Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2007 Issue 19
Shape Adaptive 2-Dimension Watermark Algorithm
LI Cheng;BI Du-yan
..............page:158-160,167
Reconsideration of Perfect Secrecy
WANG Yong;ZHU Fang-lai
..............page:155-157
Application of Particle Systems in Digital High-definition Title Generator
CAO Feng;CHEN Shu-zhen;FU Hao
..............page:249-250,282
Design and Implementation of CMT Simulator
YANG Hua;CUI Gang;WU Zhi-bo;LIU Hong-wei
..............page:251-252,255
Electronic Seal System Based on Domino PKI and PDF Document
DONG Xiang-zhi;LIU An;CHEN Wei-bo;LI Jun
..............page:253-255
Data Backup Policy in Bank's Software R&D Center
LI Wei;SONG Qin-yu
..............page:256-258,261
Implementation of Real-time Curve Plotting Under Embedded Linux Graphic System
WU Jian-fei;CHENG Ming-xiao
..............page:259-261
Real-time Decision in Banana Intelligence Expert System
TAN Zong-kun;OU Zhao-rong;CHEN En-bo
..............page:262-263,266
Cheat-detection Mechanism Based on Delta State for P2P MMOG
SHI Xiang-bin;SONG Li-qiang;LIU Fang
..............page:264-266
Decision System for Charges of Patient in Hospital Based on Data Warehouse
LIU Jia;LAN Shun-bi;ZHANG Xiao-xiang;WU Chao
..............page:267-269
Construction of Data Collection & Release in Embedded System
YAN Ting-bai;CHEN Zhong-rong
..............page:270-272
Analysis and Design of Heterogenous Database Integration System Based on Ontology
ZHOU Gang;GUO Jian-sheng
..............page:273-275
Approach of Eliminating Noise Based on Framework of Web Pages and Rules
SHI Da-ming;LIN Hong-fei;YANG Zhi-hao
..............page:276-278
Design of Network Forensic System Based on Intrusion Tolerance
ZHANG You-dong;JIANG Bo;WANG Jian-dong
..............page:161-163
Model of Teledata Access Based on CA Authentication
TAN Yun-song
..............page:168-169,172
Privacy Preserving Sequential Patterns Mining on Horizontally Partitioned Data
ZHANG Wen-yan;OUYANG Wei-min
..............page:170-172
Image Matching Algorithm Based on Critical Feature Points
LIU Shu;LUO Yu-pin;YANG Shi-yuan
..............page:173-174,182
Hybrid Fingerprint Core Point Locating Algorithm
ZANG Lan-yun;LIU Rui-hua
..............page:175-176,179
Extraction of Image Semantic Attributes and Its Application
SHI Yue-xiang;ZHU Dong-hui;CAI Zi-xing;B.Benhabib
..............page:177-179
Image Denoising Using Wavelet Weighted Threshold
CHEN Ying;JI Zhi-cheng;HAN Chong-zhao
..............page:183-185
Performance Evaluation Strategy of Kernel Function for Support Vector Machine
LUO Yu;LI Tao;WANG Dan-chen;HE Da-ke
..............page:186-187,198
Segmentation of Lung Parenchyma in Chest CT Images Based on Genetic Algorithm
QIN Xiao-hong;SUN Feng-rong;WANG Chang-yu;LI Yan-ling;WANG Xiao-jing;CHEN Li-hua
..............page:188-189,192
Information Extraction from Chinese Research Papers Based on Hidden Markov Model
YU Jiang-de;FAN Xiao-zhong;YIN Ji-hao;GU Yi-jun
..............page:190-192
Multi-focus Image Fusion Method Based on Point Spread Functions
MEI Yi-jun;WANG Yuan-qing
..............page:193-195
Simulated Annealing Algorithm Based on Immune Programming
LU Li-rong;XING Xiao-shuai;HUO Bing-peng
..............page:196-198
Image Quality Assessment Based on Dual-scale Edge Structure Similarity
LIAO Bin;CHEN Yan
..............page:199-200,203
Improved Politics of Genetic Algorithms for Premature
ZHOU Hong-wei;YUAN Jin-hui;ZHANG Lai-shun
..............page:201-203
Automatic Railroad Detection Approach Based on Image Processing
GUAN Peng;GU Xiao-dong;ZHANG Li-ming
..............page:207-209,212
Response Behavior Model of Air-attack Stream Based on Agent
SONG Nai-hua;XING Qing-hua;LIU Fu-xian
..............page:210-212
Immune Particle Swarm Optimization Algorithm
HU Chun-xia;ZENG Jian-chao;WANG Qing-hua;XIA Xiao-xiang
..............page:213-214
Identity-based Key Agreement for Secure Multicast
CHEN Li-qing;ZHANG Fu-tai
..............page:152-154,163
DDoS Defense Mechanism Based on Source-end Detection
HAN Zhu;FAN Lei;LI Jian-hua
..............page:150-151,157
Suitable Conditions and Integration of RBAC and FBAC
PAN De-feng;PENG Xia;WU Xin-cai
..............page:147-149
Performance Analysis for Multimedia Network Based on Audio Criterion
DU Xiao-jun;XING Yue-lin;WANG De-zheng;FENG Lei;FENG Jing-ying
..............page:215-217,220
Rapid Continuous Rendering Technology of Terrain Based on Wavelet
WEI Ying-mei;GU Tian-yang;YANG Bing;WU Ling-da
..............page:218-220
Fitting Algorithm for Optic-based Motion-capture-data Calibration
WU Qiong;HUANG Hai-ming;LIU Jin-gang
..............page:221-223
VLSI Design of New Operand Scalable Modular Multiplier
GU Ye-hua;ZENG Xiao-yang;ZHAO Jia;LU Rong-hua
..............page:227-229
Design of DC Power Distribution Box Based on CAN/LIN Bus
LI Xi;GAO Cong-ying
..............page:230-232,272
Design and Realization of Management and Control System Integration of AS/RS
MA Yin-yuan;JIANG Zhao-yuan
..............page:233-235,255
FPGA-based Parallel Implementation of SOM Neural Network Algorithm
KONG Chao;LI Zhan-cai;WANG Qin;LI Ang;QIAN Yi
..............page:236-237,240
Design of Wireless Communication System Based on MSP430F1611 and TR3000
LU Wu-gen;WANG Ge;LI Ou
..............page:238-240
Application of WiMAX Access Technology in IPTV System
LI Dong-mei
..............page:246-248
Design & Implementation of Cross-over Huangpu River Traffic Information Guidance System
DAI You-feng;YU Yong;LV Xiao-ming
..............page:279-282
Data Exchange Research on Storage Grid Based on Web Service
FEN Wen-long;LEI Jing-sheng
..............page:109-111
Design and Implementation of Conformance Test Suite of DHCPv6
FAN Xiao-yu;ZHENG Hong-xia;XIE Gao-gang
..............page:104-105,108
Mobile Grid Model for Offline Computing
GAO Li-wen;YAO Yao-wen
..............page:101-103
New Electronic Auction Based on Hash Chain
YANG Jia-xi;LI Yong-jiang;WANG Yu-min
..............page:99-100
Uplink Scheduling Algorithm of MPEG Video Transmission Based on Wireless MAN
HE Yuan;JIN De-peng;ZENG Lie-guang
..............page:106-108
Research on Computer Network Vulnerability Assessment Techniques
XIA Yang;LU Yu-liang;YANG Guo-zheng
..............page:143-146
Network Information Audit System Based on Network Processor
LIAO Ming-tao;ZHANG De-yun;LI Jin-ku
..............page:140-142
Survey of Privacy and Authentication Schemes for Ad Hoc Networks
HU Rong-lei;LIU Jian-wei;ZHANG Qi-shan
..............page:134-137
Algorithm of Robust Image Watermark Based on DWT Direction Tree Structure
LI Chun-hua;LU Zheng-ding
..............page:132-133,149
New Certified E-mail Protocol
ZHANG Qing;ZHANG Long;WEN Qiao-yan;CHEN Geng-li
..............page:130-131,142
Homomorphism Key Agreement Based on RSA
XIANG Guang-li;ZHU Ping;ZHANG Jun-hong;MA Jie
..............page:128-129,139
Measurement and Analysis of Factors Affecting NFS Bandwidth in Cluster
CAO Li-qiang;LUO Hong-bing;ZHANG Xiao-xia
..............page:125-127
Bluetooth Scatternet Construction Algorithm Based on Actual Capabilities of Devices
ZHOU Li-ya;REN Zhi-kao;GUO Zhong-wen
..............page:119-121
CA-CIG: Communication Architecture Design Based on CIG
QU Jun-hua;WANG Yan-hua;NIU Ya-wen
..............page:115-118
Design and Realization of Split-MAC Scheme in Centralized WLAN Network
FEI Lan;PAN Chun-jian;TAN Hong-yan
..............page:112-114,118
Performance Evaluation and Enhancement of Sleep Mode in IEEE802.16e
DONG Guo-jun;DAI Ju-feng
..............page:10-12,32
Scheme of Alert Message Integral Transferring for Clustering IDS in MANET
LI Sheng-guang;LIU Jian-wei;ZHANG Qi-shan
..............page:13-15
Approach of Describing and Verifying Web Service Composition Using B-method
WANG Shuai-qiang;WAN Jian-cheng;HOU Jin-kui;FENG Shi-hong
..............page:19-22,41
Method of Self-adaptability Data Assignment on Virtual Network Storage System
HUANG He-qing;CAO Yuan-da;SONG Xiao-hua
..............page:23-25
Aggregated Genetic Algorithm Model of QoS-aware Service Composition on P2P Network
GAO Xiao-yan;YU Zhen-wei;SHI Yin-long
..............page:26-28
Association Rules Mining Based on ANN-PCA
ZHANG You-dong;BU Shan-yue;WANG Jian-dong;YE Fei-yue
..............page:63-65
Fast Mining Algorithm for Multi-level Association Rules Based on FP-tree
CAO Hong-qi;JIANG Zhi-feng;SUN Zhi-hui
..............page:66-68,71
Incremental Sequence Mining Algorithm Based on Prefix-tree
ZHANG Kun;CHEN Yue;ZHU Yang-yong
..............page:69-71
Database Search Algorithm of Topic-based Structured P2P Network
MA Guang-zhi;YANG Xi;LIAO Jia-guo;LU Yan-sheng
..............page:72-74,84
Equivalence Problem of Security Protocol
MIAO Xiang-hua;HE Da-ke
..............page:45-46
CMMI-based Resource Model
WANG Hui;ZHOU Bo-sheng
..............page:42-44
Simulation of Safety Critical Network Based on FC
WANG Yue;CAI Wan-dong
..............page:96-98,111
Spatial Consistency Maintenance Based on Spatial Topological Rule
REN Yan;YI Bao-lin;CHEN Jia-li
..............page:93-95
GJB 2725A-2001 Oriented Test Process Management Platform
YIN Fei-fan;YAN Hai-hua;HE Jian-ying
..............page:91-92,100
EP*: A New Kind of Scalable Distributed Data Structure
SHEN Kang-wei;WANG Yu-tong
..............page:88-90,95
XML-Message Queue Markup Language
CHEN Lin;HUANG Ye
..............page:85-87
Boundary Points Detecting Algorithm for Clusters in Noisy Dataset
YUE Feng;QIU Bao-zhi
..............page:82-84
Component-based Software Framework for Network Mobile Robot
LIU Zhe;YIN Yi-xin;YIN Lu
..............page:79-81
Solution of Establishing and Improving Software Process Capability
LIANG Cheng-cai;LU Yang
..............page:75-78
Flexible QoS Multicast Routing Algorithm Based on Differential Evolution in NGI
WANG Jun-wei;WANG Xing-wei;HUANG Min;LIU Peng-cheng
..............page:1-3,25
Automatic Evaluation Algorithm of Fingerprint Images Quality
HAN Zhi;LIU Chang-ping
..............page:4-6,28
Study of Universal Logic Control Model
LIU Li;HE Hua-can;JIA Peng-tao
..............page:7-9
Situation Evaluation Algorithm in SimuroSot Decision Support System
SHI Hao-bin;XU You-feng;YAN Jian-feng;LI Wei-hua
..............page:29-32
Memory-based Cognitive Model of Artificial Fish
ZHANG Shu-jun;BAN Xiao-juan;CHEN Yong;CHEN Ge
..............page:33-35,38
Dynamic Tasks Scheduling of Multiple Unmanned Aerial Vehicle in Battlefield Environment
LONG Tao;CHEN Yan;HUO Xiao-hua;SHEN Lin-cheng
..............page:36-38
Fuzzy Support Vector Regression Based on Time Series
ZHANG Yong;CHI Zhong-xian
..............page:47-48,59
Curved Surface Reconstruction Based on Two Views
ZENG Ji-guo;ZHANG Yan;ZHAN Shou-yi
..............page:49-50,56
Analogue Data Creating System in Audit Data Processing Experiment
CHEN Wei;ZHANG Jin-cheng;Robin Qiu
..............page:54-56
Improvement on μC/OS-Ⅱ Real-time System Task Scheduling
XU Liang;XU Zhong-wei
..............page:57-59
Aoplication of ORM Technique in Airport Information System
SHEN Yang
..............page:241-242,248
tou gao xu zhi
..............page:封2