Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 6
A Model and Algorithm Design on Database System for Molded Lines of Fishing Vessels
han sheng ju ; nie shang yu ; liu qi min
..............page:198-200
Rebuild Legacy Database Schema with XMI
zhong hong ; xu liu tong ; wu jian lin ; zhao zuo zuo
..............page:196-197,225
Designing Model of Data Warehouse with OO Method
cai yong ; he guang sheng
..............page:193-195
Studing on the Influence Factor of Interestingness of Association Rules in Data Mining
lou lan fang ; jiang zhi fang ; tian shi zhuang
..............page:190-192
Information Security Protection and Secure Roam in WLAN
hu zhi yuan ; gu jun zhong
..............page:187-189,200
The Certificate Authority and it′s Application in "Digital Basin"
zhou xiao feng ; wang zhi jian
..............page:184-186
CDM Communication Model
luo zuo gui ; gu jun zhong
..............page:181-183,215
The Research on the Parameter Adaptive Congestion Control in ATM
li wei ; shi guo qing ; mao zong yuan
..............page:178-180
Automated Response Using System-Call Delay
yang wen quan ; lu yang
..............page:138-140
Implementation of Elliptic Curve Cryptography on Smart Card
li wei ; wang chun meng ; liu jie
..............page:123-125
Design and Development of Keyboard Command Parser for CAD Software
liu wei ; geng ying san ; wang xuan dong
..............page:126-127,140
Brief Analysis on Memory Leak Caused by fopen Under the Sun Solaris 7
zhong guo hui ; huang rui guang
..............page:128-131
A Form Driven Data Reverse Engineering Methodology
xu yi ; liu ya jun
..............page:132-134
Design and Implementation of Data Mining System Based on J2EE
ye song yun ; xu long fei
..............page:201-205
The Athletic Training Assistant System Based on Data Warehouse and Multimedia Information Database
guo teng chong ; wei ming zhu ; sun xiao ping ; tu xu yan ; jin ce ; wei guo
..............page:206-208,218
A Study of Enterprise Application Integration(EAI) Solution
gu zuo ; zhang shen sheng ; zhu xiang fei
..............page:209-211,222
An User Configuration Tool for Home Net
zhou jing ; liu sheng ; yang shi yuan
..............page:212-215
A Face and Document Integrated Recognition System
du cheng ; su guang da ; lin xing gang
..............page:33-36
Research on Enterprises Production Planning and Control System under Virtual Enterprises Environment
wang fu dong ; xue jin song ; zhu yun long ; li bing ; li li
..............page:29-32
Entity Partitioning Techniques in Distributed Virtual Environments
liu xiao jian ; wang zhao fu ; jin shi yao
..............page:26-28,32
Research on Integration of Mobile IP and MPLS
wang yu feng ; wang wen dong ; cheng shi duan
..............page:23-25,50
Thinking Mode of Agent under Network Environment
yuan feng shan ; zhu si ming
..............page:19-22
A Fast Multiply Algorithm of Field Element for Elliptic Curve Cryptosystems
li xue jun ; dai guan zhong ; zhang jun
..............page:16-18
A Novel Method Based on Signal-Noise Model for Choosing the Number of Principal Components
wang gang ; feng gui yu ; hu de wen
..............page:11-12,72
An e-Business Solution Model based on UDDI Architecture and Web Services
zhuang zi ming
..............page:174-177,186
Routing and Wavelength Allocation in WDM All-optical Networks
zhang wen tao ; huang chuan he ; wu xiao bing ; ding song ; wu ji
..............page:171-173
Improving the Efficiency of Intrusion Detection by Using Protocol Analysis
li xiao zuo ; zeng qi ming
..............page:169-170,180
A Comparative Analysis on Reliable Multicast Protocols
pan zuo tao ; wang zuo ; wu ling da ; wang hong xia
..............page:164-168
Research on Scheme of the Core Router Based on the Network Processor
li hong jie ; zhang hong ke
..............page:160-163
Connection Between Low-Level 8bit Micro-Controller and Internet
li shao wen ; han yuan jie
..............page:158-159
BGP Configuration and Its Effect on Router′s Performance
sun chao jing ; zhao bao hua
..............page:155-157
The Implementation of Network Register System on MS Proxy Server
zou gang ; ao yong hong ; ke shui zhou ; cao cheng zuo
..............page:151-154
Implementation of TCP Protocol in Embedded System
shi zhi guo ; wang yong ; wang tao
..............page:148-150
Cost-Model of Optimizing Point-Point SLA
ge li qing ; cheng guang ; gong jian
..............page:145-147,168
The Study of E-commerce Based on MultiAgent Collaborating Technology
wu qiang ; yao li ; liu fang
..............page:143-144,154
The Research of Integration of CORBA and Java RMI
li wen li ; deng gui shi
..............page:141-142,150
An Evolutionary Algorithm Based on Hybrid Crossovers and Intermittent Mutation
zhou yong hua ; mao zong yuan
..............page:8-10
The Research and Application of CAPP Expert System Based on CAPPFramework
jia xiao liang ; xu jian xin ; zhang zhen ming ; kong xian guang ; zhu ming zuo
..............page:5-7,36
Three Dimensional DNA Graph Structure Algorithm of SAT Problem
liu guang wu ; liu wen bin
..............page:3-4,18
Research with Pattern Matching Algorithms for Intrusion Detection
li zuo ; li wei hua
..............page:1-2,22
Function Oriented Memory Leak Detection Under Linux Operating System
wu min ; tu feng sheng
..............page:37-40
Wavelet Packets Based Features Representation by Best Bases Decomposition
zhang xiao wen ; yang zuo pu ; xu xiao ming
..............page:97-99,131
Application of Fourier Descriptor Based on Chain Code in Image Retrieval
huang yuan yuan ; guo li ; yang jing yu
..............page:95-96,110
The Research of Vulnerability Data Integrated Management Environment
zuo pei xin ; zhan shou yi ; chen hua
..............page:92-94
The Research of Statistical Feature-based Method and Wave Decomposition-based Method to Face Recognition
liu zhi jing ; liu li ; wang dong ; xue hong min
..............page:88-91
The Research on the Classification and Retrieval Method of Reusable Component
zuo rong jie ; feng li ; song yu
..............page:85-87,107
Automatic Performance Evaluation of Table Structure Recognition
jin jian ming ; shi guang shun ; zhang wei peng ; han zhi ; pan wu mo ; wang qing ren
..............page:82-84,91
Computer Vision-based Automatic Lane and Obstacle Detection
xing yan chao ; tan zheng
..............page:223-225
Practice of Intelligent Heating Managing and Control System with SCM
dong hua song ; liu en jiu
..............page:226-227,232
Petri Net-based Modeling of Office Automation Workflow
ye xu hong ; yan gang feng
..............page:228-229,232
Video Compression Based on Contents of Image
lin yao rong ; zuo rui ; wei gang
..............page:59-61
Research on Speech Segmentation Algorithm in Speaker Recognition
he zhi yuan ; hu qi xiu ; xu guang zuo
..............page:55-58
DOD TRM and an Architecture of CALS
zhang ming bao ; xia an bang
..............page:51-54
WIPPM :A Scalable Internet Performance Management Model
chen peng ; he lei ; sun xiao ning ; lv wei feng
..............page:46-50
Study on The Visualization of 3D Stratum Based on VRML
zuo xiao ping ; zhang yan min ; dong peng ; yang chong jun
..............page:44-45,72
Design of Collaborative Integrated Information System
shao xiu li ; dong ya li ; liu ming ming ; tu feng sheng
..............page:216-218
The Research of Technology of Information Publication Based on MQSeries
liu dan ; xiong zuo ; ou yang yuan xin ; pu ju hua
..............page:219-222
Analysis and Application of an Petri-nets-based Workflow Model
wang zuo ; liu wei dong ; yang sheng chun
..............page:100-102,131
Simulation and Application of Intelligent Self-organization Systems
zhang jing sheng ; zhong ling ; zhang lei
..............page:103-107
A New Approach to Application Software Specification
wang yong
..............page:108-110
Implemention of Distributed Objects System in NIPL
huang xue mei ; li tao ; wu liang fu
..............page:111-113,131
Solution of Some Questions in the Development and Application of Office Automation System
yuan zuo ; zhu shao wen ; zhang da bin ; chen lin ; gao xiao xin
..............page:114-115,137
The Technology of Visual Basic Programming Based on Microsoft Agent
zhao jian min ; zhu xin zhong
..............page:116-119,140
An Automatic Single Channel Analyzer Based on MCS-51 Single-chip Microcomputer
huang jian ping ; xie ke fu ; zhou xin yi
..............page:120-122
A Digital Watermarking Algorithm Based on Bit Planes
lu zong qing ; mei zuo zuo ; huang jing xiong
..............page:79-81,107
Research on Software Process Modeling Based on UML
li si guang ; lin zi yu ; hu feng ; pan xiao jin
..............page:76-78
Image Interpolation Based on Edge-shifted Matching Method
zhang jun hua ; chen jian hua ; wang zuo ; shi xin ling
..............page:73-75,134
Modelling Method Research for History-based User-defined Features
zhao zuo zhu ; chang ming ; zhu lin ; wu jun jun
..............page:67-69
Using RBF Neural Networks to Calibrate Camera in MIROSOT
yuan ye ; tian zhong xu ; ou zong zuo
..............page:65-66,91
Technique and Development of Data Mining Language
li bao dong ; song zuo tao
..............page:62-64,94