 |
Research on the Automated Intrusion Response Systems |
|
ZHANG Yunkai1, , ZHANG Yuqing3, WANG Changguang1, WANG Fangwei1, Ma Jianfeng2 2 (1. Network Center of Hebei Normal University, Shijiazhuang 050016; 2. School of Computer Science and Engineering , Xidian University , Xi'an 710071; 3. National Computer Network Intrusion Protection Center , GSCAS , Beijing 100039) |
 |
Development and Analysis of Measurement Technology of Dynamic Network Structure |
|
CHEN Le , WANG Xiumei , WANG Jilong (Institute of Information, Beijing University of Science and Technology, Beijing 100083) |
 |
The Augmented Reality Based on Environment Mapping |
|
GU Yaolin, WANG Jun, NI Tongguang (The School of Information Technology, Southern Youngtze University Wuxi 214036) |
 |
A Full Search Motion Estimation Algorithm for Collateral Implementation |
|
WANG Ci, FANG Xiangzhong, YU Hongbin (Institute of Image Communication and Information Processing, Shanghai Jiaotong University, Shanghai 200030) |
 |
Kernel-based K-means Clustering |
|
KONG Rui, ZHANG Guoxuan, SHI Zesheng, GUO Li (Electronic Seience & Technology Dept., USTC, Hefei 230027) |
 |
Improved Fuzzy C-mean Classifier and Comparison Study of Its Clustering Results of Satellite Remotely Sensed Data |
|
HASI Bagan, MA Jianwen, LI Qiqing,LIU Zhili,HAN Xiuzhen (Institute of Remote Sensing Applications, Chinese Academy of Sciences, Beijing 100101) |
 |
Research and Implementation of Real Time Middleware Oriented Message |
|
YU Lasheng,WANG Lupeng (College of Information Engineering ,Central South University,Changsha 410083) |
 |
A Study on the Contract Method of Software System Construction |
|
JIANG Hong, LIU Lu (Department of Economic and Management, Beihang University,Beijing100083) |
 |
The Implementation of Disguising the OS by Using Netfilter and Iptables |
|
CAO Aijuan, LIU Baoxu, RUAN Weijun, XU Rongsheng (Computing Center, Institute of High Energy Physics, CAS, Berging 100039) |
 |
A Meaningful Blind Watermarking Algorithm Based on Wavelet Transform |
|
YUAN Yuan,DOU Wenhua (College of Computer Science,National University of Defense Technology,Changsha 410073) |
 |
Automatic Analysis for Plumpness and Slenderness of Tongue |
|
WEI Baoguo, SHEN Lansun (Signal & Information Processing Lab, Beijing University of Technology, Beijing 100022) |
 |
An Embedded Image Coding Method Based on DCT |
|
WANG Donghua,ZHOU Yuanhua,WANG Jia (Institute of Image Communication & Information Processing, Shanghai Jiaotong University, Shanghai 200030) |
 |
Design and Implementation of Logical Volume Manager in iSCSI Storage System Under Linux |
|
YU Shengsheng, WANG Guohua, ZHOU Jingli (Dept. of Computer Science, Huazhong University of Science & Technology, Wuhan 430074) |
 |
An Efficient Group Signature Based on GDH Assumption |
|
DENGDonghua, ZHAOYiming ( DepartmentofComputerScienceandEngineeringofFudanUniversity,Shanghai200433) |
 |
Algorithm of BP Neural Network-based Face Detection |
|
ZHOU Jingli, WU Guilin, YU Shengsheng (Dept. of Computer Science, Huazhong University of Science & Technology, Wuhan 430074) |
 |
Reclassifying Chinese Morpheme Word Based on Grammar and a Semantic Quantifiable Model |
|
LI Guochen, DUAN Jianyong (Department of Computer Science, Shanxi University,Taiyuan 030006) |
 |
Design and Implementation of A Secure SSL/TLS Web Proxy |
|
CHEN Weixian1, LIAO Hongluan1, FENG Dengguo2 (1. State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing 100039; 2. Institute of Software, Chinese Academy of Sciences, Beijing 100080) |
 |
A New DSR-based Energy Saving Routing Strategy in MANET |
|
XU Li1,2, WANG Minqiang1 , ZHENG Baoyu 1 (1.Dept. of Info. Eng., Nanjing College of Post and Telecommunication, Nanjing 210003; 2.Dept. of Computer Science, Fujian Normal University, Fuzhou 350007) |
 |
Persistence for Official Business Object in Relational Database |
|
WANG Tao, WANG Yanzhang, LU Yanxia (Institute of Information and Decision Technology, Dalian University of Science and Technology, Dalian 116024) |
 |
Conformance Test of Distributed Transaction Service |
|
XU Chang, JIN Beihong (Technology Center of Software Engineering, Institute of Software, Chinese Academy of Sciences, Beijing 100080) |
 |
Method of Groundwater Numerical Model Simulation Based on GIS |
|
YANG Xu1,2,YANG Shucai2,HUANG Jiazhu1 (1. Jiangsu Provincial Key Laboratory of GIS, Nanjing Normal University, Nanjing 210097; 2. Chief Engineer's Office of Nanjing Metro Corp., Nanjing 210024) |
 |
Development of Workflow Based Business System |
|
CAO Han,LIU Daxin (Computer Science & Technology. College, Harbin Engineering University, Harbin 150001) |
 |
Design and Implementation of Auditing in B1 Secure Database |
|
CHENG Weiguo, TIAN Yuan, WANG Deqiang, XIE Junyuan (Computer Science and Technology of Nanjing University, State Key Lab of Software New Technology, Nanjing 210093) |
 |
System Analysis and Implementation on EJB-based OGDSS |
|
KONG Bin, TIAN Jun, TAN Junfeng (MIS Department of Management School, Xi'an JiaoTong University, Xi'an 710049) |
 |
Verification of Temporal Consistency in Workflow |
|
REN Guozhen,GONG Lei,WANG Haiyang,HUANG Fujie (School of Computer Science and Technology,Shandong University,Jinan 250061) |
 |
Web-based Integrated Query System in Distributed EMC Database |
|
HU Zhihua1, ZHANG Guofu2, CHEN Hongsheng1 (1. College of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073; 2. National Defense Technology Lab of EMC, Wuhan 430064) |
 |
Nearest Neighbor Queries of Multi-object |
|
LIU Yongshan1, , BO Shukui2 , ZHANG Qiang2, HAO Zhongxiao1,3 2 (1. Harbin University of Science & Technology, Harbin 150080; 2. Yanshan University, Qinhuangdao 066004 ; 3. Qiqiha University, Qiqiha 161006) |
 |
Grid Resource Management System Based on Agent |
|
FANG Juan,ZHANG Shujie, DI Ruihua (College of Computer Science, Beijing University of Technology, Beijing 100022) |
 |
Performance Analysis of MPI Collective Communication |
|
REN Bo, WANG Cheng (Simulation Center, Department of Hydropower, Huazhong University of Sci. & Tech., Wuhan 430074) |
 |
DAFS Implementations and Applications in NAS Cluster |
|
YU Shengsheng,TANG Shali,ZHOU Jingli,LUO Qiuming (Storage System Lab, Computer Science & Technology School, HUST, Wuhan 430074) |
 |
Dynamic Configurable Protocol Design in Mobile Network |
|
ZENG Bing1, LIU Mengbing1, XU Fanjiang2 (1. Naval Engineering University, Wuhan 430033;2. Institute of Software, Chinese Academy of Sciences, Beijing 100083) |
 |
IPv6/IPv4 Dual Stack Ethernet Access Router with Authentication and Mobility Support |
|
ZHANG Yu,HOU Ziqiang,GAO Jiming (DSP Engineering Center, Institute of Acoustics, CAS, Beijing 100080) |
 |
TCP-friendly Threshold-constrained Congestion Control Protocol for Media Flows |
|
CHEN Ming, WANG Dong (College of Computer and Communications, Hunan University, Changsha 410082) |
 |
A Virtual Router Architecture and Its Implementation |
|
LIU Gang , ZHANG Deyun, LI Shenglei, ZHANG Xiao (Institute of Network, Xi'an Jiaotong University, Xi'an 710049) |
 |
Key Management Scheme for Network Environment Based on Elliptic Curves Cryptosystem |
|
ZHOU Xuanwu1,YANG Xiaoyuan1,HUANG Deguan2,ZHANG Wei1 (1. Key Laboratory of Network and Information Secrurity, Engineering College of the APF, Xi'an 710086 ; 2. Genenal Staff ' s office , Armed Police Force of Fujian Province, Fuzhou 350003) |
 |
A (t,n) Threshold Anonymous Authorization Scheme Based on RSA |
|
MA Chunbo1, HE Dake2 (1.Computer Security and Communication Secrecy Institute of Computer and Communication Department of Southwest Jiaotong University, Chengde 610031; 2. The Center of Security of Internet and Communication of Southwest Jiaotong University, Chengdu 610031) |
 |
A Detection-oriented Attack Classification and Its Application in IDS |
|
XIANG Ga1,CAO Yuanda2 ( 1. Dept. of Computer Science and Engineering, Beijing Institute of Technology, Beijing 100081; 2. School of Software Engineering, Beijing Institute of Technology, Beijing 100081) |
 |
An Electronic Vote Protocol Without Authority |
|
SU Yunxue,LU Haijun,ZHU Yuefei (Net Engineering Department of Information Engineering University, Zhengzhou 450002) |
 |
Intrusion Detection Based on Boosting Algorithm |
|
CHEN Aibin, XIA Limin (Information Engineering College , Central South University, Changsha 410075) |
 |
Defending Against Redirected Attack in MIPv6 |
|
HU Xudong,YU Jianhua,ZHANG Gendu (Computer and Information Technology Department of Fudan University,Shanghai 200433) |
 |
A Classification Method of Network Security Incidents for Response |
|
MA Xin1,2,3,ZHANG Yuqing1,2,GU Xin3,FENG Tao1,2,3 (1. State Key Laboratory of Information Security, GSCAS, Beijing 100039;2. National Computer Network Intrusion Protection Center, GSCAS, Beijing 100039; 3. School of Computer Science and Engineering , Xidian University , Xi'an 710071) |
 |
Correcting Candidate Suggestion Algorithm and Its Realization Based on Statistics |
|
ZHANG Yangsen1,2,3, CAO Yuanda1, XU Bo3 (1. Dept. of Computer Science , Beijing University of Science and Technology, Beijing 100081;2. Dept. of Computer Science ,Shanxi University, Taiyuan 030006; 3.National Key Laboratory of Pattern Recognition,Institute of Automation,Chinese Academy of Sciences, Beijing 100080) |
 |
Face Classification Based on SVM |
|
ZHANG Mingui, PAN Quan, ZHANG Hongcai, JIANG Rui (Department of Automatic Control, Northwestern Polytechnical University, Xi' an 710072) |
 |
Text Clustering Method Based on Non-negative Matrix Factorization |
|
HUANG Gangshi1,LU Jianjiang1,2,ZHANG Yafei1 (1. College of Communication and Engineering , University of Science and Technology, PLA, Nanjing 210007; 2. Department of Computer Science and Engineering, Southeast University, Nanjing 210096) |
 |
Method of Face Detection Based on the Deformable Template Matching |
|
YE Liang (School of Computer Engineering and Science, Shanghai University, Shanghai 200072) |
 |
A High Efficiency Algorithm of ABM for Mining Associataion Rules |
|
NIU Xiaofei1, SHI Bing1, LU Jun2, WU Ke1 (1. School of Computer Science and Technology,Shandong Univ. , Jinan 250061; 2. Department of Physics,Shandong Institute of Light Industry, Jinan 250014 ) |
 |
An Algorithm for Clustering Quantitative Association Rules Based on Geometric Properties of Grid |
|
MA Guangzhi1, ZHANG Aifang1, LIU Yuliang2 (1. Department of Computer Science, Huazhong University of Science & Technology, Wuhan 430074; 2. 709th Research Institute of China Shipbuilding Industry Corporation , Wuhan 430074) |
 |
An Algorithm for Mining Maximal Frequent Patterns Based on FP-tree |
|
FENG Zhixin1,ZHONG Cheng1,2 (1. School of Computer and Information Engineering, Guangxi University, Nanning 530004; 2. Dept.of Computer Science, University of Science and Technology of China, Hefei 230027) |
 |
Study and Implementation of Situation Assessment Models |
|
WANG Baoshu,SHENTU Xiaofeng (School of Computer Science and Technology, Xidian University , Xi'an 710071) |
 |
A New Method for Slant Correction in Recognition of Handwritten Numerals |
|
WANG Youwei, LIU Jie (Department of Computer, Shandong University, Jinan 250061) |
 |
A Hybrid Agent Architecture and Its Decision Algorithm |
|
WU Bo1, WU Min2, LIU Xingdong1, NIE Zhe1 (1. Department of Cpmputer, College of Shenzhen Polytechnic, Shenzhen 518055; 2. School of Information Science and Engineering, Central South University, Changsha 410083) |
 |
Modeling of the Leaf Shapes Using L-systems and Genetic Algorithms |
|
LV Huiqiang1,LI Yiming2,KONG Fansheng2 (1. Institute of Multimedia and Visual Reality, Zhejiang University of Technology, Hangzhou 310032; 2. Institute of Multimedia and Visual Reality, Wenzhou University,Wenzhou 325027) |
 |
Network Adaptive Transmission Control Technique for Video Communication |
|
WANG Chengliang1, ZHANG Hui2 (1. Faculty of Software Engineering , Chongqing University;2.College of Computer, Chongqing University, Chongqing 400044) |
 |
Application of Virtual Reality Technology in Equipment Battle Damage Simulation |
|
BAI Mei, LIU Pengyuan, ZHANG Xien (Department of Missile Engineering, Ordnance Engineering College,Shijiazhuang 050003) |
 |
Multimedia Transport Technology Based on JMF |
|
FU Qian, QU Zhaoxia (College of Information Science, Beijing Normal University, Beijing100875) |
 |
Research and Design of Two-way VSAT Real-time Distance Learning System |
|
XIAO Renzhong, SHEN Ruimin, JIANG Ji (Dept. of Computer Sci. & Eng., Shanghai Jiaotong University, Shanghai 200030) |
 |
Design of Audio Conference System Based on OLAN |
|
ZHAO Daiqiang1, 2 (1. Institute of Information and Engineering, Chengdu University of Technology, Chengdu 610059; 2. No.10th Research Institute, China Electronics Technology Group Corporation, Chengdu 610036) |
 |
Application of XML in TV Program Personalization |
|
YU Zhiwen, ZHOU Xingshe, ZHANG Yong, GU Jianhua (Dept. of Computer Science and Engineering, Northwestern Polytechnical University, Xi'an 710072) |
 |
Qualitative Analysis of Gasoline Based on Artificial Neural Network |
|
WANG Rangding, LIANG Zhengfeng (CKC Software Lab, Ningbo University, Ningbo 315211) |
 |
Practices of Technology of Virtual Reality in City Planning |
|
QIAN Lexiang, LIU Runda (College of Environment & Planning, Henan Univ., Kaifeng 475001) |
 |
Application of TI C6211 DSP in Multi-channel Telemetry Demodulator |
|
YANG Jianguo1,2,ZHANG Can3,4 (1. Graduate School, University of Science & Technology of China , Hefei 230026; 2. Beijing Research Institute of Telemetry, Beijing 100076; 3. State Key Laboratory of Information Security ,Graduate School of Chinese Academy of Science, Beijing 100039; 4. National Computer Network Intrusion Protection Center, Graduate School of Chinese Academy of Science, Beijing 100039) |
 |
UDDI-based Knowledge Services |
|
WEN Haoyu1,TAO Liyan2, XU Guohua1 (1. School of Economics and Management, Xidian Univ., Xi抋n 710071; 2. Institute No.55 of China Arms Industry Group Corporation, Changchun 130012) |
 |
Approaches to Check 3D Mechanical Model with Related Engineering Drawings |
|
WANG Weiguang ,WANG Zhiyan ( College. of Computer Sci. & Eng., South China Univ. of Sci. and Tech., Guangzhou 510640) |
 |
Decision Support System Based on Remote Data Collection |
|
ZHU Zhongliang, QIAN Songrong ( Department of Communication Science and Engineering , Fudan University, Shanghai 200433) |
 |
Application and Implementation of Digital Network Security-Monitoring System in BA |
|
HANG Zhongwen, ZHANG Zhihao (Computing Center ,Tongji University, Shanghai 200092) |
 |
Security Strategy in Integrated Statistical Management System for Power Supply Enterprise |
|
XUE Li, SHAO Cheng (Research Center of Information and Control,Dalian University of Technology, Dalian 116024) |
 |
VPN Application in Guangxi Welfare Lottery System |
|
LIN Gang (Guangxi Welfare Lottery Issuing Center, Nanning 530023) |
 |
Computerized Servo Control System |
|
FAN Xiaoye1,WANG Hao1,ZHANG Daozhong2 (1. Department of Automation, Shanghai Jiaotong University, Shanghai 200233; 2. East China Institute of Computing Technology, Shanghai 200233) |
 |
Implementation of Synchronized Sight-view Simulation in Missile Simulation System |
|
LI Shengchao, XIE Jian (Second Artillery Engineering College, Xi'an 710025) |
 |
Design and Implementation of Web Reporting Tool Based on XML/XSL |
|
XU Wei,TANG Min,LI Shaoyuan, AN Qi (Department of Computer Science and Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083) |
 |
A Method of Reprogramming Remote Terminal Unit |
|
ZHANG Aiwu,LU Xinchun,ZHU Huiming (School of Computer Science and Technology, Shandong University, Jinan 250061) |
 |
Application of Taguchi Method in Experiment Design of WSMR Virtual Prototype |
|
XIONG Guangming,LU Jilian (School of Mechanical and Vehicular Engineering, Beijing Institute of Technology, Beijing 100081) |
 |
The Design of a Kind of Digital Surveillance System Based on C/S Structure |
|
FENG Hongcai,CHEN Yongqiang,DU Xiaoqin (Department of Computer & Information Engineering Wuhan Polytechnic University, Wuhan 430023) |
 |
Implementation of E-mail Client Software Under Embedded Linux and MiniGUI |
|
LIU Wenjun, DU Xu ,YANG Zhongkai (Dept. of Electronics and Information, Huazhong University of science and technology, Wuhan 430074) |
 |
Streaming Media Client Based on Real-time Streaming Protocols |
|
JIN Hai,SHAO Yanming,HAN Zongfen (Institute of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074) |
 |
A Design of a Transparent Gateway |
|
ZHOU Gongye,WENG Yu,QIU Jianyong (Data Storage System Laboratory, Huazhong University of science & Techology,Wuhan 430074) |