Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2011 Issue 3
Watermarking Algorithm for Color Images Based on Quaternion Frequency Modulation
SUN Jing;YANG Jing-yu;FU De-sheng
..............page:123-126,139
Approach to Dynamic Services Composition Based on Knowledge Reuse
LIU Ying;HU Hai-tao
..............page:153-158
Secure Computation Protocol for Private Matching and Inclusion Relation against Outsourced Database System
JIANG Ya-jun;YANG Bo;ZHANG Ming-wu;CHEN Xu-ri
..............page:120-122,135
Topic Extracting with User Information Protection on Web
XIE Ming;WU Chan-le
..............page:203-205,230
Locating Table in P2P Data Management System
SHEN Xin-peng;LI Zhan-huai;ZHAO Xiao-nan;ZENG Lei-jie
..............page:195-198
Improved Glowworm Swarm Optimization Based on the Behavior of Follow
LI Yong-mei;ZHOU Yong-quan;YAO Xiang-guang
..............page:248-251
Short Public Key Provable Security Identity-based Signature Scheme
WANG Zhi-yi;LIU Tie;KANG Li;XIE Jing;LEI Gang
..............page:136-139
Research on Hierarchical Optimization Strategy for Large-scale Mobile Ad Hoc Networks
YANG Juan;LING Ying;LIU Hong-fei
..............page:115-119
Construction of Odd-variable Boolean Function with Optimum Algebraic Immunity
TANG Yang;ZHANG Hong;ZHANG Kun;LI Qian-mu
..............page:83-86
New Identity-based Key Agreement Scheme for WSN
GUO Jiang-hong;LI Xing-hua;WU Jian-qiang
..............page:127-130
Tidal Level Measurement in Ruler Image Based on Hough Transform and Harris Detection
ZHANG Chao-liang;JIANG Han-hong;ZHANG Bo;JIANG Chun-liang
..............page:283-285
Hybrid Algorithm for Tool-path Airtime Optimization during Multi-contour Processing in Leather Cutting
YANG Wei-bo;WANG Wan-liang;JIE Jing;ZHAO Yan-wei
..............page:254-256,282
GPU-based Real Time Image Registration with Variant SIFT
YUAN Xiu-guo;PENG Guo-hua;WANG Lin
..............page:300-303
Processing Continuous K Nearest Neighbor Queries on Highly Dynamic Moving Objects
NIU Jian-guang;CHEN Luo;ZHAO Liang;TAN Jie
..............page:182-186
Robust Bilateral Filter in Consistent Sub-neighborhoods
XIAO Xiu-chun;WANG Zhang-ye;ZHANG Yu-nong;JIANG Xiao-hua;PENG Qun-sheng
..............page:275-278
Image Denoising Using Double-density Complex Wavelet Transform
YUAN Bo;SHANG Zhao-wei;LANG Fang-nian
..............page:292-294,303
P-code Analyzing Based on BDM Model and Extension Research
DU Jian-jun;LI Ha;CHEN Ming
..............page:304-306,封3
Research and Progress in Computational Thinking
MOU Qin;TAN Liang
..............page:10-15,50
Research on Network Security Situation Awareness System Architecture Based on Multi-source Heterogeneous Sensors
LAI Ji-bao;WANG Ying;WANG Hui-qiang;ZHENG Feng-bing;ZHOU Bing
..............page:144-149,158
Survey of CPU/GPU Synergetic Parallel Computing
LU Feng-shun;SONG Jun-qiang;YIN Fu-kang;ZHANG Li-lun
..............page:5-9,46
Invasive Weed Optimization and its Advances
HAN Yi;CAI Jian-hu;LI Yan-lai;ZHOU Gen-gui
..............page:20-23
Novel Admission Control Algorithm Based OR Differential Services
SHI Sheng-lin;ZHU Guang-xi;SU Gang
..............page:103-106,114
tou gao xu zhi
..............page:封2
Emotion Recognition of Physiological Signals Based on Intelligent Algorithm
XIONG Xie;LIU Guang-yuan;WEN Wan-hui
..............page:266-268,278
Cortical Surface Parcellation Using STAPLE Algorithm
HU Xin-tao;LI Gang;GUO Lei
..............page:279-282
Efficient Semi-supervised Active Relevance Feedback Scheme for Image Retrieval
WANG Wen-sheng;CHEN Li-ke;WU Jun
..............page:231-235
Research on Family of Object Model in Semantic Feature Modeling
LIU Xian-guo;SUN Li-juan;WANG Qi-hua;ZHANG Hui
..............page:286-289
Generation of a Consensus Sequence and its Applications in the Fault Location
YE Jun-min;XIE Qian;JIANG Li;LI Song-song;XU Lei
..............page:162-165
Research on Battlefield Environment Metamodel Hierarchy
SUN Guo-bing;HUANG Jin-jie;GAO Ya-juan
..............page:175-178
Sequence Fuzzy Concept Lattice Model and Incremental Construction
LI Yun;YUAN Yun-hao;SHENG Yan;CHEN Ling
..............page:224-230
Research on Service-oriented Network Simulation and Runtime Support Platform
SUN Li-yang;MAO Shao-jie;LIN Jian-ning
..............page:159-161,178
Algorithmic Verification of Forward Correctability
WU Hai-ling;ZHOU Cong-hua;JU Shi-guang;WANG Ji
..............page:97-102
Connectivity of Wireless Multi-hop Networks under Fading Channel
LI Yan-jun;ZHU Yi-hua
..............page:93-96,119
New Polynomial Smooth Support Vector Machine
YUAN Hua-qiang;TU Wen-gen;XIONG Jin-zhi;LIU Ting-ting
..............page:243-247
Soundness and Completeness Proof of Agent Intention Production in AgentSpeak
YANG Bo;SHAO Li-ping;QIN Zheng
..............page:236-242
Research on Virtual Sample Generation Technology
YU Xu;YANG Jing;XIE Zhi-qiang
..............page:16-19
Finding Intentional Knowledge of outliers Based On Attribute Subspace
WANG Yue;LIU Ya-hui;TAN Shu-qiu
..............page:199-202
Self-healing Intrusion Tolerant Method Based on J2EE Application Server
ZHOU Rui-peng;GUO Yuan-bo;LIU Wei;HAN Lei-lei
..............page:51-56
Semantic Graph Discovery of TCM Documents
TAO Jin-huo;CHEN Hua-jun;HU Xue-qin
..............page:213-217,251
Pervasive Computing Environment for Embedded System
QI Zhi-yong;CHANG Pai-pai
..............page:179-181,202
Study on Evaluation Method of MAC Protocol for Tactical Data Links
WANG Yi;WANG Wen-zheng;ZHOU Jing-lun
..............page:111-114
MATLAB Realization on Subalgebras of Direct Product of Lattice Implication Algebras
WU Ming-hui;LIU Xu;XU Yang;MA Jun
..............page:263-265,289
Associative Web Document Classification Based on Word Mixed Weight
LAN Jun;SHI Hua-ji;LI Xing-yi;XU Min
..............page:187-190
Unstructured Peer-to-Peer Search with Routing Orientation of Query Rate
FENG Guo-fu;ZHANG Jin-cheng;LI Wen-zhong;LU Sang-lu;CHEN Dao-xu
..............page:47-50
Adaptive Semi-supervised Marginal Fisher Analysis
JIANG Wei;YANG Bing-ru;SUI Hai-feng
..............page:252-253,262
Survey on P2P Network Pollutions
WANG Yong;YUN Xiao-chun;QIN Zhi-guang;GUO Li;CHENG Hong-rong
..............page:1-4,23
Data Delivery Scheme of Delay Tolerant Mobile Sensor Network Based on Node Priority
LIU Tang;PENG Jian;WANG Jian-zhong;LIU Liu
..............page:140-143
Neighbor Feature Extended κd-tree and Searching Algorithm for Game
XU Jian-min;LI Huan;LIU Bo-ning
..............page:257-262
Design of a Hybrid Real-time Intelligent Information Fusion System
HUANG Kun
..............page:269-270,封3
Research on Flexible Constraint of Business Process Based on Reinforcement Learning
HAN Dao-jun;XIA Lan-ting;ZHUO Han-kui;LI Lei
..............page:166-171
Image Zooming by Combination of the Curvature-driven and Edge-stopping Nonlinear Diffusion
ZHU Xuan;LEI Wen-juan;ZHANG Shen-hua;WANG Lei
..............page:290-291,299
Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery
KANG Xiao-bing;WEI Sheng-min
..............page:295-299
Anti-worm Based Defensive scheme for P2P Worm
ZHOU Shi-jie;QIN Zhi-guang;LIU Le-yuan;DENG Yi-yi
..............page:57-64,79
Efficient Authenticated Key Agreement Protocol in MANET
LI Xiao-qing;LI Hui;MA Jian-feng
..............page:73-75
Real-time Scheduling Algorithm of Hybrid with Fault-tolerant in Heterogeneous Distributed systems
DENG Jian-bo;ZHANG Li-chen;DENG Hui-min
..............page:87-92,102
Differential Fault Analysis on RSA-CRT Based on Fault in Error Checking Operation
CHEN Cai-sen;WANG Tao;TIAN Jun-jian;ZHANG Jin-zhong
..............page:76-79
Construction of Fingerprint Key Extraction with High Performance
LI Xi-ming;YANG bo
..............page:107-110
XML Parsing Schema Based Oil Parallel Sub-tree Construction
CHEN Rong-xin;LIAO Hu-sheng;CHEN Wei-bin
..............page:191-194,235
RepTrust:Reputation Based Trust Model in P2P Environment
YANG Chao;LIU Nian-zu
..............page:131-135
Dynamic Threshold Rough C-Means Algorithm
WANG Dan;WU Meng-da
..............page:218-221,242