Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2003 Issue 14
In System Programming of CPLDs in Embedded System
han xiao ru ; xiao tie jun
..............page:172-173,191
Implementation of Serial Viterbi Decoding Based on FPGA
chen chun xia ; wang kuang
..............page:169-171
Implementation of Information Analysis and Decision Support System for Power Supply Customer Relation Management
zhou xiao zuo ; fang zuo ; wu yao kun ; mao wei zhen
..............page:167-168,182
Implementing Strategies of Redundant Technology Based on PROFIBUS-DP
yu han zuo ; lu bao chun ; xu de hong
..............page:174-176
Image Fusion Method Based on Matlab
hu tao ; wang qiang ; zhang zhi gang
..............page:177-178
Developing Applied Instance of Electronic Map Based on MapObjects
zhang cheng cai ; sun xi mei
..............page:179-180,188
Principle and Method for Getting NIC Node Address Directly
li quan zhong ; yue xun ; fei yu kui
..............page:181-182
Design of Knowledge Query for NKI-Tutor
tang su qin
..............page:183-185
Control System GCS Based on PC
wu zhi song ; ma zeng liang ; gao dong jie
..............page:186-188
E-cash System's Research and Realization Based on RSA
liang qiao quan ; wang xun
..............page:189-191
System Design of Fault Diagnosis Device for Electrical Control System
yu chuan qiang ; guo xiao song ; zhang an
..............page:163-164,176
Study on Host-slave Communication Between IPC and HMI
wang you qing ; tian yong tao ; li cong xin
..............page:161-162
Research and Design of HA Tolerant System
pan jian ; chen li hua ; ni ming ; chai xiao li
..............page:158-160,171
Implementation of Remote Video Monitoring System Based on Internet
liu wei na ; zhang de yun ; cheng zhu lin ; zhang peng
..............page:156-157,封三
Progressive Watermark Technology Based on Bit-plane
hu zheng ping ; wang shi ming ; wang cheng ru ; wang jin jia
..............page:154-155
Technique for Medical Image Geometrical Registration Based on ICP Algorithm
li bin ; wu song ; wang cheng zuo
..............page:151-153
Reconstruction of the 3D Surface of Head Based on 1D Interpolation
cai shang shu ; cheng yi min ; wang yi xiao ; duan hong
..............page:148-150,162
Value-added Service System Based on Short Message
jiang li ; hu jin zhu ; deng rui
..............page:146-147
Analysis of IP Address Lookup Algorithms
zuo xiao ming ; zhou xin ran
..............page:143-145
Study on Software for BACnet/IP Router Implementation Based on Java
pu yun ; hui xiao shi ; liu xian de
..............page:139-142
A Method for Tongue Coat Classification Based on Neural Network Integration
liu guan song ; xu jian guo ; gao dun yue
..............page:100-102
Vehicle License Plate Locating Based on Horizontal Difference and Window Scanning
yuan bao min ; jin yi su ; yu wan bo ; wei xiao peng
..............page:103-105
A Knowledge Search Strategy over the Internet-based Distributed Network
ding jian hui ; liu zuo ; ling wei qing
..............page:106-108
An Improved BP Algorithm for FNN and Its Application
song xuan bin ; wang pei jin
..............page:109-111
Number Character Recognition Based on Artifcial Neural Network
wu qiang ; tong xue feng ; ji zuo
..............page:112-113,132
Three Mechanisms of Key Encryption Algorithm in Network System
lv lin tao ; cui du wu ; hei xin hong ; zhang xiang
..............page:114-116
Client/Server-based System Data Collection
jiang le tian ; zhou ling ling ; xu guo zhi
..............page:32-34
Performance Analysis of CSMA/CD Under the Self-similar Traffic
shen wei ; feng rui ; shao hui he
..............page:30-31,34
Distortionless Digital Watermarking Based on Integer Wavelet
chen ji dong ; xuan guo rong
..............page:27-29
Montgomery Algorithm and Its Fast Implementation
lei ming ; ye xin ; zhang huan guo
..............page:45-46,111
Object-oriented Model and Design Patterns in Web Applications
ge liang ; ye en ; shi bo le
..............page:42-44
Dual-key Pair Model and Key Life Cycle Management in PKI
hu yan ; dai ying xia ; zhu peng fei
..............page:39-41,108
Data Mining-based CIDF for Coordination and Exchange
niu jian qiang ; cao yuan da ; yan hui
..............page:35-36,126
Exception Handling Mechanism in JCVM
zhang da wei ; zhang qi shan
..............page:24-26
A Kind of Internet Service Management Architecture Based on QoS
yuan man ; luo jun ; hu jian ping ; zuo zhi gang ; ma jian
..............page:22-23,29
News Story Detection Based on Anchorperson Identification in News Video
zhang chun lin ; zhang peng lin ; hu rui min
..............page:20-21,26
ADO Static Binding Method Based on DFX Data Exchange Mechanism
zou hai ; li chao feng ; xiang nan ; jiang jian guo
..............page:18-19,67
Parallel Computing of LASG/IAP Ocean General Circulation Model and Its Optimization
zhang li lun ; song jun qiang ; li xiao mei
..............page:15-17
Research on System Architecture of Product Configuration Design Based on Web
xu hua bing ; li ren wang ; wang zuo juan ; zhao yun
..............page:49-50,88
Quality Model for Object-oriented Design
zhang gui zhu ; liu li ying
..............page:77-78,123
Multidimensional Association Rule Mining Method Based on Data Cube
gao xue dong ; wang wen xian ; wu sen
..............page:74-76,153
Method of Using Genetic Algorithm to Find Attribute Weighting in Case Base
jia zhao hong ; ni zhi wei ; zhao peng
..............page:71-73
Research of MPLS Forwarding Implementation Under Linux
yu gang ; wu chan le ; zhu huai dong ; xu wei
..............page:68-70
Strategies on Information Gathering in Distributed Redundant Server's Management System
yang ping ; wang feng xian ; tian jun feng
..............page:65-67
Implementation of Clock Synchronization in Distributed Network
sun na ; xiong wei ; ding yu zheng
..............page:136-138
Comparison of Reliable Multicast in Mobile Ad Hoc Network
qiao zuo ; qian song rong
..............page:133-135
Chaos-based File Security System
chen yi ; bai shao hua ; weng zuo fang
..............page:129-132
Security of Layer 3 VPN Based on the MPLS Network
zhu chang an ; liu jia yong ; liu jun
..............page:127-128,138
Design and Realization of Integrative Network Security Management System
zhang shao jun ; li jian hua
..............page:124-126
A PKI-based Asymmetric Self-enforcement Traitor Tracing Scheme with Public-key
ren ping an ; ma jian feng
..............page:122-123
DMIDS: Implementation of Network-based IDS Using Data Mining Techniques
chen jian guo ; yang ying jie ; ma fan yuan
..............page:120-121,142
Stability Analysis of Re-entrant Lines Based on the Fluid Stochastic Petri Net Models
wang you zuo ; zheng ying ping ; xie xiao xuan
..............page:63-64,102
A Spacialtemporal Index Based on R*-tree
liu jian ping ; yang xiao yu ; yue li hua ; zhao zhen xi
..............page:60-62
Design and Implementation of Reusable Digital Image Processing Toolkit
wang liang min ; zhang jian ming ; zhan yong zhao ; song shun lin
..............page:58-59,116
A New Method for Real-time Face Tracking Based on Skin-color
wang li ming ; qi fei hu ; zhou zuo
..............page:55-57
Representation of Fuzzy Membership Based on Qualitative Criterion Transition
zhou ru qi ; feng jia li
..............page:53-54
Comparison & Study on SCSI Extension Storage Protocols
xu yang ; zhou jing li
..............page:51-52,83
Design and Implementation of an Embedded Gateway
wang ji yong ; lin tao ; wu jin shi ; wang jin dong ; han guang jie ; zhao hai
..............page:9-11
Summarization of New-style Bus Technology——RACEway and RapidIO
chen li hua ; pan jian ; ni ming ; chai xiao li
..............page:5-8
Tree Model Abstract for XML Database and Its Query
xu de zhi ; wu min ;nkengu damas
..............page:12-14
Developing Federate Based on HLA/RTI
zhang ya chong ; yan hai rong ; sun guo ji ; zhong lian jiong
..............page:3-4,11
Analysis of Security Mechanism in SELinux
fu zhi feng ; zhang huan guo
..............page:1-2,8
Map Organization and Distribution of the Distributed GIS
song wei feng ; cui zuo ; liu yun cai ; zhang su
..............page:192-194
Implementation of Launcher Vehicle Integrated System Based on CORBA
chen wen tong ; zhou jin
..............page:195-封三
Monitoring Java Multi-thread Program with MS-3 System
li jie ping ; peng cheng lian
..............page:86-88
Development and Implementation of Spatio-temporal Database System
qin chuan ; liu jia
..............page:84-85,145
Data Replica Location in Lager-scale Wide Area Resource Distributed Environment
jiao wen ying ; deng su ; liu zhong ; huang hong bin ; zhang ying chao
..............page:81-83
An Internet-based User-oriented Classification Scheme for Software Components
zhang yue qiang ; chen lang yun ; tang sheng qun
..............page:79-80,142
Method of Building Decision Trees of Customer Classification by Using C4.5 Algorithm
wang xiao guo ; huang shao kun ; zhu zuo ; li qi yan
..............page:89-91
Hierarchy-based Cluster System Technique
li feng ; chen ming sheng ; sun zhi hui
..............page:92-94
A Quantitative Assessing Method for Software Quality
liang cheng cai ; tang wei ; xiao li zuo ; chen hai yan
..............page:95-97
Method of Fuzzy Failure Diagnosis Based on Self-organizing Map Neural Network
song yun xue ; shi yong sheng
..............page:98-99