Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2007 Issue 18
Concurrency Control Mechanism in Cooperative CAD System
ZHAO Rong;SHI Wei-feng;ZHENG Chao
..............page:106-108
Large-scale Urban GEO-database Based on High Resolution Remote Sensing Image
YANG Liang-jie;MOU Nai-xia
..............page:103-105
Self-tuning of PID Parameters Based on Improved PSO Algorithm
GUO Da-qing;LI Xiao;ZHAO Yong-jin
..............page:202-204
Algorithms for Template Matching and Median Filtering of Images Based on LARPBS
SHU Hong-xia;YANG Jun-min
..............page:205-207
Ground-Truth Calculation for Edge Detection Evaluation by Image Fusion Based on Confidence Measures
LI Zhang-fan;ZHANG Bi-yin;ZHANG Tian-xu
..............page:208-210
Speech Separation Based on Computational Auditory Scene Analysis
WANG Shan;XU Gang
..............page:211-213
Ear Recognition Based on Intercrossed Feature
XU Zheng-guang;SHEN Si
..............page:214-216
No-search Combined Feature Selection Method Based on KNN
SU Ying-xue;FU Yao-wen
..............page:217-218,221
Offline Handwritten Numeral Recognition Based on Principal Component Analysis
ZHANG Guo-hua;WAN Jun-li
..............page:219-221
Adaptive Particle Swarm Optimization Algorithm Based on Population Entropy
DUAN Xiao-dong;GAO Hong-xia;LIU Xiang-dong;ZHANG Xue-dong
..............page:222-223,248
Construction of Spline Wavelet Bases and Its Application in Chinese Signature Identification
ZHAO Yong-jian;YUAN Sheng-zhong;WANG Hong-run
..............page:224-226
Application of Improved Active Shape Model in Face Positioning
LIU Ai-ping;ZHOU Yan;GUAN Xin-pu
..............page:227-229,241
Design and Implementation of the Mechanism to Process IPv4/IPv6 Request Packets for Cluster Server
GUAN Shang-yuan;XUE Zheng-hua;SHI Wei-qiang;DONG Xiao-she
..............page:109-111,127
Research of Parallel Degree in Network Processor
QIN Si-lin;ZHANG Sheng-bing;ZHOU Xi-ping
..............page:116-118
Handover Performance Analysis of MIPv6 and FMIPv6
QIAO Hong-lin;MA Yue
..............page:119-121
Hardware Implementation of Synchronization Subsystem in OFDM Systems
SUN Min-zhi;XU You-yun
..............page:122-124
Dynamic Web Services Composition Based on Active XML
JIN Rong;ZHAO Jun-fu;GAO Yong-bing;SHI Hai-jun
..............page:125-127
Novel Distributed Hash Table for Wireless Ad Hoc Networks
YUAN Jin-xiu;QIAN Xue-zhong;WANG Jin-ling
..............page:128-129,133
Network-wide Traffic Anomaly Detection Based on Entropy
WANG Hai-long;YANG Yue-xiang
..............page:130-133
Hierarchical Conformance Test for IS-IS Protocol
KANG Xin;ZHOU Hao;ZHAO Bao-hua
..............page:134-136
Path Recovery Solution with Shared Resources in MPLS Multicast Networks
SHAO Shu-chao;ZHANG Hui;ZHANG Si-dong
..............page:137-138,142
Research on Optimization of Distributed Routing for Mobile IP
SUN Xue-jun;DONG Zhi-ming;MENG Tian-ge
..............page:143-144,147
Self-constraint Reputation Updating Model
ZHANG Ming-wu;YANG Bo;ZHANG Wen-zheng
..............page:145-147
Routing Security Mechanism Based on Neighbor Nodes Monitoring and Detecting for MANET
WANG Zhen-zhong;GUAN Yuan;LU Jian-de;CHEN Yu-chun
..............page:148-150,153
Efficient Scheme of Key Update in Secure Multicast
WU Tao;ZHENG Xue-feng;YAO Xuan-xia
..............page:151-153
Anonymous Subliminal Channel Scheme Based on (t, n)Threshold Cryptosystem
ZHOU Xuan-wu;YANG Xiao-yuan;WEI Ping;HU Yu-pu
..............page:154-155,158
Assessment Method Based on PKI Security Level Assurance Assessment Criteria
LIU Bao-li;XIAO Xiao-chun;ZHANG Xu;ZHANG Gen-du
..............page:156-158
Design and Implementation of Peer Group Authentication Protocol in JXTA
LI Hai-bao;ZHANG Yu-qing;HAN Zhen
..............page:159-161
Forgery Attack Scheme to Blind Group Signature
LI Yan-jun;WU Yu-hua;OU Hai-wen;YANG Gang
..............page:162-163
Plaintext Chosen Attacks on Chaos-based Watermarking Algorithm
ZHANG Bin;JIN Chen-hui
..............page:164-166
Modeling and Analysis of P2P Worms
WANG Yong;YUN Xiao-chun;LI Yi-fei
..............page:167-169
Design of Security Model of iSCSI-SAN Based on ECC
LIU Ming;SU Jin-hai
..............page:170-171,175
Model-driven Web Services Composition
JI Lei
..............page:100-102
Research on Information Hiding Technology Based on Anonymous System in P2P Network
DONG Jian-quan;WANG Meng-meng;WANG Hong-yu;LI Chao
..............page:172-175
Watermark Detection Scheme Based on Pre-estimation Attack
CHAI Ya-qin;LAN Hai-bing;TANG Xiang-hong
..............page:176-177,195
Semantic Grid Services Discovery Based on Fuzzy Matching
LIU Li;CHEN Zhi-gang;YANG Bo;HU Chun-hua
..............page:178-180,183
Grid Task Scheduling Algorithm Based on Combined Evolutionary Computation
YANG Bo;CHEN Zhi-gang;LIU Li
..............page:181-183
Goal Web Services Description Ontology and Service Discovery Model
LIU Chuan-chang;CHEN Jun-liang
..............page:187-189
Method of Automatic Knowledge Gain Based on Rough Sets Theory
LIU Dao-hua;YUAN Si-cong;LI Xiang-ying;WANG Fa-zhan
..............page:190-192,207
Handwritten Financial Chinese Characters Recognition Approach Based on Kernel Clustering Algorithm
CHEN Zeng-zhao;YANG Yang;HE Xiu-ling;YU Ying;DONG Cai-lin
..............page:193-195
Ontology-driven Knowledge Communication of Dynamic Virtual Communities
WANG LI;YU Xue-li
..............page:196-198,226
Precise Eye-corner Locating in Eye-gaze Tracking System
GAO Fei;ZHANG Xian-min
..............page:199-201,204
Multi-objective Particle Swarm Optimization and Its Application in Optimal Regulation of Reservoir
YANG Jun-jie;ZHOU Jian-zhong;FANG Ren-cun;ZHONG Jian-wei
..............page:249-250,264
VV & A Process Model of HLA Simulation System Based on MDA
ZHANG Xiang-lin;BAI Yan-qi;LI Sheng-hong
..............page:251-252,282
Implementation Scheme of Basic Architecture for MHP Digital Setup-box Middleware System
QIAN Chen;LI Ming-lu;ZHANG Ji
..............page:253-255,278
Method for Detecting Device of DDR DIMM Interface Under Linux
WANG Yue;ZHANG Xiao-tong;LI Lei;FAN Yong
..............page:256-258
Research on Structure of Test Environment for Embedded System
REN Ji;FAN Xiao-guang;TIAN Tao
..............page:259-261
Integrative Design Method of Distribution, Real-time and Fault Tolerance
LI Xin-ming;LI Yi;WANG Peng;LIU Dong
..............page:262-264
Design and Implementation of Mobile MMI Simulation Tool
LIU Lian-hao;LEI Fang
..............page:268-269
Research and Implementation of Specific Domain Modeling Tool
PANG Shi-chun;LIU Shu-fen
..............page:270-272
Spatial Data Transformation and Archaeological Detection WebGIS
CAO Li-gang;WANG Xu-ben
..............page:273-275
Orthographic Views Separation from Engineering Drawing Based on Image
PAN Hua-wei;ZOU Bei-ji;LI Li;ZHU Li
..............page:276-278
Design and Implementation of Management Tools for Parallel File System
WU Wei-guo;CHEN Chang-hong;ZHANG Hu;QIAN De-pei;HU Lei-jun
..............page:279-282
Design of Freeway IETC System Based on Multi-tier C/S Architecture
XUE Chun-feng;LIU Hui-ying;NING Fei
..............page:283-封3
tou gao xu zhi
..............page:封2
Application of Visualization Technology in Spatial Data Mining
WANG Zhan-gang;ZHUANG Da-fang;QIU Dong-sheng
..............page:67-68,71
Mapping Rules of SDL Model into C Language Based on TETRA Protocol
WANG Hao;QUAN Jin-guo;LIN Xiao-kang
..............page:64-66
Design and Implementation of VoIP Based on SIP
LI Xiao-jun
..............page:112-115
Schedule Algorithm for Intelligent Network Disk
ZHANG Lei;ZHAO Yue-long
..............page:97-99
Lucene Search Engine
ZHOU Deng-peng;XIE Kang-lin
..............page:95-96,118
Chamber Technology Based on FreeBSD Kernel
ZHANG Wei;LU Kai
..............page:93-94,136
Supporting Technology for Embedded Software Co-development
CHEN Xiao-ping;XIE Bin;LI Bin
..............page:90-92
Network Mirror Based on NBD and Software RAID in Linux
ZHAO De-ping;SHI Gui-ying
..............page:87-89
Project Storage Management Architecture Based on Cube-information Lifecycle Management
CHANG Pei;WANG Hong-mei;BAI Zhong-ying
..............page:84-86,89
Video Data Mining——Framework, Approach, and Trend
JI Zhong;SU Yu-ting;AN Xin
..............page:81-83
Design of Publish/Subscribe Middleware Based on DDS
CAO Wan-hua;XIE Bei;WU Hai-xin;CHENG Xiong
..............page:78-80,83
Data Stream Prediction Model Based on GEP Method
LI Guo-hui;FU Pei;CHEN Hui;ZHAO Hai-bo;CHEN Na
..............page:75-77,92
Self-adaptive QoS Mechanism for Composite Model Solving Based on Multi-agent
XIN Ming-jun;WU Chao;LI Wei-hua
..............page:72-74
Design and Implementation of Hash Index Used in Main Memory Database
YUAN Pei-sen;PI De-chang
..............page:69-71
Design Knowledge Management System Based on Ripple Down Rules
ZHANG Zhao;XIA Guo-ping;LI Xue-feng;WANG Jun
..............page:230-232,261
Projective Clustering Algorithm PCMF Based on Mean-Shift
HUANG Li-guo;WANG Shi-tong
..............page:233-235,269
Real-time Simulation of Rain Based on Particle System
LI Su-jun;WU Ling-da
..............page:236-238
Realization of Speech-driven Facial Lip Animation
LIN Ai-hua;ZHANG Wen-jun;WANG Yi-min;ZHAO Guang-jun
..............page:239-241
Adaptive Packetization of MPEG-4 Visual Stream in Wireless Transmission
XU Guo-jing;LUO Zhi-xiang;CAO Ming-cui
..............page:242-244,275
System Analysis and Design Based on Methods of FSM and Petri Net
JIANG Chun-ying;FANG Li-jin;ZHAO Ming-yang
..............page:245-248
XML Structural Join Based on Dichotomy
ZHANG Jing;DING Yi-xin;LIU Shan
..............page:62-63,66
Attribute Reduction Algorithm Based on Reduction Pruning
MA Ting-huai;ZHAO Ya-wei
..............page:56-58
Research on Spatial Data Fusion Techniques
PENG Yu-wei;PENG Zhi-yong
..............page:51-52,55
Java-oriented Object Behavior Modeling and Visualization Method
JIA Xiao-xia;WU Ji;LI Guo-huan;JIN Mao-zhong
..............page:48-50
Design and Application of Scalable Parallel Job Scheduling Simulator ParaSim
LUO Hong-bing;ZHANG Yu;ZHANG Xiao-xia
..............page:45-47
Design and Implementation of Access Agent Middleware in Data Grid Environments
LIU Gui;ZHU Hong-yu;XIE Xiang-hui;HE Hong-qi;WEI Hai-liang;CHEN Lin;LU Lin-sheng
..............page:42-44
Algorithm for Topic Distillation and Hierarchical Exploration Based on New Fuzzy Set
ZHOU Hong-fang;FENG Bo-qin
..............page:40-41,44
Research on Bandwidth Reduction Method in Distributed Parallel Rendering System
GAO Xin;JIA Qing-xuan;SUN Han-xu;SONG Jing-zhou
..............page:37-39
Fusion Algorithm for Multiband SAR Images Based on Contourlet Transform
ZHENG Yon-gan;SONG Jian-she;ZHOU Wen-ming;ZHANG Jie
..............page:34-36,58
Mobile Switch Center Modeling Based on Autonomous Object
LI Qian-mu;XU Man-wu;ZHANG Hong;LIU Feng-yu
..............page:28-30
Ontology Evolution Management Framework for Reliable Semantic Interoperation
HE Yang-fan;HE Ke-qing
..............page:26-27,30
Contourlet Domain Image Denoising Method Based on Bayesian Estimation
LIU Sheng-peng;FANG Yong
..............page:31-33
File Pollution and Anti-pollution on P2P Networks
ZUO Min;LI Jian-hua
..............page:22-25
Management Protocol of Trust Relationships in P2P System
LIN Huai-qing;LI Zhi-tang;HUANG Qing-feng
..............page:20-21,25
Average Reward Reinforcement Learning Theory Algorithms and Its Application
HUANG Bing-qiang;CAO Guang-yi;LI Jian-hua
..............page:18-19,39
Automatic Web Service Composition via Program Synthesis
YE Li;CHEN Jun-liang
..............page:15-17
Novel Mobility Support Scheme Based on Embedded Technology
TONG Chao;GAO Xiao-peng;CHEN Wei;PENG Ling-yun;LONG Xiang
..............page:8-11,14
Efficient Partial-parallel Architecture for Fast Modular Multiplication in GF(2m)
JIANG Jing-fei;NI Xiao-qiang;ZHANG Min-xuan
..............page:4-7
Application of BPR Technology Based on AI in Enterprise Modeling
YANG Shu-qin;YANG Qing;WANG Yan-qing
..............page:1-3,7