Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2005 Issue 3
Design and Realization of Embedded LCD Controller
huang jun kai ; jiang cun bo ; ye han min ; xu jian ; zhi yan
..............page:218-220
VLSI Design and Implementation of CRC in Ethernet
gao ji ye ; rong meng tian ; zou ding kai
..............page:215-217
Topological Reconstruction of STL Solids Model and Its Errors Repair
hou bao ming ; liu xue na
..............page:213-214,217
Application of Communications Among Inverters on CAN Bus
jiang jiang ; wu chang qi ; gu he rong ; zuo wei yang
..............page:210-212
Airport Parking-position Assignments Strategy Based on GA
tian chen ; xiong gui xi
..............page:186-188,228
Anomaly Detection for Linux Process Behavior Based on Fuzzy ART Neural Network
ji zhi gang ; cai li dong
..............page:183-185
English TTS System Using Variable-length Concatenating Units
zeng ling ping ; chai pei zuo
..............page:180-182
Image Processing System for Unmanned Aerial Vehicles
wang hai ming ; li ping ; han bo
..............page:178-179,191
Application of Fuzzy RBF Network in Constructing Knowledge Base of Expert System
wang ya zuo ; cao chang xiu ; ren jiang hong ; ye zhong quan
..............page:175-177
Pattern Library Formation and Signature Identification Classification
zhao yong jian ; lou lan fang ; li yong bo
..............page:173-174,197
A New Model and Design of Dependable Online Vote System
zuo li ming ; liu er gen
..............page:152-154,177
Research on IDS-based Distributed Firewall System
li hong wei ; yang shou bao ; ren an xi ; huang mei zuo
..............page:149-151
Design and Implementation of Interchange System for Web-based BBS
ye ling ; zhao jia zuo
..............page:128-130
A Algorithm of Network Topology Discovery Based on Multi-VLANs
zhu you chan ; li chun xiang
..............page:134-136,139
A Complete IPSec-NAT Traversal Solution
xu zuo
..............page:137-139
Design and Implementation of Secure Network Storage System
long qin ; zeng feng ping ; wu si lian
..............page:140-142
Security Architecture and Intrusion Detection Techniques of Wireless Networks
li qing chao ; shao zhi qing
..............page:143-145,151
A General Data Access Engine of Supporting Safety Access
gu hua jiang ; liu zuo ming ; li zhong liang ; shao pei nan
..............page:146-148
Design and Realization for Interface of PCI Based on FPGA
xi zhen yuan ; chen li wei ; lin shu min
..............page:221-223,封三
A Method of License Plate Location Based on Morphology
lu ya qin ; zuo ling chao
..............page:224-225,封三
Development of Handkey Management System
xing dian yong ; wu shao chun ; wei zhao chun
..............page:229-230
Distributed Trust Model Based on Recommendation
tan lin ; yang yan ping ; yin gang ; chen yue zhou
..............page:57-59
Split Decision Functions in Fractal Image Coding Based on Quadtree
li jun li ; chen gang ; chi zhe ru
..............page:54-56
Application of Improved RIP Algorithm on SDH Network Management System
huang jin ri ; sun ming hai ; wang yi chao
..............page:125-127
Design and Realization of a General Web Crawler
wu li hui ; wang bin ; yu zhi hua
..............page:123-124,194
Design and Implementation of Hierarchical Management Structure for WLAN
dan ji wen ; zhang bing quan ; xu tao
..............page:121-122,130
Study on Mobile Phone-oriented Application Integration Technology of Web Services
li lu qun ; li ming lu
..............page:119-120,182
Development of NURBS-based Multi-point Forming CAD System
chen jian jun ; ma ru yu ; li ming zhe ; wang cheng zuo
..............page:51-53
Implementation and Improvement of IPSec Kernel Based on Unix Streams Mechanism
kong fan yu ; yu jia ; li da xing
..............page:48-50
Analysis on a Business Process Protocol Based on MaSE
deng bin bin ; gu shao yuan ; wang xiao ping
..............page:207-209,212
Integrated Mobile Information System Architecture Based on Message Services
hu bin ; liu zhong ying
..............page:204-206
Research on Mold CAPP Expert System and Process Procedure Simulation Model
hua guang ru ; zhou xiong hui ; ruan xue yu
..............page:201-203
Centralized Conference Control Model Based on SIP and Its Realization
zeng qing zuo ; hu rui min ; bian xue gong
..............page:198-200,217
Implementing Method of Two-layer Reinforcement Based on Multi-agent Cooperation Learning
chen xue jiang ; yang dong yong ; fan rong zhen
..............page:192-194
Grid-based Statistical Analysis of Fe Abundances Gradients in Galaxy
luo ze ; cui chen zhou ; nan kai ; yan bao ping
..............page:45-47
Fingerprint Compression Algorithm Based on Directional Image and SLCCA
chen shu zhen ; li lin
..............page:166-169
Extraction and Segmentation of Handwriting Numerical Strings in Bankcheck
zhang zhong yang ; chen qiang ; xu yong ; yang jing yu
..............page:163-165
A New Way for Constructing Neural Networks by Division and Assembly
pan zuo ; wu shang ; zhong zuo
..............page:161-162,220
Behavioral Modifying Model of CGF
sun zhu feng ; sun yao ; huang wen bin
..............page:158-160
Design and Realization of Fuzzy Explanation Facility in Expert System
wu zuo ; xiang jing meng
..............page:155-157
Research on Communication Platform in Home Network
xu hai ; yang shi yuan
..............page:18-20,38
Research and Implementation on the Global Sup ply Chain Based on Web Services
jin ji wen ; jin zuo ; liu xi jie ; zhang jie
..............page:15-17,31
Design of Speed and Position Detection System for High-speed Maglev
qian cun yuan ; han zheng zhi ; shao de rong ; xie wei da
..............page:12-14,63
Survey on Face Recognition Technology
liu yan li ; zhao yue long
..............page:10-11,74
Research on Reengineering Based on Performance
shen zuo ; peng zuo ; xia kuan li ; zhao wen yun
..............page:7-9,47
A Study Survery of Intrusion Detection
ma chuan xiang ; li qing hua ; wang hui
..............page:4-6,56
A Model of BDI Agent Based on Petri Nets
chen wei xiong
..............page:23-25
Adaptively Dynamic Address Allocation Protocol Based on Leader Selection in Mobile Ad Hoc Networks
zhu xi ping ; fang xu ming ; li fang jun
..............page:116-118,185
Development of Multiply Dimensions in Data Warehouse
zhang ying chun ; xiang yang
..............page:113-115
Design and Implementation on GIS Dynamic Service Based on Web Service
xu hui ; zhang hong
..............page:110-112
Definition of Coding Metric and Tool Implementation
mo jie zhong ; yang zong yuan
..............page:108-109,115
Study and Implementation of Common Framework Based on Linux Security Module
li yun xue ; su zhi zuo ; wang xiao bin
..............page:105-107,172
Visual Modeling of Pattern-oriented Distributed Software Architecture
liu zuo ; fang ding yi ; chen xiao jiang
..............page:102-104
Design of Universal Agent-based Digital Production Platform
li zuo ; sun ji qing ; li hui
..............page:97-98,127
Hierarchical Decomposition for XML Schemas and DTD Design
li yuan yi
..............page:94-96
Arithmetic About the Best Link Based on Universal Relation
zuo cheng yan ; wang jian xin
..............page:90-93
A New Generalized (k,n)-Threshold Secret Sharing Scheme
ren ping an ; ma jian feng
..............page:43-44,71
Anomaly Intrusion Detection Method Based on SVDD
yang min ; zhang huan guo ; fu jian ming ; luo min
..............page:39-42
A New Congestion Control Scheme for Streaming and Its Performance Simulation
lv yun fei ; wang xing gang
..............page:35-38
Sub-job Assignment of Homogeneous Applications on Computational Grid
wang qing jiang ; gui xiao lin ; zheng shou hong
..............page:32-34
A Study on Exploratory Knowledge Discovery Directed by Users Interest
xu xiao yuan ; han guo qiang ; zuo hua qing
..............page:29-31
An Analysis of Uneven Granules Clustering Based on Quotient Space
xu feng ; zhang ling
..............page:26-28,53
Research and Realization of Nesting Transaction Based on MVCC
wang da zhi ; li man
..............page:88-89,96
Comparative Analysis of Several Semantic Web Languages
lu liu ming ; zhu guo jin ; chen jia xun
..............page:86-87,93
Protocol-based Interoperability Test of Web Application
yu ying ; huang ning ; wang ying
..............page:80-81,85
News Information Gathering Software Agent System Based on Knowledge
sun yu bing ; li jian qing ; peng hong hui ; lin zuo zuo
..............page:21-22,42
Overview of Digital Watermarking Techniques for Binary Images
zhang jing ; zhang chun tian
..............page:1-3,25
General AS/400 Jobs Monitor and Alarm System
ma liang you ; ma yong you
..............page:231-封三
Model and Classification of Software Connectors
liu zuo ; zhang shi zuo ; wang li fu
..............page:77-79
Development of Software Exception Analysis Expert System Based on Web
wang zuo ; zhang jing ; li jun huai
..............page:75-76,169
A New Anonymous Protocol for Multicast Communication
wang wei ping ; yang ji ; chen song qiao ; chen jian er
..............page:72-74
Research and Implementation of Anycast Protocol in IPv6 on Linux
wang jian xin ; yang ji ; lu xi cheng
..............page:69-71
Design and Implementation of Lock Management System in Engineering Database
hua guo yao ; zhou bo
..............page:67-68,165
Research on Trust Model in Grid Computing Environment
li zuo ; liu zuo ; chen ke fei
..............page:64-66
Multi-clock Domain Design Method for AC'97 Audio Controller
hu jia sheng ; guo zuo ; luo wei yi
..............page:60-63