Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2009 Issue 1
Frequent Itemsets Mining Algorithm Based on Matrix
ZHANG Zhong-ping;LI Yan;YANG Jing
..............page:84-86
Improved Directory-based Cache-Coherent Protocol
WANG Zheng;ZHANG Yi
..............page:87-89
Improvement of Inter-procedural Pointer Analysis Algorithm
SUN Hong-hao;WANG Shu-yi;LIN Xiao-bin;WANG Xiao-fei
..............page:90-92,104
Improved Method for Protecting Java Class Files
BAO Fu-liang;XU Jie;FANG Zhi-gang
..............page:93-94
Rules Extraction from Neural Network Based on ICS Algorithm
YU Shi-cai;MA Ning;KANG Jun-xian
..............page:173-175
Improved Feature Selection Algorithm for SVM
LV Shi-pin;WANG Xiu-kun;SUN Yan;TANG Yi-yuan
..............page:171-172
Method of Fuzzy Control in Multi-phase Cross
ZHOU Zi-li;WANG Yan-na;WANG Xin-wei
..............page:168-170,172
Improved Method of Interactive Genetic Algorithm and Application
GONG Gu;HUANG Yong-qing;HAO Guo-sheng
..............page:165-167
Study on Population Size of Genetic Algorithm
LI Ming;LONG Jia-li;SHENG Wei-xiang
..............page:162-164
Prevention and Cure of Deadlock Algorithm for Command Information System Based on Petri Net
ZHANG Li;MU Xiao-dong;ZHAO Zong-tao
..............page:159-161
Application of Colored Petri Net in Penetration Test
YANG Tao;GUO Yi-xi;ZHANG Hong
..............page:156-158,185
Dynamic Graph Software Watermark Algorithm Based on Threshold Scheme
LUO Yang-xia;MA Jun;ZHANG Zhi-gang;FANG Ding-yi
..............page:153-155,167
Transparent Encryption File System Model Based on Filter Driver
ZHAO Ming-wei;MAO Rui;JIANG Rong-an
..............page:150-152
Threshold Authentication Scheme of Ad Hoc Network Based on Bilinear Pairings
LV Xin;CHENG Guo-sheng;XU Feng
..............page:147-149
Strong Secure E-Cash Scheme Supporting Delayed Payment
LI Ying;CHEN Lu-sheng
..............page:144-146
Size Estimation Algorithms Based on Multiple Sampling
CAO Jia
..............page:98-100
Wireless Mesh Network Node Access Strategy Based on Internet
ZHANG Peng;YANG Shou-bao;HU Yun;WANG Da-peng;TENG Da
..............page:95-97,100
Method of Security Situation Assessment Based on Graph Clustering
XU Nan-nan;LIAN Yi-feng;WEI Yong
..............page:140-143
Aggregation-based Reputation Evaluation Algorithm for P2P E-commerce
CHEN Jin-yan;SUN Ji-zhou;ZHANG Ya-ping
..............page:138-139,143
Research and Implementation of Mobile Virtual Private Network
MA Rong-fei
..............page:135-137,161
Routing-header-embedded Time Synchronization Algorithm for Wireless Sensor Networks
WANG Zhe;WANG Fu-bao;CHEN Zhen-hua
..............page:132-134,149
Network Traffic Prediction Based on Grey Model and Adaptive Filter
MA Hua-lin;LI Cui-feng;ZHANG Li-yan
..............page:130-131,152
Research on Routing Optimization in Nested Mobile Network
YANG Shi-rong;CHENG Dong-nian;LI Fang
..............page:128-129,146
SOAP Optimization Based on Differential Encoding and Compression
LIU Xin;XIE Qi
..............page:126-127,146
Modeling and Simulation of Ad Hoc Network Based on OPNET
XU Lei;LI Xiao-hui;FANG Hong-yu
..............page:123-125
CPU Resource Management Policy for Active Network Node
LI Ya-hong;WANG Jian-guo;WEI Bi-fan
..............page:120-122
Community Structure Detection AlgorithmBased on Relative Density
WANG Li-min;GAO Xue-dong;GONG Yu;MA Hong-quan
..............page:117-119
Information Transmission Control Technique in Electronic Information System
GUO Zhong-ning;SUN Wen-jun
..............page:114-116,119
Research on Complex Networks Evolution Model Based on Node Attraction
TAO Shao-hua;YANG Chun;LI Hui-na;ZHANG Yong
..............page:111-113
Bandwidth Management Based Transmission Strategy for Real-time Streaming Media
XU Lin;BAI Guang-wei
..............page:108-110,113
Synchronization of Network Covert Time Channel Based on Smoothing Estimation Algorithm
GUO Qiang;PAN Li;LI Jian-hua
..............page:105-107
P2P Super Node Selection Strategy Based on Physical Characteristic of WMN
XU Tong;YANG Shou-bao;HU Yun
..............page:101-104
Image Segmentation Based on Improved Potts Model
WANG Xiang-rong;ZHAO Jie-yu
..............page:183-185
TrustFs: Distributed File System with Trust Management
ZHANG Zi-peng;LIU Hai-tao;GUAN Hai-bing
..............page:82-83,86
Minimum Cost Reachability Problem of Price Coloured Petri Net
ZHANG Wei;LIU Feng
..............page:79-81
Ontology Complex Mapping Discovery Technology
XU De-zhi;CHEN Ai-ming
..............page:76-78
Backup Mechanism of Schema Mapping in Peer-to-peer Data Management System
ZHAO Zhi-chao;ZHAO Zheng
..............page:74-75,78
Framework for Ontology Evolution in Knowledge Management System
KE Xian-da;WANG Ying-lin
..............page:71-73
Workflow Activity Instances Schedule Based on Group-categorization
MA Min;LIU Lin-lan;FU Zheng;CHEN Xuan
..............page:68-70
Improvement Scheme of Open-source Based Software Defect Management Tool
LUO Xiao;HOU Hong
..............page:65-67,70
Research on FuseGrid Based on Resource Fusion
LIN Wei-wei;QI De-yu;DONG Min
..............page:61-64
Version Control Mechanism Supporting Requirements Tracing
LIU Ling;SANG Nan;SU Rui;HUANG Xiao-hong
..............page:58-60,64
Consistency Check for Domain Ontology
XU Yong;WANG Zhi-xue;LI Zong-yong
..............page:55-57,64
Blind Way Recognition Algorithm Based on Image Processing
KE Jian-guang;ZHAO Qun-fei;SHI Peng-fei
..............page:189-191,197
Application of Image Contour Extraction Technique in ATM Monitor System
LIU Yu;XU Yon-gan;SUN Yan-feng
..............page:195-197
Modular Design of GPS Software Receiver and Its Signal Processing
ZHANG Lei;DENG Jiang-ping;WANG Jian-yu
..............page:198-200
Optimizing Compiler Design for SIMD Computer
ZHAO Hui;HUANG Shi
..............page:201-203,206
Loongson BIOS Initialization and VGA BIOS Emulator Based on PMON
LI Lei;ZHENG Wei-min;LIU Jin-gang
..............page:204-206
Design of High Speed Data Acquisition System
ZHANG Jun-jie;ZHANG Feng-lin;YE Jia-jun
..............page:207-209,212
Design of High-speed Boundary Scan Master Controller
YAN Xin-huang;RU Hui-su;WU Rong-quan
..............page:210-212
Transplantation of μC/OS on Loongson Processor and Its Performance Analysis
CHENG Xiao-yu;BI Du-an;CAI Ye
..............page:213-215
LDPC Decoder Power Analysis Method Based on Monte Carlo Simulation
ZHAO Yao;HAN Ze-yao;FU Yu-zhuo
..............page:216-217,220
Fuzzy Immune-PID Controller and Its Application in Caustic Process
LI Guo-dong;WANG Meng-xiao
..............page:218-220
Research and Application of StarFabric High-speed Bus Technology
HUANG Ya-wen;LI Xiang;LIU Hai-qing;CHAI Xiao-li
..............page:221-223
Construction of Transparent Paths for IP Cores in SoC Test
WANG Fei;TAN Ming;HE Dao-jun;XU Jin-fu
..............page:224-225,228
AC Servo Motor Motion Controller Based on WDM
SHI Wen-hao;LI Qiu-xian;LIU Hong-yan
..............page:226-228
Research on Classification Method Based on Support Vector Data Description
LI Yu;ZHENG Min-juan;CHENG Guo-jian
..............page:235-236,239
3D Geologic Modeling Technology of Oilfield and Its Software Implementation
LING Yong-hong;HUANG Xiao-wei
..............page:237-239
Reconstruction of Virtual Cutting Surface Based on Marked Points
HUANG Yu-feng
..............page:240-241,244
Time Series Forecasting Based on Variable-window Neural Networks Ensemble
TAN Qi;YANG Pei
..............page:176-177,182
Symbolic Sequence Clustering Regular Similarity Model Based on Data Mining
ZHENG Hong-zhen;CHU Dian-hui;ZHAN De-chen;XU Xiao-fei
..............page:178-179,194
Translation Robust Image Registration Method Based on Analytic Wavelet
TENG Kai-feng;ZHANG Jian-qiu;ZHOU Bai-yang
..............page:180-182
Duplicate Image Detection Algorithm Based on Hash Value
TANG Jian-gang;WANG Ze-xing
..............page:186-188
High-speed PCB Signal Test Method Based on Virtual Instrument
HUANG Yang-fan;GAN Ping;LIU Xiao
..............page:274-276
Crawler Algorithm Based on Directory Tree in Network Science and Technology Resource
LI Guo-dong;LIU Zhong-qiang;LIU Chang-an
..............page:277-279,282
Feature Modeling Method Oriented to Traffic Domain Component
WANG Fan;TAN Guo-zhen;WANG Hao;HE Qin-lai
..............page:280-282
Design of Junk Short Message Filter Module Based on Struts Framework
YANG Ni-na;WANG Qing
..............page:283-封3
Configurable Assembler Based on User Description
ZOU Yao;LIU Pei-lin
..............page:242-244
Container Management System Based on Sensor Network and Active RFID
ZHANG Hong-yu;CHAI Yi-fei;TU Shi-liang;CHEN Zhang-long
..............page:245-246,252
Key Technologies Research of Remote Monitor System on Oil-gas Production
YANG Li;CAO Xie-dong;YUAN Hai-yan
..............page:247-249,252
Design and Implementation of Address Geocoding System
GUO Hui;SONG Guan-fu;MA Liu-qing;WANG Shao-hua
..............page:250-252
Algorithm of Geology Mesh Surface ReconstructionBased on Constraints
LI Su-yun;TANG Jie;WU Gang-shan
..............page:253-254,256
Array Failure Correction Method Based on Signal-reconstruction
XU Zhao-yang;ZHANG Xin-hua;KANG Chun-yu
..............page:255-256
Network Sharing Technology of Financial Statements Based on XBRL
WANG Yi-xue;WANG Lun-jin;LV Ke
..............page:257-259
Design and Implementation of Virtual Prototype Collaborative Development Platform for Complex Product
HAN Hu;ZENG Qing-liang;SUN Cheng-tong;WANG Cheng-long
..............page:260-262,265
Design of CPU Simulator Compatible with MIPS32 Instruction Set
XUE Bo;ZHOU Yu-jie
..............page:263-265
Research on Rapid Search Strategy of Long Code
TIAN Ming-hao;FENG Yong-xin;LIU Fang
..............page:266-268
Multi-hop Sensor Network Based on TinyOS
MA Ya-jie;YIN Shou-yi;TIAN Xiang-chuan
..............page:272-273,276
Step Motor Driver for High Speed Embroidery Machine Based on WinCE5.0
BAI Rui-lin;LIU Yang;QU Ming-bo
..............page:229-231,234
Application of RTLinux in Train Detection System
LI Hua-jun;WANG Zhong-ren;LIU Zhi-gang
..............page:232-234
Design and Implementation of Remote Software Sharing System Based on Citrix
DONG Hui;FANG Jin-yun;ZHAO Hong-chao;CHENG Zhen-lin
..............page:49-51,54
Memory Optimization of Sliding Window Image Processing Algorithm Based on C6000
ZHANG Fan;DOU Yong;WU Gui-ming
..............page:46-48
Clustering of Search Engine Query Log
ZHANG Yu-lian;LI Yan-wei;WANG Quan;YUAN Fu-yong
..............page:43-45,48
Design and Implementation of Intelligent Security Defendable Software Policy Component
SHUAI Fei;WANG Jin-dong;WANG Kun;ZHANG Hen-wei
..............page:40-42
Certificate Revocation List SchemeBased on Partial Signature Hash Table
WANG Zheng;ZHAO Ming;SI Xue-ming;HAN Wen-bao
..............page:36-39,42
Hierarchically Browse and Annotation System for News Video
LIU An-an;LI Jin-tao;ZHANG Yong-dong;TANG Sheng;YANG Zhao-xuan;WU Jia-peng
..............page:33-35
Storage Service-oriented Buffer Management Model
MENG Xiao-xuan;LI Yi-ming;BU Qing-zhong;JI Hai-tao;XU Lu
..............page:30-32
DM-Chord: Improved Routing Algorithm Based on Chord
HAO Li-ming;LU Song-nian;YANG Shu-tang;TANG Jun-hua
..............page:4-6
Skip Graph-based Credential Chain Discovery on P2P Overlay Network
XU Hao;YAN Bao-ping
..............page:1-3
Application of Subword Duration Features in Telephone Speech Verification
SUN Cheng-li;LIU Gang;GUO Jun
..............page:27-29
Secure Publicly Verifiable Threshold Multi-secret Sharing Scheme
LIU Jia;HAN Wen-bao
..............page:24-26
Struts Framework Application Based on SOA
JIANG Hong-chao;YIN Yi-xin;BAN Xiao-juan
..............page:21-23,26
Win-Win Cooperate Mechanism Based on Agile Supply Chain Management System
XIE Tian-bao;WU Chi-hong
..............page:17-20
Audio Decoder Code Optimization Based on Embedded SIMD Processor
LI Xiao-chao;JIAO Li-cheng;HONG Xin-hua;LU Xiao
..............page:13-16,20
Security of Fractal Watermarking Detection Boundaries Against Oracle Attacks
ZHAO Qi-yang;YIN Bao-lin
..............page:10-12,29
Code Generation Technology for CNC System Based on Domain Modeling
SHU Zhao-gang;LI Di;HU Yue-ming;XIAO Su-hua
..............page:7-9