X
Xia Hongxia
Application of Data Mining Technology to Intrusion Detection System
Reach on How to Connect Database in FORTRAN
Xia Huosong
Cooperation Agent Applications for MKA based on Grid Computing
Xiang Yang
A New Security Solution of E-Commerce Based on Web Service
Xiao Chun
The Health Monitoring and Damage Identification Platform of the Civil Infrastructure Based on Internet
Xiao Hanbin
The Research of An Inventory Control Information System Based on The Internet
Xiao Xinping
Generating Algorithm of IAGO Generating Space
Xiong Guohai
The Warehouse Management System Based on the Distributed Database
Xiong Shanqing
A New Neural Network Models Based for Rule-Based Reasoning
Xiong Ping
Mining Fuzzy Associate Rules for Anomaly Detection
Xu Dongping
Approach on Visual Federation Member Relationship
Approach of Feature Extracting Based on Single Sample
Xu Feng
Stand Space Theory and It¡¯s Application on SET Protocol
Xu Huazhong
Empirical Studies for Two Evolutionary Fuzzy Controllers
Xu Huiying
The Summarize of JAVA Platform for Web-based Computing
Xu Kun
Metadata Catalog Service for Geographic Information Resource
Xu Wenbo
Efficient Scheduling of Task Graphs to Multiprocessors Using a Simulated Annealing Algorithm
Xu Yong
An Object-oriented Knowledge Representation Method
Construction and Maintenance of the Knowledge Base Used in GSIES-TOOL
Xu Zhe
The General M Set and Julia Sets Generated by Complex Iteration ZN+1=Z +C
Xu Zhiwen
The Cache-Multicast Method of Proxy Cache for Streaming Media
Xue Caijun
A Web-based Engineering Optimization System and Its Application
Xue Qingshui
Bilinear Pairings-based Threshold Proxy Signature Schemes with Known Signers
Security Analysis and Improvement of Some Threshold Proxy Signature Schemes