Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2008 Issue 12
Neighbor Words Selection Algorithm on Imbalanced Data
SUN Xia;ZHENG Qing-hua
..............page:2334-2338
Method of Identifying Chinese Personal Name Using Statistical Semantic Element
YU Zu-bo;MA Jian-jun
..............page:2339-2343
Model Session Variability in Speaker Verification
LI Yi-jie;GUO Wu;DAI Li-rong
..............page:2344-2347
New Evaluation Criterion of Data Allocation Algorithm in P2P Media Streaming System
XU Jie-bin;HE De-zhao;LU Jin-hao
..............page:2348-2352
Semantic Information Extraction of Video Using Ontology
ZHANG Jing;MA Jie
..............page:2353-2359
On-card Java Bytecode Verification Algorithm Using CFT
WU Jun-jun;MA Xin-long
..............page:2360-2364
Design and Implementation of the Tool Rest Simulator
YANG Hui-juan;LIU Wei;HE Fang
..............page:2365-2368
Vector Symbol Method for Time Series Data
ZHONG Qing-liu;CAI Zi-xing;YANG Xian-fen;CHEN Ming-quan
..............page:2329-2333
Study on Spatio-temporal Data Model About Feature-version
HAN Min;ZHAO Song-ling;LI Zheng
..............page:2324-2328
Parallel XML Databases Placement Model Based on Adaptive Ant Clustering of Chaos
LIU Bo;YANG Lu-ming;XIE Dong;DENG Yun-long
..............page:2319-2323
High Dimensional Evolutionary Strategy for Tuning the Structure and Parameters of a Neural Network
XIAO Chi-Xin;CAI Zi-xing;WANG Yong
..............page:2313-2318
Presentation of Relative Partition Granularity of Attributes Reduction for Decision Table
FENG Qin-rong;MIAO Duo-qian;CHENG Yi
..............page:2305-2308
Attack Target Selection of Image-aided Terminal Guidance System
YUE Dong-xue;HUANG Xin-sheng;TAN Hong-li
..............page:2296-2300
Novel Algorithm for Low-dose CT Image Enhancement Based on Local Feature Analysis
ZHANG Guo-dong;YAN Pei-yu;ZHAO Hong
..............page:2291-2295
Method for Real-time Punch Type Recognition by Motion-trace Vecotrization
JING Shu-xu;HE Fa-zhi;LIU Hua-jun
..............page:2285-2290
Optimized Design of Low-bandwidth Full Search VBSME Architecture
JIN Tao;FU Yu-zhuo;HE Wei-feng
..............page:2281-2284
Research and Design of a Four-stage Reconfigurable ALU in Vocoder
JING Tao;WANG Qin
..............page:2277-2280
Algorithm of Mining Continuous Frequent Paths Based on Web Logs
REN Yong-gong;FU Yu;ZHANG Liang
..............page:2272-2276
Research of the Distributed Security Detection System in WLAN
XING Chang-ming;LIU Fang-ai
..............page:2194-2198
Towards a Self-adaptive,Efficient and Low-cost Maya-pyramid Like P2P Overlay
LI Deng;CHEN Zhi-Gang;LIU Hui;Athanasiso Vasilakos
..............page:2182-2187
Security Routing Mechanism of Ad Hoc Network Based on Dynamic Token Escrow
HUANG Chen;WANG Fu-rong;MO Yi-jun
..............page:2177-2181
Method of Verifying the Time Constraints in Workflow Dynamically
SHI Xiang-bin;GAO Yang;XIAN Hong
..............page:2268-2271
Clustering Algorithm for Ubiquitous Data Stream Mining Based on Slip Window
SONG Bao-yan;ZHANG Heng;YU Yang;XI Lina;WANG Da-ling
..............page:2262-2267
Towards a New Dynamic Deadlock Detection Method for Java Concurrent Programs
MAO Cheng-ying;LU Yan-sheng;ZHANG Jin-long;LU Chao
..............page:2258-2261
Class of Methods for Calculating the Threshold of Local Outlier Factor
GU Bin;WANG Jian-dong
..............page:2254-2257
Reflective Real-time Integrating Middleware
HUANG Jing;LU Yan-sheng
..............page:2247-2253
Research and Development on Data Stream Mining
ZHANG Tian-cheng;YUE De-jun;YU Ge;LIN Shu-kuan;GU Yu
..............page:2241-2246
Semantics-based Malware Detector for Obfuscated Malware
GAO Ying;CHEN Yi-yun;HUA Bao-jian
..............page:2233-2240
Design Approach for Message Blocks of Security Protocol by Using State Binding
TAO Hong-cai;HE Da-ke
..............page:2229-2232
Design and Performance Analysis of a Kind of Industrial Ethernet Protocols
JI Shun-ping;LU Yu-ping
..............page:2224-2228
Prediction Based Adjusting Dynamically Fast Handover Algorithm for MIPv6
PENG Jun;ZHANG Wei;LI Chun-ming;YAN Xu-ying;ZHU Teng-fei
..............page:2213-2217
Optimization of AODV Routing Protocol Under Multi-rate Circumstance
LU Song-feng;LIU Fang;HU He-ping;WU Ya-min
..............page:2207-2212
Insecurity of "Ping-Pong" Quantum Communication Protocol
HUANG Da-zu;CHEN Zhi-gang;GUO Ying
..............page:2202-2206
Text Information Hiding Detecting Algorithm Based on Statistics
CHEN Zhi-li;HUANG Liu-sheng;YU Zhen-shan;LI Ling-jun;YANG Wei
..............page:2199-2201