Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2004 Issue 19
A Cross-platform Network-based Robot Telecontrol System
liu zuo ; fan yi yang ; zhang zuo
..............page:70-72
Web Virtual Server Based on Distributed Request Processing
zhang jian zuo ; gu zhi min ; liao xiang wen ; cao xin ping
..............page:73-75
Visualization of SNMP's MIB Based on Protocol Analysis
gu zhao jun ; han wei huan
..............page:76-77,112
A Fast Algorithm for Chinese Word Segmentation
wen tao ; zhu qiao ming ; lv qiang
..............page:119-120,182
A Quick Thinning Algorithm for Handwritten Chinese
huang tie ying ; jiang zuo ming
..............page:121-122,128
Handwritten Information Extraction and Recognition in Printed Chart
shi guang shun ; luo chun mei ; wang zuo ; qing wu mo ; wang qing ren
..............page:123-125
On-line Mining Traversal Patterns by Constructing Suffix-tree
wang yong ; shen rui min
..............page:126-128
Research on Streaming Media Communication Algorithm
hou ya rong ; xiong zuo ; ou yang wu xin
..............page:129-130
Video Capture Based on DirectShow
zhang li hui ; zhang yu ; chen wen bin
..............page:131-133
The Java Realization for Task Mobile Agent and Its Application
yang zuo ; du jun ping ; yin zuo xin
..............page:78-79,133
Design and Implementation of SNMP-based Monitor System (IF-Monitor) for Clusters Computing Environment
zhang wei yi ; yu chuan song ; sun gong xing
..............page:80-82
An Implementation of Embedded System Tcp/ip Stack
li li qing ; lu hai
..............page:83-84
A Modified Endpoint Detection Method of Noisy Speech Based on Cepstral
yu ying xia ; shi jia mao
..............page:85-87
Study of Cache Policy Under SAN Environment
yu lei ; wang xiao dong ; luo jin ping ; zhou xing ming
..............page:88-89,100
A New Explicit Loss Notification Scheme Based on Wireless Networks
yu xiao mei ; zheng ming chun
..............page:90-92,154
Enterprise Privilege Management Based on T-RBAC
jin qiong ; yang shu tang ; jiang xing hao ; li jian hua
..............page:93-95
Method of Creating Signature Equation Based on Elliptic Curve Cryptosystem
zhao ze mao ; liu feng yu ; xu hui
..............page:96-97
Design and Implementation of Enterprise PMI System
di zheng de ; li da xing
..............page:98-100
XML Blind Signature Scheme Based on RSA Public Key System
shi you hui ; li wei sheng
..............page:101-103
Implementation of Association Rules Recommendation Model in Recommendation System of E-commence Web
yang yin xia ; xie kang lin ; zhu yang yong ; zuo zi ye
..............page:57-59
An Algorithm of Spatial Join
liu xiao hong ; yue li hua ; yang yang ; zhou ying hua
..............page:60-61
The Design and Implementation of Distributed Database System Based on CORBA
zhang qiang ; chen wei ; wu jian ; wang zhi he
..............page:62-64
Parallelism Algorithm Based on Sequential FastLSA
chen peng fei ; wang chang shan
..............page:65-67
Software Test Program Generation Based on Module Relation Diagram
wang xiao yu ; xu shi yi
..............page:68-69,167
Fuzzy Clustering Analysis Based on Genetic Algorithms
liu wen yuan ; wang ying jie ; deng cheng yu ; wang bao wen ; shi yan ; fang shu fen
..............page:117-118,138
Convergence and Stopping Criterion of Iterative Decoding for Turbo Code
fu yong qing ; liu ya qin ; du hai ming
..............page:164-165
Shortcutting Copying-board Method of PCB
zhu jia ; zhang hong ping ; wang sen ; wu zuo ; zhu chang ping
..............page:166-167
Design and Implementation of AERTDB Based on OPC
han ya hong ; wang li xin ; chen xiang
..............page:151-154
Study on IPv6/IPv4 Tunnel and An Implementation at Beginning of Transition
li lin zuo ; feng yan jun
..............page:155-158
Research and Realization of Cooperative Work Mechanism in University Engineering Management
he qing ; tang yong ; liang zhong kun
..............page:159-160,188
Expressway Network Tolling System and 4+1 Abstract Modeling Structure
luo wu man ; shu qin
..............page:161-163
Traditional Merchandise Anti-counterfeiting System Based on Internet
li jun huai ; zhang jing ; lv lin tao ; zhang zhi qiang
..............page:32-34
JTAG Compliant Boundary Scan in a General-purposed CPU
lu wei ; yang xiu tao ; li xiao wei
..............page:30-31,87
Modeling of Question Searching Based on Ontology
wang xiao dong ; gao hong qing
..............page:28-29,103
Method of Real-time Face Detection in Video Images
song hong ; shi feng ; wang yi zhuo
..............page:23-24,158
A Novel Greedy Genetic Algorithm for Traveling Salesman Problem
wei ying zi ; zhao ming yang ; huang xue mei ; hu yu lan
..............page:19-20,34
Research on Video-on-demand System Using New Stream-scheduled Strategy
zuo huai quan ; hu yu zuo ; gao yuan
..............page:16-18,51
Research on Dynamic Management of CORBA Trader Federation
zhang chi ; wu jian ; hu zheng guo
..............page:13-15
Discovery of Profit Constraint Association Rules
gong yu ; yin a dong ; wu sen
..............page:11-12,37
An Improved General Test Paper Generating Model
tian xiang ; xiao ren yue
..............page:183-185
Research and Design of Stock Trade System Model Based on I*
zuo chuan hui ; li long zuo
..............page:40-41,163
Application of Case-based Reasoning in Risk Management System for Supply Chain
li ze biao ; wang zheng xiao
..............page:42-44
Parallel Processing Algorithm for Spaceborne SAR on SGI System
gao guo rong ; wang kai zhi ; liu xing zuo ; han chuan zuo
..............page:45-46,67
Network Intrusion Immune System Based on Mobile Agent
wang shuai ; cao yang ; liao ya li
..............page:47-48,185
An OLAM System Based on Data Warehouse
yin jian ; chen yi qun ; zhang gang
..............page:49-51
A New ID-based Signcryption Scheme
geng li ; wang shang ping ; zhou feng ; yan zhao jiang
..............page:52-54
Research and Design for Large Variables Combined Logic Optimization
guan zhi jin ; zhang yi qing ; qiu jian lin ; liu wei fu
..............page:55-56,95
Network Education System Integration Based on Application-tier
huang zuo ; luo jun zhou
..............page:186-188
Simulation of Stock Prices Behavior Based on Agent
liu da hai ; wang zhi bao ; sun hong jun ; zhang zuo
..............page:168-170
MPEG-4-based Embedded IP Networks Monitoring Camera System
jia gui zuo ; shi hong feng ; ye jun ; ye chen
..............page:171-172,194
Interrupt Processing Technique of High Performance DSP
xu xin ren ; chen jin
..............page:176-177,191
Soundcard Programming Based on Linux and a Method of Audio-Video Synchronization
tang yong gang ; zhang xian min
..............page:178-179,191
Application of COM in Web Data Collection and Analysis
cheng bao lei ; li pei feng ; diao hong jun
..............page:180-182
Data Share Between ArcView GIS and VB6 Based on DDE
zuo zuo ; yang hua ; zhao chun yong
..............page:189-191
Multi-DSP Parallel Processing System Based on VxWorks
chen chun xia ; li ya jing ; song wei jun
..............page:195-封三
A Secure Steganography Method Based on Text
zuo xin guang ; luo hui
..............page:104-105,191
Research of Vulnerability Dynamic Trigger for Network System
tang hong ; luo yu ; chen hua
..............page:106-107,112
An Identity Authentication System Linking Home-bank
lu jia yuan ; bao yong ; chang ben kang
..............page:108-109,130
Application of Jini Technology in SMC
yu shao hua ; guan yong ; dai yi qi
..............page:110-112
Testing Mechanism of Environment Fault Injection
dan guo dong ; lian yi feng
..............page:113-114,182
A Media Optimization Algorithm of Bacillus Thuringiensis Based on Rough Sets
weng yi hui ; zhang xu ling ; chen cong ; lin wen hao ; guan xiong
..............page:115-116
New Bilinear Fast Algorithm of Fuzzy Enhancement Image Edge Detection Based on GFS
han pei you ; hao zhong yang ; dong gui yun
..............page:6-7
Rough Set CMAC Neural Network and Its Application in Nonlinear System Identification
feng yuan jing ; li liang fu ; feng zu ren
..............page:4-5,125
A New Rate Smoothing Algorithm Based on IP Streaming
chu kai yan ; zhang wen jun ; zhang zheng hua ; gu ji xing
..............page:1-3
Research and Application of the Darwin Streaming Server
huang ba feng ; zhong ming ; yang chuan jun ; zhang jia zuo
..............page:134-135,143
Research on a Mini-multimedia Linux Distribution
zhong ming ; huang ba feng ; yang chuan jun ; zhang jia zuo
..............page:136-138
An Implementation of a High performance High Reliable Reconfigurable Computer
an jun she ; li yang ; liu yan qiu ; zhang jian ; zhou sheng yu ; sun hui xian ; he hua can
..............page:139-140,143
Master-Slave Protocol Used in Industry Ethernet
li feng bao ; li ling
..............page:141-143
Research of Statistical Process Control (SPC) and Its Application
qian xi yuan ; jing jian fen ; hou xu zuo
..............page:144-145,154
Drainage Maintenance and Developing Method Based on GIS
liang jie ; liang hong ; liao yi ; yang ke cheng
..............page:146-147,封三
Application of Message Queue Middleware in the SCADA/EMS
chen zuo ; chen lian qing ; xie qiao yun ; he xing
..............page:148-150
Analysis and Comparison of Collision Algorithm in Packing (Nesting)
song ya nan ; ye jia zuo ; deng fei qi ; feng sui yu
..............page:8-10