Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2004 Issue 9
Reverse Engineering of the Serial Data Transfer Protocols
zhao jiong ; xiong xiao lei ; zhou qi cai
..............page:106-108
Design and Construction of Vulnerability Database System
yang hong lu ; liu hai yan ; he zhen zhong
..............page:195-196,封三
Analysis of IPv6 Transition Mechanisms and Implementation of 6 to 4 Tunnel
zhao hai bin ; gao ji ming ; tang ding ; hou zi qiang
..............page:103-105
Calling of COM Based on JNI
liu hui jun ; wang zuo
..............page:101-102,120
Multi-agent Based Distributed Cooperative Virtual Environment on Internet
gao shu ; chen ding fang
..............page:109-111
Heuristic Genetic Algorithm for QoS Multicast Routing
pan yun ; yu zhen wei ; wang li cheng
..............page:112-114
HFC Network Management System Based on HMS and SNMP Protocols
wang xiao qing ; qian song rong
..............page:115-117,179
Design of Network Management Software Based on Push Model
ji xiao peng ; wu chao zuo
..............page:118-120
Multi-fractal Analysis of Compound Network Traffic
zhang da lu ; li chen
..............page:121-123
Object Request Broker Extension Based on Mobile Agent
cao hua dong ; bai li ; fu ru lin
..............page:124-125,128
Technology Analysis of TOE Used in iSCSI
cheng hong jun ; chen hong ; zhang ji ; tan jin quan
..............page:126-128
A Security Scheme for Electronic Medical Record Systems
yuan cang zhou ; liu zhong kan ; zhang qi shan
..............page:129-130,146
Application Security Platform Model Based on PKI/PMI
zhang wen kai ; cao yuan da
..............page:131-133
Application of Fuzzy Logic and Genetic Algorithms in IIDS
wang yong jie ; xian ming ; wang guo yu ; xiao shun ping
..............page:134-135,170
Security Management Protocol Based on Password in Wireless Local Area Network
sun jian ; tie ling ; zhu hong wen
..............page:136-138
Study and Implementation of IDEA of the Variable Length Keys
yang wei zhong ; li tong
..............page:139-141
Verifiable Partial Certification Service for Mobile Ad Hoc Networks
zhang li yin ; kuang xiao hui ; wang jia xin ; hu hua ping
..............page:142-143
A Novel High-quality Partially Occluded Face Recognition Method
xing yan chao ; tan zheng
..............page:144-146
Active Blackboard Design Pattern for Distributed Agents Coordination
wang bin ; zhang yao xue ; chen song qiao
..............page:147-149
An Improved Adaptive Routing in Active Networks
ji zhu liang ; dai lian kui
..............page:150-151,156
Research on a Watermark Based on the Fourier-Mellin Transform
sun gang ; xie jun yuan
..............page:152-153,165
Fast Rule-based Eyes Location Algorithm
mao min feng ; zhang xing ming ; guo yu cong
..............page:154-156
A Syllable Based Keyword Spotting System
shi feng ; qin min ; li zhi zhu
..............page:157-158
Face Recognition Based on Fixed-point Algorithm
guo rui ; song hai na ; kuang gang yao
..............page:159-161
Design of a RTP/Multicast Based Streaming Media Transmission System
wu min qiang ; zhou jun ; zhu qing bo ; lu sang zuo ; chen dao xu
..............page:162-165
Hypertext Pattern of Montage Based on Extended HTML
wang fei
..............page:166-167,176
XML-based WebGIS for Fishery
huang dong mei ; le jia jin
..............page:168-170
Application of Java3D in Steel Structure Modeling
zhao wei dong ; sun hao bo ; wei gang ; li qi yan
..............page:171-173
Abnormality Detection in Colonoscopic Images Based on Colour Texture Analysis and Neural Network
xia shun ren ; chen xi chao ; zhu dan zuo
..............page:174-176
Investigation of Cellular Automata Model for Traffic Flow
zhou zi li ; wang xin wei ; wang cheng dao
..............page:177-179
Long-distance Hydrological Data-collecting and Control System Based on GSM Short Message
zhang hong ming ; mei yi li ; zhang li xiang ; zhao shuang qiang
..............page:180-181
Parameterized CAD System Based on Object-oriented Technology
zuo lian wang ; chen zuo ; liu lu yuan
..............page:182-185
Control of Virtual Space Based on 3D Input Device
dong guang bo ; zhang xi en ; xu ya qing ; wang chang sheng
..............page:189-191
Design of Windows2000 Log-on System Based on Third Party PKI Identification
jin hui ; shi jian jun
..............page:192-194
Object-oriented Design and Implementation of ISO7776 Protocol
jiang zhong qiu ; cha jie min
..............page:99-100,173
Mapping of SDL onto C Language for Implementing Firmware of 802.11 Protocol
he cheng kai ; shen zhen ning ; liu nai an ; zeng xing zuo
..............page:97-98
The Study on Decision Tree Classification Techniques
zuo li hua ; ji gen lin
..............page:94-96,105
Design and Realization for JDBC-based Database Connection-pool
luo rong ; tang xue bing
..............page:92-93,111
Optimal Algorithm of the Multiway Array Aggregation in Data Cube in MOLAP
yin a dong ; wu sen ; gong yu ; gao xue dong
..............page:89-91,98
Software Process for ODP Interoperability Based on MDA
wang zuo wei ; tang sheng qun
..............page:87-88,114
Metadata Extracting for HTML Document Based on Rules
di di ; zhou jing yang ; pan jin gui
..............page:85-86,165
Client Cache Management of Embedded Mobile Database
sun yuan chao ; shao shi
..............page:82-84
Extension and Implementation of Object pool pattern
shui chao ; li hui
..............page:26-27,194
Systematic Function Optimizing and Realization in Oracle Database Based on Windows Platform
wang xiao chun ; zhao zuo ; zhang yan
..............page:79-81
Load Balance of Message Passing in Cluster Management System
feng kuan ; ma qun sheng ; he chuan ; fang xing
..............page:76-78
Information Retrieval Technique Basod on Genetic Algorithm
xu bin ; liu sai ; kang li shan ; zheng gang
..............page:74-75,108
RBF Neural Network Structure Optimization Based on MEC Algorithm
he xiao juan ; zeng jian chao ; xu yu bin
..............page:72-73,78
An Efficient Hierarchical Clustering Algorithm
wu fan ; li shi jun
..............page:70-71,81
Integrated Framework Design for the System of Cooperative Distance Drilling
liu yong fang ; wang kui sheng ; fang ming ; qu zhan
..............page:68-69,84
Design and Implementation of Security Vulnerabilities Scanner System
dai zu feng ; zhang yu qing ; hu yu zuo ; hong hong ; xie chong bin
..............page:65-67
A Valiant Parallel Merge Sorting Algorithm Based on Reconfigurable Optical Pipeline Bus
chen hong jian ; chen ; shen jie ; li kai rong ; luo jia qi
..............page:63-64,138
Recovery Method Based on Savepoint Mechanism and Log for Cooperative Design Transactions
chen guo ning ; li tao shen ; liao guo qiong
..............page:58-60
Image Recognition Based on Edge and Gradient Character
huang wai bin ; zhang ; chen gang
..............page:56-57,161
Silence Insertion in HMM-based Chinese Automatic Segmentation
chen zuo ; chai pei zuo
..............page:40-41
Water Target Detection Based on Statistical and Structural Information in SAR Image
song jian she ; yuan li hai ; xue wen tong
..............page:37-39
Algorithm on Convolution Calculation on MCC-SIMD Computer
zhang fa cun ; zhao xiao hong ; wang lv ; shen xu bang
..............page:34-36
A Fast Practical Method for Console Point Matching
hu ming zuo ; ren ming wu ; yang jing yu
..............page:31-33
Pattern Classifying Based on Principle of Maximizing Minimum Distance
chen mian shu ; fu ping ; zhang chun yu
..............page:28-30
Storage Strategy for XML-based GeoSpatial Metadata
luo ying wei ; xing peng ling
..............page:9-11
Design and Implementation of Video Streaming Platform over the Internet
zhu peng ; li chun wen
..............page:12-14
Network Performance-aware Communication Model for Clustered Wide Area Systems
zuo yan hui ; lu zuo da
..............page:15-16,30
Application of OO Conceptual Models Method in Data Warehouses Design
hu ruo ; qian sheng san
..............page:17-18,158
Supply Chain Information Control Mechanism Based on Distributed Structure
ni shen bing ; chen jun fang ; zhang li na
..............page:19-20,141
Adaptive Sampling Arithmetic in Passive Measurement Based on Fuzzy Logic
yang xin yu ; zeng ming ; wang jun ; wu hang
..............page:21-22,185
A GML-based Approach of Querying and Integrating Web Spatial Information
an yang ; guan zuo hong ; chen jun peng ; zhao bo
..............page:23-25
Soft-logic Control System Based on IPC
wang fei ; wang pei zhe ; xiao de yun ; lin wei
..............page:53-55
Design and Implementation of A Parallel Debugger for Dawning Cluster System
chen yong ; he ke dong ; lu zai chao ; zuo chao
..............page:50-52
Multi-source Multi-resolution Data Model Based on XML
liu hong bo ; wang xiu kun ; tang yi yuan ; li qiang ; yu fan hui
..............page:48-49,133
Design and Implementation of Embedded System Co-verification Environment Based on Simulation
yan ying jian ; wang shi hao ; liu ming ye
..............page:45-47
A Novel Algorithm for Overload Control in MIN Based on Two Stage Credit
wang tian ; jiang he lun
..............page:42-44
Summary of the Honeynet and Entrapment Defense Technology
cao ai juan ; liu bao xu ; xu zuo sheng
..............page:1-3
JTXA:A New Network Computing Platform
wu sheng hao ; zhong yi ping ; zhang shi yong
..............page:4-6
Ontology of Supporting Database E-R Model Design and Its Getting Method
li sheng zuo ; xu fu yuan ; xu ying
..............page:7-8,39