Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2005 Issue 9
Design and Implementation of GIS Component Based on OpenGIS Specification
YANG Jianyu;YANG Chongjun;Liu Donglin;RUI Xiaoping;GAO Jiliang
..............page:54-55,76
Design of RSVP Active Network Execution Environment
WANG Xuanzheng;QIAN Depei
..............page:51-53,111
Loosely Coupled Computing and Programming in Active Networks
Liang Aimin;Jia Limin;MENG Yan
..............page:56-58
PKI Authentication System Combining with Fingerprint
LIU Peishun;WANG Jianbo;He Dake
..............page:59-60,140
A Method of Building a Miniaturized Linux
Dong Xiaoming;LI Huaiyang;ZHAO Zhen;TAN Zhihu
..............page:61-63,197
Forward-secure Signature Scheme Based on Strong RSA Assumption
QIU Hongli;Cao Zhenfu
..............page:64-66
Access Control Model Based on JAAS Enterprise
Xu Guangwei;Yin Jianwei;CHEN Gang;Dong Jinxiang
..............page:67-69,215
Secure Directory Service for Virtual Organization
LI Hui;ZHAO Xibin;GU Ming
..............page:70-72,144
Software Risk Management and Control Optimization
XU Ruzhi;Qian Leqiu;Gong Hongquan;LI Weihong
..............page:73-76
Implementation of Software Design Patterns in Client-side Wireless Simulator
SUN Shiwen;Liu Zhongxin;CHEN Zengqiang;YUAN Zhuzhi
..............page:77-79
Design and Implementation of TLS Protocol
CHEN Weixian;FENG Dengguo
..............page:80-82
Noisy-data-disposing Algorithm of Data Clean on the Attribute Level
WANG Shi;Li Yuchen;LIU Naili;WANG Suqing
..............page:86-87,227
Design and Implementation of Visual Modeling and Supporting Tool Based on DRTSADL
LUO Jing;YE Junmin;ZHAO Liang;CHEN Li
..............page:88-90
Mutual Exclusion of TCP-related Tasks in an Embedded RTOS
LUO Dingding;ZHAO Hai
..............page:91-92,95
Design of Digital Simulation Platform Based on Multi-agent
XIE Zanfu;XIAO Huakun;Cui Huailin;WEI Wenguo;LI Jun
..............page:93-95
Implementation of Hub-spoken Network Based on IPSec VPN
LOU Xueming;QIAN Hualin
..............page:115-117
W-CDMA Systems Power Control Based on Circular Neural Networks
ZHANG Bin;GUO Jun
..............page:118-120
Resources Discovery in Mobile Ad Hoc Networks
ZOU Min;OU Feng
..............page:121-123,184
Large-scale Network Configuration Management System Based on Web
NI Chunsheng;Wang Jilong
..............page:124-126
A Web Based Virtual Machine
MA Lin;LUO Tiejian;SONG Jinliang;YE Shiwei
..............page:127-128,137
Improvement and Application of MVC Design Patterns
LI Yongliang;CUI Duwu
..............page:96-97,212
Design of Collaborative Service in the DVE Based on Jini
DONG Chen;ZHANG Hua
..............page:98-100
Algorithm for Matching Ancestor-Descendant Relationship on XML Stream
WANG Wangen;Wan Changxuan
..............page:101-103
Research of Real-time CORBA Based on Real-time Java
LIU Xiaojun;Zhang Lichen
..............page:104-105,封三
Study of Self-adaptive TCP Congestion Control Window Algorithm
CHEN Yu;Zhang Naitong
..............page:106-108
Application of XML in Protocol Implementation of SNMP Manager
WU Libing;CUI Jianqun;WU Chanle;MENG Xuejun;XING Jianbing
..............page:109-111
Availability Analysis and Design of the Web Cluster System
Zeng Biqing;YE Xiaozhou;CHEN Zhigang;LIU Anfeng
..............page:112-114
Group Signature Scheme Based on Discrete Logarithm
XU Guangbao;ZHANG Jianzhong
..............page:143-144
Probabilistic Edge Marking-based Effective Method for Locating Attacker
LIU Li;SU Defu;Wang Guoying
..............page:145-147
Research in the Models of the Security Risk Assessment Technology
LIU Heng;LV Shuwang
..............page:129-131
Approach of Specification-based Mixed Intrusion Detection
MU Wei;SONG Hua;Dai Yiqi
..............page:132-134,230
DDoS Attacks Detection Based on Sequential Change Detection
Lin Bai;LI Ou;LIU Qingwei
..............page:135-137
Comprehensive Implementing Model for Enhancing Linux's Security
HU Juan;She Chundong;Fan Zhihua;LIU Feng;HE Hui
..............page:138-140
Realization of Extended Permission in RBAC
YE Chunxiao;FU Yunqing;Wu Zhongfu
..............page:141-142,172
MIS for Cotton Seed Bank
Long Tengfang;Yang Luming;DU Xiongming;WU Tongli
..............page:225-227
An Approach for Combining Conflict Evidences
WU Genxiu
..............page:151-154
Application of Entropy Theory to Information Retrieval
Kang Haiyan;FAN Xiaozhong;Li Yanfang;Geng Zengmin
..............page:155-156,181
Histogram Image Retrieval Based on Spatial Information
WANG Xiaoling;Xie Kanglin
..............page:157-159
Research of Affective Model Applied in Robot
ZHANG Xueyuan;WANG Zhiliang;NAGAI MasstakKe;Guo Dong
..............page:160-162
Research on Automatical Cheque Processing
WANG Linshui;Pan Wumo;Shi Guangshun;XUE Feng;WAN Hongwu;ZHANG Hui
..............page:163-166
Image Bilinear Interpolation Enlargement and Calculation Analysis
SUN Chengye;Sang Nong;Zhang Tianxu;WANG Xinsai
..............page:167-169,230
Improved Effective Immune Genetic Algorithm for Solving the Packing Problem
Song Yanan;Deng Feiqi;Ye Jiawei
..............page:170-172
A New Method of Image Recognition
XUE Mingdong;GUO Li;ZHANG Guoxuan;LIU Shijian
..............page:173-175
Application of Intelligent Technologies in Simulation Platform Design
Zhou Haiying;CHEN Lichao
..............page:176-178
Application of Feature Points Extraction and Graphic Deformation Techniques in Speech Animation
NIU Xiaosong;WANG Xun;Wan Shouhong
..............page:179-181
Stream Control Based on Bandwidth-adaptive Buffer Technology
WANG Hailing;WANG Zongmin;ZHOU Bing
..............page:182-184
Input Transition Sensitive Power Models of Function Units
Zhao Zhenxi;ZHANG Hong;Zhou Xuehai;LEI Ting
..............page:204-206
Fuzzy-PI Control System for Fermentation Temperature Based on PLC
Xiong Weili;XU Baoguo;XIAO Yingwang
..............page:207-209
Design of Movement-control System Based on TMS320C32
DENG Qihui;ZHU Xianxin;HUANG Tao;LU Luoxian
..............page:210-212
Design of DiskOnChip as Boot Device Replacement
LIU Chaoping;DU Jiao;FENG Dengguo
..............page:216-218
Research and Realization of a Personalized Pedagogic Design Model
PING Li;SHEN Jun
..............page:219-221
Development and Design of Windsurfing Pumping Training Expert System
WANG Shujie;LIANG Xiao;ZHANG Shuqing
..............page:228-230
Role-based User Privilege Management in Universal Foreign Trade Operation Software
ZHOU Jianmei;ZHAO Lei;Kong Fang
..............page:231-封三
A Resisting Cropping Robust Watermarking Algorithm Based on Chaotic Map
Tang Guoping;Liao Xiaofeng
..............page:34-36
Unsupervised Intrusion Detection Method
Jiang Shengyi;LI Qinghua
..............page:31-33
A Net Parallel Chess Tree Searching Model Using PVM
WANG Jinghui;QIAO Weimin
..............page:29-30,126
Concurrency Control of Transactions in Embedded Real-time Databases
LIAO Guoqiong;LIU Yunsheng;WANG Hongting;Wang Lina
..............page:27-28,150
Competitive Decision Algorithm for Large-scale TSP
Ning Aibing;MA Liang
..............page:23-26
Extraction and Recognition of Characters in Images from Industrial Containers
LIANG Zhizheng;SHI Pengfei;ZHOU Xutong
..............page:41-42,131
Integrity Constraints for Data Integration and Exchange Based on XML
Liu Yunfeng;Yang Dongqing;Tang Shiwei;Wang Tengjiao;GAO Jun;LI Ying
..............page:39-40,224
Distributed Multithreading Implementation of the K-th Shortest Paths Problem for GIS
Yuan Zhenming;ZHANG Liang
..............page:37-38,162
3D Reconstruction of Spine's CT Image
LIU Qiaohong;LI Lijun
..............page:185-186
An Overview on Snakes Models
Li Tianqing;ZHANG Yi;LIU Zhi;Hu Dongcheng
..............page:1-3
Optimal Algorithm of Mode Selection Based on H.264
Chen Chuanbo;XIAO Dan
..............page:187-188,218
Camera Head Expansion on the Sitsang Evaluation Board
LI Tao;RUI Heling;CHEN Guangmeng
..............page:195-197
Fast Restoration Method for Disk-based Network Backup System
QU Zhiwei;Xie Kanglin;CHEN Yan;ZHANG Zhenhua;Yeo Boon-Lock
..............page:198-200
Security Analysis and Improvement of RADIUS Protocol
LI Yuanzheng;REN Chuanlun;YANG Yixian
..............page:49-50,209
A Log-based Recovery Algorithm Based on Fault-tolerant Web Services
Liu Lingxia;ZHOU Bin;WU Quanyuan
..............page:46-48
A Web Ontology Server and Its Query Interface
HU He;LIU Dayou;Hu Zhiyong
..............page:43-45
Fuzzy Rule Study Model of Network Intrusion Detection System
Xu Zhoujun;SUN Jizhou;Yue Bing;YU Li
..............page:21-22,154
Anti-collision Algorithm Based on Jumping and Dynamic Searching and Its Analysis
YU Songsen;ZHAN Yiju;WANG Zhiping;Tang Zhongping
..............page:19-20,26
A Method for Quantitative Association Rule Mining Based on Decimal-binary Conversion
LIU Jun;Li Renhou;Zheng Qinghua
..............page:17-18,33
Energy-efficient Unicast Routing Algorithm in Mobile Ad Hoc Networks
Zhang Wentao;Jia Xiaohua;HUANG Chuanhe
..............page:14-16
A Novel Design of Efficient SNMP Agent Based on MIB-interface Healthy Mapping
WANG Li;GUO Qiao;ZHANG Jun;FENG Wenfeng
..............page:11-13,166
Research on Logical Semantic Analysis of Web Ontology Language
LIU Jin;HE Keqing;LI Bing
..............page:7-10
Research on Key Technology in Web Usage Mining
CHEN Jian;YIN Jian
..............page:4-6