Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 19
The Design and Implementation of Structured Text Retrieval System
wang jian ; zhou zhi ying ; xiao hui yong
..............page:133-135
The Design of Feedward Neural Network Based on Recursive Prediction Error Algorithm
mu ling ling ; wang gui ping
..............page:130-132
Multi-channel Real-time Data Acquisition System Based on USB
chen xin hao ; liu hai hua ; chen ya guang
..............page:128-129,135
The Application of Design Pattern in CORBA System
wang jie ; li zhi shu ; liu wei shi
..............page:125-127
The Investigation and Analysis of UNIX Memory Management
zheng xue feng ; lin cheng yong ; yao xuan xia
..............page:139-141,182
New Scheme for Firewall Solution:Hierarchical Firewall System
li chun yan ; yang yong tian
..............page:161-163
The Design and Implementation of Mail Server Based on Java
kong fan fei ; jin lian fu
..............page:164-166,170
Research on the Control Protocol for Visual Communication Based on H.245
li rui ; yu zhan wu ; pan shao ming ; hu rui min
..............page:167-170
A QoS Multicast Routing Approach with Good Point Set Based Genetic Algorithm
gu jun hua ; wang fang wei ; song jie
..............page:171-175
Cyber IDS--New Generation Intrusion Detection System
jiang jian guo ; fan xiao zuo
..............page:176-179
The Design and Implementation of Vehicle Monitor and Control System Based on GIS/GPS/GSM
su zi lin ; han xiao ling
..............page:206-208,226
An Automatic Subject Indexing System Based on Feedback Rule Learning
liang hong bing ; yang ming kui ; zhao wei hua
..............page:209-211
Design of EPG WebTV System
li shu zuo ; li xiao jiang ; hu zheng guo
..............page:212-213,220
The Business Process-oriented Enterprise Application Integration Methodology
jiang hong xi ; xie mo xuan
..............page:214-216
The Research on Principle and Method of Parametric Design for Relating-graph
jin jian guo ; zuo yong wei ; zuo xue jun ; zhou ming hua
..............page:122-124,179
Natural Texture Synthesis Based on Steerable Filter Pyramid Algorithm
li hou qiang ; ye zhong fu ; zhang qian
..............page:84-86,99
The RealizationOriented Protocol Description Language
liu cai xing ; xiao de qin ; xie jie rui
..............page:81-83,145
Impact of Chinese Segmentation to Chinese Information Retrieval
cao gui hong ; he zuo lian ; wu guang yuan ; nie song
..............page:78-80,90
Texture-based Skin Detection
li yan ; shen zuo jing ; zhao de bin
..............page:74-77
Chinese Telephone Number-input Technology for Chinese Surname Character and its Applications
luo ren ; guo sheng fang ; yang qing jie ; yao ze qing
..............page:71-73
Comparative Study on Improved Models of BP Networks
li chao feng ; qu ying ge ; xia de shen ; zou hai
..............page:120-121,132
How to Demonstrate Parallel Efficiency with Pictures
hao xiao yun ; fan yu mei
..............page:118-119,232
A Service Mechanism of Handle System for Open Digital Library
yu jun ; gu jun zhong
..............page:142-145
Security Protocol Verification for E-Commerce
yang jin ji ; su kai le
..............page:146-148
The Cross Authentication Scheme Based on Forward-secure Digital Signature
wang xiao feng ; wang shang ping ; luo xi zhao ; yan zhao jiang
..............page:149-151,163
A New Multi-Objective Programming Model of Qos-based Multicast Routing Problem
pan yun ; yu zhen wei ; liu ke jian ; zuo wei
..............page:155-157,163
The Research of RSA Algorithm in the Electronic Commerce Payment System
wang la fang ; di yun bo
..............page:158-160
The User Model and Building Methods for the Intelligent Human Computer Interface Agent
zhang zheng lan ; zhang ming
..............page:115-117
Service Process Modeling Based on Workflow
zhu dan jun ; feng bo qin ; zhang ke
..............page:111-114
Image Enhancement Method Based on Rough Sets Classification
jiang jia fu ; diao hong xiang ; tang xian zuo
..............page:109-110
Fractal Compression of Order by Variance and Similar Extension
hua zhen ; fan hui ; fan ce ; li jin jiang ; liu jing yun
..............page:106-108,117
Test Case Generation Based on Interface State Cause-Effect Chart
jin yi fu ; yang xue wei ; chen chuan yi
..............page:104-105,114
Research and Realization about Grid Map Vector
zou xiu ming ; zhang yue xin
..............page:102-103,138
Research of the Agent Database Integration Based on Java RMI
shen zuo ; yin zhao zuo ; chen jin song
..............page:183-185
An Algorithm of Fuzzy Association Rule Mining in Relational Database
dong dou dou ; li deng feng ; cheng chun tian
..............page:186-188,226
Study and Implementation of Intrusion-Detection Alerts Via Correlation Analysis
li xue ying ; liu bao xu ; bi xue yao ; an de hai ; xu zuo sheng
..............page:14-16,114
A Technical Overview of Software Development Environment for Telecommunication System
bian xue gong ; hu rui min ; yu zhan wu ; li de ren
..............page:10-13,20
A Peer Discovery Method Based on IP Multicast
li zu peng ; liu qin rang ; li yun tao ; huang dao ying ; huang jian hua
..............page:7-9,64
A Fast Image Segmentation Method Based on Histogram Evaluation Function
zuo qi ; shi zhong ke
..............page:5-6,20
Probing the Heterogeneity Problems for Information Systems
zeng guo zuo ; chen zuo zhong
..............page:1-4,54
The Research of the Methods of Outliers Mining
jiang liang xiao ; cai zhi hua
..............page:189-191
On Data Mining and the Appreciation of Human Quality
zhang de xin ; cui wei ; jiang tian fa
..............page:192-193,223
Containment Checking among Multi Queries
hong xiao guang ; li zuo
..............page:194-195,211
Research on an Algorithm for Mining of Efficient Association Rules Based on Apriori
zhang mei feng ; zhang jian wei ; zhang xin jing ; lou shu qin
..............page:196-198
Applying Petri Nets in Modeling Business Workflow
lu chao xia ; zeng guang zhou
..............page:199-202
Stduy on Proxy Web CACHE Based on Content
chen xiao long
..............page:100-101,185
Moving Object Detection Based on 2-D Histogram Segmentation and Color Segmentation
wang jin song ; ye zhong fu ; li hou qiang
..............page:96-99
Enhancement of Image by PCNN
zhang jun ying ; lu tao
..............page:93-95,127
The Convergence Analysis and Algorithm Improvement of Computation Algorithm
zuo jun ; kang li shan ; chen zuo ping
..............page:91-92,179
Design and Implementation of Web-Based Seal Management System
he zuo ; ye ke jiang
..............page:217-220
Internet-based Intelligent After Service System
zuo zuo feng ; wang dong bo ; zhu ming zuo
..............page:221-223
The Challenge of ERP Strategy for Traditional Enterprise Finance Management
chai yong xin ; lu zuo
..............page:224-226
Using Role Model to Analyze and Design Multi-Agent Based Supply Chain Management System
luo wen bo ; chen you ping ; ai wu ; lou ping
..............page:227-229
The Research of Virtual Enterprise Model Parallel Simulation
wang guo wei ; yan zuo zuo ; dai yi ru
..............page:230-232
An Adaptive Learning Algorithm for Image Recognition
feng zuo ; liu yong jun ; zhang cui jun ; yang yang
..............page:69-70,77
Image Normalization-Based Watermarking for Video Objects
wu rui ; sun yan kui ; tang long
..............page:65-68
Design of Nation-wide Call Center Based on Voice and Data Network
chen zuo ; chen xin yi
..............page:55-58
The Application of Data Mining in Teaching Appraisal
ma xi rong ; sun hua zhi
..............page:51-54
Mining the Data of Enterprise Business to Find Potential Users in the Planning of Product Design
qin zhong bao ; he wei ping ; peng wen li ; yu zuo fang
..............page:43-46
A Parallel Implementation of Elliptic Curve Cryptosystem on DSP
tu hang ; wang chao zuo ; li li ; li yuan xiang
..............page:40-42,46
Design and Implementation of the Fast Algorithm for Extracting Contour in 3D Scanner
lei hai jun ; li de hua ; qian zuo tie ; lei feng zhong
..............page:37-39
CAC Scheme Based on Adaptive Threshold Control in Cellular Networks
deng gang ; yang guang ; zhang ping
..............page:34-36,58
The Applications of Blind Signature in E-cash
peng bing ; yang zong kai ; tan yun meng
..............page:31-33
The Design of BP Neural Network on Chaotic Gradient Optimal Algorithm and its Application
hu zhi kun ; gui wei hua ; peng xiao qi
..............page:29-30,50
Wavelet Based Feature Representation
zhang xiao wen ; yang zuo pu ; xu xiao ming
..............page:25-28
Software System of Automatic Mail Sorting Machine
huang lei ; liu chang ping
..............page:21-24,50
The EIS Data Management Architecture Based on Data Warehouse
wang suo zhu ; sun yu fang
..............page:17-20