Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2002 Issue 11
Overall Copy Technique of Sybase Database
zuo yong kang ; yue zuo ling ; xi chuan yu
..............page:114-115
Using Oracle PRO C to Collect Data Packet in Network
lin tian feng
..............page:116-117
Development of User Object Inputted by Simple Code in PowerBuilder
gao jing ; dai jian feng
..............page:118-120
Developing Music Editor Software Based on AutoCAD
zhang qiu yuan
..............page:120-122
Re-development of CAD System Based on Pro/Engineering
he fei ; liu zi jian
..............page:123-125
Implementation of DTS Package Based on DTS Object Model
zhou yong feng ; deng su ; yang qiang ; liu qing bao
..............page:112-114
Implementation of Class Loader in Java Virtual Machine
wang li dong ; zhang kai
..............page:107-109
Design of StrongARM Based Real-time Surveillance System
li yun fei ; hu jian ling ; chen jian
..............page:65-67
Research and Implementation of DCOM-based Distributed System with Recomposing Ability
xiong wei ; sun na ; ding yu zheng
..............page:62-65
Implementation of Distributed Parallel Calculation Based on CORBA Kernel Services
zhao gang ; zhao ming sheng ; yang hai ming
..............page:59-61
Design and Implementation of ORB in Fault Tolerant CORBA System
wang jun ; zhou ming hui ; wu quan yuan
..............page:56-59
Key Techniques in Interactive Real-time Virtual Endoscopy System
geng guo hua ; zhou ming quan
..............page:54-55
A NEW REVOCATION AND VERIFICATION SCHEME OF DIGITAL CERTIFICATE
hou meng bo ; xu qiu liang
..............page:50-53
BLUETOOTH SECURITY AT LINK LAYER
tian xin jian ; wang zuo ; jin chun
..............page:47-49
COMPARISON OF WEB SERVICE-ORIENTED WORKFLOW MODELING LANGUAGES
wang fu dong ; wei jun
..............page:26-29
METHODS FOR COMMUNICATION PRIMITIVE TRANSFORMATION IN MPI PROGRAMS
jia ming fei ; dong wei qing ; huang yong xiang
..............page:30-33
A PRACTICAL ALGORITHM OF BUILDING DELAUNAY TRIANGLE MESHES FOR TERRAIN MODELING
xiang chuan jie ; zhu yu wen
..............page:34-36,39
CHAOTIC PROPERTIES OF NEURAL NETWORK AND ITS APPLICATIONS IN SECURE COMMUNICATIONS
liu nian sheng ; guo dong hui ; wu bo zuo
..............page:40-42,53
EXPANSION OF INTRUSION DETECTION RULES IN CIDF
tang yi
..............page:43-46
MMX Technology Used in Industry Control
xu yi ; feng shan ; zhu da yong
..............page:125-126
Application of Fuzzy Control in TCP/IP-based Telecontrol System
wang xiao feng ; wu ping dong ; ren chang qing ; huang jie ; chen zhi long ; ma shu yuan
..............page:83-85
Design and Implementation of a 3-layer Multimedia Surveillance System
lu ke cheng ; dai li rong ; song yan
..............page:78-80
A Pattern Recognition Algorithm of Neural Network Based on Cash Character
xie kai ; hao jian xin
..............page:76-77
A Hierarchical 3D Reconstruction Method Based on Medical Images
he jun ; zhou gang ; wang cong jun ; huang shu huai
..............page:74-75
Implementation of Distributed Database System Based on JavaRMI in VisBroker Environment
jin li ming ; yao ai guo ; xie ya ling
..............page:71-73
Solution of Multi-function IP Telephone Based on PA1688
peng chun feng ; ruan fang
..............page:68-71
MAGIC CUBE TRANSFORMATION AND ITS APPLICATION IN DIGITAL IMAGE ENCRYPTION
bao guan jun ; ji shi ming ; shen jian bing
..............page:23-25
IMAGE RETRIEVAL BASED ON USER DEFINED REGION-OF-INTEREST
tang jun hua ; yan bao ping
..............page:20-22
MAP SEGMENTATION BASED ON FUZZY MAXIMUM ENTROPY
guo ling ; zhou xian zhong
..............page:18-19
Design of User Interface System Based on Design-pattern
wang rui ; lin xiao ming
..............page:104-106
Discussion of Windows Script Encoder
zhao gen lin
..............page:100-103
An Automatic Judge Technology for Windows Operation Test
wang hao ; nie cheng qi
..............page:98-99
Snort: an Intrusion Detection System with Open Soruce Code
zhang xiang ; zhang ji cai ; wang zuo ; mi dong
..............page:96-97
Research and Implementation of VPN Using Kerberos
wei hai ping ; wu xing ; yang fei ; yang zuo
..............page:93-95
Design and Application of a Spatial Data Mining Query Language—GMQL
li hong ; cai zhi hua ; hu jun
..............page:91-93
Data Integration and Copy Model Among Databases of Different Structure
chen ding tao ; zhuang cheng san ; guan shu
..............page:88-90
RESEARCH STATUS OF RAPID DIGITALIZATION OF OBJECT APPEARANCE
cai qiang ; yang qin ; chen qi ming
..............page:11-13
AUTOMATIC LAYERED RECOMMENDATION ALGORITHM
li ying ji ; peng hong ; zheng qi lun ; zeng zuo
..............page:8-10
APPLICATION OF OBSERVER-BASED COLLISION DETECTION IN VIRTUAL ENVIRONMENT WALKTHROUGH
xiong wei ; mao shan jun ; ma ai nai
..............page:6-7,10
RESEARCH AND IMPLEMENTATION OF CHINESE-BRAILLE MACHINE TRANSLATION SYSTEM
li hong qiao ; fan xiao zhong ; li liang fu ; yang feng
..............page:3-6
RECOGNITION OF HMM-BASED CHINESE INSTITUTION TERMS
zheng jia heng ; zhang hui
..............page:1-2,25