Based on role object, the Business Process Reengineering (BPR) is quickly implemented by constructingthe frame of role model. This technology will be widely app
There are two well-known characteristics about text classification. One is that the dimension of the sample space is very high, while the number of examples ava
Web Cluster is an effective mechanism used in Web site construction to deal with the system capacity prob-lem. Researchers proposed several strategies or algori
Security protocols use cryptography system to complete the tasks of principal identity authentication andseccion key distribution. The correctness of security p
In this paper, classical control theory and Smith's principle are applied in designing a class of effective andsimple congestion control schemes for high-sp