Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2004 Issue 12
Research and Design of PRBAC-based Host Security Safeguard in Mobile Agent System
niu xin zheng ; xiong jie ying ; zuo ; zhou ming tian
..............page:129-132
Constructing for the Data Warehouse of Grain Trade
bai hong tao ; sun ji gui ; wang xiao tao ; zuo wan li
..............page:214-217
A New Forward-Security Digital Signature Scheme
huang yan qu ; xie dong qing
..............page:133-134
A New Model for Electronic Software Distribution and Copyright Protection
cheng qing feng ; xie duan qiang
..............page:135-136
Double-factor System of Identity Authentication Based on MD5 Algorithm and Schnorr Protocol
wang tong qing ; lu jun ; hua jin ; ni shui ping
..............page:137-139
Role and Context-Based Access Control Model
xu ren zuo ; zheng hong jun ; chen bin ; ma ruo feng ; gao jun peng
..............page:140-142
An Algorithm of Text Steganography
bai jian ; xu ying zuo ; yang yu
..............page:147-148
Design of Several Mesh Edit Tools
li lei lei ; mo guo liang ; zhang san yuan
..............page:149-151
An Effective Approach of Binocular Dynamic Calibration
zhang chun sen
..............page:152-154,165
A Rapid Hole Filling Algorithm for Arbitrary Shape
zhang yan ; zeng li bo ; wu qiong shui ; xie wen juan
..............page:155-156,136
Study on Modification and Actualization at Algorithm of Gray Image Manipulation
wang guo quan ; zhong wei bo
..............page:175-176
Application of a New Approach to Locating and Segmentation of License Plate
cui mao qian ; liu jian guo ; liu wen qing
..............page:177-178,234
Data Mining Application Study in Analyzing Source of Students
cai yong ; han yong guo ; liu zi wei
..............page:179-181
Meta-database Design for Flood Control General Databases Integration
li ding fang ; kou ji sheng
..............page:182-184,203
Standardization of Page Service in Grid System Using XSLT
zhang wan jun ; zeng zuo ; dong wei ; li guo qing ; liu ding sheng
..............page:185-186,256
Deeply Parse the Application of ASF in the Multimedia Synchronization
hu yan ; wang gang
..............page:204-205,208
Several Methods of Solving Data Conflict in Data Cleaning
tang xin yu ; chen hai yan ; li xiao ; zou guang xing
..............page:209-211,225
Realization of the Separate and Parallel Processing in B/S Development by Using Template
wang yao xi ; wang li qing ; xu yong yue
..............page:212-213
Achievement of One Organ Office Automation System Based on B/S Structure
liu zi yu ; wang qiao ling ; liang pu xuan
..............page:218-220,242
XML Document Access and Store Technology Based on Oracle XML DB
liu liang jun ; shu qin
..............page:221-222,261
Design and Research of SIP-VoiceXML Browser
gao feng ; lu shi wen
..............page:223-225
Application of ADO Stream Component Object in Picture Uploading of Web Information Publishing System
xu sheng xiang ; he li yuan ; huang wei ; chen jie
..............page:226-228
Publication of Web Map Based on.NET and GeoMedia WebMap
liang jian ; li man chun
..............page:229-231
Research and Application of CRM System in the Automotive Matching Enterprises Based on JXTA
zhang yang ; zhang yi sheng ; liang shu yun ; li de qun
..............page:232-234
Design of Graduate School MIS Based on Component
pang yan hong ; dong yi sheng ; chen dai zuo
..............page:235-236,239
Design and Implementation of Remote Intelligent Management System for City Energy Resources Based on Wireless Network
luo hong ; long ning ; zhang feng li ; zhou ming tian
..............page:237-239
Research and Development Based on Large Datasets Batch Processing
wu jian ping ; yang jian guo
..............page:240-242
Design and Implementation of Universal Backup System
xue qin ; mao yu guang
..............page:243-245,248
Automatic Extraction of ROI in Medical Image
he chu ; peng wen min ; li ji xing ; liao meng yang
..............page:157-159,162
Face Detection Based on Skin Color and Independent Component
gao quan xue ; pan quan ; cheng yong mei ; zhang hong cai ; wang yong
..............page:160-162
A Gateway Model Based on VPN for Secure E-mail System
an ji yao ; yu fei ; zhu miao sen ; li ren fa ; he jing
..............page:123-125
Study on Gabor Filter-based Handwritten Chinese Character Feature Extraction
jin lian wen ; zuo jian zuo
..............page:163-165
Automatic Text Detecting Based on Edge Information and LH
li chao zuo ; yu ying lin
..............page:166-167
Level Bars Calibration Based on Image Processing
wei zuo ; zhu shan an
..............page:168-169,172
Flexible Cloth Simulation Based on Self-Adaptive Runge-Kutta Method
zhang zong guo ; luo xiao nan
..............page:170-172
3D Graphical Modelling and Simulation of IGM Arc-welding Robot Station
liu yong ; wang ke hong ; yang jing yu
..............page:173-174,192
Research and Algorithm of Flash File System
shen jian hua ; luo yue zuo
..............page:246-248
Delphi/SQL Server Transaction Processing Programming Technology
zhang rui chang ; xiang shi yong ; zhao zuo zheng
..............page:249-250
Access Policy for Integrated Admission over CDMA Network
wang ai min ; yuan sen zuo ; wu jing
..............page:251-252
Component-based Network Protocols on Communication Device
cai yan wen ; chen tian zhou ; wu chao zuo
..............page:253-256
Comprehensive Network Topology Discovery's Universal Algorithm and Technology Realization
you wei zhao ; liu qiang ; wei wei ; chen yu jian
..............page:257-261
A Computer Aided Process Planning System Based on Web and XML
qu su chao ; zhang shi jie
..............page:187-189
Visualization for the Result of Data Mining Based on Virtual Reality
xu yan ; liu chang an ; zu xiang rong
..............page:190-192
An Automatic Digital Map Generation System and Map Image Stitching
cheng zhi guo ; chen mang ; liu yun cai
..............page:193-195
Application and Research of WebGIS Based on MapGIS-IMS
jiang tai ; deng yi xing
..............page:196-197,217
Research and Implementation of the Smart Web Office System Based on Soft Component
zuo wen ke ; liu xi yu ; li xue xiu
..............page:198-200
Application of CORBA Technology in Multi-class Distributed Command System
zhao hong ; li zhu lin ; zhao zong tao ; wang wen dong
..............page:201-203
Agent-based Workflow Management Model for Hetero-network
liu min zhong ; chen xiao hong ; wang bin
..............page:262-263,266
Implementation of MIB Conversion Technology for SNMP-TMN
han zhong xiang ; shi hao shan ; yang qi
..............page:264-266
Disquisition and Implementation of DMI MIF to MIB Mapping
liu yi lan ; chen jian ming ; xiao de bao
..............page:267-269,272
Methods of Packet Capturing in 802.11b WLAN Based on Linux
li hai lin ; wang mei qin ; gao zhen ming
..............page:270-272
Network Files Access Control Using SPKI/SDSI Certificates
xia gang qiang ; xie dong qing ; fan qiang
..............page:273-275,277
Improving Real-time Monitor NMS Based on JMX
zhang deng xian ; wang peng ; he xi qiong
..............page:276-277
Research and Implementation of Hot Standby in State Inspection Firewall
cui wei ; qi jing yan ; huang zuo
..............page:278-280
Implementation of Snapshot Used for Failure Recovery in Storage Network
feng yong ; zhang yan yuan
..............page:281-283
A System Model of No-Agent HIDS Based on WMI
yu hong kui ; wang cheng yao ; wang ji long
..............page:284-285,289
Analysis of System Structures in MPEG-4
wan ; guo bao long ; feng zong zhe ; chen long tan ; xiang you jun
..............page:62-64,93
Research of Digital Ergonomics Design Based on the H-anim Digital Manikin
jing shao yu ; yu sui huai ; lu chang de
..............page:59-61
Design a New End-to-End TCP Enhanced Scheme in Mobile Ad hoc Networks
lin hua sheng ; guo wei ; cheng shi duan
..............page:286-289
Design and Implementation of Axis-based Web Services Authentication Module
guo jian feng ; zhao xiao fang ; chen peng
..............page:290-292,294
WebPass:A New Method for Directed Broadcast via Web
tang lv an ; li hong yan
..............page:293-294
Business Intelligence and Applicaton in Mobile Industry
qi bin ; meng bo ; lin zuo
..............page:295-297,300
Research of Web Data Processing System Based on Wrapper
song jing jing ; li zhen kun ; liu dong ning ; zhang ; he jia jia
..............page:298-300
Study of Secure E-mail System Realizing Two-way Authentication
zhou jian guo ; zuo pu liu ; li kai
..............page:121-122,134
Security Strategy Design and Discussion of Web-based Data Warehouse
tang lei ; xu jie pan
..............page:118-120
Performance Optimization for Implementing Encryption Algorithms on PC
yu jia ; kong fan yu ; li da xing
..............page:115-117
Building Key Management Based on Secure Audit Log Server
hu ya juan ; han zhen ; liu ji qiang
..............page:113-114,125
Security of Authentication Protocols Involving Trusted Third Party
zhuo ji liang ; zuo hui li ; li xian xian
..............page:109-112
Reseach on the Formalization of Parallel Programming Platform Architecture
li dai ping ; luo shou wen ; zhang xin yi ; fang hai xiang
..............page:73-75
ObjectARX-based Parametric Design for Special Purpose Component
liu mei ; ding shu hui ; zhong pei si ; sun zhao yang
..............page:70-72
Study on Reconfigurable Manufacturing Execution System Based on Software Component
cai zong zuo ; chang zhi qing ; wang ning sheng ; li ya bai ; hao wen yu
..............page:68-69,72
Research of Pivotal Technology of Software Distribution Cooperation Exploitation Environment(SDCEE)
wu heng ; zhang wei min ; ren kai jun ; zhao xi an
..............page:65-67,81
Research of Grid Computing Task Scheduling Based on Mobile Agent
chen hong wei ; wang ru chuan ; han guang fa
..............page:45-48
Study of Partners Selection for Virtual Enterprise Based on Support Vector Machine
li zhong wei ; zhang jian pei ; yang jing ; zhang fu shun
..............page:43-44,75
A QoS Routing Algorithm Based on Priority Queuing WFQ and Load Balancing
zeng gang ; zhang ling ; xu yong ; zhou jie
..............page:56-58
Component-oriented Managing Technique of Process Pool and Thread Pool Based on the Core of ElastOS
chen zhi cheng ; mao ming yi ; he hua can ; chen zuo ; lin qing hong
..............page:49-52,55
Study on Ergonomics CAD of Complex Surface Design in Products
liu xiao jian ; yu sui huai ; lu chang de
..............page:36-38
Applied Study of Library Functions Recognition in Decompiling
zhou rui ping ; lei tao ; zhu hong
..............page:34-35,58
A New Third-order Frequency Domain Intra Prediction Algorithm
ni wei ; guo bao long ; chen long tan
..............page:31-33,48
Algorithm of Two-dimensional Maximum Entropy Thresholding Segmentation Based on VSAR
wang jing hua ; du shu xin
..............page:29-30,42
API Design of Security Components Communication in Large-scale Distributed Intrusion Detection System
shi wei min ; yang yi xian ; yang ya fei ; zuo yong gang
..............page:107-108
Architecture of Large-scale Distributed Intrusion Detection System
zuo yong gang ; lv hui qin ; yang yi xian ; hu zheng ming
..............page:105-106,132
Proxy-based IDS Design and Implementation
zhao sheng hui ; chen gui lin ; yang shou bao
..............page:102-104
Research on Early-warning and Quarantine System of Large-scale Network Intrusion
li zhong hua ; li wei hua ; liu zun
..............page:100-101,112
Introduction of Intelligent Simulation for Structure State
yuan jing ling ; zhong zuo ; jiang qiong ; jin peng
..............page:98-99,146
Differentia and Unification of NAS and SAN
duan jian gong
..............page:94-97,104
Flexibility Management in Distributed Workflow System
zhang xuan ping ; li ya ; chen hong xing
..............page:88-90
Internet Resource Repository:A Subject-Oriented Data Grid Model
zhao jie ; qi de zuo
..............page:85-87,90
Research of Linux Operating System Extensions Based on SCI
chen zhi qing ; wang lei
..............page:82-84
Research on Integration Methodology of BMS Based on Web
zeng ming ; chen li ding ; zuo bu gong
..............page:79-81
Model-based Design of Embedded Software
yang li sha ; wang hui
..............page:76-78
Research on Trusted Computing
hou fang yong ; zhou jin ; wang zhi ying ; liu zhen ; liu zuo
..............page:1-4,22
A Novel Method of Rough Approximation of Preference Relation
hua wen jian ; liu zuo liang
..............page:23-25,28
A Review on Model-Driven Architecture
chen yong ; li jing yan ; wang zhi jian
..............page:19-22
Research of Dynamically Changing Coverage of Immune Detector Based on Logic Program
xue tong ; dong hong bin ; wu zhi jian
..............page:16-18
Automatic Abstracting Technology and Its Application
jin bo ; shi yan jun ; zuo hong fei ; ai jing bo
..............page:13-15
Sensor Network
li zhi gang ; zhou xing she
..............page:9-12
Review of Recent Development in Decision Tree Algorithm in Data Mining
han hui ; mao feng ; wang wen yuan
..............page:5-8