Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2002 Issue 12
The Design and Realization of Intelligent Interface of Knowledge Base in KDD
huang shao jun ; liu yu zhen ; yang bing ru
..............page:202-203,223
Access Control Based on Data Partition
zhang hong sen ; zhu zheng yu
..............page:204-206
The Establishment of the Database of the Distance Education System Based on Web
deng da quan ; xue bing
..............page:199-201
Research on Technique of Rule-Based Subject-Oriented Analysis of Data Warehouse
liu zhen ; deng su ; cao ze wen
..............page:195-198
The Design and Development of MDM2 Lite:a Client-Side Database of Mobile Database Management
wang yuan zhen ; wang li dong ; li dong
..............page:193-194,198
The Physical Design for Parallel Database PDBMS
xu xiang yang ; cai ji ping ; zhang yong
..............page:191-192,220
The Research of Distributed WEB Software Development Based on Reuse
gao da qing ; meng ying jie ; du yi tao ; zhao shu cheng
..............page:188-190
The Analysis and Countermeasure of Denial of Service
zhang shuang ; qing si han
..............page:183-187
Implementation of Proxy Service Based on Application Layer Transfer
xu rui jing ; xu xue zhou
..............page:180-182
The Research and Design of Policy-based Network Management Software Platform
li jin ping ; gao dong jie
..............page:177-179
Communication Module's Design of the Mass Capability HA System
mo yi jun ; wang xiao yan ; dong yan
..............page:175-176,206
Multicast Security Research and Implementation
dai qiong hai ; zuo yi li ; zhang ying ; chen feng
..............page:171-174
Study on Mobile IPv6's Notification Protocol
liu jin rong ; cai ming
..............page:168-170
A Dynamic Routing Algorithm Based on Neural Network
yuan you wei ; yu jiang hong ; zhan han hui
..............page:165-167
The Implement Model of Risk Management of Information System Development
yu jian ; zheng yue bin
..............page:110-112,153
The Consistency Algorithm of Whiteboard Tool
xu bao min ; zhao huai lin
..............page:113-115
A Sorting Algorithm on Probability Distribution(2)
zhao zhong xiao
..............page:103-104
An Algorithm for Combining Classifiers Based on Fuzzy Integral and Genetic Algorithms
li yu zuo ; qiao bin ; jiang jing ping
..............page:119-121,140
Design of Testing Scenario Generation Based on UML Activity Diagram
liu min ; jin mao zhong ; liu chao
..............page:122-124
Research and Implementation of Intelligent Information Agent
chen hong ying ; li wei hua
..............page:125-127
WorkFlow Design Based on Interlink Structure
yu chen ; li wan zhou
..............page:128-131
An Agent Oriented Programming Shell System
zhang shi jie ; guo hong wei
..............page:132-134
A Software Process Model Based on Principles Set
jiang li ping
..............page:100-102
A Construction of Knowledge Model in IHMCAI System
hu ning jing ; xie shen quan ; jiang hong yan
..............page:97-99
New Trends of Software Configuration Management Technology
luo fang bin ; lu yong ning ; mai zhong fan
..............page:94-96,99
A Dynamic Combination Method of Multiple Classifiers
pan xiang ; yao ming hai ; chen guo hua
..............page:92-93
Study on Conformance Testing of User Datagram Protocol
yu xiao li ; wu jian ping
..............page:138-140
The Constraint-based Routing to Implement Traffic Engineering in the Internet
wang wen yi ; chen jing
..............page:141-143
The Study on Evaluation Metric of Internet End-to-end Behavior
bi jing ping ; li zhong cheng ; wu qi
..............page:144-150
The Schemes of Implementing IN-CPH in VoIP Networks
qin jun ; ma yu xiang
..............page:151-153
IP Telephone Technical Based on New Network Protocol
wang yu feng ; yang shou bao ; sun shi
..............page:154-156,187
Special Networ Adapter Driver Development for LINUX Based on Double Register
xu xiao fei ; kang ji chang ; hua zuo
..............page:157-158,187
Multi-Agent Based Internet Information Service Mode
tan chang geng ; wang bin ; wang jian xin
..............page:159-162
Network Security Framework Based on User Behavior Analysis
li wei
..............page:163-164,170
OPC :Application of the COM Technology in Industrial Automation Software
gu jian ; wang jing chun ; huang de xian
..............page:207-209
Object-oriented Abstract Model of Network Communication in Substation
sun jun ping ; sheng wan xing ; wang sun an
..............page:210-212
The Computer Control and Measure System Applied to the Pantograph / Catenary Mixed Dynamic Simulation System
wu xue jie ; zhang wei hua ; yang shi jie ; mei gui ming
..............page:213-216
Management of Engineering Change and its Applied Examples in Concurrent Engineering
zhu quan min ; xiong guang leng ; gu cheng lin
..............page:221-223
Design of E-commerce Competition Simulation System
tan chun ; gu wen dong ; liu lu
..............page:224-226,247
Design of the City Investment Environment Assessment System
guo sheng fang ; zhang chang chun ; zhang han ya
..............page:243-244,247
Research on a Multimedia Courseware Publishing System Based on WebLogic Server
wang hai hang ; tan cheng xiang ; zhang liang
..............page:245-247
Redundancy Management Technique on an Aviation Fault Tolerant Computer
cheng xin ming ; xiong jia jun ; chen jin song
..............page:248-250
Computational Intelligence in Engineering
wang jiang qing ; jiang tian fa
..............page:251-252
The Study of Enterprise Data Integration
yin xiao zuo ; fu yuan bin ; li jing
..............page:253-255
vspworks,dsp ying yong cheng xu kai fa li qi
liu zhan wen
..............page:256
Design and Analysis of the Double Hash Function of a Hash Table
luo yong long ; huang liu sheng
..............page:59-60
Study on Network Security Active Defense Architecture and its Application
zuo huai zhi ; hu chang zhen ; tan hui min
..............page:26-28
The Model of Marketing Outlier Mining Based on Fractal
xia huo song ; cai shu qin
..............page:24-25,28
Multi-service Network Traffic Engineering Model :An Analysis
liu qing nan ; lin sheng ; bao zong zuo
..............page:21-23
Design of MIS Based on Two-tier Data Warehouse
zhu yi hua ; zhou gen gui ; gao ji ; chen li min
..............page:18-20,40
Research on the Network Management Technology Based on the Multi-agent
wang xiao kai ; hou chao zuo
..............page:15-17
Distributed Speech Recognition System and Relative Techniques
liang zuo
..............page:57-58,137
An Algorithm of Portrait Composition Based on Component
liu tong ; su guang da
..............page:54-56,174
The Research on Applying Tone Information in Mandarin Speech Recognition
qiao chun lei ; wu ji ; wang zuo ying
..............page:51-53
A Novel Image Analysis Approach--Area Histogram
wang zhi gang ; wang wei ; xu xiao ming
..............page:48-50
Caculation on High-ranked R I of Analytic Hierarchy Process
hong zhi guo ; li zuo ; fan zhi hua ; wang yong
..............page:45-47,150
XML and Building of New Generation WebGIS
wang xing ling ; yang chong jun ; liu dong lin
..............page:227-230
An Automatic Dimension Algorithm Under a New Partition for Joint Drawing in Steel Structure CAD System
liu bao qin ; shi fa zhong ; tang wei qing ; huang yong hong
..............page:231-233
The Design and Implementation ofWater Resources IS for Internet
zhu gui liang ; xu qiang ; song qing tao
..............page:234-236,239
The Design and Implementation of Wireless Real Time Warehouse Management System
sun dan ; song zuo tao
..............page:240-242,250
Research on Karatsuba's Algorithm Application
zuo feng hui ; fan xiao zuo ; wang dang hui
..............page:43-44,216
Data Mining in the Huamn_like Intelligent Control
wang pei jin ; liu qi cheng
..............page:41-42,53
Research on the Logistics Guarantee of War Area
liu zhi qin ; zhang ming zhi ; wang xian feng ; yao guang feng ; nie cheng
..............page:39-40
Baysian DOA Estimator by Gibbs Sampling
sun yi ; liu ke wei ; huang jian guo ; zuo fu zhao
..............page:36-38
The Scheme Design of Distributed System of Satellite Thermal Circumstance Prediction
zhong shi sheng ; lin lin ; li fu jun ; wang zhi xing ; pang he wei ; zuo shao guang
..............page:33-35
Encoding Schemes of Array Problem in Genetic Algorithms
han jian feng ; li min qiang ; kou ji zuo
..............page:29-32
Research of Mass Customization News Based on NewsML
zhang xin long ; zhu you qin ; xia guo ping
..............page:12-14,28
A Vulnerability Description Language
li zuo ; li wei hua
..............page:10-11,32
Design Patterns Using in NMS
liao zhi gang ; li zeng zhi ; kou ya zuo
..............page:7-9,81
Key Issues on Optical Jukebox for VOD Systems
li qing guo ; cai an ni ; sun jing zuo
..............page:5-6,17
A Network Topology Model and its Arithmetic in OSPF Protocol Testing
wang zhi liang ; yin xia ; li zhong jie
..............page:1-4,35
Image Retrieval Based on Color-Space 2D Histogram
liu fang ; wang tao ; zhou deng wen
..............page:85-88
Hybrid Flowshop Scheduling Method Based on Genetic Algorithm
wu yun gao ; wang wan liang
..............page:82-84
Soap and Its Impact on Web Service
li dong ; zhou xiao yu ; xu bao wen
..............page:78-81
A Kind of Digits Recognition Method Based on BP Neural Network
zhu man li ; sun zhi feng ; sun zhi lin
..............page:75-77,84
The Construction Method and Validation Algorithm of Certificates Path in Public Key Infrastructure
wang xiao feng ; wang shang ping ; wang yu min
..............page:72-74,88
Research of Random I/O Schedule of Tertiary Device in Massive Storage Management
hu jun zhe ; zhou li zhu ; shi jing
..............page:70-71,162
A Concept Space Based Text Retrieval System
zheng yi ; wu bin ; shi zhong zhi
..............page:67-69,190
Personalized Information Service Based on Agent
yang kai ; zuo zhi yang
..............page:64-66
Research and Implementation of Agent-based Cooperative Design System
yang xue hai ; wu lan mu qi
..............page:61-63,167