Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2003 Issue 2
English-Chinese Bilingual Phrase Alignment Based on Effective Sentential-Form
qu gang ; chen xiao rong ; lu ru zhan
..............page:143-149
A Subword-Based Approach to Large Vocabulary Chinese Sign Language Recognition
wang chun li ; gao wen ; ma ji yong ; gao xiu juan
..............page:150-156
π-Calculus Based Operational Semantics for Restricted AGENT0
wang yi chuan ; shi chun yi
..............page:157-162
A π-Calculus Based Model for Agent Organization
wang yi chuan ; shi chun yi
..............page:163-168
A Multicast Routing Algorithm Based on Transient Chaotic Neural Networks
zhang qiang ; wang chao ; xu jin
..............page:177-179
First Packet Queuing Phenomena After the Bottleneck Link in the Packet Pair Algorithm
zhang wen jie ; qian de pei ; yang xin yu ; xu da zuo
..............page:187-192
An Approach to Seeking Policy Disputes Based on Dispute Cycle Avoidance
zhang chun hong ; qu rong xin ; gao yuan
..............page:193-200
A Distributed Algorithm of Topology Construction and Network Routing of Bluetooth Scatternet
lin hong ; ding wen fang ; gao qiang
..............page:201-207
A DiffServ Based Solution to Problems of Greedy Flow
yan wei rong ; cai shi jie
..............page:208-214
Meaningful Watermarking for Audio with Fast Resynchronization
wang yong ; huang ji wu ;yun q.shi
..............page:215-220
RPRDM: A Repeated-and-Part-Role-Based Delegation Model
zhao qing song ; sun yu fang ; sun bo
..............page:221-227
A Study of Extending Generalized Framework for Access Control
dan zhi yong ; sun yu fang
..............page:228-234
A Study of Generalized Environment-Adaptable Multi-Policies Supporting Framework
dan zhi yong ; sun yu fang
..............page:235-244
A Hidden Markov Model Used in Intrusion Detection
tan xiao bin ; wang wei ping ; zuo hong sheng ; yin bao qun
..............page:245-250
A Formal Model and Algorithm for Verifying Security Protocols Based on Strand Spaces
zhou hong bin ; huang lian sheng ; sang tian
..............page:251-257
SMV Analysis of TMN Cryptographic Protocol
zhang yu qing ; wang chun ling ; feng deng guo
..............page:258-262
Synchronization of a Coupled Time-Delay Chaotic System and Its Application to Secure Communications
peng jun ; liao xiao feng ; wu zhong fu ; li xue ming ; liu yong guo ; zhang wei
..............page:263-268
A Strategic Negotiation Model of Incomplete Information Under Time Constraints
cao da jun ; xu liang xian
..............page:136-142
A Clustering Algorithm Based on Markov Chain Models
xing yong kang ; ma shao ping
..............page:129-135
Video Based Human Body Animation
luo zhong xiang ; zhuang yue ting ; liu feng ; pan yun he
..............page:269-276
Sequential Image Segmentation Using Block-Motion Vector Weighted Snakes Model
li jun ; zhou jing li ; yu sheng sheng ; chen jia zhong ; he xiao cheng
..............page:277-282
Dimension Recognition and Reconstruction in Vectorization of Engineering Drawings
su feng ; song ji qiang ; cai shi jie
..............page:289-296
Stereo Matching and Occlusion Detection with Integrity and Illusion-Sensitivity
luo qiu ming ; zhou jing li ; yu sheng sheng ; li jing
..............page:297-303
A New Vector Display Method in Cartography
yi hui zhan ; cai xun ; song jun qiang ; dan diao hong
..............page:304-311
A Study of Compiler Techniques for Multiple Targets in Compiler Infrastructures
dai gui lan ; zhang su qin ; tian jin lan ; jiang wei du
..............page:312-317
Study of a Parallel Programming Method of Using Design Patterns in Program Refinement Calculus
wan jian zuo ; sun yong qiang ; xue jin yun
..............page:318-324
Implicit Constraints in Serializable Schedules for Nested-Transactions
liang zuo ; shi bo le
..............page:325-329
An Effective Stack-Transform Based Algorithm for Mining Association Rules
hui xiao bin ; zhang feng ming ; yu jian fei ; niu shi min
..............page:330-335
An Optimal Parallel Sorting Algorithm for Multisets
zhong cheng ; chen guo liang
..............page:336-341
Modeling and Supervision of a Workflow System Oriented Toward the Knowledge Based Application and Interaction
zuo wan chun ; su feng ; cai shi jie ; zhang fu yan
..............page:342-350
An Operating System-Centric Memory Consistency Model-Thread Consistency Model
dai hua dong ; yang xue jun
..............page:351-359
Design and Implementation of a High-Speed and Low-Power Viterbi Decoder
you yu xin ; wang jin xiang ; lai feng chang ; ye yi zheng
..............page:360-365
Research on Measuring Methods for the Dynamical Characteristics of High Performance Optical Disks
wang hai wei ; pei xian deng ; xie chang sheng
..............page:366-372
yan jiu kai fa dong tai
..............page:373-374
huan ying jia ru ieee computer society
..............page:375-375