Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2004 Issue 8
Context-Based Triggered Task Model in Pervasive Computing
luo jun wei ; qin xiao ; chen si gong
..............page:1542-1545
Anomaly Detection Based on Hidden Markov Model
tan xiao bin ; wang wei ping ; zuo hong sheng ; yin bao qun
..............page:1546-1549
PC Remote Control - the Technology and Application
li ning
..............page:1554-1557
Research on the Object Oriented Remote Supervisory Control Framework
liu ming ; shi ren
..............page:1558-1561
Research and Realization of Fuzzy BP Neural Network for Target Station Direction-Finding & Locating
wang su fen ; yang guang ming ; chen jian
..............page:1562-1564
Implementation and Design of a Bluetooth Simulation Software
xu ming ; wang zuo ; hou zi feng ; song jian ping
..............page:1565-1568
Applying Multiple Query Optimization in Mobile Database
yang xiao yu ; yue li hua ; liu jian ping
..............page:1538-1541
Organizing Broadcast Data Based on a Huffman Index Tree in a Mobile Environment
yang jin cai ; liu yun sheng ; liao guo qiong
..............page:1534-1537
Designment and Implementation of Dynamic Route in WMS
lu ben jie ; wei shou ping ; yu bo
..............page:1530-1533
Role-Oriented Workflow Modeling Based on Concurrent Language ConGolog
yang dong ; wang ying lin ; zhang shen sheng
..............page:1525-1529
Research on the Parallel Pipeline Policy of Net-Raid Based on Straming Media
deng yu hui ; zhang jiang ling ; feng dan
..............page:1522-1524
Quantitative Study of Pipeline Management Strategy in Micro-Processor Design
wan lv ; li fei ming ; chen jin
..............page:1517-1521
Architecture of a Configurable Two-Dimensional Adaptive Prediction Filter Used for Small Object Detection
sang hong shi ; shen xu bang ; chen chao yang ; fu yong
..............page:1513-1516
Multi-Threaded Visualization Technique for Large Scale 3-D Scene
chi zhong xian ; yang bai xin ; gai yin ; di wei
..............page:1510-1512
Rotation-Invariant Face Detection in Color Images Based on Multiple Classifiers
li shi jin ; zhu yue long ; wang zhi jian
..............page:1506-1509
Method to Image Edge Extracting Based on NURBS Fitting
sui lian sheng ; jiang zhuang de
..............page:1502-1505
Cryptography with no Transmission Error or Cipher-Text Extension Based on Orthogonal Table
wang rui min ; hong fan ; chen zhuo
..............page:1499-1501
Public Key Method for Watermark Based on Dual-Transform Technique
hong fan ; shi lei ; xia jing ; luo zuo
..............page:1495-1498
Wavelet Tree Quantization Watermarking Based on Human Visual System
hu yu ping ; sun wei ; shi lei ; han de zhi
..............page:1491-1494
Category-Based Crossing Segment Ambiguity Treatment of Chinese Document
li kai ; zuo wan li ; lv wei
..............page:1486-1490
Knowledge Bases in English-Chinese Machine Translation System ECT
lv xue qiang ; guo jun ; yao tian shun
..............page:1482-1485
Bottom-Up Computation of Data Cube with Hierarchy Along Dimension
feng yu cai ; xiang long gang
..............page:1477-1481
Application of Un-Continued Universe of Discourse Fuzzy Control Method in Self-Balance System
tu yun wu ; zhang xian zhou ; zhang zhi jian ; zhang pei ren
..............page:1473-1476
New Approach for Interpolative Reasoning with Multi-Dimensonal Sparse Fuzzy Rules
lu zheng ding ; fu hai dong
..............page:1468-1472
Evolutionary Algorithm for Constrained Optimization Using Nondifferentiable Exact Penalty Functions
zhou yong hua ; zhang xu ; mao zong yuan
..............page:1464-1467
Integrated Modeling Method and Intelligent Optimization Algorithm for Lead-Zinc Sintering Process
du yu xiao ; wu min ; zuo li hui ; gui wei hua
..............page:1458-1463
Research of the Real-Time Versions of Linux System and Real-Time Performance
lin zuo ; cai guang qi ; li feng xian ; zhong li ming ; guo rui feng
..............page:1454-1457
Formal Method Integrating Petri Nets and Z
hu jin song ; zhao bao hua ; guo xiong hui ; qu yu gui
..............page:1450-1453
Survey of Multicast Technologies
ye bao liu ; gu tie cheng ; lu sang zuo ; chen dao xu ; xie li
..............page:1409-1414
Content-Based Web Caching
zhang xing jun ; qian de pei ; liu zuo ; zhu li ; li yue
..............page:1415-1419
Research on Fixed Channel Assignment Method in Cellular Systems
li man lin ; wang yu na ; wen ying you ; du lei ; wang guang xing
..............page:1420-1423
Method of Vulnerability Evaluation Based on Fuzzy Data Fusion
chen xiu zhen ; zheng qing hua ; guan xiao hong ; feng li
..............page:1424-1427
Web Caching System Performance Analysis Based on Concentrated Management
jiang cai ping ; li zi mu ; yang feng jie
..............page:1428-1431
Image Parallel Fourier Analysis Technology Based on LS MPP(2):Realization and Performance Analysis of Algorithm
li jun shan ; li jian jun ; jiao kang ; ye xia ; shen xu bang
..............page:1432-1436
Novel Periodic Task Model of Control System and its Optimal Scheduling Algorithm
liu huai ; fei shu zuo ; shi guo sheng
..............page:1437-1441
QoS-Based Multicast Routing Algorithm Based on DBOA
yao jin tao ; lin ya ping
..............page:1446-1449