Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Chinese Journal of Computers
0254-4164
2003 Issue 1
2003 nian zhi wu jian mo fang zhen ke shi hua ji qi ying yong guo ji zhuan ti tao lun hui zheng wen tong zhi
..............
page:90-90
ieee/wic2003 wang shang zhi neng yu zhi neng dai li ji shu lian he guo ji hui yi (wi2003/iat2003) zheng wen tong zhi
..............
page:70-70
A Kind of Subliminal Channel Communication Algorithm with Keys
li shun dong ; zuo zheng
..............
page:125-128
Simulation of Inflorescences Using Dual-Scale Automaton Model
zhao xing ;philippe de reffye; xiong fan lun ; hu bao gang ; kang meng zhen
..............
page:116-124
A Theorem on Dimensionality of the Uncorrelated Optimal Discriminant Feature Space
yang jing yu ; jin zhong ; hu zhong shan
..............
page:110-115
Multi-Pose Face Recognition Based on a Single View
zhu chang ren ; wang run sheng
..............
page:104-109
Reduction Algorithm Based on Discernibility and Its Applications
xu yan ; huai jin peng ; wang zhao qi
..............
page:97-103
Chinese Prosodic Phrasing Based on Extension Matrix Theory
zuo wei jun ; lin fu zong ; li jian min ; zhang zuo
..............
page:26-31
Reachability Analysis on Real-Time Value-Passing Systems
chen jing
..............
page:19-25
Knowledge Reductions in Inconsistent Information Systems
zhang wen xiu ; mi ju sheng ; wu wei zhi
..............
page:12-18
DNA Computer Principle, Advances and Difficulties (Ⅰ):Biological Computing System and Its Applications to Graph Theory
xu jin ; zhang lei
..............
page:1-11
Incremental Updating Algorithm Based on Frequent Pattern Tree for Mining Association Rules
zhu yu quan ; sun zhi hui ; ji xiao jun
..............
page:91-96
BC Interconnection Networks and Their Properties
fan jian xi ; he li qin
..............
page:84-90
The h-Dimensional Wall Torus
chen xie bin
..............
page:77-83
An Computing Immune Model Based on Poisson Procedure and Rough Inclusion
li xiao jian ; huang yong ; huang hou kuan
..............
page:71-76
An Intrusion Detection Method(RHDID) Based on Relative Hamming Distance
zhang zuo ; xu man wu ; zhang hong ; liu feng yu
..............
page:65-70
Some Analytical Properties of Sequences of Degree Distribution for Low-Density Erasure Codes
mu jian jun ; wang xin mei
..............
page:60-64
Linear Cryptanalysis of Q Block Cipher
wu wen ling
..............
page:55-59
An Anonymity-Revoking Blind Proxy Signature Scheme
wang xiao ming ; fu fang wei
..............
page:51-54
Quantitative Research of Validity on Subsection Sorting Algorithm with Equal Probability Data Segment
you zhi qiang ; zhang da fang
..............
page:45-50
Rough Logic Systems with Rough Equality Relation and Its Reasoning
liu qing ; zheng fei ; jiang juan ; liu zuo
..............
page:39-44
Automatically Acquiring Chinese Parsing Knowledge Based on a Bilingual Language Model
lv ya juan ; li sheng ; zhao tie jun
..............
page:32-38