column
Research of a Hybrid Spam Filtering Algorithm
QIN Zhi-guang, LUO Qin, ZHANG Feng-li
2007, 36(3): 485-488.
Abstract PDF
An Algorithm of Scheduling Analysis for Distributed Real-Time Embedded Systems
ZHANG Hai-tao, AI Yun-feng
2007, 36(3): 489-492.
Abstract PDF
Research of Security Mechanism RBAC-Based in P2P System
NIU Xin-zheng, SHE Kun, LU Gang, ZHOU Ming-tian
2007, 36(3): 493-495,499.
Abstract PDF
A Distributed Certificate Revocation Scheme for Ad Hoc Networks
ZHONG Huan, XU Chun-xiang, QIN Zhi-guang
2007, 36(3): 496-499.
Abstract PDF
Design and Principle of the Trusted Authentication Gateway
TAN Liang, LUO Xun, ZHOU Ming-tian
2007, 36(3): 500-502.
Abstract PDF
An Assessment Method for Fuzzy Partial Ordering Relation-Based Software Testing Quality
YAO Yi, LIU Xiao-ming, HUANG Song
2007, 36(3): 503-505,509.
Abstract PDF
Web Service Discovery Based on Domain Ontology
AI Wei-hua, SONG Zi-lin, WEI Lei, WU Liang
2007, 36(3): 506-509.
Abstract PDF
XML-Based User Interface Customization and Dynamical Modification of the Embedded Linux System
JIN Jing, SANG Nan, LIU Yi
2007, 36(3): 510-513.
Abstract PDF
Research and Design of Monitoring Technology of Auto-Electronic in ITS
ZHAO Hong-zhi, LUO Ke-lu, JIANG Wei
2007, 36(3): 514-516.
Abstract PDF
Design and Development of Multi-Agent Systems Based on Petri Nets
YU Zhen-hua, JIA Jun-xiu, CAI Yuan-li
2007, 36(3): 517-520.
Abstract PDF
Dynamic Power Management Based on Markov Process
CHU Yi, ZHAO Min
2007, 36(3): 521-523.
Abstract PDF
Analysis of a Real-Time Scheduling Algorithm with Fault-Tolerance
LEI Hang, WANG Liang
2007, 36(3): 524-527.
Abstract PDF
Inference Control of Databases Based on Rough Set Theory
ZHANG Zeng-jun, LI Xiang-yang, XIAO Jun-mo
2007, 36(3): 528-530,537.
Abstract PDF
Research of JAVA Security Reforms and Validation
XIAO Jun-mo, LIU Jun, YU Ling
2007, 36(3): 531-533,537.
Abstract PDF
Forward-Secure Identity-Based Encryption Scheme
YANG Hao-miao, SUN Shi-xin, LI Hong-wei
2007, 36(3): 534-537.
Abstract PDF
An Improved Secure Two-Party Bargaining Protocol
ZHAO Yang, LIU Yong, WANG Jia-hao, QIN Zhi-guang
2007, 36(3): 538-540,558.
Abstract PDF
End-to-End Performance Guarantee for Distributed Real-Time Embedded Systems
LIAO Yong, XIONG Guang-ze, CHEN Xu-dong, SANG Nan, ZHU Qing-xin
2007, 36(3): 541-544.
Abstract PDF
Dynamic Scheduling Algorithm Based on Limited Number of Priority
HE Fu-gui, WANG Jia-li
2007, 36(3): 545-547.
Abstract PDF
A Design Method for Buffer of Aperiodic Soft Real-Time System
CHEN Xu-dong, ZHU Qing-xin, LIAO Yong, KUANG Ping, XIONG Guang-ze
2007, 36(3): 548-550.
Abstract PDF
A GSPN Battery Model for Embedded System Energy Optimization
WU Qi, XIONG Guang-ze
2007, 36(3): 551-554.
Abstract PDF
A Recombination-Delaying Buddy Mechanism for Embedded System Memory Management
GUO Zhen-yu, SANG Nan, YANG Xia
2007, 36(3): 555-558.
Abstract PDF
Embedded Operating System Customizing with Software Reusing
LI Xiang-wei, SANG Nan, XIONG Guang-ze
2007, 36(3): 559-562.
Abstract PDF
An Image Digital Watermarking Algorithm Based on Bit-Plane-Decomposition and Multi-Resolution-Decomposition
YANG Jun, SHE Kun, ZHONG Shou-ming
2007, 36(3): 563-565,572.
Abstract PDF
A Brief Analysis on Detection Standard of Digital Watermark
PENG Jing
2007, 36(3): 566-568.
Abstract PDF
Realization of 3-D Facial Animation Based on MPEG-4
JIANG Xiu-feng, PU Xiao-rong, ZHANG Yi
2007, 36(3): 569-572.
Abstract PDF
Dirichlet Free-Form Deformation in Three-Dimensional Space
GUO Ji-xiang, PU Xiao-rong, ZHANG Yi
2007, 36(3): 573-575,586.
Abstract PDF
Texture Mapping Based 3D-Reconstruction of Medical Images
HE Xiao-qian, CHEN Lei-ting, FANG Chun-lan
2007, 36(3): 576-578,586.
Abstract PDF
A Method for Extracting the Synchro Characters in the Video Information Leaked by a Computer System
XUN Jing-jing, WANG Hou-jun, XIANG Chang-bo, SONG Jian-zhong
2007, 36(3): 579-582.
Abstract PDF
Iris Recognition Method Based on Independent Component Analysis and Support Vector Machine
WANG Yong, XU Lu-ping
2007, 36(3): 583-586.
Abstract PDF
Research on Bayesian Classification Network for Spam Based on Kernel Method
LIU Zhen, ZHOU Ming-tian
2007, 36(3): 587-589,593.
Abstract PDF
Modeling Analysis of Network Worm Propagation
XING Chang-you, YANG Li, CHEN Ming
2007, 36(3): 590-593.
Abstract PDF
Research on the Application of 0-1 Algorithm in HW/SW Partition
JIANG Kai-zhong, Lü Zhao, SUN Shu-feng
2007, 36(3): 594-597.
Abstract PDF
Cost Modulus Research in Multi-Airport Ground-Holding Problem
YU Jing, FU Qiang, WU Kun
2007, 36(3): 598-600.
Abstract PDF
Resistance Against Power Analysis Attacks on Width-w NAF Method
ZHOU Wen-jin, LU Xiao-jun, ZHU Da-yong, FAN Ming-yu, ZHANG Tao
2007, 36(3): 601-603.
Abstract PDF
Design and Implementation of Network Confrontation Training Simulation System
GAN Gang, CHEN Yun, LI Fei
2007, 36(3): 604-607.
Abstract PDF
An IPv4 over IPv6 Tunnel Solution Based on UDP
SHEN Qing-wei, YANG Shou-bao, SUN Wei-feng
2007, 36(3): 608-610,624.
Abstract PDF
A New Fault Model for Testing Signal Integrity in SoCs
ZHANG Jin-lin, SHEN Xu-bang, CHEN Chao-yang
2007, 36(3): 611-613,631.
Abstract PDF
Research on DDoS Attack and IP Congestion Control
WU Guo-gang
2007, 36(3): 614-616,655.
Abstract PDF
Unified Modeling of the Intruder's Attack Ability Based on the Protocols
ZHANG Jing
2007, 36(3): 617-620.
Abstract PDF
A Methodology to Detect Malware Based on Registry Hive Files
REN Yun-tao, LI Yi-chao, CAO Yue
2007, 36(3): 621-624.
Abstract PDF
A Bluetooth Network Data Transmission Algorithm Based on BER Model
MO Bei-jian, SANG Nan, TIE Bing
2007, 36(3): 625-627,635.
Abstract PDF
Optimization Algorithm of Multi-Level Discrete Fuzzy Neural Networks for Solving Global Stability
CUI Meng-tian, FU Li-xia, ZHAO Hai-jun, ZHONG Yong
2007, 36(3): 628-631.
Abstract PDF
Modeling and Performance Evaluation of Time-Triggered CAN Bus
LIU Lu-yuan, WANG Xiao-xin, MA Jin-yan
2007, 36(3): 632-635.
Abstract PDF
A MDL-Based Unique Word Detection Method
TANG Gang, FENG Zhang-wei, ZHU Zhong-liang
2007, 36(3): 636-639.
Abstract PDF
A New Fetal Electrocardiogram Extraction Algorithm
MENG Hai-tao, ZHANG Zhi-lin
2007, 36(3): 640-641,645.
Abstract PDF
A Mixed Algorithm for Network Congestion Control
WANG Man-xi, HU Xiang-hui, MA Yi-fei
2007, 36(3): 642-645.
Abstract PDF
A Spliting Files Transmission System Based on MQ
WU Cheng-bin, ZHU Bin
2007, 36(3): 646-648.
Abstract PDF
A Key Delay Design on Block Cipher Algorithm
LUO Lan, QU Ze-hui, ZHOU Shi-jie, ZHANG Feng-li, QIN Zhi-guang, WEI Zheng-yao
2007, 36(3): 649-651.
Abstract PDF
Study of Software Quality Evaluation Based on Fuzzy Sets Theory
LU Xin, LIAO Jian-ming
2007, 36(3): 652-655.
Abstract PDF