Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2004 Issue 12
Secure IGMP Mechanism Based on Encrypted Access Token
liu li ; li jin sheng ; hong pei lin
..............page:2186-2189
Survey of Multicast Security Issues
tan yun meng ; yang zong kai ; li shou peng
..............page:2190-2194
A New Logic for the Analysis of Secure Protocols
shi shu dong ; li zhi tang
..............page:2182-2185
125 MHz Mixed-Signal Adaptive Equalizer for Fast Ethernet Applications
li hai hua ; zhu quan qing ; zou xue cheng ; shen xu bang
..............page:2179-2181
Research of A New Cache Technology on RAID
yi fa ling ; xie chang sheng ; wan ji guang
..............page:2173-2178
Lightweight Workflow Engine Based on COM+
lai xiang yu ; zhu yun long
..............page:2169-2172
Evaluation、Research and Development of Performance Benchmark on Network Storage System
fu chang dong ; shu ji wu ; shen mei ming ; zheng wei min
..............page:2049-2054
XML Based Communication Mechanism Serving for Intrusion Detection Agents
shi liang ; peng zuo ; zhuang zhen quan
..............page:2055-2060
Study on Parallel Algorithm Based on PVM
yan xue song ; cai zhi hua ; kang li shan ; chen zuo ping
..............page:2061-2064
New Replication Architecture for Distributed Databases Based on UD-Tree
peng jing ; tang chang jie ; li chuan ; chen an long ; hu jian jun
..............page:2065-2069
Data Race Detection of Software Distributed Shared Memory System
zhang long bing ; wu shao gang ; zhang fu xin
..............page:2070-2074
Heuristic Optimization Algorithm of Resource Load Balancing for Web Cluster
liu an feng ; chen zhi gang ; zeng zhi wen
..............page:2075-2079
Research and Implementation of an Embedded Device Network Management Model Based on Web Technology
han guang jie ; zhao hai ; wang jin dong ; lin tao ; wang ji yong
..............page:2080-2083
Research of Passive Testing and Active Testing
zhang bo ; zhao bao hua ; qu yu gui ; zhang ying tang ; liu gui ying
..............page:2084-2087
System Framework of Cross Layer Energy Conservation for Mobible Ad Hoc Network
xu li ; zheng bao yu
..............page:2088-2090
Dynamic Protocol Conformance Testing Method
lv xin yan ; zhao bao hua ; qu yu gui
..............page:2095-2098
Design and Implementation of a Front End Development Tool Based on Embedded Internet Technology
han guang jie ; wang jin dong ; lin tao ; wang ji yong ; zhao hai
..............page:2099-2101
Efficient Multi-Objective Evolutionary Algorithm Based on Partial Order Ranking
liu min zhong ; zou xiu fen ; kang li shan
..............page:2102-2106
Constraints Based Category Utility and its Applications
he zhen feng ; xiong fan lun
..............page:2107-2111
Research on Optimize Prediction Model and Algorithm about Not Line Chaotic Time Series
jiang wei jin ; xu yu sheng ; sun xing ming
..............page:2112-2115
Study of Flexible Logic Based on Universal Logic
wang wan sen ; he hua can
..............page:2116-2119
Knight's Circuit Problem in a Chessboard with Holes and its Solution
ning an zuo ; ning xuan xi
..............page:2126-2130
Improved Algorithm for Parallel Mining Association Rules
zuo chun dong ; sun shi xin ; fan zhi hua ; hu shi xiang ; che zhu ming
..............page:2139-2142
Algorithm for Mining Association Rules in Distributed System Based on Hyper-Structure
ye fei yue ; wang jian dong ; zhuang yi ; chen hui ping ; zhang you dong
..............page:2143-2147
Using Data Mining Technology Analyse Performances of the Fusion System
liu tong ming ; huang yong feng ; wu xiao jun
..............page:2148-2151
Research on Real-time Components for Controller
yu dong ; lu yan jun ; yang jian gang
..............page:2152-2155
Performance Analysis and Test of Object-Oriented Fault Tolerant System
tian jun feng ; liu yu ling
..............page:2156-2159
Implementation and Performance of Software DSM on SCI
cao xian bo ; hu ming chang ; shi gang
..............page:2160-2163
Algorithm for Detecting Approximately Duplicate Database Records Based on Conditional Probability Distribution
zuo jia jia ; wu gang ; mao han dong ; yang qiang ; deng su
..............page:2164-2168
MAIDS-an Multi-Layer Integrated Distributed Intrusion Detection System for Ad Hoc Network
feng jian xin ; wang guang xing
..............page:2195-2198
Distributed Key Management Scheme for Large and Dynamic Multicast Groups
han xiu ling ; wang xing yu
..............page:2199-2202
Optimizing RSA Key Generating Under Restrained Conditions
tu hang ; li li ; li yuan xiang
..............page:2203-2206
MPEG Video Encryption Algorithm Based on Entropy Encoding and Encryption
lian shi guo ; wang zhi zuo
..............page:2207-2210
Link Layer Automatic Topology Discovery Algorithm Based on AFT
liu yu hua ; yu sheng sheng ; zhou jing li ; li yan hong
..............page:2211-2214
Study of Parallel IDS Load Balancing Algorithm
sun qin dong ; zhang de yun ; gao peng ; zhang xiao
..............page:2215-2217
Modified Scheme for the Up*/Down* Routing Algorithm
ge jian fang ; zhang gong zuo
..............page:2218-2221
Fair Queueing Using Best-Effort Method
li ; he liang ; gao chuan shan
..............page:2222-2225
Performance Evaluation and Improvement of the IEEE 802.11 DCF
wang yan ; huang ben xiong ; zhang fan ; zhu hui zuo
..............page:2226-2231
Speaker Normalization Method Based on the Piece-Wise Linear Frequency Warping
lu zheng ding ; feng hong cai
..............page:2232-2236
TFIDF_NB Co-Operative Training Algorithm
peng ya ; lin ya ping ; chen zhi ping
..............page:2243-2246
Object Identification and Garbage Collection for the Multi-Versioning Scheme
li chun ping ; zuo wan feng ; li gui xiang
..............page:2247-2250
Combining Color,Spatial and Texture Feature for Image Retrieval
ding guo xiang ; wu ren bing ; wang zu zuo ; wang zuo fa
..............page:2251-2253
Adaptive Watermarking Based on Fractal Image Coding in Wavelet Domain
shi lei ; geng hong qin ; hong fan ; hu yu ping
..............page:2254-2257
New Fragile Digital Audio Watermarking Algorithm for Authentication
wang xiang yang ; yang hong ying ; feng chun yang
..............page:2258-2260
Face Recognition Based on Support Vector Machines
liu xiang dong ; chen zhao qian
..............page:2261-2263
Creating Multi-Resolution Representation with Implicit Surface
wang kui wu ; dong lan fang ; chen yi yun
..............page:2268-2272
Research on Improving the Performance of Random Vibration Spectrum Equalization Using Wavelet Analysis
liu xiao yong ; yao xiang hua ; shi ren
..............page:2273-2276
Recoverable Scheme for Off-line Electronic Payment
lang wei min ; yang zong kai ; wu shi zhong ; tan yun meng
..............page:2286-2288