column
    Research of a Hybrid Spam Filtering Algorithm
    QIN Zhi-guang, LUO Qin, ZHANG Feng-li
    2007, 36(3): 485-488.
    Abstract PDF
    An Algorithm of Scheduling Analysis for Distributed Real-Time Embedded Systems
    ZHANG Hai-tao, AI Yun-feng
    2007, 36(3): 489-492.
    Abstract PDF
    Research of Security Mechanism RBAC-Based in P2P System
    NIU Xin-zheng, SHE Kun, LU Gang, ZHOU Ming-tian
    2007, 36(3): 493-495,499.
    Abstract PDF
    A Distributed Certificate Revocation Scheme for Ad Hoc Networks
    ZHONG Huan, XU Chun-xiang, QIN Zhi-guang
    2007, 36(3): 496-499.
    Abstract PDF
    Design and Principle of the Trusted Authentication Gateway
    TAN Liang, LUO Xun, ZHOU Ming-tian
    2007, 36(3): 500-502.
    Abstract PDF
    An Assessment Method for Fuzzy Partial Ordering Relation-Based Software Testing Quality
    YAO Yi, LIU Xiao-ming, HUANG Song
    2007, 36(3): 503-505,509.
    Abstract PDF
    Web Service Discovery Based on Domain Ontology
    AI Wei-hua, SONG Zi-lin, WEI Lei, WU Liang
    2007, 36(3): 506-509.
    Abstract PDF
    XML-Based User Interface Customization and Dynamical Modification of the Embedded Linux System
    JIN Jing, SANG Nan, LIU Yi
    2007, 36(3): 510-513.
    Abstract PDF
    Research and Design of Monitoring Technology of Auto-Electronic in ITS
    ZHAO Hong-zhi, LUO Ke-lu, JIANG Wei
    2007, 36(3): 514-516.
    Abstract PDF
    Design and Development of Multi-Agent Systems Based on Petri Nets
    YU Zhen-hua, JIA Jun-xiu, CAI Yuan-li
    2007, 36(3): 517-520.
    Abstract PDF
    Dynamic Power Management Based on Markov Process
    CHU Yi, ZHAO Min
    2007, 36(3): 521-523.
    Abstract PDF
    Analysis of a Real-Time Scheduling Algorithm with Fault-Tolerance
    LEI Hang, WANG Liang
    2007, 36(3): 524-527.
    Abstract PDF
    Inference Control of Databases Based on Rough Set Theory
    ZHANG Zeng-jun, LI Xiang-yang, XIAO Jun-mo
    2007, 36(3): 528-530,537.
    Abstract PDF
    Research of JAVA Security Reforms and Validation
    XIAO Jun-mo, LIU Jun, YU Ling
    2007, 36(3): 531-533,537.
    Abstract PDF
    Forward-Secure Identity-Based Encryption Scheme
    YANG Hao-miao, SUN Shi-xin, LI Hong-wei
    2007, 36(3): 534-537.
    Abstract PDF
    An Improved Secure Two-Party Bargaining Protocol
    ZHAO Yang, LIU Yong, WANG Jia-hao, QIN Zhi-guang
    2007, 36(3): 538-540,558.
    Abstract PDF
    End-to-End Performance Guarantee for Distributed Real-Time Embedded Systems
    LIAO Yong, XIONG Guang-ze, CHEN Xu-dong, SANG Nan, ZHU Qing-xin
    2007, 36(3): 541-544.
    Abstract PDF
    Dynamic Scheduling Algorithm Based on Limited Number of Priority
    HE Fu-gui, WANG Jia-li
    2007, 36(3): 545-547.
    Abstract PDF
    A Design Method for Buffer of Aperiodic Soft Real-Time System
    CHEN Xu-dong, ZHU Qing-xin, LIAO Yong, KUANG Ping, XIONG Guang-ze
    2007, 36(3): 548-550.
    Abstract PDF
    A GSPN Battery Model for Embedded System Energy Optimization
    WU Qi, XIONG Guang-ze
    2007, 36(3): 551-554.
    Abstract PDF
    A Recombination-Delaying Buddy Mechanism for Embedded System Memory Management
    GUO Zhen-yu, SANG Nan, YANG Xia
    2007, 36(3): 555-558.
    Abstract PDF
    Embedded Operating System Customizing with Software Reusing
    LI Xiang-wei, SANG Nan, XIONG Guang-ze
    2007, 36(3): 559-562.
    Abstract PDF
    An Image Digital Watermarking Algorithm Based on Bit-Plane-Decomposition and Multi-Resolution-Decomposition
    YANG Jun, SHE Kun, ZHONG Shou-ming
    2007, 36(3): 563-565,572.
    Abstract PDF
    A Brief Analysis on Detection Standard of Digital Watermark
    PENG Jing
    2007, 36(3): 566-568.
    Abstract PDF
    Realization of 3-D Facial Animation Based on MPEG-4
    JIANG Xiu-feng, PU Xiao-rong, ZHANG Yi
    2007, 36(3): 569-572.
    Abstract PDF
    Dirichlet Free-Form Deformation in Three-Dimensional Space
    GUO Ji-xiang, PU Xiao-rong, ZHANG Yi
    2007, 36(3): 573-575,586.
    Abstract PDF
    Texture Mapping Based 3D-Reconstruction of Medical Images
    HE Xiao-qian, CHEN Lei-ting, FANG Chun-lan
    2007, 36(3): 576-578,586.
    Abstract PDF
    A Method for Extracting the Synchro Characters in the Video Information Leaked by a Computer System
    XUN Jing-jing, WANG Hou-jun, XIANG Chang-bo, SONG Jian-zhong
    2007, 36(3): 579-582.
    Abstract PDF
    Iris Recognition Method Based on Independent Component Analysis and Support Vector Machine
    WANG Yong, XU Lu-ping
    2007, 36(3): 583-586.
    Abstract PDF
    Research on Bayesian Classification Network for Spam Based on Kernel Method
    LIU Zhen, ZHOU Ming-tian
    2007, 36(3): 587-589,593.
    Abstract PDF
    Modeling Analysis of Network Worm Propagation
    XING Chang-you, YANG Li, CHEN Ming
    2007, 36(3): 590-593.
    Abstract PDF
    Research on the Application of 0-1 Algorithm in HW/SW Partition
    JIANG Kai-zhong, Lü Zhao, SUN Shu-feng
    2007, 36(3): 594-597.
    Abstract PDF
    Cost Modulus Research in Multi-Airport Ground-Holding Problem
    YU Jing, FU Qiang, WU Kun
    2007, 36(3): 598-600.
    Abstract PDF
    Resistance Against Power Analysis Attacks on Width-wNAF Method
    ZHOU Wen-jin, LU Xiao-jun, ZHU Da-yong, FAN Ming-yu, ZHANG Tao
    2007, 36(3): 601-603.
    Abstract PDF
    Design and Implementation of Network Confrontation Training Simulation System
    GAN Gang, CHEN Yun, LI Fei
    2007, 36(3): 604-607.
    Abstract PDF
    An IPv4 over IPv6 Tunnel Solution Based on UDP
    SHEN Qing-wei, YANG Shou-bao, SUN Wei-feng
    2007, 36(3): 608-610,624.
    Abstract PDF
    A New Fault Model for Testing Signal Integrity in SoCs
    ZHANG Jin-lin, SHEN Xu-bang, CHEN Chao-yang
    2007, 36(3): 611-613,631.
    Abstract PDF
    Research on DDoS Attack and IP Congestion Control
    WU Guo-gang
    2007, 36(3): 614-616,655.
    Abstract PDF
    Unified Modeling of the Intruder's Attack Ability Based on the Protocols
    ZHANG Jing
    2007, 36(3): 617-620.
    Abstract PDF
    A Methodology to Detect Malware Based on Registry Hive Files
    REN Yun-tao, LI Yi-chao, CAO Yue
    2007, 36(3): 621-624.
    Abstract PDF
    A Bluetooth Network Data Transmission Algorithm Based on BER Model
    MO Bei-jian, SANG Nan, TIE Bing
    2007, 36(3): 625-627,635.
    Abstract PDF
    Optimization Algorithm of Multi-Level Discrete Fuzzy Neural Networks for Solving Global Stability
    CUI Meng-tian, FU Li-xia, ZHAO Hai-jun, ZHONG Yong
    2007, 36(3): 628-631.
    Abstract PDF
    Modeling and Performance Evaluation of Time-Triggered CAN Bus
    LIU Lu-yuan, WANG Xiao-xin, MA Jin-yan
    2007, 36(3): 632-635.
    Abstract PDF
    A MDL-Based Unique Word Detection Method
    TANG Gang, FENG Zhang-wei, ZHU Zhong-liang
    2007, 36(3): 636-639.
    Abstract PDF
    A New Fetal Electrocardiogram Extraction Algorithm
    MENG Hai-tao, ZHANG Zhi-lin
    2007, 36(3): 640-641,645.
    Abstract PDF
    A Mixed Algorithm for Network Congestion Control
    WANG Man-xi, HU Xiang-hui, MA Yi-fei
    2007, 36(3): 642-645.
    Abstract PDF
    A Spliting Files Transmission System Based on MQ
    WU Cheng-bin, ZHU Bin
    2007, 36(3): 646-648.
    Abstract PDF
    A Key Delay Design on Block Cipher Algorithm
    LUO Lan, QU Ze-hui, ZHOU Shi-jie, ZHANG Feng-li, QIN Zhi-guang, WEI Zheng-yao
    2007, 36(3): 649-651.
    Abstract PDF
    Study of Software Quality Evaluation Based on Fuzzy Sets Theory
    LU Xin, LIAO Jian-ming
    2007, 36(3): 652-655.
    Abstract PDF
    Baidu
    map