Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2004 Issue 15
Research on GSM03.48 Synchronization Counter Mechanism and Its Improved Schemes
li zuo wei ; yang yi xian ; hu zheng ming
..............page:31-33
Basic Algorithms for Mining Association Rules
lu jian jiang ; zhang wen xian
..............page:34-35,148
Method of Overcoming the Oversegmentation by Wavelet Transform
wang peng ; dan bao ci ; xie qian he ; zeng zhen bing
..............page:36-37
Co-evolutionary Genetic Algorithm and Its Applications
zhang yun kai ; wang fang wei ; zhang yu qing ; ma jian feng
..............page:38-40,43
Remote Control of Inverter Based on Web and Its Implementation Using Java Technology
liu qi cheng ; chen xiao hong
..............page:41-43
Multi-signature Scheme for Network Environment Based on Elliptic Curves Cryptosystem
yang xiao yuan ; zhou xuan wu ; wei ping ; wei li xian
..............page:44-46
Efficient XML Query with Patten Tree and Materialized View
wu ai hua ; zhang zuo ; qiao jian ; wang wei ; shi bo le
..............page:47-49
Ontology Based Web Site Modeling
ge liang ; leng de hong ; xie zu ming ; ma jian ; zhang liang ; shi bo le
..............page:50-52
Ontology Based ER Model
ge liang ; xie zu ming ; ma jian ; zhou zhen ; zhang liang ; shi bo le
..............page:53-54,91
A Bayesian Approach for Case Retrieval
hu cai ping ; ni zhi wei ; li long zuo ; jia rui yu
..............page:58-59,82
Process and Product Quality Assurance Model Based on CMMI
liu kuan hong ; yin ren kun
..............page:75-77
Mining Association Rule with Monotone Constraints
lu yan sheng ; yang fen ; zhao dong
..............page:78-79,129
Research of Process Patterns Based on XPDL
wang qing guo ; bu feng lin
..............page:80-82
Design and Implementation of Fixed-point Algorithm for MP3 Audio Decoder
jiang wei ; yang jun ; luo zuo ; hu chen
..............page:83-85
Learning Behavior Analyzing Center Based on Open E-Learning Platform
gao yi ; shen rui min ; yang fan ; han peng
..............page:86-88
Job Scheduler in PBS and Solution for One Kind of Resource Allocation Failure
yuan li qiang ; xu zuo min ; zhang li xiao
..............page:89-91
Wireless Scheduling Algorithms
ren yan ying ; zhang wen jun ; wang bin
..............page:92-93,116
Design of Model of Service Quality in CSCW
xiao jian ; sun ji zhou ; tu zi zuo
..............page:94-96
Design and Implementation of A Hierarchical and Scalable Gatekeeper System
zhang xiao ; zhang de yun ; zhao dong ping ; hu ning
..............page:97-98,183
Application of Wireless Access Technology to Internet-based Telecontrol System
xiu zhen ; wu ping dong ; huang jie ; chen zhi long
..............page:101-102,126
Intrusion Detection Based on the Fusion of Multiple Features
xu hui ; liu feng yu
..............page:103-105
Research on Intrusion Prevention
wang jing ; wang neng
..............page:108-110
The Method of Perfecting the Honey Pot System in Intrusion Detection
xue qiang ; sun ji zhou
..............page:111-113
Potential Conflict Alert Algorithm Based on Flight Posture
shu hong ping ; you zhi sheng ; liu jian bo
..............page:28-30
Constructing of Software Platform Based on μC/OS-Ⅱ
hua liang ; yang shi xi
..............page:184-186
Design and Implementation of Application-oriented Fault Tolerant System
xie chang sheng ; hu bing quan
..............page:187-189
A System Call Serials Analysis Based Intrusion Detection Method and Its Usage
cao yuan da ; xu man jiang
..............page:114-116
Research on Application of Petri Net in IDS
xue jing feng ; cao yuan da
..............page:117-119
A Robust Image Watermarking Algorithm Based on SVD
zhou bo ; chen jian
..............page:120-121
An Anti-DoS Attack Model Based on Ingress Address Marking
jin guang ; zhao jie zuo ; zhao yi ming ; wang xiao hong
..............page:122-123,138
Real-time Content Filtering Based on Vector Space Model
he jing ; liu hai yan
..............page:26-27,85
FPGA Simulation for 5/3 Wavelet Lifting Scheme
dong wen hui ; liu ming ye
..............page:24-25,96
Faster Algorithm for Searching Similar Text
yan ji kun ; zheng hui ; xi jian min
..............page:22-23,71
Concept and Characters of Ownership Management in Distributed Object Systems
liu bao hong ; zhang he ying ; huang ke zuo
..............page:20-21,33
Pseudo-parallel Genetic Algorithms Based on Grid and Hamming-distance
chen hai ying ; guo qiao ; xu li
..............page:18-19,88
On-line Authentication System Based on Key Management Technology
xu zuo hua ; xu jian zhen ; wu wei min ; yu jin rong
..............page:124-126
Algorithm for Automatic Recognizing the Size of Neighborhood in Texture Synthesis
liu jing ; chen zheng ming ; zhu yue long
..............page:127-129
Model and Implementation of ExActor in Virtual Experiment System
zhang xin li ; zhu da yong
..............page:130-131,160
Application of Case-based Reasoning in the Helicopter Fault Diagnosis Expert System
zhu yi peng ; weng jing nong
..............page:134-135,168
State Test Data Generation Based on State Machine Code Synthesis
zhang yi kun ; zhao ming ; cui du wu
..............page:136-138
COM-based Matlab and C++Builder Mixed Programming
liu xian yong ; hu jin song ; zhou fang jie ; li hong lei
..............page:60-61,110
Driver Cache:A New Cache to Improve Disk Performance
liu jun ; yang xue jun ; tang yu hua ; wang lei
..............page:62-63,163
Design of Distributed Database in LYMIS on Network
jiang hong
..............page:64-65,177
Data Migration Dynamic Load Balance Technology of DSMC Parallel Simulation
fu you ; hua zuo ; kang ji chang
..............page:66-68
Research on Component-oriented Model of ERP Systems
wu shi liang ; xue heng xin ; wei dong fang
..............page:69-71
Research on Software Quality Evaluation System on Multi-agent-oriented Technology
yang gen xing ; zong yu wei ; zhu san yuan
..............page:72-74
Application of Image Segmentation Based on Deformable Templates in Medical Image
wang peng ; geng guo hua ; zhou ming quan
..............page:139-140
Research of Defect Segmentation on Apple Image Using SUSAN Operation
zhao zhi hua ; cai jian rong ; zhao jie wen ; liu mu hua
..............page:141-142,194
Graphic Modeling of Jointless Track Circuit
mao guang zhi ; jie xue shu
..............page:146-148
Total-asset Visibility System Based on Multi-agent
zheng gui sheng ; liu lu yuan ; zhao rui
..............page:149-151
Application and Deployment of the Useridentity-based VLAN in Broadband Campus Accessing
shi xiao qiu ; chen wen pu ; zhang xin jian
..............page:152-154
Building Detection Using Vanishing Point Information
luo ding ; ci lin lin ; chen xiao feng ; zhao rong chun ; zhao min
..............page:155-157
Research on Non-recording Magnetic Field of Magnetic Levitated Hard Disk Drive
ding guo ping ; zhou zu de ; wang xiao guang ; hu ye fa
..............page:158-160
Research on Nanjing Digital House Property WebGIS Sharing Platform
song ya chao ; zhang hong ; wen yong ning ; jiang wen ming
..............page:161-163
A Testing System of Refrigerator Based on File Mapping in Memory
guo zhong wen ; wang yuan bin
..............page:164-165,186
Develop DLL of Smart Card by VC
li tao ; yang bin
..............page:166-168
DFT Techniques in DSP Chip Core NDSP25
xue jing ; bai yong qiang
..............page:169-171
Design and Implementation of Performance Test on HIS
hu nai jing ; yu xin mei ; wang ying ying
..............page:172-174
GIS-based C2 System of the Tactical Surface Air Defense
wang yi zeng ; wang ying long ; liu zhi qin ; zhang ji long
..............page:175-177
DSP Image Processing System Based on USB Communication
zhu li ; su jian bo
..............page:181-183
Design and Implementation of Tourism Map Symbol Database Based on Java
wen zi jin ; gong hui li ; zhao wen ji
..............page:190-191
Real-time System Analysis and Design Based on UML-RT
xie shuan qin ; jie yue jiang
..............page:192-194
Business Information Interchange in SCM Based on XML/RDF
wang xiao yun ; li chun ying
..............page:195-封三
A Search Engine Ranking Algorithm with Link Analysis
wu ming li ; shi shui cai
..............page:143-145
Approach to Coordinate Agents Under Incomplete Information
li jian ; zhen zuo ; cao yuan da
..............page:16-17,57
H.26L-based Video Robustness Strategies
xu yan ling ; zhou yuan hua
..............page:13-15,68
A Mechanism to Form Coalition in Multi-agent Cooperation
li jian ; cheng bao dong ; cao yuan da
..............page:10-12,52
Efficient Fully Distributed Proxy Signature Scheme
ji jia hui ; li da xing
..............page:7-9
Grid Operating System and Study of Its Key Issues
liu li min ; xu zhi wei
..............page:4-6
Novel Efficient Algorithms in Speech / Speaker Recognition
chen yi ning ; li ke ; zhou jing fang ; liu jia ; liu run sheng
..............page:1-3