Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2004 Issue 22
Nonuniform Simplification Algorithm of Unorganized 3D Points
xiong bang shu ; lei zuo
..............page:32-33,97
Analysis of Remote Backup and Its Key Technology
han de zhi ; wang yang ; li huai yang
..............page:34-36,61
Security Bottleneck Shifting in Information System
mao xing ; zhong yi ping ; zhang shi yong
..............page:114-116
Implementation of the Network Sniffer in LAN on Windows
zhao hai yan ; chen li chao ; ye shu hua
..............page:117-118,124
Distributed Delegation Certificates Chain Discovery with Mobile Agent
qi jing yan ; huang zuo ; cui wei
..............page:119-121
Analysis of the Security Threat and the Precaution Tactics Based on SNMP
yang xiao dong ; liu yu zhen ; zhang huan guo
..............page:122-124
Application of Digital Image Encryption Based on a Chaotic Neural Network
wang cheng ru ; wang feng ying ; hu zheng ping
..............page:125-126
A Detecting Method of DDoS Attacks Based on Traffic Statistics
zhuang xiao bin ; lu kang jun ; wang li ; lu jian zhi ; li ou
..............page:127-128,183
Application of Hybrid Coarse-grained Genetic Algorithm in Constrained Optimal Problems
qian zhi qin ; wang zhi peng ; zhou zuo
..............page:129-131
Design of Cache Controller with Harvard Architecture
xie xue jun ; ye yi zheng ; wang jin xiang ; yu ming yan
..............page:37-39
Polynomial Representation of Circuit Containing Branches
wu jun hua ; ma guang sheng ; li guang shun
..............page:40-41
Domain-based Active Code Location and Revocation Mechanism
chen zuo ; li zeng zhi ; liao zhi gang ; kou ya zuo
..............page:42-43,106
Research on Application of Support Vector Machines in Network Fault Diagnosis
wu jing ; zhou jian guo ; zuo pu liu
..............page:44-46,131
A Secure Roaming Scheme for WLAN Integrated of Mobile IP
fu gang ; yang bo
..............page:47-49,139
Study of Benchmark Test of Fault Tolerant CORBA
dang xin mei ; liu hui ; wu quan yuan
..............page:50-52
Design of Gmail System Based on Globus Toolkit
chen dong feng ; yang shou bao ; feng zheng ; guo lei tao
..............page:53-55,78
Design and Implementation of Central-controller in Tridimensional Defense System
zhang lei ; yang shou bao ; huang mei zuo ; fang xiang ming
..............page:56-58
Research on the Evolutionary Storage System
xie chang sheng ; wang yu de ; cao qiang
..............page:59-61
Application of Content Based Research in Virtual Cultural Relic Restoration
ji li yan ; zhou ming quan ; geng guo hua
..............page:62-63,83
Design of Risk-assess Tools Based on BS7799
sun tie ; zhang yu qing ; meng xiang wu
..............page:64-66
Component Integrated Framework Based on Software Architecture
chen jian xun ; zhang zi he ; ma yu tao ; xia xue zhi
..............page:69-71
Supporting J2ME in ORP
peng yu feng ; dai chun yang ; gao chuan shan
..............page:72-73,113
A Fast and Flexible Instruction Set Simulator
xing wen feng ; yao qing dong ; shi ce ; gao lei
..............page:74-75,154
Design and Implementation of Reusable Software Framework Based on.NET
wang xiao ming ; hu jian ; lu kun ; zhou wei
..............page:76-78
A VLIW DSP Compile Technology Based on Machine Description
yuan zheng cai ; liu chun lin ; hu ding lei
..............page:79-80,116
Design Method and Application of Arbitrary N Multiple Circulation
xiao jian hua ; ou yang hao ; he hong
..............page:81-83
Parallel Mining Association Rules Based on Grouping
zhang wei ; zheng tao ; li hui
..............page:84-85,100
Design and Implementation of Linux Operating System Based on DSP & CPU
tang hong wu ; hou chao huan ; ma jie
..............page:86-88
Mining Association Rules Based on Comprehensive Measures
lu jing ; sai ying
..............page:89-90,131
Design and Implementation of Agent-based Message Oriented Middleware
mu zuo ; li zhong liang ; wang peng ; huang mei feng ; wu rong quan
..............page:91-92,151
Measurement and Assessment of the Real-time Performance of Internet
huang zhou song ; lei zhen ming
..............page:93-94,144
Verification of Mobile IP Function in the Embedded Protocol Stack
yang zao ; wang neng
..............page:95-97
A Confidential Documents Distribution Scheme in Enterprises
wang yan ; sun peng ; lv shu wang
..............page:27-29
Research of String Matching Techniques
li xue ying ; liu bao xu ; xu zuo sheng
..............page:24-26
User-oriented Remote Access Control Method for Network File System
li ying ; liu jin gang ; li jin tao ; tang ning
..............page:21-23,29
Preudo-Random Sequences Technology in the Information Hiding Based on Auditory Perception
zhang liang ; bian zheng zhong ; gao ying chun ; zuo ya lin
..............page:19-20,26
Analysis for the MIMO OFDM WLAN and Its Implementation
han xu dong ; zhang chun ye ; cao jian hai
..............page:98-100
Research and Implementation of Intelligent Mobile Agent Model in Network Fault Management
li yan ; chen qing wei ; guo zuo
..............page:104-106
Research on IP Micro-mobility Based on MPLS
chen wei ; chen qian bin ; long ke ping ; zhang hong
..............page:107-108,126
Research on Collaboration Systems Based on Peer-to-peer
meng xian dong ; sun fu chun
..............page:109-110
Network Security Evaluation Method Research Based on Bayesian Net
liu bo ; zhou he qin
..............page:111-113
Self-adaptive Blind Source Separation for Non-stationary Signals Based on Recursive Neural Network Structure
su wei sheng ; he wen xue ; xie jian ying
..............page:30-31,88
Gray Image Segmentation Based on Wavelet Region Growing Algorithm
liu xu hong ; zhang guo ying ; liu yu shu ; liu xiao lei
..............page:132-133,194
Asynchronous Pattern of Particle Swarm Optimization Realized with Java Multiple Threads
li jian yong ; yu huan jun ; zhang li ping ; chen de zuo
..............page:134-136
Realization of Lightweight Migrating Instance
wang jing ; zeng guang zhou ; zhang peng
..............page:137-139
Recognition of Blurry Chinese Words Based on Semantic and Hopfield Network
tan xu ; le xiao bo ; zhu heng rong ; chen rong yuan
..............page:140-141,189
A Natural Language Query Supported Automatic Information Retrieval Method
li xin juan ; cai qing sheng ; liu gui quan
..............page:142-144
Optimized Dijkstra Algorithm
yu dong mei ; zhang qiu yu ; ma shao lin ; fang zuo
..............page:145-146
Character Gesture Recognition Algorithm Based on Structure Classification
zhu zuo tao ; ge yuan ; wang lin quan
..............page:147-148,186
Gesture Recognition Algorithm Based on Feature Pixels
su jiu lin ; ge yuan ; wang lin quan
..............page:149-151
A Knowledge Reduction Method Based on Niche Genetic Algorithm
wu zhi feng ; ji gen lin
..............page:152-154
Tomatoes Recognition and Location from Nature Background Based on Binocular Stereo Vision
zheng xiao dong ; zhao jie wen ; liu mu hua
..............page:155-156,171
Research and Implementation of SIP Multimedia Conference Framework
xu jian bo ; hu rui min ; bian xue gong
..............page:160-163
Design and Development of Focus in SIP-based Video Conference System
zeng qing zuo ; hu rui min ; bian xue gong
..............page:164-166
Case and Tree Structure Based Product Creative Design Method
cai hong ming ; he yuan jun
..............page:17-18,103
Modeling and Analysis of BPEL4WS Based on Petri Nets
sun jian ; tao xiao feng
..............page:14-16
Error Control Scheme for FGS Video Streaming over Internet
cheng lian ji ; zhang wen jun
..............page:11-13
Query Strategy for XML-based GeoSpatial Metadata System
luo ying wei ; xing peng ling
..............page:8-10
Applying Paralleled Genetic Algorithm to Classified EST Sequence
cai chen yuan ; yu song nian
..............page:6-7,39
A Survey of Strong Mobility Technology for Java-based Mobile Agent
zhang peng ; zeng guang zhou
..............page:4-5,180
Design and Implementation of Intelligent Monitoring System for Tunnel
yu zhi guo ; wu jin yong ; leng jian qing ; ma guo qiang ; xu su shan ; xu jian jian
..............page:167-168,封3
Web-based Realtime Control System
huang jian ; yu han zuo
..............page:169-171
Public Service Framework for E-government
qin zhong guang
..............page:172-174
Application of Computer Real-time Monitoring System in GMP Manufactory
yin xiao bo ; pan di lin
..............page:175-177,183
A New High-speed Decoder for Double-error-correcting BCH Codes
liu ling zhi ; rong meng tian ; luo wei yi
..............page:178-180
Study on Test Question Representation and Method Employed
kong zuo ; yang guan zhong ; tao yong ; huang qin
..............page:184-186
A Remote Control System for Embedded Environment
shi lei ; dong jin xiang
..............page:187-189
Study on Network Processor's Architecture Technology
li yu tong ; wang yu yan ; zhang jian xiong
..............page:195-封三