Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2009 Issue 2
Reverse Analysis Technique of Register Rotation in IA-64 Software-pipelined Loops
WANG Miao;ZHAO Rong-cai;CAI Guo-ming;DING Zhi-fang
..............page:1-3
Analysis and Improvement of BGP Route Lookup Algorithm
MA Hai-long;GUO Yun-fei;CHEN Le-ran
..............page:4-5,9
Performance Comparison of TCP Variants for High-speed Network by NS2 Simulation
REN Yong-mao;TANG Hai-na;LI Jun;QIAN Hua-lin
..............page:6-9
Improved Spectral Method for Point Pattern Matching
ZHANG Chang-fang;YANG Hong-wen;HU Wei-dong;YU Wen-xian
..............page:10-12,17
Genetic Inductive Logic Programming Based on Bit-string Encoding
YANG Xin-wu;LIU Chun-nian
..............page:13-14,20
Identification of Exception Return in Subroutine of Executable File
ZHANG Yi-chi;PANG Jian-min;ZHAO Rong-cai;HAN Xiao-su
..............page:15-17
Research on TPCHDriver of Automatic Test Tool in TPC-H
WANG Liang;LI Yu-peng;YANG Zheng
..............page:18-20
Semantic Research on UML State-chart Based on rCOS
ZHANG Xiao-meng;RONG Mei;ZHANG Guang-quan
..............page:21-23
Anti-collision Algorithm Based on EPC Class-1 Gen-2 Standard and Its Improvement
ZHANG Rui-zi;NAN Lin;HU Kun-yuan;TIAN Jing-he
..............page:24-26
Key Software Technology of 4-Degree of Freedom Parallel Tracking Platform
LIU Feng;WANG Xiang-jun;XU Hong;ZHANG Zhao-cai
..............page:27-29
Classification of Software Code Errors and Its Application
HU Xuan;LIU Bin;LU Min-yan
..............page:30-33
Study on Parallel Crawler Based on Pipeline Load Balancing Model
MENG Xiang-qian;YE Yun-ming;DENG Bin
..............page:34-36
Improved Apriori Algorithm Based on Across Linker
HUANG Jian-ming;ZHAO Wen-jing;WANG Xing-xing
..............page:37-38,41
Data Exchange Technique Based on Time Gate and Passing Token
LIN Feng;REN Kai-yin;NI Bin
..............page:42-43,46
Virtual Instrument Development Environment Generated by Syntax-directed Method
SUI Yang-yi;LIN Jun;ZHANG Xiao-tuo;WANG Shi-long
..............page:44-46
Research on XML Data Pagination Index Technology
LEI Xiang-xin;YANG Zhi-ying;SHAO Yang-jun;HU Yun-fa
..............page:50-52
Research on Inheritable BIRCH Based on XML
FENG Xing-jie;DING Yi-xin;LIAO Yong-yi
..............page:53-54,57
Replica Location Method Based on PM-chord Algorithm in Data Grids
WANG Fu-ye;GAO Jing-yang;WEI Sheng-jun
..............page:55-57
Semantic Web Service Discovery Framework with QoS Constraints
ZHU Bi-cen;XIA Qing-guo;ZHU Zheng-zhou
..............page:58-59,62
Association Mining Algorithm for Privacy Preserving on Horizontally Distributed Datasets
JIANG Dong-dong;SUN Zhi-hui;WANG Xiao-gang;WU Ying-jie;LV Jian-hua
..............page:60-62
Batch Update Clustering Algorithm Based on DBSCAN
YI Bao-lin;WU Yi-qiang;FENG Da-yang;ZHANG Xiao-li
..............page:63-64,67
Composite Semantic Web Service Framework Based on Workflow Technique
LI Xiang-mei;SUN Ping
..............page:65-67
Parallel Computation Technique for Static R-tree Index Based on Partition Technology
ZHOU Qin;ZHONG Er-shun;HUANG Yao-huan
..............page:68-69,73
UCONA Model for Service Grid Authorization Decision-making
GUI Jin-song;CHEN Zhi-gang;HU Yu-ping
..............page:70-73
BPEL Modeling Technique Based on Object Petri Net
LIN Qiang;HU Hao;LV Jian
..............page:74-75,78
Research on Test Case of Generating Scenario Based on UML
ZHENG Guang-cheng
..............page:76-78
Improved Chord Resource Routing Algorithm Based on Opposite Regions
LI Yan-feng;LI Han-bing;ZHANG Xue-jie
..............page:79-82
Long Range Dependent Networks Traffic Hurst Exponent Estimate Arithmetic
ZHANG Bo;WANG Bin-qiang;ZHI Ying-jian
..............page:83-85
Application Level Multicast Algorithm Based on Available Bandwidth Measurement
YANG Shan;HUANG Dong-jun;ZHOU Wei
..............page:86-88
Fast Handoff Algorithm for WLAN Based on Dynamic Cache
NI Wei-guo;DONG Yong-qiang;ZHANG Cong
..............page:89-91
Topology Inference Based on Tomography Technology
ZHAO Hong-hua;CHEN Ming
..............page:92-94
Bidirectional Search Chord System Based on Heterogeneity of Peers
ZHOU Wei-ping;LIU Wei-guo
..............page:95-97
Efficient Distributed Feedback Flow Load Balancing Algorithm
CHEN Yong
..............page:98-99,102
Load Balancing Based on Game Theory for Multi-homing
CHEN Qian-bin;ZHANG Bao;TANG Lun;WANG Cai-xia;LI Yun
..............page:100-102
Research on Adaptive Judgment Algorithm of Available Bandwidth
LIANG Liang;HUANG Yu-qing;JIANG Hong
..............page:103-104,108
Midnormal-based Area Localization Algorithm
DAI Pei-hua;XUE Xiao-ping;SHAO Yu-hua
..............page:105-108
Design and Implementation of IS-IS Routing Performance Monitor System
WANG Wei-hua;JIAO Li;JIN Yue-hui
..............page:109-111,115
Hybrid P2P Network Model Based on More Than One Super Peer in One Cluster
YIN Wei;JIANG Zhuo-ming;CHENG Gang;XU Rong-sheng
..............page:112-115
Optimized MAC Protocols in Wireless Sensor Networks Based on Game Theoretic
ZHAO Li-qiang;GUO Le;ZHANG Guo-peng;ZHANG Hai-lin
..............page:116-117,125
Two-layered Agent Based Model for Service Discover in P2P Environment
WAN Peng;XIANG Yang;SHEN Hong
..............page:118-120,128
Design of PQ_SIP Protocol Stack Based on QoS
JIANG Rui;YU Xiang
..............page:121-122,132
Timing Attacks and Defenses on RSA Public-key Algorithms
CHEN Cai-sen;WANG Tao;ZHENG Yuan-yuan;ZHAO Xin-jie
..............page:123-125
Non-intrusive Add-on Steganographic System Based on NTFS
SHI Qian;ZOU Heng-ming
..............page:126-128
Design and Implementation of Compliance Test on TPM Interface Command
CUI Qi;MA Nan;LIU Xian-gang
..............page:129-132
Trust and Reputation Evaluation Model Based on P2P Network
LIN Xin;ZHAO Tie-zhu
..............page:133-135
Authentication Research for Migrating Instance Based on Pass and Visa
LI Hui;WANG Xiao-lin;ZENG Guang-zhou
..............page:136-138
Research on Construction Methods of Network Covert Channels
YAN Qing;LIU Jun;XIAO Jun-mo
..............page:139-141
Design and Implementation of Fast Disk Encryption Algorithm
GAO Wei;GU Da-wu;HOU Fang-yong;SONG Ning-nan
..............page:142-144
Research on Statistical Hitting Set Attack in Anonymity System
XU Hong-yun;LIU Jing;XIE Cheng;PENG Shu-guang
..............page:145-147
Study of Policy Model of Software Secure Loading for Trusted Mobile Platform
LI Jian;LIU Ji-qiang;ZHOU Zheng;SHEN Chang-xiang;ZHANG Jun
..............page:148-150
Visualization Method for Time and Space Logic Correlation of Security Audit Event
WANG Bao-yun;YANG Ying-jie;CHANG De-xian;WU Bei
..............page:151-153
K-anonymity Algorithms Based on Multi-Dimensional Generalization Path
HUANG Chun-mei;FEI Yao-ping;LI Min;DAI Yi;LIU Jiao
..............page:154-156
Privacy Data Preserving Method Based on Discrete Cosine Transform Martrix
ZHANG Guo-rong;YIN Jian
..............page:157-158,161
Tag Authentication Protocol for RFID Based on Discrete Sequence of ID
LIU Zhi-liang;XUE Xiao-ping;WANG Xiao-ping
..............page:159-161
Analysis Method of Firewall Rule Configuration Anomalies
SUN Yun;LUO Jun-yong;LIU Yan
..............page:164-166
Game Model for Trust Establishment Based on Internet Virtual Environments
LIU Ji-chao;ZENG Guo-sun;YUAN Lu-lai
..............page:167-169,213
Efficient ID-based Proxy Signcryption Scheme
YANG Xuan;YU Zhao-ping
..............page:170-171,183
Research and Design of Adaptive Intrusion Prevention System for Co-stimulated by Danger Signals
XU Hui;XU Chen;CHENG Xue-yun;PENG Zhi-juan
..............page:172-174,186
Generalized Forward-secure Group Signature Scheme
CHEN Shao-zhen;SUN Hui-hui
..............page:175-176,179
Improved Gait Recognition Approach
ZHAO Xi-ling;LI Qi-shen;LU Zhi-tian;LI Jun-feng
..............page:177-179
Fuzzy Horn Clause Rules and Its Discovery Algorithm
LIU Dong-bo;LU Zheng-ding
..............page:184-186
Edge Detection Algorithm Based on Facet Model
SUI Lian-sheng;WANG Hui
..............page:187-189,193
Handover Scheme Based on Fuzzy Logic Technique
WANG Li;GUO Ai-huang;LIU Fu-qiang;XU Shang-zhi
..............page:190-193
Mixed Method of Reducing Feature in Text Classification
LIU Hai-feng;WANG Yuan-yuan;YAO Ze-qing;ZHANG Shu-zu
..............page:194-196
Application of Ant Simulated Annealing Algorithm in Test Case Reduction
ZHENG Yan-ni;LI Zhi-shu;LI qi
..............page:197-199
Application of Embedded Speech Interaction Based on HMM in AmI
GONG Xiao-qing;KE Su-juan;LI Hui;HUA Qing-yi
..............page:200-202
Path Test Data Generation Based on Adaptive Genetic Algorithm
LI Jun;LI Yan-hui;PENG Cun-yin
..............page:203-205
Feature Weight Adjustment Method Based on Feedback Information
LI Yan-ling;DAI Guan-zhong;YU Mei
..............page:206-207,229
Research on Evolutionary Neural Network of Intrusion Detection
YI Xiao-mei;CHEN Bo;CAI Jia-mei
..............page:208-209,213
Color Image Segmentation Based on B-spline Curve Model
TANG Hong-zhong;HUANG Hui-xian;ZHANG Dong-bo;LI Wei-wei
..............page:214-215,218
SFT Based on Scale Invariant Feature
WANG Qiang;PENG Si-long;LI Zhen-wei
..............page:216-218
Water Automatic Detection from SAR Image Based on Fuzzy Weighted SVM
CHENG Ming-yue;YE Qin;ZHANG Shao-ming;CHEN Ying-ying;LI Wei
..............page:219-221
Improved Background Motion Compensation Technique in Aerial Image Sequence
LIU Zhen-hua;LI Ning;JIA Liang
..............page:222-224
Automatical Object Detection and Extraction in Real-world Image
NIE Qing;ZHAN Shou-yi
..............page:225-226,232
Image Enhancement Algorithm for Strips Surface Defect Image Based on Wavelet Transform
SUN Xiu-ming;WU Gui-fang;XU Jin-wu;XU Ke
..............page:227-229
Design and Implementation of Embedded Redundant Computer
ZHANG Li-fen;YUAN Pu-ji
..............page:230-232
Design of Serial RapidIO-PCI Bridge Based on FPGA
GAO Yu-gu;WANG Hao;NI Ming
..............page:233-235
Design and Implementation of USB1.1 Controller
GU Ying-ke;WANG Zheng;BAI Guo-qiang;CHEN Hong-yi
..............page:236-238
Hardware Design of Combo Vehicle Navigation Terminal Based on GPRS
LIU Yue-feng;ZHANG De;SUN Hua-bo;LIU Ting
..............page:239-241
High-speed Data Acquisition and Processing System Based on TMS320F2812
SUN Yuan-min;YIN Li-xin;YANG Shu-tao
..............page:242-244
Design and Implementation of Monitor System to Five-stand Cold Tandem Rolling Mill
LI Qiang;FANG Yi-ming;CHEN Gang;HAN Yong-cheng
..............page:245-246,249
Fast Anti-collision Algorithm Based on Query-prefix
YANG Li-bing;HUANG You-fang
..............page:247-249
Research and Development of Remote Control Experimental System Based on Double-client Server
HONG Zhen;YU Li;XU Jian-kai;YIN Pei-qiang;ZHANG Gui-jun
..............page:250-252,255
Real-time Virtual Visualization of Vegetation Based on GIS Data
TANG Fei;YANG Liao;WANG Wei-sheng
..............page:253-255
Design and Implementation of Exhibition System for Interaction Chinese Painting
SHEN Jian-li;YANG Xu-bo;XIAO Shuang-jiu
..............page:256-258,262
Research and Design of Multi-language Comprehensive Information Services System
XIAO Rong;WU Ying-zi
..............page:263-264,267
Data Monitor System for Information Board
WANG Fang;WANG Kun-qi
..............page:265-267
Real-time Algorithm for Large-scale Terrain Rendering Based on Triangle Bintree
LIN Ji-cheng;WAN Wang-gen;ZHOU Jun-wei;TAN Xiao-hui
..............page:268-270
Mannequin Modeling for 3D Dress Based on Part Separation
ZHU Zi-yang;SHI Xia-ping;CHEN Jia-xun
..............page:271-273
Distributed Autonomous Navigation System Based on VANET
JIANG Jin;CHEN Hong-zhong;FANG Yu
..............page:274-276
E-Business Service System for Manufacture Based on BPEL
DAI Jiang-peng;DONG Yong-qiang;CHEN Qiu
..............page:277-279
Design and Implementation of State-driven Executable Business Process Model
ZHOU Jie-liang;YAN Jun-wei;LIU Min
..............page:280-282
Debugger Framework on Dynamic Binary Translation System
ZHENG Ju-yu;GUAN Hai-bing;LIANG Al-ei
..............page:283-封3