Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2006 Issue 7
Method of Bottleneck Bandwidth Measurement with Different Packet Pair Size
SUN Qingnan;LU Shiwen
..............page:115-117
IP over Optical Network Survivability Coordinated Mechanism Under High-intensity EMP
CHENG Zhongqing;JIANG Haibo;LIU Kejian;YIN Kai
..............page:112-114,128
Empirical Study on Stock Through Arch Based on PSO Algorithm
XI Maolong;XU Wenbo;SUN Jun
..............page:204-206
An Image Retrieval System Based on IGA
SHI Ying;HE Yanxiang;LIU Maofu
..............page:207-209
Research on Meta-search Engine Based on Semantic Comprehension
CAO Ertang;LIU Yulin
..............page:210-211
Management and Application of Domain Knowledge Based on Conceptual Network
LIU Shuguang;ZENG Junfang;LI Xiaobing
..............page:212-214
Prediction Model of the Running Time of Tasks Based on Load
YUAN Jingbo;DING Shunli;JU Jiubin
..............page:123-125
End-to-end Available Bandwidth Measurement Method
WANG Fang;QIAN Depei;XU Dawei;DU Lei
..............page:126-128
Study and Implement on Information Sharing Agent Based on P2P
ZHANG Lei;PENG Wei;YE Xiuzi
..............page:129-131
Analysis and Improvement on Portal Performance
ZHAO Heli;GE Xufeng;JIANG Shui;WU Rongquan
..............page:132-134
Transmission Method of Image Information Hiding Based on Chaotic Encryption
LIU Niansheng;GUO Donghui
..............page:135-137
A Distributed Public Key Management Based on Off-line CS in MANET
HUANG Meisun;YANG Shoubao;ZHANG Lei;LI Hongwei
..............page:138-139,148
An Improved Role Based Access Control
GAN Quan;HE Yeping;HAN Naiping
..............page:140-142,168
XML Digital Signature Scheme Based on Zero Knowledge Proof
WANG Huijin;YANG Wenyin;ZHU Anqing
..............page:143-145
Using Gain-ratio Based Decision Trees to Improve Intrusion Detection
TANG Qian;ZHANG Dafang;HUANG Kun
..............page:146-148
A Novel Clustering-based Intrusion Detection Method
LI Wei;FAN Jiulun
..............page:149-150,153
Intrusion Detection Based on Fuzzy Logic and Immune GA
CAI Weihong;LIU Zhen;WANG Meilin
..............page:151-153
A Confirmer Signature Scheme Based on RSA
JU Hongwei;LI Fengyin;YU Jiguo;CAO Baoxiang
..............page:154-156,165
A Gray-scale Blind Watermarking Algorithm in DCT Domain Based on Chaotic Encryption
BAO Zheng;ZHANG Jianwei;XIA Deshen
..............page:157-159,1362
Intrusion Detection Methods Based on Network Processor
WEI Lihua;ZHANG Xiaoming;TANG Yuhua;SUN Zhigang
..............page:160-162
Research on Multi-application Single-logon System Based on Strong Authentication
DING Desheng;XU Jianzhen;SHEN Lizhen;YU Lili
..............page:163-165
New Scheme for Injection of Trojan Horse Based on Winsock 2 SPI
TIAN Lei;LI Xianghe;XIN Zhidong;PAN Jun
..............page:166-168
Research on Genetic Algorithms Based Fingerprint Image Binarization Algorithm
ZHAO Yingding;LIU Jingang
..............page:169-171
Composition of Web Services Using Process Ontology
LI Changyun;YANG Aimin;YING Jing;JIANG Li
..............page:172-173,214
Study of Intelligence Frame Based on Case of Battlefield Damage Assessment
WANG Runsheng;JIA Xisheng;WANG Runquan
..............page:174-176,184
Study of Logistic Scheduling Algorithm Based on Ant Colonies Optimization
TANG Lianggui;CHENG Daijie
..............page:177-179,194
Adjusting Uneven Brightness of Spray Liquid Particle Image
JIAN Linsha;ZHANG Tianhao
..............page:180-181
Cloud Shadow Removal Based on Undecimated Wavelet Transform
CHEN Fen;ZHAO Zhongming;YANG Jian
..............page:185-187
Case-based Reasonor Based on Multi-layered Feedforward Neural Network
LI Jianyang;ZHENG Hanyuan;LIU Huiting
..............page:188-190
Multi-scale Statistic Shape Model Based Levelset Segmentation Method
ZHANG Hui;LIU Weijun
..............page:191-194
Prediction Methods for Load Balancing Based on No-full Trust Confirmation Mechanism
YANG Yongjian;JU Jiubin;CAO Xiaodong
..............page:109-111
Service Time Based Admission Control Mechanism in Cluster-based Web Server
ZHANG Yongzhong;ZHAO Yinliang;SONG Jingbin;LI Zengzhi
..............page:106-108
Sequential Distributed Variable-length Packet Scheduling Algorithm: SDMCRR
LIU Qinrang;WU Jiangxing;LAN Julong
..............page:103-105
Integration Approach of Distributed Network Resource and Service Management
YANG Huaizhou;LI Zengzhi;CHEN Jing
..............page:100-102,111
Iris Texture Classification Based on Histogram Ratio Features
WANG Yong;HAN Jiuqiang;ZHAN Licai
..............page:195-196,223
Design and Realization of the System of Farm Crop Information Extraction
ZHENG Jiaheng;JIAN Xiaoyan
..............page:197-198,220
A New Approach of Stacking Based on Voting
WEI Yanyan;LI Taoshen
..............page:199-201
A Region-based Image Retrieval Method Using Harris Salient Points
SONG Hui;LI Bicheng
..............page:202-203,206
A Multimedia Storage System Based on WAN
LIU Dan;LIU Xinsong
..............page:215-217
Compression and Transmission Scheme of Linux Desktop Graph Sequences
LUO Hong;MU Dejun
..............page:221-223
HTT and Parallel Algorithms of H.264 Video Encoder
WANG Han;LIN Tao
..............page:224-226
Distributional Model of Yearly Investment for Torpedo Based on Vague Sets
LIANG Qingwei;SONG Baowei;PAN Guang
..............page:227-228,233
Implementation of A Real-time Physiological Signal's Transfer System Based on TINI Technology
ZHU Youping;ZHANG Jinxiang;YANG Jiahai
..............page:229-230,239
An Improved Map-matching Algorithm Used in Traffic Flow Estimation System
WU Hui;SHENG Zhijie;YU Quan;LIU Yuncai
..............page:237-239
Electronic-dog and Dynamic Tree Using Link
GU Zhen;BAO Renmin;ZHOU Mingrun
..............page:243-244,252
Design and Realization of Waterway Maintenance & Management System Based on Electronic Map
YANG Pinfu;DU Qingyun;YAN Changping
..............page:245-246,249
Optimized Determination of Fractured Well Layers Based on Support Vector Machine
YANG Weimin;TIAN Fang;GONG Shengrong
..............page:247-249
Application of Matlab in Force Density Form-finding Method of Tensile Membrane Structure
LU Yinghua;WANG Fan;LIU Renhuai;DU Bing
..............page:250-252
Design and Implementation of Hole Scanner
SUN Gangfeng;HAN Quanyin
..............page:253-255
Application of Socket and DDE in Monitoring and Control System for Automated Multi-layer Garage
YAO Xiaoming;BAI Chenming;FAN Duowang;JIANG Zhaoyuan
..............page:256-257,263
A Practical Modeling Algorithm for Fermentation Process
ZHANG Guiwei;ZHAO Jiang;HU Shiqiang
..............page:261-263
A Pipelined Splittable Multiply-accumulate Unit Architecture
LI Dongxiao
..............page:264-266
Design and Implementation of WLAN MAC Protocol Using SDL
HU Tianli;YANG Yang;JIN Depeng;ZENG Lieguang
..............page:267-268,277
Implementation of Communication Between Cluster-based Cache Server and CD Jukebox
DU Xiao;GUO Chengcheng;HU Xiumin
..............page:269-271,280
Implementation of Face Identification in Intelligent Mobile Telephone
LI Bing;WU Song;ZENG Fantao
..............page:272-274
Fuzzy Cluster Analysis of ITS Demand and Realization in VBA Program
XU Yan;YANG Xiaokuan;LIU Xiaoming;DU Xiaohui
..............page:275-277
An Efficient Algorithm for Polygon Clipping
FU Yingchun;YUAN Xiuxiao
..............page:278-280
Armament Modeling for Battlefield Damage Simulation Based on CAD
WANG Guangyan;SHI Quan
..............page:281-283
tou gao xu zhi
..............page:封二
Mechanism of Address Autoconfiguration for Virtual Backbone-based MANETs
ZHENG Min;YANG Qingjie;FENG Meiyu;DING Wei
..............page:97-99
QoS Management of Web Services Transaction
LI Jie;TANG Weiqing;WANG Xinggang
..............page:94-96
Real-time Concurrency Control Mechanisms in Wireless Mobile Distributed Environments
DANG Depeng;ZHOU Lizhu;LIU Yunsheng
..............page:92-93,99
Improvement and Research on Dependence Analysis in SUIF
WANG Shanshan;ZHAO Rongcai;ZHANG Ping
..............page:89-91
Design and Realization of Database Accession Middleware System
LIAO Xianglin;ZHANG Hongjun;ZHAO Zhennan;ZHAO Hongqiang
..............page:86-88,91
A Novel Two-level Clustering Algorithm for GIS
WANG Bo;CHI Zhongxian;YUE Xun
..............page:84-85,125
Design and Realization of Net Filter Based on URL
ZHOU Haoyu
..............page:81-83
Platform Independent Models Based on Role Model
HE Chengwan;DONG Yanyan;TU Wenjie;HE Keqing
..............page:78-80
Object-based Management System for Multiple Resources
WEI Jianjun;WANG Min;LI Jing;XU Lu
..............page:75-77
Research and Application of Spatial Data Processing Based on SDPG
LI Fengsheng;ZHOU Xiaofeng
..............page:72-74
Realization of a High-available Cluster File System
LI Hui;FAN Zhihua;XIONG Jin;MA Jie
..............page:69-71
Application of Design Pattern in Reusable GIS Software Development
ZENG Zhiming;ZHU Jiang;ZHANG Lili;ZHONG Ershun
..............page:67-68,77
Research of QoS-based ASOS Resource Management and Task Scheduler
ZHU Changhai;SUN Yuan;QIAO Xin
..............page:61-63
Application and Research of Web Usage Mining on Electronic Commerce
LIU Haiquan;YAO Quanzhu
..............page:58-60
Spatial Data Concurrency Control Based on MDG-Tree in GIS
LIU Ying;ZHANG Shuguang
..............page:55-57
An Efficient Approach to Web Services Discovery with Multi Agent
JIANG Zheyuan;HAN Jianghong;CHEN Jin
..............page:52-54,57
ParaCQ:A Kind of Parallel Computing Middleware Based on Mobile Agent
TAO Xiaofeng;SUN Jian;SHI Youqun;LIU Hui
..............page:49-51,60
Research on Development Component of Decision-oriented Knowledge Management System
HU Dongbo;CHEN Xiaohong;HU Dongbin
..............page:46-48
A Fuzzy Clustering Model for Incomplete Data Sets
TONG Youtang;WANG Jianming
..............page:43-45
A Novel Image Warping Approach Based on Aided-view
TANG Yang;WU Huizhong;LI Dong;XIAO Fu
..............page:40-42
Theorem Proving System Based on Tableau--TableauTAP
LIU Quan;SUN Jigui
..............page:38-39,45
Application of High-level Design of Hardware with Timed CSP
CUI Xiaoxin;YU Dunshan;CUI Xiaole;SHENG Shimin
..............page:14-16
Summary of Embedded CPU Soft-core
SUN Kai;WANG Tianmiao;WEI Hongxing;CHEN Youdong
..............page:6-9
Development Trend of Embedded Operating System--CEOS
CUI Lingli;GAO Lixin;ZHU Lixin;ZHANG Jianyu;DING Qingxin
..............page:4-5,16
Autonomic Computing Environment
ZHANG Haijun;SHI Zhongzhi
..............page:1-3
Research of Trust Management Model for Grid Computing
WANG Dongan;QIN Gang;NAN Kai;YAN Baoping
..............page:32-34
Certificate-based Sheme of Secure Group Communication in Grid Environment
QIN Gang;WANG Dongan;YAN Baoping
..............page:29-31
Multiresolution Feature Based Image Mosaics
HUANG Tongcheng;HU Yunfa
..............page:23-25
Temporal Model and Evolutionary Strategy of Lymphocytes
TAN Chengyu;DONG Hongbin;LIANG Yiwen;GUAN Gang
..............page:19-22
Real-time Signal Control of Urban Intersection Based on Genetic Algorithms for Bus Lane
CHEN Qun;YAN Kefei;LENG Jie
..............page:17-18,22