Paper Title
Page
Authors: Li Li, Ye Yuan
Abstract:Most of IDS(Intrusion Detection System) are very particular about data source which might be asked to be categorical data or need to be...
867
Authors: Gang Yong Lin, Sheng Hui Dai, Shan Long Ma
Abstract:The increasing use of wireless communications in mobile devices starts a new level of resource management. Users with mobile devices...
872
Authors: Wen Ya Tian, Zhu Jun Xu
Abstract:Many methods have been used such as UDDI and DWS to discovery requested web services. But they are just a kind of simple syntax match based...
878
Authors: Cheng Fa Xu, Jun Ling Wang, Rong Gang Wu
Abstract:In order to meet multi-channel, high data rate, intensive computing capacity of modern radar signal processing, a standard, scalable,...
884
Authors: Sheng Hui Dai, Gang Yong Lin, Hong Zhen Xu, Liang Qing Zhang
Abstract:On the basis of the shortage on traditional workflow management system, a workflow management system framework integrated with Web Services...
889
Authors: Ting Mei Wang, Ge Chen, Hui Guan
Abstract:This paper presents an efficient algorithm filling Images with complicated closed edges through analyzing and comparing several frequent...
894
Authors: Rong Cheng
Abstract:A transformation technology for part model to blank model based on feature mapping of turbine blade was prompted to improve the design...
898
Authors: Bao Liang Hu
Abstract:According to the ways of information systems(IS) to support business strategy, this paper proposes three dimensions of IS strategy fitting...
905
Authors: Jun Chu, Man Tun Gao, Gui Mei Zhang, Rui Na Feng
Abstract:Based on iterative technique, a novel optimization approach for reconstruction a planar object from a perspective line drawing is proposed....
910
Authors: Cheng Dong Lu, Qin Wei Li
Abstract:This paper introduced security threaten and familiar vulnerability in Ad Hoc networks, described security requirements for Ad Hoc routing,...
916
Showing 151 to 160 of 263 Paper Titles