Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2010 Issue 1
Application of MAS in Soil Heavy Metal Pollution Evaluation and Safety Warning
li xiang ; song tao
..............page:217-220,224
Spam Filter Method Based on Discriminative Model
xu zhen ; wang hong guo ; ran yu mei ; yang yu hui
..............page:181-184
Three-Dimensional Scanning Map Generating Algorithm from Single Image
zhang qiao fang ; li guang yao ; ding mei lin ; ding zhi qiang
..............page:22-24,28
A New Target Identifying Method Based on GRT
gao jian ; shi juan ; qin qian qing
..............page:33-35
A 4D Symmetric Chaotic System and Its Application on Image Hiding
ye rui song ; zuo song xian
..............page:93-96
Implementation of BGAN Communication Based on AT Command Sets
wang kun ; jia zhuo sheng
..............page:111-115
Study of Outlier Data Mining Based on CLIQUE Algorithm
xiang xiang qin ; wang cai mei
..............page:124-127,131
Solving the Shortest Path in Parallel of City Road Network
lu zhao ; shi jun ; yu hai zuo ; fang zuo
..............page:82-85,89
An Optimization Method for Spatiotemporal Predictive Motion Estimation
zhang shao zuo ; yu qiong
..............page:104-107
Study on Problems of Security Routing in Cognitive Radio Networks
lin lin ; zhou xian wei ; xue zuo ; liu zhen zhen
..............page:159-162
Design of Remote Data Acquisition System Based on SOPC
ding xiao gui ; liu gui jiang
..............page:229-231
Design and Implementation of a Cross-platform Digital Resource Integrated System
zhou yu hong ; zuo feng xin
..............page:243-246
The Fuzzy Comprehensive Evaluation for Information Security
huang song ; xia hong ya ; tan li qun
..............page:189-192
A Study on Accuracy Evaluation Method for Multi-Label Classifier
qin feng ; huang jun ; cheng ze kai ; yang fan
..............page:46-49
Application of Web Caching Technology in Business System
gao fei ; hou rui chun ; zhou zhi ming
..............page:209-212
Implementation of ARINC 659 Bus Interface Chip Verification Platform
ma ning ; li ling ; tian ze ; xu hong jie
..............page:205-208
A License Plate Location Method Based on Improved Fuzzy Entropy
huang zuo juan ; fang yan ; zhou jie min ; liu bo yang ; wang zhan jun ; tao si zuo
..............page:193-196,200
Research and Application of Flexible Technology for Workflow Management System
shen tu xiao li ; yao ming hai ; tang xing jiang
..............page:120-123
Use of Multi-scale Morphology in Filtering out Noise of Color Image
jia shu xiang ; ren xiao hong ; wang tian wen ; liang li fei
..............page:128-131
Btrust: Management in Pervasive Computing
zhu xiang wei ; chen shan shan ; yang geng
..............page:86-89
XML Object-Oriented Language Characteristic
kuang xu ; liu bo
..............page:54-57
Design and Realization of AdHoc Network Terminal Based on i.MX21
hou zhan sheng ; yao fang wu
..............page:5-8
A Web Information Extraction Algorithm Based on Web Page
meng ren ; shao yan zhen ; yuan ding rong
..............page:197-200
Research for Invulnerability of Ad hoc Network Topologies
hu xing yu ; zhang xue yi ; wu jun ; deng hong zhong
..............page:185-188,192
Study and Application of Data Mining in E-government of House and Real Estate Industry
ji tong lu ; bai yong fei ; wang li song
..............page:239-242,246
Design and Realization of Virtual Network Laboratory System Based on Distributing Object
gong xiang jian ; zou la mei ; long zhong
..............page:116-119,123
A Cycle Data Caching System Based on Dual-Port RAM
li zhen
..............page:201-204,208
A Watermarking Algorithm of Gray Image Based on Histogram Statistical Characteristics
wang shu mei ; fan yong
..............page:177-180,184
Study of PCB Design and Testing Standards in Embedded Systems for Military Usage
song liang ; yuan liang ; man meng hua
..............page:235-238
Segmentation of Remote Sensing Image Based on an Improved Labeling Watershed Algorithm
jiang zuo zuo ; wang shi ; wang bao cheng ; li hui min
..............page:39-42
Analysis Method of Time Array and Two Models of ARMA and GARCH
wu wei ; liu xi yu ; yang zuo ; wang nu
..............page:247-249,封3
Chain-Table Area Filling Algorithm Applied in 3-D Oil Model
di cui ping ; shen zuo chun ; liu shuang
..............page:36-38,42
Research on Prevention Model of Malicious Code in Smart Phone
gui jia ping ; zhou yong zuo ; shen jun ; cai ji wen ; liu gong shen
..............page:163-166
Research on Trusted Computing Platform in EFI Based on Portable TPM
zhang ying ; zhou chang sheng
..............page:167-171
The Research about Grid Simulators
gao qiang ; liu bo
..............page:100-103
A Technology in Fault Diagnosis of Spaceflight Launch Based on State Character
zhang tian ; luo mei ; meng xiao hong ; zhao zong tao
..............page:97-99,103
Concurrency Control Strategy Distinguishing Real-time Transaction Criticality
xu ya mei ; zhang li chen
..............page:90-92,96
A Way of Creating XHTML Page from XML by Introducing dom4j
zhou qiang ; li yu ; xu yan dong
..............page:43-45,49
Application of Office Automation Based on SSH Framework
liu bin ; wang zui
..............page:151-154,162
Application of Support Vector Machine to Atmospheric Pollution Prediction
chen qiao ; cao gen niu ; chen liu
..............page:250-252,封3
Application of Road Extraction in Satellite Images Based on Snakes Model
ding mei lin ; li guang yao ; zhang qiao fang
..............page:71-73
Research of Relation Between Texture Mapping and Illumination Model and Its Application
zhang qun hui ; di xiao ru
..............page:232-234,238
Research and Application of Software Testing Based on Regression Testing
zhong xiao fang ; zhang chun hai ; li yang
..............page:155-158,166
Method and Study of Impacting Factors for Extracting River Channel Network from SRTM DEM Data
yang yong ; xu zuo ; yang jing xue ; wang yun peng
..............page:1-4,107
Propagation Characters Analysis of USB-Disk Virus Based on Dynamic System Simulation
zhu wei wei ; chen wen hui ; yang jie
..............page:172-176
Research and Application of Wrapper Approach to Stock Trend Prediction
liu li ; he xian ping ; yuan wen liang
..............page:213-216
Verification Algorithm of Consistency Based on Time Constraint Petri Nets
liu lin gang ; jiang hao
..............page:58-62
Design and Implementation of Simulation System Based on Sparc Microprocessor
liu xiao yan ; zhou kuan jiu ; xi fang
..............page:147-150,216
A New Architecture Based on Agent
zuo hang ping ; xiao deng hai ; lian xiang lei ; wang ling ling
..............page:50-53,57
Natural Texture Segmentation Algorithm Based on Weighted Features FCM Clustering
zhu ying hui ; jiang yu zhen ; ou yang chun juan
..............page:108-110,115
Simulation Research of Ad hoc Routing Protocols Based on NS
jin wei ; liu fang ai ; wang xiao jie
..............page:63-66
Design and Application of SOA-SSH Layered Architecture
fu geng li ; cao bao xiang
..............page:74-77
Phrase Segmentation for Chinese Text Classification
tian zuo hui ; li cheng ji
..............page:9-13
RFID Anti-collision: Standards , Algorithms and Protocols
wang zuo zuo
..............page:29-32,35
Research on Performance Comparison among Improved AODV Routing Protocols
zhang deng yin ; wang jun ling
..............page:67-70,73
Research on Character Detection for Typical Shellcode Engine
zhang deng yin ; hong fu zuo
..............page:18-21
Research of Campus Data Integration Based on SOA
li xue jian ; he wen hua
..............page:78-81