Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2007 Issue 12
Self-adaptation Polling Strategy of Grid Resource Monitoring
XIAO Guoqiang;XIANG Suihua
..............page:108-110
Distance Vector Routing Algorithm Based on State Stability Update
LI Yuan;MA Zhengxin;CAO Zhigang
..............page:105-107,113
Research of Engineering Design Knowledge Representation on Semantic Web
ZHEN Lu;JIANG Zuhua;LIU Chao;LIANG Jun
..............page:199-201
Research of Double Token Based Collaborative Strategy for Multi-robot System
DONG Yangbin;JIANG Jinping;HE Yan
..............page:205-207
Research and Application of Improved Simulated Annealing Algorithms in Module Identification
SHAN Quan;YAN Guangrong;LEI Yi
..............page:208-210,213
Clustering Integration of Collaborative Ontologies Based on EOWL
XIAO Ruliang;TANG Shengqun
..............page:211-213
Call Admission Control Strategy for Wireless Network Based on Shared Buffer
ZHAO Ling;HUANG Shengye
..............page:111-113
Research of Network Flow Correlation Based on Principal Components Analysis
YE Lin;ZHANG Hongli;HE Hui
..............page:114-116,121
A Multipath Routing Protocol Based on Hybrid Criterion to Choose Routing
SHEN Yang;ZHENG Baoyu;ZHAO Xianjing
..............page:119-121
Research and Implementation of Source Routing Management
WANG Jinyi;NAN Kai;CHEN Qi
..............page:117-118,124
Research on DRM System Architecture and Protocol Based on P2P
XU Haiyin;SHE Dang'en;LI Dan;DONG Jiushan
..............page:122-124
Performance Analysis of Wireless LANs for Lossy Channel
ZHAI Linbo;ZHANG Xiaomin
..............page:125-127,130
Inter-domain Multicast Architecture Based on Chord
CHENG Long;CAO Zheng;XU Chunrong
..............page:128-130
Method for Dynamic Reconfiguration of Network Based on Information Stream
DOU Lihua;XIAO Yang
..............page:131-133
Efficient Truly Random Key Generating System Based on PDA
XIAO Youan;ZHOU Zude
..............page:134-136,147
A New Remote Management Secure Method of IDS
LAI Dian
..............page:137-138,141
Correction Algorithm Based on Cartesian Moment for Watermark Image
YANG Xiaoyuan;NIU Ke;WEI Ping;WU Yijie
..............page:139-141
Proxy-based Scheme to Enhance Browsers Security
YAN Pei;SU Ruidan
..............page:142-143,147
Trust Valuation Model Based on Subjective Trust Coordination
ZHANG Shibin;LI Qilin
..............page:144-147
Design of Blind Detecting System for Image Steganalysis
LIU Jia;YANG Xiaoyuan;WANG Yumin;TANG Yuhua
..............page:148-150,153
Study of Model-based Integrated Network Security Protection System
LIU Baoxu;CHEN Taiwei;CHI Yaping;XU Rongsheng
..............page:151-153
Research on Obfuscating Transformation Technology for Malicious Code
PANG Lihui;HU Huaping
..............page:154-156
Scheme of Limited Multi-verifier Signatures
LIN Tingting;WANG Xiaofeng;WANG Shangping;WANG Juan;XIANG Xinyin
..............page:157-159,165
Design and Implementation of Secure Authenticated Protocol Based on TNC
YAN Fei;REN Jiangchun;DAI Kui;WANG Zhiying
..............page:160-162,165
A New Method of SPIT Detection and Prevention
ZHAO Kai;ZHU Ganghua;XIN Yang;YANG Yixian;NIU Xinxin
..............page:163-165
New Certificate Revocation List
MOU Ying;QUAN Taifeng;YUAN Ding
..............page:169-171
Image Encryption Method Based on Chaotic Sequences and Fractional Fourier Transform
WANG Yinhua;CHAI Xiaodong;ZHOU Chengpeng;FENG Zhaoyan;ZUO Yansheng
..............page:172-174
Improvement of Threshold Proxy Signature Scheme with Known Signers
LIU Changyuan;XU Qiuliang
..............page:175-177
Cryptanalysis and Improvement of New Proxy Signature Scheme
WANG Tianyin;CAI Xiaoqiu;ZHANG Jianzhong
..............page:178-179
A New Two-key-lock-pair Access Control Scheme
WU Yingjiao
..............page:180-182
Software Encryption and Protection Based on Dynamic Register Code
SUN Yongqing;GU Yujie;ZHAO Ge
..............page:183-184
Outlier Mining for Multivariate Time Series Based on Sliding Window
WENG Xiaoqing;SHEN Junyi
..............page:102-104
Index Optimization for Database Based on Data Access Flow
FU Xianghua;FENG Boqin;WANG Xiaoming;WANG Zhiqiang
..............page:99-101
Research on Formal Modeling Technology of IPSec Security Policy
HUANG Jun;HAN Lingli
..............page:185-187
An Improved Scheme of PMI Attribute Certificate Revocation
ZHAO Ming;LIU Jia
..............page:188-190,201
Timing Attack on Fast Implementation Algorithm of RSA
ZHANG Peng;CHEN Kaiyan;ZHAO Qiang
..............page:191-192,204
Design of Authentication Model of Intranet Security Management System Based on 802.1X
DONG Zhenliang;LV Shuwang;WANG Zhaoshun
..............page:193-195,198
Face Detection Based on Map of Mahalanobis Distance to Skin in Color Image
XU Congdong;LUO Jiarong;XIAO Bingjia
..............page:196-198
Research on Collision Detection Algorithm Based on Z_Buffer
ZHOU Yang;XU Qing;XIAO Yonghui
..............page:214-216
P2P Streaming Media Multicast Model Based on Genetic Algorithm
AN Yuyan;ZHAO Yuhui;YANG Deguo;GAO Yuan
..............page:217-219
Objectionable Videos Detection Algorithm Based on Optical Flow
LV Li;YANG Shutang;LU Songnian;LI Jianhua
..............page:220-221,227
Content-based Film Animation Material Search
LI Wei;WANG Shumei;WANG Ling
..............page:222-224,230
3D Earth Modeling in Visual Simulation
LI Yachen;JIANG Hongliu;XIONG Hailin;LUO Yongfeng;YAN Peng
..............page:225-227
Simulation and Implementation of Embedded Memory System
ZHANG Qin;HAN Jizhong
..............page:231-233,236
Research on General Fault Diagnosis and Test Platform of Weapon Systems
GUO Xiaosong;YU Chuanqiang;ZHANG An;CHEN Deguo
..............page:234-236
Intelligent Control System of Large-scale Underground Buildings Based on Multi-Agent Technology
YANG Qiliang;XING Jianchun;WANG Ping
..............page:237-240,246
Application of Distributed Digital Supervision and Large Screen Display
ZHANG Dezhen;WEI Xiaopeng;ZHANG Jianming;CHANG Tian
..............page:244-246
Design of Blood and Pulse Measurement Instrument on AVR SCM
PENG Guili;LIU Zhigui;XIAN Hua;LI Jing;WANG Caifeng
..............page:247-250
Design and Application of Programmable Speech Processor
HAN Dahan;CUI Huijuan;TANG Kun;LIU Dali
..............page:251-252,255
Design of Multi-access Residential Gateway Based on Intel IXP425
ZHAO Shengying;JIN Xinyu
..............page:253-255
Architecture Design of VoiceXML-based Voice Value-added Service Platform
WANG Wenlin;LIAO Jianxin;WANG Chun;ZHU Xiaomin
..............page:256-258,261
Design and Implementation of Retargetable Cycle-accurate Simulator for TTA
YUE Hong;WANG Zhiying;DAI Kui;ZHAO Xuemi
..............page:259-261
Design of Java-based Security MANET Application Framework
CHEN Dongsheng;WANG Peikang
..............page:262-263,266
General Schema of Provincial E-government System
ZHENG Feng
..............page:264-266
Research and Design of Charge Checking Case Selection System Based on Local Finance
DING Chunling;HUANG Yonghong;WANG Jianhua;LIU Heyang
..............page:267-269
Design of Reconfigurable System with FPGA Readback Function
ZHOU Shengyu;SUN Huixian;CHEN Xiaomin;AN Junshe;ZHANG Jian
..............page:270-271,274
Construction of Marine Oil Spill Response Information System Based on WebGIS
LIAO Guoxiang;XIONG Deqi;ZHAI Weikang;LIU Ming
..............page:272-274
Transplantation of uC/GUI in SCM System
CHEN Wenhui;CAI Qizhong
..............page:275-276,279
Boot Technique of PXA270 Eboot Based on NAND Flash
ZOU Ying;WEI Hongxing;WANG Tianmiao
..............page:277-279
Development of Eclipse Based Boundary-scan Tester Software
LIN Jinxiao;CHEN Weinan;ZHOU Xuegong;PENG Chenglian;WU Rongquan
..............page:280-282
Complex Principal Curve Modeling Based on B-spline Network
HAO Jisheng;HE Qing;SHI Zhongzhi
..............page:283-封3
tou gao xu zhi
..............page:封4
Analysis of Enterprise MC Software System for SDN Node
NI Ming
..............page:76-77,81
Data Management of Solid State Recorder Based on Flash Memory
ZHU Yan;SHEN Weihua;SUN Huixian
..............page:73-75
Management of P2P Based on Netfilter Framework of Linux Kernel
LI Jian;WANG Ling;LI Jun;YAN Baoping
..............page:71-72,75
Analysis and Implementation of TrueFFS Based on VxWorks
WANG Renyong;YU Jianxin
..............page:68-70
Research on Grid-based Logistics Recourse Mining Model
NING Hongyun;LIU Jinlan
..............page:65-67
Data Mining Algorithm Based on Fuzzy Neural Network
LI Liangjun;ZHANG Bin;YANG Ming
..............page:63-64,67
Research on BPF Implementation and Performance Improvement
ZENG Ming;ZHAO Rongcai
..............page:43-45,48
Analysis of Alarm Correlation Based on Bayesian Learning
DENG Xin;MENG Luoming
..............page:40-42
Family-gene Based Network Access Control Model
SUN Feixian;LIU Xiaojie;LI Tao;ZHAO Kui;HU Xiaoqin;ZENG Jinquan
..............page:37-39,42
Method of Buffersize Computation Based on Fractional Alpha Traffic Model
ZHANG Bingyi;ZHANG Hongke;BIAN Yulan;ZHANG Hui
..............page:34-36
MDA-supported Model Transformation Approach
HOU Jinkui;WAN Jiancheng;WANG Shuaiqiang
..............page:31-33,36
Fast Implementation of 2D DCT Based on Media Instructions
YU Qian;SHAO Yang;ZHANG Tiejun;WANG Donghui;LI Wei
..............page:25-27
Error Reconciliation Algorithm for Quantum Key Distribution
ZHAO Feng;WANG Faqiang;ZHENG Liming;LU Yiqun;LIU Songhao
..............page:22-24
Dim Targets Detection Based on Local Character Information Measurement
WANG Xun;BI Duyan
..............page:19-21,24
Feature Selection Measurement Approach Based on Community Modularity Structure
YUE Xun;CHI Zhongxian;MO Hongwei;HAO Yanyou
..............page:16-18
Triangle Mesh Simplification Algorithm Based on Edge Collapse
DU Xiaohui;YIN Baocai;KONG Dehui
..............page:12-15
Method of Unlabeled Texts Classification
JIANG Zhifang;ZHU Cuiling;WU Qiang
..............page:96-98
A New Algorithm for Merging Materialized Views
XIAN Bing
..............page:90-92
Conceptual Modeling of Spatial Database Based on Geographic Ontology
SU Li;ZHU Qingwei;CHEN Yijin;ZHOU Danhui
..............page:87-89
Method for Reducing Checkpoint Overhead of Parallel Program
ZHOU Xiaocheng;SUN Ninghui;HUO Zhigang;MA Jie
..............page:84-86
Software Fault Location Based on Checking Codes
YI Zhaoxiang;MU Xiaodong;ZHAO Peng;ZHANG Xiongmei
..............page:82-83,89
Meta-graph-based Algorithm for Composing Event Graphs
WANG Huanbao;ZHANG Yousheng
..............page:1-3
New ElGamal Type Broadcasting Digital Multisignature Scheme
DU Haitao;ZHANG Qingpo;YANG Yixian
..............page:10-11,15
Optimization Algorithm of Load Balancing for Service Deployment
ZHAO Yao;YANG Fangchun
..............page:57-59
Adaptive Transmission Control Based on Throughput Maximization
PENG Liexin;ZHU Guangxi;XIAO Xiao;NING Guoqin
..............page:54-56
A New Method for Determining the Parameter of Gaussian Kernel
ZHANG Xiang;XIAO Xiaoling;Xu Guangyou
..............page:52-53,56
Microscopic Image Mosaicing Based on 2D Grid Graph
MIAO Ligang;YUE Yongjuan;PENG Silong
..............page:49-51