Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2008 Issue 21
Dynamic Intrusion Prevention System Model Based on Risk-aware
CHEN Dong-fang;WANG Hua;GU Jin-guang
..............page:132-135
Sub-channel and Power Allocation for OFDM Systems Based on Comb-pilots
YIN Yin;YANG Yu-hang;YAN Zheng-hang
..............page:81-83
Force Feedback Assisted Liver Virtual Surgery Simulation System
PAN Jia-hui;BAO Su-su;ZHU Zhi-you;LIAO Qi-guang;DUAN Xiu-li
..............page:262-264
Application of Road Net in 3D Virtual Scene
ZHENG Fu-qiang;HUA Qing-yi;ZHANG Feng-jun
..............page:273-275
Driver Design of PC104 Data Acquisition Card in Embedded Linux
ZHU Bin;CHENG Ming-xiao
..............page:236-238
Application of Load Balancing in Intrusion Detection System Based on Multi-Agent
XU Su-xia;FU Xiu-fen;HU Jin-xia;GAO Bao-qing;SU Lei
..............page:184-186
Static Analysis of Vulnerability Based on Dataflow
KUANG Chun-guang;CHEN Hua;ZHANG Lu-feng
..............page:124-125,128
P2P Worm Detection Method Based on Information Correlation
ZHANG Jing;HU Hua-ping;XIAO Feng-tao;LIU Bo
..............page:115-117,135
Strategy of P2P Resource Discovery Based on Agent and Distributed Caches
CHEN Jie;PENG De-wei
..............page:175-177
Probability Model of Multi-value Combined Controlled Generator
DU Yi-bin;HUANG Xiao-ying;TENG Ji-hong
..............page:120-123
Certificateless Hybrid Encryption Based on Elliptic Curve Discrete Logarithm
LAI Xin;HE Da-ke;HUANG Xiao-fang
..............page:26-27,37
BCLFL Strategy of Dynamic Cache in APM Architecture
SHI Jia-qing;NIU Ji-zhen;WANG Fan
..............page:84-85,88
Certificate Authority Based on J2EE Multilayer Architecture
MA Ji;JIANG Wei-qiang;YANG Yi-xian
..............page:109-111,114
Algorithm of Active Learning to Rank Based on PRank Algorithm
WANG Yang;HUANG Ya-lou;LIU Jie;LI dong;KUAI Yu-hao
..............page:38-39,47
Dynamic Management Model Based on Reputation Guarantee in Grid Domains
WANG Rong-bin;CHEN Shu-yu;Yu Ling;JI Xiao-bo
..............page:153-156
geng zheng
..............page:131
Service Oriented File Management System in Wide Area Distributed Environment
CHEN Fen;XU Wen-bo
..............page:265-266,272
Study and Implementation of PSK Signal Recognition
ZHANG Yu;YANG Xiao-jing
..............page:89-91,105
EAST Tokamak Real-time Data System
LI Gui-ming;LUO Jia-rong;LIU Ying;LI Shi
..............page:15-17
Mobile Web Services Based on Context-aware
SONG Rui;YIN Zhao-lin;KONG Liang;DING Ling;FAN Bao-de
..............page:42-44
MAP Selection Algorithm Based on MN Movement Characteristics
ZHU Xiao-li;LIU Xiao-tian
..............page:78-80
New Model to Linux Network Installation Based on Kickstart
LIU Qing-kun;YIN Yuan-you;ZHENG Xiao-wei;LIU Shao-hai
..............page:103-105
Key Techniques of Uyghur,Kazak,Kyrgyz Full-text Search Engine Retrieval Server
TURDI Tohti;WINIRA Musajan;ASKAR Hamdulla
..............page:45-47
Anti-rootkit Technology of Kernel Integrity Detection and Restoration
WU Kun-hong;LE Hong-yan
..............page:129-131
Time Delay Analysis of JTIDS Message Transmission
REN Pei;ZHOU Jing-lun;LUO Peng-cheng;YANG Guang
..............page:23-25
Clustering Algorithm Based on Competitive Learning in Wireless Sensor Networks
TIAN Feng;WANG Chuan-yun;GUO Wei
..............page:181-183,186
tou gao xu zhi
..............page:封2
Robot Communications System Based on Embedded Linux
WU Nan;GUO Pei-yuan;CHEN Yan;YUE Ming;WEI Hong-xing
..............page:100-102
Secure Protection Policy for Electronic Evidence Supporting Computer Forensics
ZHAO Xiao-min;ZHENG He-rong
..............page:161-162,189
Tobacco Smoking Quality Evaluation Based on Cost-sensitive Bayesian Networks
GAO Yan-fang;ZHAO Qing-song;CHEN Ying-wu
..............page:187-189
Hybrid Information Retrieval Model Based on Domain ontology
XIONG Zhong-yang;LI Chun-ling;ZHANG Yu-fang
..............page:68-70
Fast Generalized Dynamic Reduction Algorithm
WANG Jia-yang;XUE Shuang-ying
..............page:56-58
Channel Code Rate Allocation Scheme Based on Video Communication
HU Yun-feng;WANG Jia
..............page:205-207,232
Method for Curvature Calculation of Red Blood Cell Surface
WANG Rui-hu;Brendan McCane;YIN Zhang-qun
..............page:28-30,34
ILP-based TTA Code Optimization
HU Wei;ZHU Yong-xin;JIANG Lei
..............page:219-221,224
Identity-based Threshold Blind Signature Scheme
TU Feng;ZHAO Yi-ming
..............page:118-119,138
Text Areas Segmentation Approach for Business Card Images
HU Jing-feng;LV Yue
..............page:169-171
Design of Assisted GPS Client Based on Wireless Network
WU Zhi-hua;SHEN Gong-xun;TANG Li-zheng
..............page:98-99,102
Application of Covering Array in Parameter Combination Pair-wise Test
ZHANG Dan;GAO Jian-hua
..............page:51-53,70
Rapid Design of Metalforming Machines\' Assembly Model Based on Pro/Toolkit
WEI Shen;ZHONG Xiao-qiang;CHEN Kai;ZHU Chan-gan
..............page:239-241
Research on Remote Virtual Monitoring System of Port Machinery
XU Tao;Li Yan-ming;MIAO Yu-bin;LIU Cheng-liang
..............page:276-278,283
Optimized File-blocking Storage Scheme in Clustered VoD System
WANG Fei;XI Hong-sheng;YANG Jian
..............page:213-215
Ship Data Visualization Based on DWF,NURBS and JNI
MA Bao;LIU Yuan;LENG Wen-hao
..............page:242-244,275
Analysis of Query Repetition in Large-scale Chinese Search Log
DOU Zhi-cheng;YUAN Xiao-jie;HE Song-bai
..............page:40-41,44
Design of Low-cost RFID Authentication Protocol Based on PRNG
ZHU Sheng-lin;YANG Bo;ZHANG Ming-wu;HU Yue-ming
..............page:18-19,22
Warning Index-System Ontology Modeling and Its Application
ZHAI Dong-sheng;HUANG Yan
..............page:247-249,269
Localized Searching Algorithm of Pairwise Key Path in WSN
LI Ping;LIN Ya-ping;WU Jia-ying
..............page:150-152
Research and Design of Dynamic Branch Prediction Mechanism for Embedded Processor
HUANG Wei;WANG Yu-yan;ZHANG Jian-xiong
..............page:163-165
Design and Realization of Document Transform Tool
XIANG Shi-wu;CAO Feng
..............page:48-50
Construction of Electronic Countermeasure Simulation System Based on HLA and Agent
SHI Yi;LU Ting-jin;WANG Xin-lin
..............page:245-246,275
Linear Frequency-modulated Continuous Wave of Single Slope Based on AD9954
TAO Hong;FAN Pan-guo;LIANG Bo
..............page:230-232
Load Shedding Algorithm for Multi-joins over Data Streams Under Limited Communications Resource
JIANG Wan-chang;HUO Cong;REN Jia-dong
..............page:95-97
Detection Method of Deviated Group Data Based on Confident Interval
XIA Xiu-feng;XIE Guang-yu;SHI Xiang-bin;XU Lei
..............page:12-14,17
Anti-forge Reader Based on FPGA
LI Hui;HOU Yi-bin;HUANG Zhang-qin;HE Fu-gui;CHEN Rui
..............page:35-37
Analysis of Delay-time of Bus Contention on Multi-core Processor Based on Queuing Theory
ZHAO Zhao;JIANG Lie-hui;ZHAO Qiu-xia;LIU Hui;LIU Zhen-guo
..............page:233-235
Research and Design of Blade Service Cluster Based on Centralized Storage
Qu Hai-ping;WANG Xiu-wen;DONG Yu-min;FENG Shuo;SONG Chun;XU Lu
..............page:1-3
Research and Design of Common Management Architecture for Bluewhale Storage System
WANG Xiu-wen;FENG Shuo;QU Hai-ping;XU Lu
..............page:4-6
Secret Sharing Scheme Based on Grey Half-generation
SHANG Yu-lian;JIA Wu-yuan;WANG Hong-mei;SHI Kai-Quan
..............page:157-158,177
Design and Implementation of Logistics Operation Assistant System
CAO Jian-dong;ZHENG Si-fa;LI Bing;LIAN Xiao-min
..............page:279-280,283
Research on Stable Region of PI Active Queue Management in Ad Hoc Network
CHEN Liang;ZHANG Hong;HU Wei-min
..............page:86-88
Totally Asynchronous Parallel Transformation Algorithm
HUANG Li-guo;SUN Li;HAN Cong-ying
..............page:54-55,58
Concurrency Strategy for Real-time Transport Based on Proactor Pattern
YUAN Fang;CHEN Ping
..............page:59-61,64
Servo System Based on Technology of Multiposition North-seeker
LIU Chang;QIAO Yan-feng;WANG Zhi-qian;SHEN Cheng-wu
..............page:227-229
New Text Steganalysis Method
JIN Ye;SUI Xin-guang
..............page:159-160,168
Security Improvement of GEAR Protocol in Wireless Sensor Network
ZHOU Shan-shan;LIN Shan;WANG Cui-rong
..............page:136-138
Watermark Algorithm in Chirp-Fourier Transform Domain
ZHU Chun-hua;MU Xiao-min
..............page:141-143,146
Research and Analysis of Complex Networks Statistical Regularity for Internet
GUAN Mo;LI Bo;ZHAO Hai
..............page:92-94,97
Design and Application of UART Based on FPGA
JIANG Yan-hong
..............page:225-226,229
Design of Time Triggered CAN Network
RAO Yun-tao
..............page:216-218
Eye-contour Extraction Method Based on Transform Projection
LIU Wei-feng;WANG Zeng-fu
..............page:196-198
Indicator Model of Intellectual Employee Task Evaluation Information System
DING Lei;SHEN Hui-zhang;LIANG Zhen;ZHANG Yong-zhe;YU Bin;WANG Rui-zhong;BO Tao
..............page:281-283
Multi-level Structure Abstract and Description of Supercomputer
LIU Hui;JIANG Lie-hui;ZHOU Wu-ming;ZHAO Zhao;WANG Ying
..............page:255-258
Improved Complete Coverage Algorithm
ZENG Wei-biao;CAI Zi-xing
..............page:193-195,198
Fast Triangle Mesh Surface Intersection Algorithm Based on Uniform Grid
JIANG Qian-ping;TANG Jie;YUAN Chun-feng
..............page:172-174
Design and Implementation of Core Service in Civil Aviation Integrated Information Platform
ZHENG Wei-feng;XU Tao;GU Qing-fan
..............page:267-269
Multicast Key Management Scheme Based on Key Matrix
SUN Hai-bo;ZHANG Quan;TANG Chao-jing
..............page:112-114
Tabu Search Algorithm in Varying Neighborhood for Hybrid Flowshop Scheduling
LI Xiao-feng;SHI Jin-fei;YAN Wei-wu
..............page:10-11,25
Diagnosis and Treatment Expert System of Chinese Traditional Medicine Using Case-based Reasoning
YANG Jian;MA Xiao-lan;YANG Deng-qi
..............page:178-180
High-speed Network Intrusion Detection System Based on Heterogeneous Cluster
YANG Feng;ZHONG Cheng;YIN Meng-xiao
..............page:126-128
Generation of Test Cases Based on UML Sequence Diagrams
LI Jian-jun;ZHU Min;LIU Xiao-juan;SHAO Pei-nan
..............page:73-75
Software Environment of Space Panel Vibration Shape Perception and Active Control
ZHU Xiao-jin;LU Mei-yu;ZHAO Xiao-yu;ZHANG He-sheng
..............page:31-34
Host Computer System Based on Multithreading in Centralized Control Soccer Robot
JING Zheng-jun;ZHOU Jun
..............page:199-201,204
Markov User Navigation Prediction Model Based on Dynamic Sorting
CHEN Zi-jun;QIAO Liang;WANG Xin-yu
..............page:166-168
Hierarchical Tree-form Task Evaluation Model Based on B/S Information System
DING Lei;SHEN Hui-zhang;LIANG Zhen;ZHANG Yong-zhe;YU Bin;WANG Rui-zhong;BO Tao
..............page:252-254,272
Concentric Circles-based Simple Method to Solve Image Distortion Center
TIAN Yong-tao;LI Juan;TIAN Lin-huai;SUN Bing-rong
..............page:250-251,258
Side Channel Attack Based on Cache Behaviors
ZHANG Peng;DENG Gao-ming;ZHAO Qiang;CHEN Kai-yan
..............page:20-22
Independent Noise Algorithm for Privacy Preserving Clustering
WANG Zi-liang;ZHENG Yu-ming;LIAO Hu-sheng
..............page:144-146
Service-oriented Framework of Resource Reservation and QoS Mointoring in Grid
QI Chao;ZHANG Jing;HE Ju-hou
..............page:65-67
Parallel Multi-swarm Cooperative PSO Framework of Implemented SLA in Grid
QI Chao;ZHANG Jing;MA Jun-liang
..............page:190-192
Research of Implicit Problems in Workflow Mining
YU Wan-jun;LI Qian-qian;ZUO Guo-ming;HU Zhao-wei
..............page:7-9
Secure Electronic Document Interchange Arithmetic Based on Image Disguise
GAO Guang-yong;LI Xin-wu
..............page:147-149
Secure Workflow Model Based on Role
SONG Chun-yan;XU Jian-liang;LI Shen-hua
..............page:139-140,152
Interactive Virtual Logistics System Based on VRML and Java3D
LIU Hai-xia;LI Ren-wang;YANG Gui;ZHANG Peng-ju
..............page:259-261,264
Data Mining Approach of Association Rules Based on Image Mapping
WANG Han;KONG Ling-fu;LIAN Qiu-sheng
..............page:71-72,75
TCP/IP-based OPC Communication Between Heterogeneous Platforms
GONG Chao;GONG Liang;YANG Yu-pu
..............page:62-64