Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2006 Issue 10
Design of Wireless Control System in River
JIANG Xinge;LU Chong;ZHANG Lin
..............page:229-230,282
Optimal Design for Physical Structure of RITS Based on Multi-objective GA
MENG Yan;SUN Yang;JIA Limin
..............page:227-228,279
Application Technology of Logistics Management Oriented Mobile Agents
WANG Chonghai;ZHU Yunlong;YIN Chaowan
..............page:224-226,262
Reconfiguration Rule Based Impact Analysis Method for Enterprise Information System
WANG Zhongjie;XU Xiaofei;ZHAN Dechen
..............page:221-223
Multicasting and Receiving of AVI Files in Intranet Based on DirectShow
ZHANG Yong;LUO Jing
..............page:218-220
Joint Source-channel Decoding Based on VLC and LDPC
ZHANG Yanxin;SUN Jun;WANG Yue;WANG Jia
..............page:215-217
Video Application and ADSL's Matching Measurement Model
ZHONG Yiping;ZHI Xiaofan;WU Jie
..............page:212-214
A Binocular Stereo Vision Algorithm on GPU
LI Yafeng;QIN Kaihuai
..............page:210-211,236
Research and Implementation of Image Out Glow and Projection Arithmetic
WANG Ronglin;CHEN Shuzhen;XIONG Naixue;CAO Feng
..............page:207-209
Design and Implementation of Virtual Museum Based on Web
TIAN Haishan;HE Yuanjun;CAI Hongming;HAO Xin
..............page:204-206
Research and Implementation of A Finger Mark Encrypted E-mail System
GAO Yi;QI Dongyuan;LI Lei
..............page:149-150
A New Security Mechanism of Mobile IPv6 Binding Update
ZHOU Aidong;WU Chengrong;ZHONG Yiping;ZHANG Shiyong
..............page:151-153
DDoS Detection in High Speed Network
CAI Weijun;ZHONG Haijun
..............page:154-156
A Secure Efficient Multi-round Electronic Auction
ZHANG Zhiming;DENG Jiangang;YU Min
..............page:157-158,195
Network Security Audit Multi-level Model BrosaAudit
YANG Chaofeng;LIU Qingyun;LIU Lijun
..............page:159-160,163
Implementation of ECC with DSP TMS320C6201 Chip
ZHAO Tao;PAN Xiaodong;WANG Chunying;GU Chunxiang
..............page:161-163
A Novel Approach of Runway Recognition in Complex Environment
LI Tao;WANG Junpu;WU Xiuqing;WANG Pengwei
..............page:164-166
An Immune Algorithm Applied to Function Optimization
YU Ying;HOU Chaozhen
..............page:167-168,171
An Intelligent QoS Multicast Routing Algorithm in IP/DWDM Optical Internet
WANG Xingwei;WU Tieyan;LIU Cong;HUANG Min
..............page:169-171
A Combined Algorithm for High-dimensional Similarity Search in Time Series Database
LIANG Jianhai;DU Jun;SUN Xiuxia;LI Xiangqing
..............page:172-174
Adaptive Segmentation for Skin Micro-image
HU Yueli;CAO Jialin
..............page:175-177,182
Application of Image Recognition in Automatic Recognition System for Part Assembling
ZHA Ying;LIU Tiegen;DU Dong
..............page:178-179,185
Knowledge Retrieval Based on Knowledge Context Tree in KMS
AN Shihu;CHU Dongsheng;YU Hua;DU Yibing;WU Quansheng
..............page:180-182
An Isolated Word Recognition System Based on Combination Score
KUANG Hangyu;ZHANG Jun;JI Fei;WEI Gang
..............page:186-188
A Decision Tree Based Approach for Construction of Speech Database and Unit Selection
YE Zhenxing;CAI Lianhong
..............page:189-190,220
An Efficient Approach for Counting Multiple Keywords Frequency
MA Zhirou;YE Yi
..............page:191-192,203
Method of Eye Location Based on Gray Projection Function
ZHANG Nana;MA Yan;SU Guilian
..............page:193-195
Maxicode Boundary Location Algorithms Based on Edge Detection
FU Bin;FENG Yuliang
..............page:196-198
A New Method of Iris Location
XU Wenbo;ZHOU Li
..............page:199-200,233
Intelligent Optimization Algorithms for Euclidean Steiner Minimum Tree Problem
JIN Huimin;MA Liang;WANG Zhoumian
..............page:201-203
Dynamic and Static Power Co-analysis of CMOS Circuits
XU Yongjun;CHEN Jinghua;LUO Zuying;LI Xiaowei
..............page:231-233
HT-7 Tokamak Data Acquisition and Real-time Visualization Based on PCI Bus
HUANG Qinchao;WANG Huazhong;LUO Jiarong;LIU Kun
..............page:234-236
Signal Integrity for the Design of High Speed Switch
LI Nan;LIU Qiong;WU Zhimei
..............page:237-239,242
Realization of Expand Search and Neighbor Node Table in AODV
ZHANG Yuan;GUO Hong;LIU Luokun
..............page:113-115
Research and Revision on Policy Management Model
WU Bei;CHEN Xingyuan;ZHAO Liang
..............page:110-112
A New Type of Scheme for Improving TCP Throughput in Mobile Ad Hoc Network
XIONG Yan;LI li;Miao Fuyou;WANG Xingfu
..............page:108-109,153
Distributed Dynamic Cell QoS Routing Protocol and Simulation with NS2
XIONG Yan;WANG Haibo;MIAO Fuyou;WANG Xingfu
..............page:105-107
Implementation of FCSP-based Web Service Dynamic Composition Algorithm
GUO Heqing;XIE Jianshan;LIN Manshan
..............page:102-104
Implementation of TTCN-3 Test System Based on Object-oriented Method
LIU Xiaoyong;JIANG Fan
..............page:80-82
A Method to Automatically Detect and Recover from Kernel Level Rootkit
Yan Renzhong;ZHONG Xichang;ZHANG Ni
..............page:77-79
News Information Extraction for Web Resource
Zhu Yongsheng;WU Gangshan
..............page:74-76
A Reflective Framework for Dynamic Evolution of Business Process
JIA Xiangyang;YING Shi;ZHANG Tao;YU Xiaofeng
..............page:71-73
Research of Software License Management in Cluster
WANG Min;LU Yutong;PENG Jian
..............page:68-70
An Effective Algorithm of Data Placement in a Mass Storage System
TAN Huafang;SUN Lili;HOU Zifeng
..............page:47-49
Exploiting Parallelization of BLAST on Dawning 4000A
TAN Guangming;XU Lin;ZHOU Youying;FENG Shengzhong;SUN Ninghui
..............page:45-46,49
Attribute Reduction Algorithm Based on Discernable and Similar Matrix About Similar Rough Set
ZHANG Guiyun;HUANG Guoxing;YANG Bingru
..............page:43-44,65
Document Flow Domain Framework Based on Multi-layer Architecture
XU Hongzhe;ZHANG Haoxiang;WANG Jungang;LIU Chaolong
..............page:40-42,93
Application of Binary-tree Under Multi-communication Network
YU Xinsheng;RONG Zhiwei
..............page:119-122
CDM-based Distributed Server Diagnostic System
LI Ning
..............page:240-242
Application of Distributed-computing in Digitized Gas-field
ANG Li;YANG Jinlin;CAO Xiedong
..............page:243-245
Design of AHB-to-APB Bridge and Its Application
XIA Jing;QUAN Jinguo;LIN Xiaokang
..............page:246-248
A Novel Adaptable Workflow System Prototype
ZHAO Jian;WANG Jianmin;SUN Jiaguang
..............page:249-250,253
A Clustering Algorithm with Self-maintenance Feature in Wireless Sensor Network
JIANG Guobin;ZHANG Shiyong;ZHONG Yiping
..............page:99-101
Research and Implementation of Network Vulnerability Scanner System Based on Policies
WANG Sheng;SUN Lechang;WANG Xinzhi
..............page:96-98,115
Windows Host Intrusion Detection Experimental System
WANG Yong;ZHANG Xijun;YANG Huihua;WANG Xingyu
..............page:132-134
Research and Implementation of A Web Services Secure Model
HAN Tao;GUO Heqing
..............page:130-131,134
Design of Audit Module in DBMS Based on Common Criterion
CHEN Chi;FENG Dengguo
..............page:128-129,139
Mstream Attack Detection Approach Based on Probabilistic Fuzzy Cognitive Map
YANG Feng;ZHONG Cheng;LI Zhi
..............page:125-127
Weakness and Improvement of Encrypted Messages Guessed in TLS Protocol Group
XU Qiang;SI Tiange;ZANG Yiqi
..............page:123-124,127
Multicast Routing Protocols with Multiple QoS Constraints Based on Ad Hoc Networks
CHEN Niansheng;LI Layuan;DONG Wushi
..............page:31-33,52
Rectification of Magnetic Force Tracker in AR System
FENG Yan;WANG Minghui;CHEN Yimin;HAN Jin
..............page:28-30
A Reconfigurable Workflow Enactment Model
YIN Quan;ZAHNG Haisheng
..............page:22-24,36
Analysis and Design of MAGrid Architecture in Agent-level
ZHAO Ye;LEI Yingjie
..............page:94-95,122
High Performance IPv4/IPv6 Transition Gateway Using IXP2400 Network Processors
CHEN Mo;WANG Chunfeng;YIN Zhaoyin;LI Dan
..............page:91-93
A Routing Algorithm Based on Selective Probing for Multi-constrained Path
JIN Xin;LIU Xiande;XIAO Shiyuan
..............page:89-90,104
A High-availability VoD System with Dynamic Fault Tolerant
ZHANG Minglong;FENG Boqin;LIU Fang
..............page:86-88
J2EE Quick Development Framework Based on Struts & Hibernate
YANG Tao;ZHOU Zhibo;LING Li
..............page:83-85
E-Gov Affairs Official System Platform Based on Domain Engineering Methods
WANG Ning;YU Miao;LIU Jishan
..............page:257-259
Value Added Service of Mobile Short Message Based on CMPP Protocol
ZHOU Shumin;Tang Bin;SUN Yamin
..............page:260-262
Measurement of Fiber Array Errors Based on Image Processing
LIAO Qianghua;ZHONG Jiangsheng
..............page:263-264,267
Design and Implementation of Topic News Information Portal System
MO Qian;LIU Shujia
..............page:265-267
Implementation of Multi-agent-based Simulation Framework for Biochemical Networks
ZHENG Haoran;LIU Jun;NIU Junqing
..............page:268-270
Boolean Rule Mining Based on Multi-factor Random Perturbation
CHEN Yun;ZHANG Wei;ZHOU Ting;ZOU Hanbin
..............page:63-65
Modified Binary Search
WANG Haitao;Zhu Hong
..............page:60-62,118
Software Fault Monitoring Based on Runtime Formal Analysis
LIU Yanbin;Zhu Xiaodong
..............page:58-59,142
Rules of Transforming XML Schema to UML Class Diagram
LU Zhengding;FAN Xiaodan
..............page:53-54,57
Estimation of Size of Military Software Using IFPUG
FENG Jing;Zhu Xiaodong;LIU Yanbin
..............page:50-52
Mechanism of Digital Library Interoperability Based on OAI Under Grid Environment
ZHENG Zhiyun;XU Wei;SONG Hantao;NIU Zhendong
..............page:37-39
Overlay Nodes Placement Problem on Overlay Network
PAN Yun;ZHANG Li;YU Zhenwei
..............page:34-36
Personalized Net-news Custom-made and Reading Service Based on Web Service
SHI Yong;WANG Yiyong;WANG Dongmei
..............page:283-封三
tou gao xu zhi
..............page:封二
ei shu ju ku wen zhai yao qiu
..............page:封四
A Dynamic-verifier Based Authenticated Key Exchange Protocol
YU Shuyao;ZHANG Youkun;YE Runguo;SONG Cheng
..............page:145-146,209
A Novel Multi-bit Watermarking Scheme in Digital Images
JIN Xizi;WANG Zhenxuan
..............page:143-144,214
Buffer Overflow Protection Based on Segment Limitation
CUI Zhigang;TIAN Yuan;CAO Yuanda;ZHANG Xuelan
..............page:140-142
Adaptive Spread Spectrum Information Hiding Method Based on Auditory Perception
TONG Ming;HAO Chongyang;LIU Xiaojun
..............page:137-139
A Detection Model for Distributed Denial of Service Attacks Based on Network Connection Analysis
WU QINGtao;SHAO Zhiqing;QIAN Xiyuan
..............page:135-136,166
Research and Design of Remote Application Layer Disaster Recovery System
ZHOU Huanjun;ZHANG Shiping
..............page:277-279
System Maintenance Based on the ITIL's Change Management
WU Fusheng;HAO Jianming;ZHENG Guoqin
..............page:280-282
Unknown Computer Virus Detection Based on Multi-naive Bayes Algorithm
ZHANG Boyun;YIN Jianping;GAO Jingbo;ZHANG Dingxing
..............page:18-21
UART-based Reliable Communication and Performance Analysis
HU Likun;WANG Qingchao
..............page:15-17,21
Latent Link Analysis-based FTSVM for Hypertext Classification
WANG Ye;HUANG Shangteng
..............page:12-14
Log-infinitely Divisible Cascades Analysis of Abnormal Network Traffic
CHENG Hua;SHAO Zhiqing;FANG Yiquan
..............page:9-11,14
SVM-based Blind Steganalysis for JPEG Images
SONG Hua;YOU Xingang;DAI Yiqi
..............page:6-8
Method of Filting Reactionary Text Based on Vector Space Model
LI Qiang;LI Jianhua
..............page:4-5,8