Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Wuhan University of Technology
1671-4431
2009 Issue 18
A Minimum Generalized Hamming Distance Algorithm for Attribute Reduction
QIN Hai-ou;TANG Ke-ming
..............page:135-137,150
Research on Hierarchy Model of Metadata in Learning-Resource Grid
CHEN Zong-yang;ZHONG Luo;SONG Hua-zhu
..............page:151-155
An Architecture of Big-Windowed Stream Cube
JIN Xin1;GAN Liang2;ZHOU Xiong3
..............page:112-116
Network Vulnerability Assessment Based on Risk Theory
LIU Xue-jiao;MA Nian;XIAO De-bao;ZHAO Ning
..............page:39-42
Hierarchical Data Placement Policy in Large-Scale Network Storage Systems
LIU Chun-xiao;LIU Fang;CHEN Tao;XIAO Nong
..............page:128-131
Intelligent and Visualization of Component Assembly
ZHOU Yan;WANG Shun-yan;LIU Wan-chun
..............page:87-90
Research on Fault Detection Mechanism of Topology-aware ALM
CUI Jian-qun1;WU Li-bing2;HE Ting-ting1;XIAO De-bao1
..............page:16-19,67
Research and Implementation on the Common Mapping Algorithm of Components Description
WANG Shun-yan;ZHANG Mei-fen;NING Hai-bo;QIU Chang-cheng
..............page:83-86,90
Optimized Design for Dynamic LOD Virtual Terrain Using Quad Tree
ZOU Cheng-ming1;LI Yin1;LU Yuan2;CHEN Jin-rui1
..............page:182-185
Gait Representation with the Non-linearity Correlation Information
WEI Su-yuan1;2;NING Chao2;GAO You-xing1
..............page:147-150
Concurrency Control of Embedded Mobile Real-time Database System
LU Yan-sheng;ZHONG Xian
..............page:132-134,146
An Algorithm of Video Watermark Based on DCT Domains
ZHENG Peng1;2;LIU Min-zhong2
..............page:9-11,50
The Research of JXTA Architecture Based on Mobile Agent
WANG Hua-deng;DENG Zhen-rong
..............page:186-189
Streaming Media Transmission Framework Based on EMIPLIB for Research and Implementation
XU Qin-qin;TIAN Dan;TIAN Zhong
..............page:190-194
A Strategy of Dynamic Caching in Cellular Mobile Computing Systems
MA Xiao-pu1;LI Lian-cheng2
..............page:175-178
Research and Implementation of IN/Internet Networking Service
MA Cheng-qian;ZHANG Tian-ping
..............page:72-75
Research on Web Service Selection Based on QoS and Reputation
JIA feng;WEN Zhi-cheng;LI Chang-yun;ZENG Mao-lin
..............page:5-8
A Model Analysis for Load Balancing Based on Object-Based Storage System
LIU Qun1;FENG Dan2;LI Jian2
..............page:105-107
Concept Distribution-based Image Semantic Annotation and Retrieval
LUAN Xi-dao1;2;XIE Yu-xiang2;HAN Zhi-guang2;TAN Yi-hong1;CHEN Zhi-ping1;SHEN Jin-rong1
..............page:172-174
Business Process Oriented E-Government Application Integration
WANG Hong-bo;BEN Ke-rong
..............page:51-54
Design and Implementation of Data Collection and Serial Communication Prototype in Structural Health Monitoring
SONG Hua-zhu;XIA Tian-yang;CHENG Cong;ZHONG Luo
..............page:63-67
Optimizing of Model Database in Visual Simulation System
ZONG Mei-ling;TONG Xiao-nian
..............page:102-104
An Energy-aware MAC Protocol in Wireless Ad Hoc Networks
ZHU Xiang-xian1;FENG Guang-zeng2
..............page:1-4
Randomized Cache Reliability Multicast Algorithm
LU Hui;HE Yan-xiang;HUANG Chuan-he
..............page:24-27,75
A Threat-centric Model for Information Security Risk Assessment
XIAO Min1;FAN Shi-xi2;WU Zheng3
..............page:43-45
A Distance Class Based on Soft Switch Technology
ZHANG Li-min;ZHANG Jun;XIA Hong-xia
..............page:80-82,71
RRTDMA MAC Protocol for Tactical Ad Hoc Network
YU Wei-bo;WANG Hai;NIU Da-wei
..............page:20-23,199
Scheduling-based Efficient LDPC Decoding Algorithm
YANG Ye1;ZHANG Zhi-ping2;LIAO Wei3
..............page:46-50
A New Bayesian Network Based Approach for Video Static Semantic Detection
HAN Zhi-guang1;3;Wu Ling-da1;XIE Yu-Xiang1;Luan Xi-Dao2
..............page:179-181
Real-time Smoking Simulation Based on GPU Acceleration for Virtual Endoscopic Surgery
YUAN Zhi-yong;DING Yi-hua;ZHANG Yuan-yuan;ZHAO Jian-hui
..............page:55-58
Implementation of Asynchronous Handshake Protocol Based Power Randomization Technique
DAI Yu-tong1;YUE Da-heng1;LI Shao-qing1;ZHANG Min-xuan1
..............page:28-31
Local Complexity Based Remote Image Segmentation
YAN Cheng-xin
..............page:160-163
Analysis of User Behaviors for Large Scale File Sharing Systems
ZHANG Cheng-bin1;TU Xu-ping2
..............page:32-34
Research on Multi-Agent System Cooperation based on Employment Relationship Network
CHEN Wei1;WANG Hui2;HE Yan2;GAO Peng-yi2
..............page:138-141,155
Breed Genetic Algorithm and Application of Image Restoration
MA Guo-qiang;LIU Juan
..............page:156-159,163
A Distributed Conference Key Management Scheme Based on Threshold Cryptography
ZHENG Ming-hui1;2;CUI Guo-hua1
..............page:12-15,54
Research on Bearing Capacity Prediction Based on the Intelligent Method
PENG Wen-tao1;WU Jun2;CHEN Ying-qin1;XIAO Xuan2;ZHONG Luo2
..............page:117-119,123
Research on OLAP and Multidimensional Visualization Based on Data Warehouse
ZU Qiao-hong;GAO Hai-yao;WANG Hui
..............page:108-111,116
An Improvement Program on High Priority Two-Phase Locking Protocol
XU Xin-hua1;TANG Sheng-qun2
..............page:99-101
Cluster-based Key Management Scheme for Ad Hoc Networks
WANG Xin-ying;WU Zhao;WANG Yi
..............page:35-38
Area and Power Aware in Network on Chip Mapping
ZHENG Fei1;XU Ning1;GUO Zhen-ping2;ZHENG Xing2;CHEN E1
..............page:164-167
A Trust Computing Model Based on Multi-step Propagate Mechanism in Grid
HE Yan1;2;ZHNEG Chun-Ying1
..............page:168-171
Research on Grade Division Policy in Hiberarchy Trusted Network
SHAO Dan;CHENG Xue-jun
..............page:200-204