Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2005 Issue 2
Cellular Automata Model to Simulate the Infect of the Epidemic Diseases
Yu Xin;Duan Xiaodong;Liu Xiangdong;ZHOU Fucai
..............page:205-209
RD-RACE :An Improved Rate Control Mechanism in Ethernet
Zhang Yibo;Li Wei;Lei Zhenming
..............page:149-153
The Realization of BACnet over IP
Wang Zhongming;Liu Xiande
..............page:146-148
Simulation Platform of Networked Control System Based on Matlab
He Jianqiang;Zhang Huanchuen;Jing Yazhi
..............page:142-145
Personal Search Engine Based on Web Services
Cao Long;Du Yajun;Liu Zuo;Li Zhangsheng
..............page:138-141,175
On-line Dynamic Incremental Learning in MAS Negotiation and Its Application in E-commerce
Jing bo;Li Jian;Qian Yueying
..............page:136-137,160
Authenticated Key Exchange Scheme for Secure Against the Man-in-the-Middle Attack
Li Jialan;Lu Jianzhu;Zhang Lei
..............page:133-135
A Workflow Access Control Model Based on Role and Task
Xing Guanglin;Hong Fan
..............page:210-213,222
The Application of CANBUS 2.0B in Power Distribution Automation
Deng Xiaogang;Tang Houjun
..............page:214-216
The Application of Data Mining in Analyzing Accountant in the Company
Li Jianfeng;Li Yijun;Qi Wei;Jin Shiwei
..............page:217-219
The Quick Inspection System for Flexible Printed Circuit Board Based on Image Contrast Technology
Zhang Yisheng;Peng Yi;Liang Shuyun;Li Dequn
..............page:220-222
A Method of Discerning Precisly in Plate License Character Recognition
Tong Jianjun;Zou Mingfu
..............page:223-226
A New Model of Intrusion Detection Based on Artificial Immune Theory
Liang Kexin;LI Tao;Liu Yong;Chen Huan
..............page:129-132
Design and Implementation of the Prefix Email Filtering System
Lin Xiang;Jing Tao;Li Shenghong
..............page:116-119
Linux-hosted Intrusion Detection System Using Least Square Support Vector Machines
Wang Yong;Yang Huihua;Wang Xingyu;He Qian
..............page:120-124
A Survey on Qos Constraints_Based Multicast Routing
Liu Xianfeng;Shu Lin;CHEN Songqiao;Chen Jianer
..............page:125-128
Clustering Algorithms for Wireless Sensor Networks
Liu Gang;Li Zhigang;Zhou Xingshe;Gu Jianhua
..............page:16-18,153
Clustering of Web Search Results Using Link Analysis
He Yongjun;Luo Jiawei;Sun Xingming
..............page:179-183
Contriving and Realizing of Battlefield Environment Database
Dong Zhiming;Wang Hui;Guo Qisheng
..............page:173-175
A New Index Mechanism for XML Database
Zhu Hong;Tong Yao
..............page:171-172,226
Research on Modeling Dynamic Structure for Artificial Plants
Geng Ruiping;Duan Jun;Tu Xuyan
..............page:14-15,32
Techniques in Intrusion Detection System
Zhao Junzhong;You Lin;Xu Maozhi;Sun Shanli;Huang Houkuan
..............page:11-13,89
A Study of Platform for Distributed Agent-based Simulation
Fu Xing;LIN Yin
..............page:100-102,148
The Structure of Web-based SQC and Its Communication Implementation
ZHAO Fengyu;Sun Xiaobin;Ma Yizhong
..............page:103-106
Design of SFR Bus for Reusable Microcontroller IP
Xue Liqin;Zou Xuecheng;Chen Chaoyang
..............page:107-108,132
Analysis on Definition and Realization Models of SoD in RBAC
Ouyang Yu
..............page:112-115,190
Design of a Marrow Cell High Spectrum Microscopic Image Classifier
Xie Wenjuan;Zeng Libo;Wang Sixian;Wu Qiongshui;Zhang Yan
..............page:97-99,168
A Real-time and Accurate Numeric Recognition Algorithm
Xu Dahong;Wang Runsheng
..............page:87-89
Testing of Wall Thickness for Aero-turbine Blade Based on ICT Image
Wang Qingsheng;Zhang Dinghua;Cheng Yunyong;Zhao Xinbo;Wang Kai
..............page:203-204
Design of Geographic Information Metadata of Water Project
Zhu Yuhua;Chen Yonghua
..............page:200-202,226
A Review of Algorithms of Single-loop Data Based for Speed Estimation
Gong Xingbin;Yao Danya
..............page:197-199,209
Design and Implement of RCM Maintenance Interval Analysis Software Based on Activex Technology
Qu Changzheng;Zhang Liu;YU Yongli;Chen Yubo
..............page:194-196
DNA Microarray Image Analysis Based on Clustering and Statistic Analysis
Wu Shuanhu;Yan Hong
..............page:22-25,86
A Novel Algorithm on Color Image Compression Based on 2D Fractal-wavelet Transforms
LI Huifang;Niu Zhao;Yu Bianzhang
..............page:19-21
Implementation of Multi-Projector Displays
Cao Shuangxi;Chen Fumin
..............page:84-86
The Approaches to Model Transformations Based on MDA
Lin Wei;Xia Kuanli
..............page:80-83
Network Behavior Analysis Based on Multi-distribute Agent Radial Basic Function Neural Net
Qiao Aiping;Song Rushun;Shen Lingling
..............page:169-170,196
A Firewall Gateway Based on Specific Network Stacks
Guo Xiquan;Zhang Huiting;Fang Shan;Zheng Liming
..............page:165-168
The Framework of Dynamic Defense System for Distributed Network
Liu Hongfa;Huang Minghui;Tan Zujun;Xia Chunhe;Fan Yuehua
..............page:157-160
A New Application Model of Mobile Phone in the Ubiquitous Computing Environment
Xu Ying;Chen Enyi;Shi Yuanchun;Xu Guangyou
..............page:154-156,219
The Object-Oriented H.323 Protocol Stack Analysis and Implement
Ren Yanzhen;Hu Ruiming;Xu Yanyan
..............page:7-10
Software Project Complexity Evaluation Based on Evidence Reasoning
Jiang Guoping;Chen Yingwu
..............page:4-6,10
Summary of Particle Swarm Optimization and Its Improved Algorithms
Zhang Yan;Wang Lei;KANG Qi;Wu Qidi
..............page:1-3,62
The Application of Motion Tracking and Motion-JPEG2000 in Videophone System
Wang Chengru;Li Lin;CHEN Shuzhen
..............page:227-229
Design of Fuzzy Logic On-Ramp Controller in Freeway and Its Simulation Research
Liang Xinrong;Liu Zhiyong;Mao Zongyuan
..............page:230-232
The Designing and Comparing of Multi Diagnosis and Reasoning Methods
WEI Yuanyuan;WANG Rujing;Fang Jing
..............page:57-58,119
Difference Driving Fuzzy Decision Algorithm Based on Fuzzy Eigenvector
Gu Xiangbai;ZHU Qunxiong
..............page:53-56
Uncertainty Measures of Rough-fuzzy Sets
Wang Hong;Zhang Wenxiu;Li Hongru
..............page:51-52,186
An Adaptive Information Hiding Algorithm of Digital Speech Signals Based on Wavelet Transform
Hu Jicheng;Huang Xiaodi;XieYuqiong
..............page:47-50,135
The Research on CGF Team Advanced
Zheng Yanbin;Wei Ji
..............page:44-46,79
Component Software Configuration Management & Research on Version Control Technology
Ni Xiaofeng;Zhao Wenyun;Zhang Jie
..............page:94-96,145
A Multi-objective Optimal Evolutionary Algorithm Based on Tree-ranking
Chen Liu;Zhou Wei;Zhang Guoping
..............page:90-93,164
Image Retrieval Based on Fuzzy Similarity Measure
Li Junli;Chen Gang;Chi Zheru
..............page:36-39,74
Applications of PDEs Model in Image Analysis and Processing: a Survey
Fu Shujun;Ruan Qiuqi;Wang Wenqia
..............page:33-35,89
A New Iris Location Algorithm
Jiang Li;Li Changyun
..............page:30-32
A Watermarking Algorithm Based on Adaptive Modulation Factor
Wang Jinwei;Dai Yuewei;Wang Zhiquan
..............page:26-29,124
A New Iteratively Progressive Multiple Sequence Alignment Algorithm
Zhang Min;Fang Weiwu;Zhang Junhua;Chi Zhongxian
..............page:72-74
A Method Based on Behavior and Its Application in Model Transform
Tian Xiaoyu;Wang Mingzhe
..............page:69-71,209
Spherical Surface Reconstruction of Computer Generated Hologram
Ding Dawei;Wei Sui
..............page:66-68
Fast Tessellation for Implicit Surfaces
Yu Li;JIN Xiaogang;Feng Jieqing
..............page:63-65,68
A Mended Shifting Bottleneck Algorithm for Job Shop Scheduling
Huang Wenqi;Huang Zhi
..............page:59-62
Research on Ontology Modeling Using Object-Oriented Technology
Chen Kai;HE Keqing;Li Bing;Liang Peng
..............page:40-43