Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2010 Issue 3
Research on Techniques of Data Collecting for Web Usage Mining
shao lan jie ; li guang zhong
..............page:225-229
Study of SMB Protocol-Based High-speed I/O Technology for HD Set-top Box in LAN
wang zhao hong ; zhang qin yan
..............page:159-162
Study on Approach to Enhance Coronary Artery in Angiograms
li chun lin ; yang jie ; yang shi xing
..............page:188-190,194
Embedded Software Testing Platform for Gun Fire Control System
han wei jie ; yan hui ; dong zheng hong
..............page:180-183,187
Data Transferring among Different Structure Data Source Based on .NET
shu qing lu ; wang qing xin
..............page:109-112
A Kind of Hierarchical Search Mechanism in the Resources Grid
wang xiao jun ; he qing
..............page:63-66
Design of Intrusion Tolerant Voting Mechanism Based on Probability Strategy
fei hong xiao ; li qin xiu ; li wen xing ; zuo si ming
..............page:136-139
A Research for Company Automatic Negotiation in Secondary Supply Chain Based on Agent
shen zuo ping ; zhuang ya ming
..............page:121-124,158
A Technology of Stereo Scene Matching and Its Application
zhang su zuo ; li zhu lin ; zhao zong tao
..............page:221-224
Research on Ray Casting Algorithm Based on OpenGL
jiang zhao yao ; lu you ; jia guang zhong ; zuo yong gang ; xu zhen
..............page:218-220,224
Semantic Web Services Composition Based on Weighted Planning Graph Algorithm
dai xue mei ; jiang hao
..............page:67-70,75
Electronic Medical Record Retrieval System Based on Ontology
zhao yang ; li wan long ; bai jie ying
..............page:211-213,217
Design and Realization of Peer-to-Peer Web Spider
zhang lin cai ; zhang yan ; wang hong xia
..............page:195-198,202
An Image Segmentation Algorithm Based on Adaptive Initialization FCM Clustering
wang xing ; feng zi liang
..............page:101-104
Design and Implementation of Eight Puzzle Problem Based on Genetic Algorithms
he ji wen ; song cheng xiang ; liu hong
..............page:105-108
Modeling and Analysis of Flight Management System with AADL
tang xiao ming ; su luo hui ; song ke zuo
..............page:191-194
Analysis and Implementation of IP Phone Gateway
lin xiao peng
..............page:199-202
Design and Implementation of Light-Power Video Conference System Based on IPv6 Multicast
zuo wen yao ; wang zhi xiao ; bai hai tao ; chen hai rong
..............page:184-187
Research on File System Transparent Encryption Techniques
wang quan min ; zhou qing ; liu yu ming ; zhu er fu
..............page:147-150
Swap Based on Hot Standby and Its Application in High-end Router
zhang yu feng ; sun zhi xin
..............page:172-175,179
A Wavelet Domain Adaptive Blind Watermarking Algorithm with Error Correcting Encoding
liu hui ying ; zhang zheng bao ; wen jia fu ; li zhan de
..............page:140-142,146
An Improved Edge Detector Using the Support Vector Machines
li lei ; zhang jian min
..............page:125-127,封3
Studies on Some Bionic Optimization Algorithms
xiong wei ping ; zeng bi qing
..............page:9-12,16
Simulation of the Wireless Network of Controlling Measurement of Material Position in NS2
mao gen yong ; liu cheng an ; lan rui li
..............page:163-166
Researches to Gain Stabilizing Regions of PID Controller
fang bin
..............page:203-206,210
Modeling Research on Equipment Battlefield Repair System Based on Petri Net
weng hui ; xu hai zhu ; chen xiao shan
..............page:176-179
Test of Business Process Based on Genetic Algorithm
zhang lei ; wang xiao jun
..............page:155-158
Research on Method of Session-Based P2P Network Traffic Identification
gong bo ; wang ru chuan
..............page:5-8
Design of Image Transmission from Scanner under Terminal-Server
lu pei xin ; zhao guo an
..............page:28-31
Hammerstein Networked Predictive Control System with Dead-Zone Input
wang lei ; shi wu xi ; guo wen cheng ; guo li jin
..............page:246-249
Design of ETL System for Drilling Data Warehouse
liang mei hong ; zhang nan zuo ; li jian ; wu dong ; hu yong quan ; yang jing
..............page:250-252,封3
A New Human Hand-Image Tracking Method
hong hong ; zhu xiu chang
..............page:88-91
Design and Implementation of File-Sharing System Based on P2P
fan hui bo ; zhang xin you
..............page:48-51,55
Multi-focus Image Fusion Scheme Based on Wavelet Transform
yang ya ; wang zuo ; zhang su lan ; guo fei fei
..............page:56-58,62
Application of Remote-Thread Injection Technique on Monitor System
wang zuo ; lou yuan sheng
..............page:207-210
An Improved Artificial Fish-Swarm Algorithm of Solving Clustering Analysis Problem
wang hui ying ; zhang yi gang
..............page:84-87,91
Intrusion Detection Technology Research Based on Homing-Constraint Rule
li lei ; ding ya li ; luo hong qi
..............page:143-146
Application and Research on Hopfield in Computer Programming
zhou ai wu ; xia song
..............page:52-55
Distance Transformation-Based Liver Embolization Treatment Simulation
luo long ling ; xia yong xing ; cheng ming
..............page:214-217
Cross-Compiling and Implanting of MiniGUI Based on Embedded Linux
ren qiang ; peng rui
..............page:13-16
Development and Implementatin of Graduation Project Management System Based on B/S Mode
guo xiu juan ; wang chun guang
..............page:239-242
A Trust Model with Classified Decision Attributes
li kun ; jiang hao
..............page:36-39,43
Research on Campus Network Upgrade Based on IPv6
luo hui qiong ; nie rui hua ; zheng kai
..............page:132-135,139
A New Feature Selection Method in SVM Text Categorization
jiang he ; chen li ya
..............page:17-19,23
Pseudo-Randomness of a Class of Generalized Self-shrinking Sequences
sun guo hua ; li fang fang
..............page:96-100
Design and Implementation for Cooperation Office System Based on Role-Based Access Control
lu chuan ; hu xin jie ; ji feng
..............page:230-233
A Blind Watermarking Technology Based on Lifting Wavelet Transform
jia zhu zhi ; zhu hong yu
..............page:151-154
A Detection Algorithm for Spatial-Domain Stego Based on M C Model of Neighborhood Correlation
zhang zheng bao ; ma zuo ; liu yi chuan ; yang xiao wei
..............page:76-79,83
Automated Testing Based on STAF Framework
zhang lei ; wang xiao jun
..............page:116-120
Real-time Performance Test Methods for Real-time Multi-thread Based Linux/RTLinux
cao ting fa ; ji hua ; ma jiang ; fu yao guo
..............page:113-115,120
A Conceptual Framework of Inter-Enterprise ERP
wang zuo ; ma jin ping ; zhang lei
..............page:40-43
AVL Tree Design and Implementation Based on Balancing Factor
du zuo zuo ; zhang yi yan ; zuo chun liu
..............page:24-27,31
Research of Deformation of Soft Objects in Haptic Rendering
cai wei ; kuang ying hui
..............page:20-23
Research of Chinese Full Texts Inverted Index Based on Lucene
zheng zuo zeng ; lin shi ping
..............page:80-83
A Scheme to Node Cooperation Based on Reputation System in Mobile Ad hoc Networks
wang li ; wu meng ; chang li
..............page:32-35