Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2004 Issue 16
Web Log Mining Considering Web Content and Web Structure
jiang bao lin ; shen zhan ; zhang chuan ; ge jia xiang ; hu yun fa
..............page:30-32
PDM Framework Focused on Product Structure and Configuration Management
sun guo zuo ; yu ding wen ; wu zhi jun
..............page:27-29
Multi-parent Crossover and Its Application in Continuous Optimization
li liang zhi ; kang li shan ; fang ning
..............page:33-35
Web Services Based Distributed Workflow Management for Multi-enterprise
chen ting bin ; wu wei
..............page:36-38
Analysis and Implementation of SSL Multiple Authentication Based on Secure Proxy
cai yan wen ; chen tian zhou
..............page:39-41,101
Mutual Authentication and Key Exchange Scheme Based on SRP
liu yan min ; shi jian jun ; li jian hua
..............page:42-44
Fast Implementation of Elliptic Curve Scalar Multiplication
niu guang ping ; ma jian feng
..............page:45-46,101
Study on Object-oriented Algorithm of Path Optimization Based on Complicated Network Environment
pu zheng yan ; li ming lu ; li zhi hong
..............page:80-81,封三
Design and Realization of Object-oriented Discrete Event Simulation Kernel
zhou xi ming ; wu yue ; yang hong bin
..............page:82-84
Study and Devolopment of a CMM Self-evaluation System
liu lin ; wu yong ying
..............page:85-87
Research of Fault-tolerance Mechanism for MPI
cui li qing ; xu zuo min
..............page:88-90
Content-based Subscription Method and Its Implementation in MQSeries
liu zhen tao ; xiong zuo ; ou yang yuan xin
..............page:91-93
Study and Implementation of Linux Binary Compatibility Technique
huang jin ; lu kai ; liao xiang ke
..............page:96-98
Realization of Network Video Surveillance System Based on Dynamic IP
lv hong hui ; li jian ping
..............page:119-120
Automation Trust Establishment in Open Network Environment
ning yu peng ; cao yuan da
..............page:124-125,152
Application of Data Mining in Misuse NIDS
song shi jie ; hu hua ping ; hu xiao lei ; jin shi yao
..............page:126-127,175
Method of Using CAPICOM to Implement Security of Application System
song ling ; li tao shen ; chen tuo
..............page:128-129,封三
IPSec-based Distributed Firewall Security Architecture
cui wei ; qi jing yan ; cai sheng wen ; huang zuo
..............page:130-132
Mining Multi-level Temporal Association Rules from Distributed Timestamp Databases
ren jia dong ; ren dong ying
..............page:63-64
A Method Based on Multi-agent for Handling Exceptions in CSCD
tian feng ; li ren hou ; zhang jin cheng
..............page:65-66,84
An Algorithm for Multitask Predictable Scheduling in Real-time Systems
hou shuang ; song ying hui
..............page:67-69
Factors Affecting Enterprise Application Evolution and Their Function
li gang ; han yan bo ; jin mao zhong
..............page:70-71
Interaction Inside Delphi Integrated Development Environment by Lean Cuisine+
li lei ; zhu qing zuo
..............page:72-74,93
Database Architecture and OLTP Based on CIMS
pan tie jun ; zheng lei na ; wei yang su ; zuo li feng
..............page:75-77,165
Research and Analysis of Tamino Database Based on XML
si gong shan ; wang hong gu ; xu jie
..............page:78-79,123
Algorithm of Histogram Cone-shaped Extending Applied to Image Contrast Enhancement
shi yu lin ; guan zheng xi
..............page:153-154
Research of Semantic-based News Video Retrieval
shi ying chun ; wang zuo ; zhou xian zhong
..............page:155-157
Research on Mosaics Algorithm of Cylindrical Panoramic Images
cui han guo ; cao mao chun ; ou yang qing
..............page:158-159
A Network Adaptive Transmission Strategy of MPEG Video Stream
zhou bing ; bi quan qi
..............page:160-162
High Speed Remote Sensing Image Storage System
wang yue ming ; chen jian xin ; liu yin nian ; xue yong zuo
..............page:166-167,187
Research on Computer Simulation System for Nanlidu Landslide
yang ji xin ; zeng yan ; zhang bao kui
..............page:168-170
Two-level Ensembles of Selective Neural Network Based on Stochastic Gradient
shi yan ; huang cong ming ; hou chao zuo
..............page:133-135,159
Reversible Data Hiding of Color Image
yang cheng yun ; xuan guo rong
..............page:136-138
Genetic Algorithm Based Solution of Multiple Travelling Salesman Problem
dai kun ; lu shi wen ; jiang xiang gang
..............page:139-140,145
Moving Object Detection and Recognition Method for Video Monitoring System
li qing zhong ; chen xian hua ; wang li hong
..............page:143-145
The Maximum Probability Algorithm of Automatic Chinese Word Segmentation Based on Context
jin zuo ; lu qi ming ; gao feng
..............page:146-148
Development and Performance Analysis of Device Driver for Encryption Card Under Linux
jiang ming hua ; zhou jing li ; huang xiao tao
..............page:185-187
Automatic Abstraction for Promela Behavioral Model
zhi xiao li ; lu zuo da ; rong zuo
..............page:7-8,44
Simulation and Prediction of Injection Parameters Based on Artificial Neural Network
zheng sheng rong ; xin yong ; yang guo tai ; he cheng hong
..............page:4-6
Study on Performance of Fairness Algorithm in Resilient Packet Ring
gong yan rong ; zhou xiao bo ; jin de peng ; zeng lie guang
..............page:1-3
M+ Tree:A Novel and Effective Dynamic Hash Algorithm
zhang wang guang ; zhuang yi
..............page:94-95,120
Objective Image Segmentation in Non-even Background
lu gui zuo
..............page:141-142
Research on Automatic Control System of Laser Fine Weight Adjusting Machine
liu zuo ; fang hai tao
..............page:171-172
Research and Implementation of a Dynamic Performance Measurement System for Goat
wu wei guo ; liu zuo ; dan de gen ; qian de pei ; cao shi yong ; sun zhong yan ; tan xing ya
..............page:173-175
Step Fusion Arithmetic's Application in Artillery Recon Info System
chen pei bin ; bo shu bing ; yang hui
..............page:176-178,187
PH Parameter Self-adjustment Fuzzy Control System Based on Dynamic Data Exchange
xu ling ; xu bao guo ; xiao ying wang
..............page:179-181,184
Security Architecture of Electronic License System Based on XKMS
shu ting ; zhang guo zuo
..............page:182-184
Another Modification of NS Public-key Authentication Protocol
ren xia ; lv shu wang
..............page:12-13
A Search Engine SISI Based on Usage Information in WWW
guo yan
..............page:9-11,13
Design and Realization of VxWorks Device Driver in Core Routers
li yong ; zhan shou yi
..............page:188-190
Study on Architecture of New Network Processor
hu kai ; zhang jian xiong ; wang yu yan
..............page:191-193
Design and Implementation of IDE
pan hui qin
..............page:194-封三
Research on the Attacks and Classification of TMN Protocol
liu xiu ying ; zhang yu qing ; yang bo ; xing ge
..............page:47-50
"One-Stop" Services Framework Model Based on Web Services
zhao hong ; gu ming
..............page:51-52,56
A Face Recognition Based on DCT and Neural Network
fang ning ; li jing zhi ; he gui ming
..............page:53-56
A Secure Delegation Model and Supporting Framework Based on CORBA
chen ming feng ; yin gang ; wu quan yuan ; liu tao ; lin zuo
..............page:57-59,132
Architecture Description and Code Schedule in Retargetable Compiler
hu wei ; zhou xue hai ; zuo xiao ming ; lu zuo
..............page:60-62
Misunderstandings and Counter Measures on Problem Solving by Ant Colony Algorithm
xu jing ming ; cao xian bin ; wang zuo fa
..............page:25-26,90
Research About Fast Walsh Transform Algorithm of Adverse Walsh Order
zeng fan zhi ; hu xue jun ; wang neng chao
..............page:23-24,184
JPEG Image Retrieval Based on A/D Energy Histograms
zhang wen yin ; zeng zhen bing ; sun xing ming
..............page:21-22
An Improved Multi-objective Evolutionary Algorithm Based on Constrain-domination
zhang yong de ; huang sha zi
..............page:19-20,105
Formal Method B and Its Program Specification Theory
xiao mei hua ; xue jin yun
..............page:16-18,50
Image Retrivl Method Based on NMI Invariable Feature
zhang wen yin ; zeng zhen bing
..............page:14-15,38
Real-time Performance Evaluation of Remote Robot Control System
xue guang tao ; shi hua ; you jin yuan
..............page:99-101
Service-oriented Software Development in Embedded Systems
lv yong ; yu hai bin ; wang tian ran
..............page:102-103,175
WBS Algorithm Based on Threaded Binary Tree
li zhi jie ; huang fei xue ; zhou dong qing
..............page:104-105
Abstract Syntax Analysis Based on Statecharts
qian jun yan
..............page:106-107
Algorithm for Searching Primitive Polynomial to Establish Pseudo Random Sequence
lv hui ; he jing ; wang gang
..............page:108-109,165
Establish UMS System over IP Based on Open Source Project
ni jie ; xue xiang yang
..............page:110-112,170
A Multi-agent-system Based CSCL Middleware
leng de hong ; ge liang ; gu ning
..............page:113-115,138
A Practical Communication Mechanism for Heterogeneous Sensors in Distributed IDS
zheng qing hua ; liu jun jie ; fan lin tao
..............page:116-118