Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Technology and Development
1673-629X
2010 Issue 8
SOAP-Based Model of Communication Protocol Ontology
geng li li ; yu xue li
..............page:63-66,70
Analysis of Promoting IPv4/IPv6 Transition Strategies
wang li chao ; tang xue wen ; cao zhi tong
..............page:124-127
Application of BP Neural Network in Colliery Drainage Monitoring
zhao shu fang ; chen li chao
..............page:250-252,封3
Stochastic Resonance in Linear System with Dichotomous Noise
qiu qin wei ; jiao xian fa ; zhu liang yan
..............page:239-242
Research and Simulation of Speech Enhancement Algorithm Based on HHT
ru zhen ; li zuo ; chen fei ; yang li jian ; li xiang
..............page:116-119
Implementation of Third Party Logistics Warehouse System Based on Struts+EJB3.0
liu shu jun ; bi li ; wang yan
..............page:184-187,191
Design and Realization of Substation Data Management System Model
yang xiang ; li shao fa
..............page:229-233
Chaos Encryption Algorithm Based on Bit-Plane of Digital Image
cao jian qiu ; xiao hua rong ; lan zhang li ; zhang hong
..............page:133-136
Simulation and Optimization of RED Algorithm
cao zhi bo
..............page:188-191
Correlations Analysis Between Stock Index Time Serials Based on Reconstructed Phase Space
cha chun sheng ; ni zhi wei ; ni li ping ; gong wei feng
..............page:17-20
Embedded Signal Acquisition and Transmission Device for Driven System
liu xiao ming ; han shu ; tan ting qing ; jian fu bin
..............page:243-246
Research and Simulation of Timing Attacks on RSA
tian jun jian ; kou ying zhan ; chen cai sen
..............page:150-153,158
Research of Framework and Algorithm of Semantic Information Retrieval
li gui hua ; wang xue ming
..............page:41-44
Implementation and Application of AFDX-ES SoC Virtual Simulation Platform
tian jing ; tian ze
..............page:192-194,198
Steganographic Method Based on Fractal Dimension
gong zuo ; luo shu fen ; an yan ping
..............page:167-170,175
Wireless Video Surveillance System Embedded Design and Realization
lu qing feng ; mao yu gang ; li lin po ; luo chong liang
..............page:12-16
A Hierarchical Network Security Situation Evaluation Method Based on Grey Theory
li ling juan ; kong fan long
..............page:163-166
Survey of Motif Discovery Algorithms in Protein-Protein Interaction Networks
kong de sheng ; he jie yue
..............page:1-4,8
Design and Implementation of Moving Target Detection Video Surveillance Software
guo xu ; zhang li jie
..............page:199-202,207
A New Ant Colony Clustering Algorithm Based on Feature Weight
li ling juan ; li bing
..............page:67-70
The Study of Architecture for XML Security
yang ling ; zou juan
..............page:137-141
Cloud Computing Model Applicable to Rich Client Applications
sun fang ; chen yun fang ; lin hang feng
..............page:96-99,183
An Early Defect Prediction Approach for Object Oriented Software
zhang ; yuan zhi hai ; jiang hai yan
..............page:37-40,44
Research on P2P Searching Technology Based on Semantic Division
sun ming song ; liu jie ; li sheng li
..............page:75-78
Application of Access Control List on Router in Network Security
pan wen zuo ; zhang yun
..............page:159-162,166
A Histogram-Based Non-Linear Distortion Measurement and Correction Methods
liu xi yun ; yang yang ; ming jun
..............page:9-11,16
Firework Animation Design Based on Particle System
ge fang ; zhang cheng ; wei sui ; cheng hong
..............page:180-183
Analysis and Implementation of AFDX-ES\'s Determinism
lou xiao qiang ; tian ze
..............page:56-58,62
Research and Design Multimedia Services Platform for Museum
li rong ; zou kun ; xu xiang
..............page:234-238
Integrate Control Feedback Model Based on Delay Worm Propagate
yin an sheng
..............page:146-149
Design and Implementation of a Self-Service Portal Based on WebService
tang zhi cheng ; fu xiu fen ; dong chong jie
..............page:221-224,228
Design and Implementation of Power Management System Based on SoC-FC
li xiao yu ; tian ze ; wang quan ; cai ye fang ; li pan ; yang hai bo
..............page:247-249,封3
Analysis and Design of Log Accounting and Analyzing System Based on SSH
ji chao yang ; tang hong xi
..............page:212-216
Image Segmentation Method Based on Top-Hat Transformation and FCM Clustering
zhao wei ; wang xi chang ; li xiao han
..............page:52-55
Design and Implementation of Database Integration System Based on Ontology
han song ; cao bao xiang
..............page:104-107
Test Technology in Chip Operating System
xie jing jing ; li dai ping ; guo zuo
..............page:21-24,28
Key Distribution Algorithm Analysis in Wireless Sensor Network
di shuo ; he meng yun
..............page:142-145
Design of General FFT Processor Based on FPGA
zhang yu ; fang kang ling
..............page:87-90,95
Formal Analysis and Improvement of IKEv2 Protocol Based on Extended Spi Calculus
han ming kui ; pan jin ; liu qiong ; li bo
..............page:154-158
Research and Practice of Web Services Based on XFire and Axis
bai wen juan ; ma guang si
..............page:120-123
Research and Design of E-police Red Light Runners Front-end Capture System
liu yong xiang ; fang kang ling ; xiong li
..............page:208-211,216
Research on Automatic Generating Test Case Method Based on UML Activity Diagram
su cui cui ; wang xiao jun
..............page:49-51,55
Application Studies on Command Pattern of Eclipse GEF
liu xu bin ; wang liang ; zuo you peng
..............page:100-103,127
An Improved Algorithm for 3D-SPIHT Based on Asymmetric Tree Structure
wu de ling ; hu dong
..............page:79-82,86
Realization of Network Traffic Control System in Open-Source Router
huang wen zuo ; zuo wei
..............page:225-228
Construction of Maritime Ontology OWL-Based
liu ning ; shao bin ; zhang yu
..............page:59-62
Improved Algorithm of Linked List Based Insertion Sort
chen li jing
..............page:33-36
Research on Malware Code Propagation Effect Control Technology
cao ying ying ; wang shao zuo ; wang ru chuan ; zhang wei
..............page:128-132
USIM Card File System of Dynamic Memory Management
ma hai feng ; li dai ping ; yin wei ; ou yang xiao xing ; li chun feng
..............page:71-74,78
Research on Joint Channel Assignment and Routing Protocols for Wireless Mesh Networks
liu feng ; zhang qing ; xia hong fei
..............page:29-32,36
A Precomputed Slicing Based Volume Rendering Technique
gong zhong ; tang jie ; wu gang shan
..............page:5-8
A Maintaining Algorithm for k-Connected m-Dominating Sets in Wireless Mobile Networks
qin yun long ; yu ji guo ; wang kang
..............page:83-86
A Lossless Watermarking Algorithm for CT Image
gao zhong wen ; zhang zuo ; yu fei
..............page:171-175
An Access Control Scheme for Pervasive Computing
zhu yi xia ; sun dao qing ; shen zhan
..............page:91-95