Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Electronica Sinica
0372-2112
2002 Issue z1
An Introduction to Feature Interaction Problem
mei hong ; huang zuo ; xing yan ; peng feng
..............page:1923-1927
Status and Development of Formal Methods for Performance Evaluation
lin chuang ; li ya juan ; wang zhong min
..............page:1917-1922
The Overview on Modern Operating System
gu ming ; zhao zuo bin ; guo zuo ; sun jia guang
..............page:1913-1916
Model Checking: Theories,Techniques and Applications
lin hui min ; zhang wen hui
..............page:1907-1912
Technology and Trend of Network Storage
chen kai ; bai ying cai
..............page:1928-1932
A RBAC Based and Policy Enforcement Coordination Model in Open Distributed System
zhang ya ying ; you jin yuan
..............page:2000-2003
A Triangle Mesh Simplification Algorithm Based on Solo-Envelope Controlled
shen zuo xiang ; zou bei zuo ; sun jia guang ; zhu li
..............page:2004-2007
An Intelligent Packet Dropping Mechanism for Active Queue Management
ren feng yuan ; lin chuang ; wei ya ya ; fan yan fei
..............page:1933-1937
PKUAS:A Domain-Oriented Component Operating Platform
huang zuo ; wang qian xiang ; cao dong gang ; mei hong
..............page:1938-1942
An Approach to Detect and to Code ROI of Scanned Document Based on Segmentation
zhu qing sheng ; wang zuo ; fu he gang ; wu zhong fu
..............page:1943-1946
Testing Time Constraints in Network Protocols
chen dong luo ; yin xia ; wu jian ping
..............page:1947-1952
Handover Analysis with Resource Reservation in Hierarchical Cell Structure
wang ying ; wang wei dong ; zhang ping
..............page:1953-1956
A New Multicast Protocol for Dynamic/Mobile Environment
fan rui ; cheng shi duan
..............page:1957-1961
Performance Enhancement and Analysis of TCP over WLAN
zuo hai tao ; lin yu ; cheng shi duan
..............page:1962-1967
An Adjustable Heuristic Algorithm for Multi-Constrained Routing Problem
cui yong ; xu zuo ; wu jian ping
..............page:1968-1972
Research on Performance Evaluation Criteria for IP Network Traffic Control
lin chuang ; zhou wen jiang ; tian li qin
..............page:1973-1977
A New Bandwidth and Delay-Constrained Distributed Multicast Routing
lu hui mei ; xiang yong ; shi mei lin ; yang min
..............page:1978-1981
A Novel Technology of Two Blind Watermarks for Two Images
wang dao shun ; dai yi qi ; liang jing hong
..............page:1982-1985
A Meta-Model Supporting Dynamic Changing Workflow
sun rui zhi ; shi mei lin
..............page:2052-2056
AADX:A New Active Application Descriptor Based on XML for Active Network
zhou yue zhi ; zhang yao xue ; wang yong
..............page:2057-2060
Mobile Agent Based Realization of Service Mobility
yu yu hai ; zhang ping
..............page:2061-2065
Fragile Watermarking Authentication Based on the Perturbation of Reverse Problems
zhao xian feng ; wang wei nong ; chen ke fei
..............page:2130-2133
An Abstract Intermediate Representation in Compilation Systems
dai gui lan ; zhang su qin ; tian jin lan ; jiang wei du
..............page:2134-2137
Research on Robot High-Level Planning Based on Fuzzy Cognitive Map
luo xiang feng ; gao zuo ; wang xiao jia ; xie zhao
..............page:2138-2141
Network Traffic Sampling Measurement Model on Packet Identification
cheng guang ; gong jian ; ding wei
..............page:1986-1990
Research and Design of an Adaptable Replication Protocol
zhao dong ; yao shao wen ; zhou ming tian
..............page:1991-1994
Multi-Dimensional Qualitative Spatial Query Language MQS-SQL
wang sheng sheng ; liu da you ; yang bo
..............page:1995-1999
An Asymmetric Link Bandwidth Measurement Algorithm
lin yu ; zuo hai tao ; wang zhong gang ; cheng shi duan ; wang wen dong ; jin yue hui
..............page:2066-2070
WLFVC:A Distributed Fair Scheduling Scheme for WLAN
zuo hai tao ; lin yu ; sun liang ; cheng shi duan
..............page:2071-2074
Virtual Enterprise and Its Coordination Modelization
chen gang ; jin zhi ; lu ru zuo
..............page:2075-2078
A Single Pattern Matching Algorithm Based on Character Frequency
liu gong shen ; wang yong cheng ; xu huan qing
..............page:2079-2082
Slicing UML Statecharts for Model Checking
dong wei ; wang zuo ; qi zhi chang
..............page:2082-2089
Research and Implementation of Real-Time Middleware
guo chang guo ; wang huai min ; zou peng ; yuan hong liang
..............page:2094-2098
Modeling and Verifying Cryptographic Protocols Using SPIN
shao chen zuo ; hu xiang dong ; xiong yan ; jiang fan
..............page:2099-2101
A CAC Algorithm Based on the Fraction Brownian Motion Envelope Process
deng gang ; ji yang ; zhang ping
..............page:2102-2104
DCT-Based Approach to Progressive Image Coding
zhuo li ; shen lan zuo ; li chao feng ; zhu qing
..............page:2105-2107
A Uniform Framework of Security Model for Mobile Systems
wang li bin ; chen ke fei
..............page:2108-2110
Research of RSVP Extension in Wireless Mobile Networks Based on 3GPP2 Framework
hua zuo ; xiong yan ; cai cheng jie
..............page:2111-2114
Semantic Web-Oriented Specification of Logic Descriptive Primitives
yao shao wen ; yu jiang ; zhou ming tian
..............page:2115-2118
Research on Reference Model of Mobile Agent Systems
tao xian ping ; lv jian ; ma xiao xing ; hu zuo
..............page:2119-2121
Automatic Transform UML Statechart into PVS
lai ming zhi ; you jin yuan
..............page:2122-2125
The Design and Implementation of a Novel 2-DCT/IDCT Architecture
fu yu zhuo ; wang jia fang ; hu ming zeng
..............page:2126-2129
Some Discussion on the Development of Software Technology
yang zuo qing ; mei hong ; lv jian ; jin zhi
..............page:1901-1906
On Distributed Web Crawler: Architecture,Algorithms and Strategy
ye yun ming ; yu shui ; ma fan yuan ; song zuo ; zhang ling
..............page:2008-2011
Semiautomatic Video Object Segmentation by Integrating Various Semantic Information
chen han feng ; qi fei hu
..............page:2012-2015
A Fast Indexing Method on Compressed Images for Internet Applications
li xiao hua ; shen lan zuo ; jia ke bin
..............page:2016-2019
Access Control and Group Key Management of IP Multicast
dai qiong hai ; zuo yi li ; zhang ying
..............page:2020-2023
Solution of VPN on MPLS Backbone Networks
zhao peng ; luo ping ; liu zuo jie
..............page:2024-2026
IP QoS Architecture and Algorithm Based Network Edge Controlling
fan xiu mei ; lin chuang ; wang zhong min
..............page:2027-2031
Software Quality Management Based Process Control
li ming shu ; wang qing
..............page:2032-2035
A Research on XML Based Architecture Description Language-XBA
zhao wen yun ; zhang zhi
..............page:2036-2039
Flexible Workflow Management System Based on Reflection Technology
yao shao wen ; wang min yi ; zhou ming tian
..............page:2040-2044
An Optimal Normal Basis Type Ⅱ Multiplier over GF(2n) for FPGAs
fang bing ; fan hai ning ; dai yi qi
..............page:2045-2048
Development of Software Modeling Tools Based on UML
ma zhi yi ; jiang yan bing ; li jin yu ; dai yao fei
..............page:2049-2051
Experimental Research on Bandwidth Measurement Technology and Method Improvement
xie gao gang ; tang yan xia ; zhang da fang ; li zhong cheng
..............page:2142-2145
A Method of Pattern Recognition Based on Associative Matrix
zhou jing zhou
..............page:2146-2148
The Unified Facet-Based Method to Retrieve Component in Multi-Library
ma liang ; xie bing ; yang zuo qing
..............page:2149-2152
The CMAC Learning Algorithms of Non-Overlapping Receptive Field with Variable Resolution
yang yan li ; cao guang zhong
..............page:2153-2154
Mutation Analysis Based on Constructed Type Algebra Specification
zhou xiao zuo ; zhao bao hua ; qu yu gui
..............page:2155-2157
An Improved Router Packet Forwarding Model
li xiao yong ; liu dong xi ; chen kai ; liang a lei ; bai ying cai
..............page:2158-2160
A High-Efficient Parallel Genetic Algorithm Based on Multi-Level Competition
li bi ; yong zheng zheng
..............page:2161-2162
A Precision Analytical Technology for Software Code
tang ying ; xu liang xian
..............page:2163-2165
Software Complexity and Value of Test Cases Satisfied with Testing Criterion
wu ji ; jin mao zhong ; liu chao
..............page:2166-2168
Using Monte Carlo Simulation to Evaluate the Reliability of Web Services Systems
zhi xiao li ; lu zuo da
..............page:2172-2176
A Fast Approach of Extracting Repeated String from Chinese Text
ma ying hua ; wang yong cheng ; su gui yang
..............page:2177-2180