Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2006 Issue 18
Data Movement Service Based on Load Balance in Grid
LIANG Ying;HU Zhigang
..............page:111-113
A Link Layer Topology Discovery Algorithm Based on STP
LI Yanbing;MA Yue;WANG Wei;WAN Xiaoqiang
..............page:109-110,113
Feature Compensation Method Based on Probability Model and Spectrum Difference
MA Zhifei;XU Wang;WANG Bingxi;WANG Xingbin
..............page:200-201,205
A Geometric Distortion Resilient Image Watermark Algorithm Based on DFT-SVD
ZHANG Xianhai;YANG Yongtian
..............page:120-121,132
Analysis of Buffer Overflow in Binary Files
YE Yongqing;LI Hui;ZHENG Yanfei;HONG Xuan;ZHENG Dong
..............page:141-143
A Fast Correlation Attack Algorithm Based on Error-correcting Codes
SHI Jianhong;ZHENG Haoran;JIANG Hong
..............page:144-146,199
Arithmetic to Analyze and Detect Buffer Overflow Vulnerability
LAI Dian;HUANG Yu
..............page:147-148,227
Algebraic Expression for AES S-box and InvS-box
MA Hongbo;LIU Lianhao
..............page:149-151
Research on Unix Host Security Monitor Technique
SHEN Weichao;WANG Shihua
..............page:152-154
Efficient Rule-matching Algorithms on Snort
GU Xiaogang;JIANG Rongan;ZHAO Mingwei
..............page:155-156,213
Authentication System with Intrusion-tolerant Feature
HUANG Jianhua;CHENG Xiaosong;SONG Guoxing
..............page:157-159
A New Model for Streaming Media DRM Based on Triple Level Encryption
WU Junjun;WANG Juan
..............page:160-162
Design and Implementation of Distributed Virtual Honeynet System
WANG Jie;WANG Jianxin;TANG Yong
..............page:163-165,177
Design and Implementation of Real-time Security Monitor System for Inter-domain Route
LI Kai;ZHU Peidong;LIU Gongjie
..............page:166-168
Technology of Audit Tracing for Intrusion Detection
JIANG Weihua;CHONG Liang;DU Jun
..............page:169-171
A Distributed Intrusion Detection System Based on Autonomous Agent
WANG Lihui;LI Tao;DU Yu;GUO Jing;HU Xiaoqin;LU Zhengtian
..............page:172-174
A New ID-based Chameleon Digital Signature Scheme
MA Xiaojing;WANG Shangping;WANG Xiaofeng;QIN Hui
..............page:175-177
Personalization in Web Search Engine
ZHANG Liang;FENG Zhiyong
..............page:202-205
Study on Urban Function Partition Based on Self-organizing Neural Network
SHI Yufeng;WANG Yan
..............page:206-207,250
Rough Set Feature Weighting Method for Image Retrieval
FENG Lin;YUAN Bin;SUN Tao;TENG Hongfei
..............page:208-210
Design and Implementation of CSPI of Security Middleware
ZENG Linghua;OUYANG Kaicui;ZHOU Mingtian
..............page:178-180,183
Simple Support Vector Machine Incorporating Invariance Features
XIA Guoen;JIN Weidong;ZHANG Gexiang
..............page:184-185,191
Study on Product Design Knowledge Reuse
SHEN Bin;GONG Da
..............page:186-188,210
Prediction of the End-price of Online Auction Item
LI Xuefeng;LIU Lu;WU Lihua
..............page:189-191
Simulate Analyzing of Agent's Learn Strategy on Stock Market
ZENG Hongkun;SHEN Deyao
..............page:192-194
Research on Linear Lane Mark Identification and Track Method Based on Edge
WANG Rongben;YU Tianhong;GU Baiyuan;GUO Lie
..............page:195-196,239
Model and Algorithm for Pallet Loading Problem in Railway Transportation
JING Xianghe;ZHOU Xianzhong;XU Yanyong;CHEN Zhiwei
..............page:197-199
Intrusions Detection Using the Ratio of Kernel Central Distance
RAO Xian;LI Bin;YANG Shaoquan
..............page:122-124
ID-based Authenticated Encryption Scheme with Public Verifiability
GUO Sheng;CAO Zhenfu;LU Rongxing
..............page:125-126,194
Agent-based Certification Path Building Method
LI Zhuofan;YANG Shutang;LU Songnian
..............page:127-129
Research and Implementation of Spam Filtering System
ZHANG Yi;ZHOU Jianguo;YAN Puliu
..............page:106-108,124
Genetic Algorithm for Optimizing Multicast Route in WDM Networks
WANG Qing;OUYANG Wei;CAO Wenjun
..............page:103-105
Integrated Scheme for Fighting Against DDoS Attacks
LI Jun;LI Ming
..............page:130-132
Design of Database System Covert Channel Analysis
ZHANG Shiming;HE Shoucai
..............page:133-134,154
AHP and Fuzzy Comprehensive Evaluation Application in Disaster Recouery Ability Evaluation
CHEN Mingang;DONG Jun;ZHANG Liliang;YAO Hanxing
..............page:135-137,140
Study on Network Intrusion Detection Based on TSVM
XU Wenlong;YAO Lihong;PAN Li;NI Yousheng
..............page:138-140
Performance Optimization of Shared Main Memory System of Zhongke SoC
CHENG Xiaodong;PAN Jie;ZHANG Zhimin
..............page:243-245
Efficient VLSI Design for Elliptic Curve Cryptograph
HE Xiangjun;SU Bin
..............page:246-247,257
High Performance Instruction Set Simulator Using Dynamic Decode Cache
SANG Shengtian;WANG Jinxiang;ZHAO Xinshu
..............page:248-250
ONOPTOC Clustering Algorithm and Application to Batch Process
CHEN Shu;XU Baoguo
..............page:251-252
Research on Submarine Equipment Application Research System: HLA FEDEP
WU Jinping;LU Minghua
..............page:237-239
Design of Compatible Memory Controller Based on WISHBONE Bus
CHEN Shuangyan;WANG Donghui;ZHANG Tiejun;HOU Chaohuan
..............page:240-242
Design of On-board-computer Control System for CX-1 Micro-satellite
WANG Ping;SUN Ning;LI Huawang;BAO Haichao;YIN Zengshan;LIU Haitao
..............page:255-257
Implementation of Embedded IDE Based on Eclipse Framework
LI Lianyun;LI Yi;WEN Lina;ZHANG Xiaoxian;ZHANG Ji
..............page:278-279,282
Research on Approach of Generating Random Stitch in Embroidery CAD
LIU Kun;LUO Yupin;YANG Shiyuan
..............page:280-282
Realization of Control Algorithm Editor Based on IEC61131-3
KONG Yaguang;WANG Wenhai
..............page:283-285
Implementation of Automatic Service Discovery Based on Semantic Web Service
SHEN Weiwei;CAI Hongming;JIANG Lihong
..............page:211-213
Region Entropy-based Image Retrieval
HE Shan;GUO Baolong;HONG Junbiao
..............page:214-216
Novel Vision Algorithm on Improving Performances of Soccer Robot
WANG Shuli;DING Fengxia;YANG Guanglin;ZHAO Fengda
..............page:217-219
Human Face Image Edge Detection Methods and Application
HUANG Yucheng;HU Guoqing;WU Xiongying;LIU Wenyan
..............page:220-221,224
Wavelet-based Multi-resolution Analysis of Irregular Surface Meshes
HUANG Jiaqiang;GU Yaolin
..............page:222-224
Web Problem Resources Retrieval Based on Ontology and Description Logic Inferences
WANG Zongwei;ZHU Guojin;ZHAO Langbo;SU Xiang
..............page:225-227
Multiple Description Image Coding for Wireless
LI Xin;YIN Baocai;YANG Meng;SU Haibin
..............page:228-230
Study on Multimedia Ring Back Tone Service
SHEN Qiwei;LIAO Jianxin;WANG Chun;CAI Bin
..............page:231-233,236
Research on 3-Dimensional Visualization of Reservoir Based on DEM
WANG Zongmin;YANG Haibo;QIN Hongyan
..............page:234-236
Efficient Structural Join Way Dealing with XML Documents Query
YAO Quanzhu;DING Xiaojian
..............page:87-89
End-to-End QoS Architecture Based on IEEE802.11e and DiffServ
CHENG Hao;SHI Xingrong
..............page:100-102,105
Implementation and Test of Non-blocking 2PC Model for Web Services Transaction
YANG Haitao;CHEN Chuchao;LIN Jintang
..............page:98-99,119
Novel Self-adaptive RWA Algorithm in WDM Optical Networks Without Wavelength Conversion
KANG Qiaoyan;MENG Xiangru;LI Weimin;WANG Jianfeng
..............page:95-97
Design Method for HTTP Engine Based on EWS
ZHANG Wenbo;ZHAO Hai;SU Weiji;XU Ye;ZHAO Ming
..............page:92-94
Research of TCP Congestion Control Algorithm over LEO Satellite Networks
GONG Changqing;ZHAO Zhigang;WANG Guangxing
..............page:90-91,151
A Chinese Universal Input Model for Handheld Devices
LI Peifeng;ZHU Qiaoming;QIAN Peide
..............page:258-260,282
Integration and Realization of Inter-government Workflow Based on Web Service
WANG Hengjie;ZHANG Song
..............page:261-263
Design and Application for Embedded Video Codec Based on H.264
FAN Xinnan;XING Chao
..............page:264-266
One Service Approval System Based on Workflow
WU Weina
..............page:267-269,272
Waveform Development Based on SCA
HONG Xijun;QIAN Chen;ZHANG Ji
..............page:270-272
Design of Computer System for SINS with Laser Gyro
WANG Yu;TANG Jianxun;LONG Xingwu
..............page:273-274
Application of Multi-agent Corporation in E-business Intermediation Platform
GUO Wensheng;DU Junping;YIN Yixin
..............page:275-277
A Context Storage Scheme for Sensornet
QIN Huaifeng;ZHOU Xingshe
..............page:28-31
Implementation of Embedded TCP/IP for Multi-thread Application
BAI Ruilin;WU Guanglin
..............page:84-86
New Region-based Dynamic Numbering Scheme
REN Jiadong;YIN Xiaopeng
..............page:79-80,89
Integrate Test Method for Component-based Software Based on Theory of Finite Automaton
ZHANG Yikun;HOU Yuming;CUI Duwu
..............page:75-78
Soft-technology of Network Fault-tolerant for Blue Whale Distributed File System
FAN Yong;ZHANG Jiangang;XU Lu
..............page:72-74,86
Application of Neural Networks Based on Modified RPE Algorithm in Customer Fraud Prediction
WANG Huaqiu;CAO Changxiu;HE Bo;LIU Xiangming
..............page:25-27
Modified Particle Swarm Optimization for 0-1 Knapsack Problems
SHEN Xianjun;WANG Weiwu;ZHENG Bojin;LI Yuanxiang
..............page:23-24,38
Unrestricted Check Type Identification Based on Regulated Morphology
HE Xiuling;YANG Yang;CHEN Zengzhao;DONG Cailin
..............page:20-22
Fuzzy Grey Model of Base Level Maintenance Time for Torpedo Weapon System
LIANG Qingwei;SONG Baowei;PAN Guang
..............page:17-19
Collision Model and Communication Strategy of Multiple Callings
WANG Bo;PAN Quan
..............page:14-16,69
Method for Importing Web Content Mining into Patterns Clustering
CHEN Zhengming;MA Guangzhi
..............page:70-71,78
Security Analysis on a Multicast Source Authentication Scheme
HE Yongzhong;FENG Dengguo
..............page:12-13,22
Model of Cross-language Information Retrieval Based on Language Concept Space
WU Chen;ZHANG Quan;MIAO Jianming
..............page:9-11,19
Research and Review of Software Engineering Economics
FANG Haiguang;GAO Xinyan;CHEN Peng
..............page:3-5
Research on Technologies of Computer Aided Sketching Design
FANG Guisheng;HE Lili;KONG Fansheng
..............page:1-2,5
Approach to Role Implementation Based on Mediator Pattern
HE Chengwan;HE Keqing;TU Wenjie
..............page:48-49,94
Schedule Processes with Packet Attributes in NP Control Plane OS
YAN Shoumeng;ZHOU Xingshe;ZHANG Fan
..............page:45-47
Data Element Distill Method on Demand-oriented of Information System
OUYANG Yi;YAO Li;DAI Changhua
..............page:42-44,47
Study of Database Connection Pool in LBS Platform
LIANG Qinghan;SHEN Zhanfeng;LUO Jiancheng;FAN Hong;MING Dongping;LI Junli
..............page:39-41
Improved Fast IPv6 Route Lookup Algorithm Based on Binary Search
SUN Qingnan;LU Shiwen
..............page:35-38
Novel Snake Model Based on Fractal Dimension Feature and Its Application in Segmentation
MIN Li;TANG Yandong;WANG Lidi;SHI Zelin
..............page:32-34
Research on Grid Schedule Model Based on Colored Petri Net
HU Zhigang;CHEN Huaquan;CHEN Ren
..............page:67-69
A Schema-based XML Index Structure
ZENG Yi;XU Xian;ZHANG Yuanping
..............page:64-66
Principle and Realization of Review Based on SOFL Specification
FANG Xiaoli;CHEN Haopeng
..............page:61-63
Analysis of Task Schedule Overhead and Load Balance in OpenMP
LAI Jianxin;HU Changjun;ZHAO Yudi;WANG Shengyuan;ZHANG Suqin
..............page:58-60
Workflow Modeling Based on Parallel Finite Automata
LIU Jinglei;ZHANG Wei;Fan Baode
..............page:52-54,66