Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2005 Issue 1
A New Method of Anti-buffer Overflow
ren an xi ; yang shou bao ; li hong wei ; song shun hong
..............page:150-152
Research of Secure Billing to VASP for UMTS Application
zeng zuo ; gao zi li ; jing jin hua ; zhang gen du
..............page:146-147,186
Dynamic Computer Forensics Based on Multi-agent
yang shi ; li tao ; ding ju ling
..............page:153-154,233
Improvement on Rijndael Algorithm for IC Card Application
chen zuo xin ; liu hong yan
..............page:155-156,183
Research and Application of Ontology Representation Language
zhou ming jian ; gao ji
..............page:160-162
Decision Model of Manager Selection Based on SVM
bi lu zheng ; wu ping dong ; hu pei cheng ; yu jing kuan
..............page:163-164
A Genetic Algorithm with Sex Character
xiong wei qing ; liu ming da ; zhang shao yu
..............page:165-166,190
An Ant Colony Algorithm Based on Dynamic Transition
hu yong
..............page:167-168,171
A Harmonious Particle Swarm Optimizer --HPSO
pan feng ; tu xu yan ; chen jie ; fu ji wei
..............page:169-171
An Image Retrieval Method of Getting the High-level Semantics from the Low-level Features
shen yu li ; ren jian feng ; guo lei
..............page:172-173,178
Accelerated Evolutionary Computation Based on Mask Technology
zhang rong ; zheng hao ran ; huang guo rui ; wang zuo fa
..............page:176-178
A Detecting Algorithm for Low Resolution Objects
ming ying ; jiang jing zuo ; bian zuo zuo
..............page:179-180
Adaptive Fair Bandwidth Allocation in Layered Video Multicast
gao yu jin ; shi feng ; zhang yan su
..............page:181-183
Real-time Transmission of Video Image Based on Web
shen jin qi ; ruan feng ; zhu jing
..............page:187-188,198
A New Screen Encoding Algorithm
xiao ren zhong ; shen rui min ; chen shi ming
..............page:189-190
Model of Web Text Mining System Based on Multi-agent Technology and Application
jiang li hua ; huang min ; ma yong guang ; zuo zhen sheng
..............page:217-218,221
Architecture and Design Practice of A Security Middleware
zeng le ; xie xin gui
..............page:219-221
Study of Personalized Net News Service on Web
shi yong ; wang xiao lin ; zeng guang zhou
..............page:222-224
Research of Integrated USB Interface in Media Processor Co-simulation Platform
chen ruo yu ; yao qing dong ; liu peng ; wang wei dong ; jiang zhi di
..............page:225-227
Design and Implementation of Dynamic Adaptive Load Balancing Algorithm in Firewall Cluster
li qing yu ; wei wei ; hou zi feng
..............page:141-143
A Fast Combined Chaotic Cryptographic Method Fitting Mobile Computing
zhu cong xu ; chen zhi gang
..............page:138-140
Research of Security Policy Model in Application Security Platform
zhang wen kai ; cao yuan da
..............page:136-137,162
An Active Network Framework Supporting Traditional IP Applications
jin zhi gang ; wang yuan
..............page:133-135
A Group Multicast Communication Protocol Based on Internet
yao zuo ; xu xue zhou ; li xiao an
..............page:130-132
Model of over Enterprises Application Based on Web Service
ying hong ; zuo pei
..............page:127-129
Design of Dynamic ERP System Based on Frame and Component Technology
xu xiang ying ; yang he biao ; chen hua
..............page:231-233
Association Rules Mining Algorithm of Web Pageviews for Personalized Recommendation
zuo zuo ; wang da ling ; yu ge
..............page:79-81
Mining Periodic Pattern from Network Log File
wang peng ; xie qian he ; zeng zhen bing
..............page:76-78
Design and Implementation of Network Service Visitor Tracing System
zeng bao zhu ; gu da wu
..............page:125-126,230
Performance Research of MultiRail Technique
wang zuo ; wang wei jun ; yao yu liang
..............page:122-124
Design and Implementation of Security Router Based on MPC180 and MPC8260
liu gang ; zhang de yun ; ding hui ning ; li jin ku ; liao ming tao
..............page:119-121,159
TURBO Codes with Unequal Error Protection
zhang can ; yang jian guo
..............page:116-118
Design and Realization of CORBA Calls Encapsulated by Web Services
gu hai qun ; gu qing fan ; wu jie yi ; li zuo
..............page:114-115,135
Access Control Model Based on Role and Vector Matrix
hu ying song ; li guang jun
..............page:111-113
A Dynamic Multicast Routing Algorithm with Delay Bounded
chen lin ; yang zhi yun ; xu zheng quan
..............page:108-110
Software Development Based on Software Bus
yuan zhan ting ; zhang qiu yu ; zhang dong dong ; di zhi wan ; li wei ping
..............page:105-107
Meta Level Software Architecture for Workflow
he zhi qiang ; cai wen jie ; li lei
..............page:103-104,124
Design Pattern Based Enterprise SMS Gateway Framework
ge ning ; xu zuo ; zhang dao ping
..............page:100-102
Research and Design of RTDB in Industry Control
qian xiao yu ; zhang yan wu
..............page:98-99,132
Intelligent Routing Algorithm for Power System Graph Using Production System
wang ping ; yang pei long ; luo ying zuo ; wang li jun ; lin kong yuan
..............page:195-198
MC-oriented Preference Model of Customer Requirements
chen xin du ; liu qiang ; chen xin
..............page:199-200,216
Study and Implementation of Complex Ship-hull Surface's NURBS Modeling
chen jun ; cui han guo ; liu jian jun
..............page:201-202
Application and Research of Multisensor Fusion Used in Robot
lin feng ; chen yi min ; xiong yu mei ; duan hong wei
..............page:203-205
Research and Design of Home Gateway Platform Based on SoC
guo bing ; shen yan ; xie jun ; wang yong ; xiong guang ze
..............page:209-211
Disaster Forecast Model Based on BP Network
zhang zheng ; huang tai song ; zuo chun
..............page:212-213
A Process to Develop Component-based Web Application Systems with UML
he li ; yu bin ; he yan ; wu li xian
..............page:95-97
Web-enabled Data Warehouse Resolvent
liu lang ; wang li ya ; huang hai liang
..............page:92-94
Application and Implementation of Mobile Agent in Distributed Database Searching
wang wen xue ; zhang bo feng ; zhou chuan fei ; fang ai guo ; guo xiao yan
..............page:89-91
Realization of Oracle Database Management System in PowerBuilder
guan hong ; zhong qiu hai ; cheng chun
..............page:87-88,140
Dynamic Information Visualization for Reverse Engineering
li peng ; chen ping
..............page:84-86
Research on Preemptability of Linux Kernel
dong xiao feng ; gu xin
..............page:82-83,143
Workflow Model Based on ARIS and XML
liu lei ; zhu ze fei ; li ren wang
..............page:53-55,164
Notes on the Application Modes of Online Certificate Status Protocol
ai feng ; zhou yong bin ; ni xi zhen
..............page:50-52
WBEM-based Unifying Management System
xiao zheng ; wei wei ; hou zi feng
..............page:47-49,208
Agent-based Transaction Model for CAD System
wang xiao juan ; zheng guo qin ; zhang jian yu
..............page:45-46,70
Heuristic Algorithm for Signed Domination Number of a Graph
chen wei dong
..............page:41-44
Wavelet-based High-capacity Lossless Image Hiding and Its Application
zheng yi zhan ; yang cheng yun ; xuan guo rong ; liu lian sheng ; bai wei chao ; shi yun qing
..............page:56-59
A Strategy of Multi-level Classification Based on SVM
lu bin ; yang jian wu ; chen xiao ou
..............page:73-75,113
Design and Implementation of Global File System
jiang jin hu ; chen zuo ning ; huang wen zheng
..............page:71-72,封三
Design of Heuristic Parallel Computation Model Based on PVM
wang jing hui ; liu cai hong ; qiao wei min
..............page:68-70
Implementation of Email Security Monitoring System Based on Protocol Analysis
cao xue wu ; yi guo liang ; liu li jun
..............page:65-67,91
A Robust Algorithm for Separation of Characters from Ternary Phase Diagram
liu xue song ; bao hong ; xue yu xiang
..............page:63-64,102
Research of Human Head Deformable Model
chen yong qiang ; wang qi fu
..............page:25-26,44
An OGSI-based Grid Workflow Language
yang yan ; tang sheng qun ; zhang wen tao
..............page:19-21,35
Optimization of OSPF Link Weights Based on Adaptive Genetic Algorithms
sun qin dong ; zhang de yun ; sun chao zuo ; zhang xiao tong
..............page:17-18,78
Study of Web Information Retrieval Technology Based on Improved Vector Space Model
lei jing sheng ; lin dong xue ; fu qian qian
..............page:14-16
A Clustering Algorithm Based on the Hybrid Neural Networks for Web Document
lei jing sheng ; wu qing qing ; wang ping
..............page:12-13,16
Peak Load Forecasting System Based on Data Mining
liu jin ; yu ji lai ; tang jiang long
..............page:9-11
A Feedback-learning Mechanism Based on the Semantic Topological Network
yang jian wu ; wan xiao jun
..............page:6-8
Review of Classification Algorithms in Data Mining
luo ke ; lin mu gang ; zuo dong mei
..............page:3-5,11
Research of Admission Control in IP Networks
gao wen yu ; chen song qiao ; wang jian xin
..............page:1-2,38
Detection of Images Steganography Algorithm Based on Wavelet Packet Decomposition and Support Vector Machines
wang zhi gang ; yang xiao yuan ; wang yu min ; qin qing
..............page:60-62
An SNMP-based Web Management Model of Embedded Systems
wang jin dong ; zhao hai ; han guang jie ; wang ji yong ; lin tao ; zhang wen bo
..............page:39-40,59
Integrated Management of Embedded Internet Devices
wang jin dong ; zhao hai ; han guang jie ; wang ji yong ; lin tao ; guan mo
..............page:36-38
Design and Implementation of Ocean Data Collecting & Monitoring System
wang wen jun ; zhou zhi hai ; luo lin
..............page:33-35
Research on Implementing Behavior Protocol Based on Model Transformation
yin jian fei ; guo he qing ; peng xin yi
..............page:31-32,107
Study on Application of Combination of Wavelet with Fractal in Image Processing
zhao jian ; pan jian shou ; chen guang hui
..............page:29-30,52
Generalization of Security Enhancement Model for Operating Systems
chen ze mao ; shen chang xiang
..............page:27-28,62