Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2007 Issue 16
System of Dynamic Computer Forensic Based on Remote Control Technology
SHI Wei-qi;ZHANG Bo-yun;XIE Dong-qing
..............page:117-119,122
Research on Computer BIOS Security Risk Analysis and Detection System
ZHOU Zhen-liu;LIU Bao-xu;CHI Ya-ping;XU Rong-sheng
..............page:114-116
Design and Implementation of Self-help Service System Based on Smart Client Architecture
ZHU Tao;ZHANG Shui-ping;LI Yun-yun;CHANG Guo-cen
..............page:205-207
Research on Architecture Design of Multi-core Processor
HE Jun;WANG Biao
..............page:208-210
Novel Architecture for Modular Exponentiator Based on Montgomery
ZHANG Yuan-yang;LI Zheng;YANG Lei;ZHANG Shao-wu
..............page:211-213
Test Data Compression and Decompression Based on State Reversal Run Length Codes
XIAO Zhu-hong;OUYANG Yi-ming;LIANG Hua-guo
..............page:214-216
Simplified AES Algorithm of Resistant to Zero-value Power Analysis and Its VLSI Implementation
ZHAO Jia;ZENG Xiao-yang;HAN Jun;CHEN Jun
..............page:220-222,233
High Precision Real-time Control Algorithm Based on dsPIC30F Controller
JIA Qing-zhong;LIU Yong-shan;LIU Zao-zhen
..............page:223-225,236
Algorithm of Multiple Frequency Ranging Based on Chirp Signal
CHEN Yu-tao;YI Bo;XU Guang-ting
..............page:226-227,236
Cholesteatoma Diagnosis Based on Computation Measurement of Asymmetry
XIA Jiao-xiong;XU Jun;HUANG Wei;ZHANG Wu
..............page:228-230
Early-phase Security Requirements Modeling Method Based on Extended i* Framework
WANG Run-xiao;XIANG Dong;WANG Hai-peng;ZHANG Tao
..............page:120-122
Improved Dynamic Group Key Management Scheme for Multicast Based on LKH Tree
KANG Qiao-yan;MENG Xiang-ru;WANG Jian-feng;FAN Bo
..............page:123-125
Anonymity-revocable Divisible Multi-bank E-cash Payment Scheme
WANG Da-xing;DU Yu-song;SHEN Jing
..............page:126-127
Research and Implementation of Security Event Management System Based on Log
YU Ya-ling;TANG Hong-wu;DU Hai-xia
..............page:128-129,132
Research on Source Authentication Schemes for IP Multicast
ZHOU Xian-wei;DAI Xin-yu;LIU Yun-luo
..............page:130-132
Research and Practice on Network Security Evaluation Method
LIU Bao-xu;WANG Xiao-zhen;CHI Ya-ping
..............page:133-135,138
Transformation Technique of Extensible Security Policy
DAI Xiang-dong;CHEN Xing-yuan;WU Bei;NIU Xin-jian
..............page:136-138
DDoS Attacks Detection Algorithm Based on Flow Connection Entropy
ZHAO Ji-jun;HU Zhi-gang;ZHANG Jian
..............page:139-141
Analysis and Study of Buffer Overflow Attack Detection Technology
XU Qi-jie;XUE Zhi
..............page:142-143,152
Image Feature Extraction and Recognition Based on Fuzzy CCA
SU Zhi-xun;LIU Yan-yan;LIU Xiu-ping;ZHOU Xiao-jie
..............page:144-146,149
Feature Selection Algorithm Based on Association Features Enhancement
GU Ping;ZHU Qing-sheng;HE Xi-ping;LI Yun-feng
..............page:150-152
Bayesian Optimization Algorithm Based on Mutation Operator
WU Yan;WANG Yu-ping;LIU Xiao-xiong
..............page:153-155,158
Research on Application of Density Distribution of Keywords in Biased Summarization
YAN Ying-jie;LIN Hong-fei;YANG Zhi-hao;ZHAO Jing
..............page:156-158
Semantic Analysis and Chinese Translation of English Preposition Based on Semantic Pattern Decomposition
GUAN Xiao-wei;GAO Qing-shi;ZHANG Rong-xin
..............page:159-161
Laser Stripe Processing in Measurement System Based on Structured-light
YANG Xue;YU Xiao-yang;YANG Ming-ji;CHEN Yang;SHAN Li-na
..............page:162-163
Automatic Multidocument Summarization Based on Time Stamp
SUO Hong-guang;LIANG Yu-huan;LIU Yu-shu
..............page:164-165
Method of Ellipse Detection Based on Hough Transform
ZHOU Xiang;KONG Xiao-dong;ZENG Gui-hua
..............page:166-167,171
Research on Intelligence Processing Based on Fuzzy Artificial Immune Network
WU Shuai;ZHANG Hong-wei;SHI Hong-shan
..............page:168-171
Extension of Bayesian Network Retrieval Model Based on Similarity of Term
XU Jian-min;BAI Yan-xia;WU Shu-fang
..............page:175-177,180
Image Feature Points Match Algorithm Based on Color Gradient
DONG Rui;LIANG Dong;TANG Jun;BAO Wen-xia;HE Dao
..............page:178-180
Design and Implementation of Link-padding Traffic Camouflaging Prototype
HU Bai-jiong;LI Ming
..............page:111-113
Shortest Path Problem on Curved Surface Based on DNA Genetic Algorithm
ZHANG Lei;YANG Da-di;RAN Rong
..............page:181-182,185
Research on Gene Expression Data Classification Based on Rough Sets
SUN Li-jun;MIAO Duo-qian
..............page:183-185
Research on Key Technology of License Plate Recognition
ZHANG Mei-duo;GUO Bao-long
..............page:186-188
Optimization and Comparison of Decision Tree Algorithm
LU Wei;WANG Cong
..............page:189-190
Heuristic Search-based Ant Algorithm of Solving Graph Coloring Problem
LIAO Fei-xiong;MA Liang
..............page:191-192,195
Decision Tables Simplification on Rough Set Based on Binary Scale
CHEN Lian;DENG Shao-bo;WAN Fang;LI Min;LIU Qing
..............page:193-195
Design and Implementation of Expert Referring System Based on Knowledge Base
CHEN Ya-bing;SUN Ji-qing
..............page:196-198
Remote Rainfall Monitoring System Based on GPRS
WANG Li-duan;YANG Lei;ZHAN Xing-qun;FAN Bao-song
..............page:199-201
Inspection System of Material Decay Based on Image Characteristic Retrieval
ZHANG Jian-xun;JI Gang;HONG Xiong
..............page:202-204
Web Services-based Mobile Location Access Gateway
LIU Chuan-chang;NIU Zhi-yuan;CHEN Jun-liang
..............page:231-233
Minimum Distribution Priority Algorithm for Clos Network
DUAN Xin-ming;YANG Yu-lu;SUN Lai-yin;LING Xiao-ping
..............page:80-82
Load-Balance Policy in Two Level-cluster File System
TIAN Jun-feng;SONG Wei-wei;YU Hong-fen
..............page:77-79,82
Framework Model for Information Service Grid Based on Resources Deployment
FANG Cheng;ZHU Jing;YANG Guang-wen
..............page:74-76
Research on Support for Multi-party Communication via VoiceXML
WANG Wen-lin;LIAO Jian-xin;ZHU Xiao-min;WANG Chun
..............page:71-73,76
Grid Middleware Based on Remote Sensing Data Access and Integration
XIE Yi;WANG Jian-qin;SUN Rui-zhi;YANG Lu;DING Ying;OUYANG Ya
..............page:68-70
Software Measurement Model for CMMI Based on PSM
LI Xin-ke;WANG Chang-rui;SHAO Kun;WU Lei
..............page:65-67,70
Triangulation Method for 3D Scattered Data Points Based on CAD Models
CHEN Hui-qun;CHEN Shao-ke
..............page:62-64
Research on Dynamic Priority Service Request Queue Management Model
YANG Hong-yu;LIU Hong-zhi
..............page:59-61,64
Algorithm of Inserting Constrained Edge into Delaunay Triangulation
CHEN Xue-gong;HUANG Jing-jing
..............page:56-58
Design of Efficiency Evaluation Software of Simulation-based Missile Weapon System
LI Dong;LI Guo-lin;WANG Shi-xing;LEI Zhi-dong
..............page:237-239
Research and Implementation of Remote Application Deployment System in Wide Area Network
ZHAO Yan-bo;MA Jie;KANG Wei
..............page:240-242,245
Research on Embedded MMS Client Model
CHEN Hua-peng
..............page:243-245
Analysis and Improvement of Real-time Embedded Operating System μC/OS-II Kernel
JI Hong;FU Shao-feng;CHE Xiang-quan;ZHOU Li-hua
..............page:246-247,250
Embedded Linux Desktop System Based on PowerPC
ZHANG Xiao-bin;MU Chun-di
..............page:248-250
Color Space Transform with LUT Based on Multiplication
LIU Peng-rui;GUO Wei;FU Yu-zhuo
..............page:251-252,255
Network Measurement Device Based on XScale and Embedded Linux
ZENG Xian-wei;PEI Chang-xing;ZHU Chang-hua;YI Yun-hui
..............page:253-255
Application of Rule Engine in Telecom Settle and Apportion System
LIN Bi-ying;ZHANG Yan-hui
..............page:256-258,260
Design and Implementation of PKI-Platform Software in Embedded System
LI Rong-sen;QIN Jie;DOU Wen-hua
..............page:259-260
Asynchronous and Real-time Remote Replication System Based on LVM
WANG Feng;LIU Xiao-guang;WANG Gang;LIU Jing
..............page:261-263
Design and Realization of Human-computer Dialog System Based on Agent
XU Kai-hua;ZHANG De-gan;YAO Lin
..............page:264-266
WebGIS Functions Enhancement of B/S Mode Based on Temporary Layers
LIU Dong-mei;LIU Zhan;GUO Jia-shu;BAN Li;LI Wang;SUN Qiu-fen
..............page:267-268,271
Design and Implementation on RAID On-line Expansion Based on Linux
QI Lu;XIE Guang-jun;LIU Xiao-guang;WANG Gang;LIU Jing
..............page:269-271
Medicine Assist Expert System Based on Object-oriented Method
LIN He-ping;GUAN Ren-chu;WANG Yan
..............page:272-273,276
Cost Estimation Model for Web System Software Development Item
LI Hu-xiong;LI Hu-jun
..............page:274-276
Embedded Ethernet Interface Development with DM642
LIANG Xun;XIONG Shui-dong
..............page:277-279
Design and Processing of Assignment Description Language Based on XML Schema
ZHU Xin-hua;HUANG Li-he;LUO Hui;ZHANG Xian-quan
..............page:280-282
Research of Watermelon Seed Shape Distinguishing Based on Orthogonal Double Axle Algorithm
SUN Yong;GUAN Miao;ZHAO Ye;YANG Feng
..............page:283-285
tou gao xu zhi
..............page:封2
Analysis of Security Protocols Based on Probabilistic Polynomial-time Processes
WANG Quan-lai;WANG Ya-di;HAN Ji-hong
..............page:109-110,113
Efficient Structure and Generation Method of Anti-worm Code
WANG Wei;LUO Dai-sheng;WANG Xin;FANG Yong
..............page:104-105,108
Realization of Media Content Services on Active Networks
WU Jie-dong;LV Shu-wang
..............page:101-103
Optimization for Algorithm of Document Distribution in P2P Network
DU Hong-bo;Xiao Li-qian;HU Xing
..............page:98-100,103
Study on Key Techniques of Mobile Terminal Management System
MA Jun;LIAO Jian-xin;ZHU Xiao-min;ZHANG Yu-ting
..............page:95-97
Experimental Study of Mobile IPv6 Handoff Performance
LUO Li-jun;JIANG Xin-hua;ZOU Fu-min;WANG Tong-sen;LIN Zhang-xi;ZHANG Yong-hui
..............page:92-94
Multi-agent-based Grid Resource High-available Trust Schedule Model
ZHANG Shu-tai;CHEN Jia-hui;GUI Ya-dong;YANG Wei-dong
..............page:88-91
Dynamic Load-balancing Algorithm for MMOG Based on P2P
SHI Xiang-bin;DU Ling;XING Yuan-sheng
..............page:86-87,91
Joint Multicast Routing Protocol Based on Traffic Prediction for Mobile Ad hoc Networks
GAN Guo-zheng;ZHANG Xin-ming;LIU Qiong;ZHENG Wen-chen
..............page:83-85
Design of Embedded Real-time Operating System AutoOSEK
ZHANG Liang-fei;LI Yin-guo
..............page:53-55
MFCPLG: Mining Frequent Closed Patterns in Microarray
JIN Bo;MIAO Yu-qing
..............page:50-52,55
Risk Calculation for Information System Based on Fuzzy Theory
YANG Hong-yu;LI Yong;CHEN Chuang-xi
..............page:44-46,49
Translation Algorithm of XML and SQL Query Based on DTD
BU Li;LI Jun-huai;ZHANG Jing
..............page:41-43
Design and Implementation of Remote Sensing Image Frequency Editor
MA Jiang-lin;ZHAO Zhong-ming
..............page:35-37
Design of VLIW Digital Signal Processor's 64-bit Configurable Adder
ZHANG Zhi-wei;MA Hong;LI Li-jian;WANG Dong-lin
..............page:29-31,34
Component Design Method Based on Business Model and Cluster Algorithm
XU Wei;LI Zhao-yuan
..............page:26-28
Human Face Feature Extraction and Recognition Based on Wavelet-moment Descriptors and 2DPCA
XIE Yong-hua;CHEN Fu-bing;ZHANG Sheng-liang;YANG Jing-yu
..............page:23-25
Fault-tolerant Clos Network and Its Routing Algorithm
DUAN Xin-ming;YANG Yu-lu
..............page:20-22
Refinement-based Software Architecture Design Method
ZHAO Heng;YE Jun-min;WANG Zhen-yu
..............page:17-19,22
Nodes Placement Strategy for Even Energy Consumption in Wireless Sensor Networks
FAN Yong;ZHANG Xiao-tong;WAN Ya-dong;WANG Qin
..............page:11-13,16
Real-time Feature-based Shot Cut Detection
TANG Zhi-feng;YANG Shu-yuan
..............page:7-10
Approach to Building Object Verification in Natural Images
JIN Tai-song;LI Cui-hua;LIU Ming-ye
..............page:4-6,10
Schema Merging in Information Integration System
LIU Jun-qiang;PENG Zhi-yong
..............page:1-3