Classification Based on Skeleton Junction Nodes Features
CHEN Jun;WANG Bo;ZHOU Yu;BAI Xiang;LIU Wen-yu
..............page:279-281
Three-way Decision-theoretic Rough Sets
LIU Dun;YAO Yi-yu;LI Tian-rui
..............page:246-250
Tree Kernel-based Zero Pronouns Recognition
HUANG Li-wei;KONG Fang;ZHU Qiao-ming;ZHOU Guo-dong
..............page:214-216,250
Research and Implementation of Domain-specific Virtual Data Center Based on Semantics
LI Hua-yu;HU Chang-jun;OUYANG Chun-ping;YE Yin-zhu
..............page:190-194
Probabilistic Earley Algorithm Based on Extended Viterbi Path
HAN Xi-wu;Roland Hausser
..............page:207-209
Novel Autonomous Clustering Method Based on Decision-theoretic Rough Set
YU Hong;CHU Shuang-shuang
..............page:221-224
LEACH-CS:A Customizable Zone-spanned Multi-hop Routing Protocol in WSNs
GU Yue-yue;BAI Guang-wei;TAO Jin-jing
..............page:78-82
Maximal Clique Percolation Algorithm Based on Neighboring Information
CHEN Duan-bing;ZHOU Yu-lin;FU Yan
..............page:203-206
Quality Assessment for 3-D Model Based on Surface Roughness
YANG Bin;LI Xiao-qiang;LI Wei;DING Guang-tai
..............page:276-278,285
Study of a Grid User Whole Life Cycle Management Model Based on State Chart
LIU Li-min;SHANG Chao-xuan;XU Zhi-wei
..............page:113-115,135
StarOSGi:A Distributed Extension Middleware for OSGi
SHI Dian-xi;WU Yuan-li;DING Bo;YIN Gang;WANG Huai-min
..............page:162-165,189
P-sets and Data Internal Search-application
XIE Wei-qi;YU Xiu-qing
..............page:236-239
Design of Dynamic Approach for Data Path ID Distribution in WiMax Network
LI Jun;TANG Ding;ZHAO Zhi-jun;WU Jin-zhao;TANG Hui
..............page:116-118,149
Feature-level Fusion Fault Diagnosis Based on PCA
WU Qian;CAI Hai-ni;HUANG Li-feng
..............page:268-270
Incremental Algorithm for Attribute Reduction Based on Conditional Entropy
LIU Wei;LIANG Ji-ye;WEI Wei;QIAN Yu-hua
..............page:229-231,239
Metric-based Research of Software Product Line Management
DING Jian-jie;HAO Ke-gang;HOU Hong;GUO Xiao-qun
..............page:156-157,169
New Fractal Model of Grid Overlapping Differential Box-counting
LI Chuan-long;LI Ying;YU Shui-ming
..............page:282-285
Improvement of Dynamic Hand Gesture Recognition Technology Based on HMM Method
YU Mei-juan;MA Xi-rong
..............page:251-252
Approach of Internet New Word Identification Based on Immune Genetic Algorithm
DING Jian-li;CI Xiang;HUANG Jian-xiong
..............page:240-245
Cache Resource Management Mechanisms of Chip Multiprocessors
JIA Xiao-min;ZHANG Min-xuan;QI Shu-bo;ZHAO Tian-lei
..............page:295-301
Verifiable and Efficient Multi-secret Sharing Threshold Scheme
BU Shan-yue;WANG Ru-chuan
..............page:100-103
Construction of Boolean Function with Maximum Algebraic Immunity
XIONG Xiao-wen;QU Liong-jiang;LI Chao
..............page:26-30
Localization Algorithm Based on Dynamic Hop Distances in Wireless Sensor Networks with Holes
ZHANG Song-tao;JIANG Hong-bo;LIU Wen-yu
..............page:57-61
Generation and Identification of External-distortion Data
LI Yu-ying;LIN Hong-kang
..............page:253-255,267
Secure Overlay Network for Peer-to-Peer Full Text Search
HUO Lin;HUANG Bao-hua;BAO Yang;HU He-ping
..............page:104-106,139
Data Randomization to Defend Buffer Overflow Attacks
YAN Fen;YUAN Fu-chao;SHEN Xiao-bing;YIN Xin-chun;MAO Bing
..............page:73-77
tou gao xu zhi
..............page:封2
High Energy Node Driven On-demand Distance Vector Routing Protocol
JIAO Zhen-zhen;TIAN Ke;ZHANG Bao-xian;ZHONG Guo;LI Xiao;ZHANG Yan
..............page:91-93,103
Research of Representation Based on Feature Semantic for Models
JIN Ying-hao;SUN Li-juan
..............page:286-289
Robot Behavior Control Based on Multi-LCS and the Artificial Potential Field
SHAO Jie;YANG Jing-yu
..............page:264-267
Research of Learning-based Planning Techniques
CHEN Ai-xiang;JIANG Yun-fei;HU Gui-wu;CHAI Xiao-long;BIAN Rui
..............page:15-19,61
Noised Image Segmentation Effect Evaluating Method Based on Run Length Statistic
ZHANG Xue-feng;FAN Jiu-lun;XIE Xie
..............page:271-275
General Extraction Engine Framework:Research of a New Approach for Web Information Extraction
GONG Ji-bing;TANG Jie;YANG Wen-jun
..............page:198-202
Performance Analysis Method for Access Authentication Mechanism
LIU Wei;YANG Lin;LI Quan-lin
..............page:48-50,77
Research of a Method for Hardware and Software Co-design Based on RSOC
LIU Zhao-yu;LI Ren-fa;CHEN Yu
..............page:302-304,封3
Mathematic Analysis of Semantic Overlay Network\'s Optimal Scale
LIU Zhen;ZHOU Hao-hao;DENG Su
..............page:69-72
Comparison with Attribute Reduction Algorithms in Information View
TENG Shu-hua;SUN Ji-xiang;ZHOU Shi-lin;LI Zhi-yong
..............page:259-263
Research on Hybrid Simulation of OMNET++ and H.264 Codec
CAI Min-jie;LI Bo
..............page:136-139
Method of Rule Extraction Based on Rough Set Theory
E Xu;SHAO Liang-shan;ZHANG Yi-zhi;YANG Fang;LI Han;YANG Jia-xin
..............page:232-235
System Calls Based Intrusion Detection:A Survey
WU Ying;JIANG Jian-hui;ZHANG Rui
..............page:20-25,47
Model and Algorithms for Dynamic Workflow Mining
LIANG Jun-feng;ZHANG Zu-ping;LONG Jun
..............page:185-189