Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2009 Issue 4
Signaling Design of IMS-based Time-shifting System for Mobile Multimedia Broadcast
XIAO Lin;YANG Qun;ZENG Xue-wen;WANG Jin-lin
..............page:1-3
Non-classical Slicing Optimization Runtime Verification Approach for Synchronization
GAO Xin-yan;WU Jin-zhao;QIAO Rui;YAN Wei
..............page:4-6
Predictive Compensation Control Algorithm on Packet Loss for Shared Control System
ZHONG Min-gen;WU Ping-dong;HUANG Jie;CHEN Hong-wei
..............page:7-9
Effective Load-balancing Algorithm for WebGIS Based on Map Server Farm
HUANG Ying;XIE Zhong;GUO Ming-qiang
..............page:10-12
Parallelizing Technique of Finite-difference Grid Subdivision in 3D Pre-processing
CHEN Ru;ZHANG Wen-yao;NING Jian-guo
..............page:13-15
Evaluation Method for Simulation Credibility Based on RS-FSE
WANG Li-guo;XUE Qing;MENG Xian-quan;LI Ping
..............page:16-18,22
Alert Verification Based on Active D-S Theory Classifier
HE Guang-yu;WEN Ying-you;ZHAO Hong
..............page:19-22
Method for Index-building and Dynamic Maintenance of TPR*-tree
LIAO Wei;WU Xiao-ping;YAN Cheng-hua;ZHONG Zhi-nong
..............page:23-24,27
WLAN Location Algorithm Based on Gauss Mixture Model
CHENG Yuan-guo;GENG Bo-ying
..............page:25-27
Function Point Measurement Based on Java Program
GU Xun-mei;SHAO Zhi-qing
..............page:28-30,34
Protein 3D Structure Prediction Based on Improved Tabu Search
ZHANG Xiao-long;CHENG Wen
..............page:31-34
Algorithm for Keyword Search over XML Stream
LI Bo;YANG Wei-dong
..............page:35-37
Differencing Algorithm for Decompilation Code and Source Code
CAO Meng-chun;CHEN Kai-ming
..............page:38-40
RTEMS-oriented Integrated Development Environment for Embedded Software
LI Xi;ZHANG Fei;SHI Zheng;WU Xiao-dan
..............page:41-43
Some Subclasses of Petri Net with Confluence Property
WANG Peng-wei;WU Zhe-hui
..............page:44-47
Concurrency Control Mechanism in Collaborative Virtual Environment
FU Yun-qing;QUAN Wen-jun
..............page:51-52,55
Design and Implementation of Data Migration Algorithm on SAN
ZENG Lei-jie;ZHANG Yan-yuan;LI Zhan-huai;ZHAO Xiao-nan
..............page:53-55
Analysis and Study on Parallelizability of Parallel Test Task
XU Ming;HU Lei-gang;ZHOU Yue-wen
..............page:56-57,60
Stride and Pointer Based Prefetching in Chip Multiprocessor
XIAO Jun-hua;FENG Zi-jun;ZHANG Long-bing
..............page:58-60
Internet-based Supervisory Software for Networked Control Systems
ZHU You-zhi;ZHENG Geng;HU Wen-shan;LIU Guo-ping
..............page:61-62,65
Improved XML Intelligence Data Cleaning Strategy
ZHAI Xue-min;LIU Yuan;LIU Bo;BI Rong-rong
..............page:66-68,71
Research on Large-scale Ontology Partition and Mapping Method
XU De-zhi;TAO Ke
..............page:75-77
Association Rules Mining Algorithm Based on Privacy Preserving
ZHANG Rui;ZHENG Cheng
..............page:78-79,82
Improved Parallel Generalized Conjugate Residual Algorithm
ZHAO Li-bin;TIAN You-xian
..............page:80-82
Optimization Approach for Cost Function Computing Based on Correlation Window Matching
XIA Yong-quan;HUANG Min;GUO Long-yuan;YANG Jing-yu
..............page:83-84,87
Algorithm to Eliminate Redundancy Communication Based on Define-Use Analysis
WANG Jun-wei;ZHAO Rong-cai;LI Yan
..............page:85-87
Pre-merged Repeats Masking-off Method in DNA Fragment Assembly
CAI Kui;YANG Jin-cai
..............page:88-90
Research on Fairness Between High Speed TCP Variants and DCCP
WANG Yao-gong;PAN Li;LI Jian-hua
..............page:91-93
Serial Communication Based on TMS320F2812 and LabVIEW
DAI Peng;LIU Jian;FU Xiao;PAN Qing-shan
..............page:94-96
Optimization Design for DSR Routing Protocol in Wireless Ad Hoc Networks
TU Zi-hao;WU Rong-quan;QIAN Li-qun
..............page:97-99
Application Layer Distance Laboratory Session Protocol
CHENG Xin-dang;MA Xiao-pu;ZHAN Shi-hua
..............page:100-102
Research on Communication Between PC and Multi-PLC Based on VB
ZHOU Min;LI Feng-ting;WU Wei-min
..............page:103-104,107
Distribution Design of Web Crawler
LI Wei-jiang;ZHAO Tie-jun;PIAO Xing-hai
..............page:105-107
Research on Needs for Buffer of All-optical Packet Switching Router
WANG Jun;LAN Ju-long;LI Yu-feng
..............page:108-109,112
TCP Slow Start Algorithm Based on RTT Fairness
WANG Jian-feng;HUANG Guo-ce;CHEN Cai-qiang;ZHU Meng
..............page:110-112
MANET End-to-end Performance Analysis Model Based on Virtual Clock
HUANG Yang;YU Zhen-wei;ZHANG Yong;DAI Wan-zhou
..............page:113-115,118
Impact of Small Buffer on Real-time Network Traffic
WANG Jun;LAN Ju-long;LI Yu-feng
..............page:116-118
Analysis of Congestion Control Algorithm Based on Receiver-driven
MA Yi-zhong;SI Ying;DOU Zhan-wei
..............page:119-120,124
Ad Hoc Network Based on Simplified OSPF Protocol
XIONG Xiao-bing;SHU Hui;DONG Wei-yu;REN Hua
..............page:121-124
Attack and Defense of Webmail Based on DNS Cache Poisoning
ZHANG Hong-qing;WANG Dao-shun
..............page:125-127
Threshold Proxy Re-signature Scheme
SUN Chao-liang;CAO Zhen-fu;LIANG Xiao-hui
..............page:128-130
Design and Implementation of Parallel Multiplier Based on Optimal Normal Basis of Type II
QI Peng;SUN Wan-zhong;DAI Zi-bin;ZHANG Yong-fu
..............page:131-133
Security Policy Conflict Detection and Resolution Based on Multidimensional Integer Space
WANG Yong-liang;CHEN Xing-yuan;WU Bei;DAI Xiang-dong;PENG Jun
..............page:134-136
User-oriented Uniform Security Frame in IMS Media Level
YANG Tao;GUO Yun-fei;WANG Xiao-lei
..............page:137-139
Design and Implementation of General ECC Co-processor
CAI Liang;DAI Zi-bin;CHEN Lu
..............page:140-142
P2P Reputation Model Based on Trust and Recommendation
XI Jing;WANG Yuan;LU Jian-de
..............page:143-145
Application of Sequential Detection in DDoS Detection
QIN Xiao-ming;ZHAO Jian-gong;JIANG Jian-guo
..............page:146-148
Fair Document Exchange Protocol with Confidentiality
YE Xiao-xin;CAO Zhen-fu;LIANG Xiao-hui
..............page:149-151,156
Provably Secure Identity-based Proxy Signature Scheme
WANG Tian-qin
..............page:152-153,156
Research and Implementation of IPSec VPN Based on Firewall Hook
ZHANG Ming;CHEN Xing-yuan;DU Xue-hui;QIAN Yan-bin
..............page:154-156
New Randomized Broadcast Encryption Scheme
LAI Xia;CHEN Li-ya;HE Ming-xing
..............page:157-158,164
Application of Incremental Associative Classification Method in Malware Detection
ZHUANG Wei-wei;YE Yan-fang;JIANG Qing-shan;HAN Zhi-xue
..............page:159-161,164
Reconfigurable Feedback Shift Register Instruction Based on Stream Cipher
REN Qiao;DAI Zi-bin;LI Wei;YANG Xiao-hui
..............page:162-164
Privilege Delegation and Access Control Model for P2P
LIU Ren-fen;ZHANG Chang-you;LI Yan-hua
..............page:165-166,169
DWT Domain Zero Digital Image Watermarking Algorithm Against Rotation Attack
WANG Xuan;HE Bing;ZHAO Jie;WANG Nan
..............page:167-169
Image Watermarking Algorithm Based on Improved Curvature Scale Space Technology
ZHANG Zhen-kai;TIAN Yu-bo
..............page:170-171,174
Verifiable Threshold Secret Sharing Scheme in RFID Tags Group
CHANG Zhen-hua;CHEN Yue;SHAO Jing
..............page:172-174
Comprehensive Evaluation of Steganalysis Algorithm Based on FCM Algorithm
GONG Qu;GUO Ji-qiang
..............page:175-176,179
Dual Image Watermarking Algorithm Based on DCT and Chaos
XI Kun-hong;YE Rui-song
..............page:177-179
Encryption Algorithm Based on Circle Property
GE Lina;HE Zhong-hua;JIANG Zhuo-lin
..............page:180-182
Point Cloud Density Extraction Based on Stochastic Distribution Estimation
YE Ai-fen;GONG Sheng-rong;WANG Zhao-hui;LIU Chun-ping
..............page:183-186
Multi-issue Negotiation Based on Co-evolutionary Genetic Algorithm
YUAN Yong;LIANG Yong-quan
..............page:187-189
Moving Target Tracking Under Occlusion Based on Multi-hue-blob Voting
YANG Wei;FEI Yao-ping;LI Min
..............page:190-192
Video Text Segmentation Algorithm Based on Stroke Extraction and Color Model
CHENG Hao;HUANG Lei;LIU Jin-gang
..............page:193-195
PNN Recognition of License Plate Chinese Characters Based on Pseudo-Zernike Invariant Moments
GAO Quan-hua;WANG Jin-guo;SUN Feng-li
..............page:196-198
Face Recognition Based on NMF Group Strategy
SU Tao;ZHANG Qiang;WEI Xiao-peng;ZHOU Chang-jun
..............page:199-200,203
Application of LSBPSO in Disk Load Balance Problem
GE Hong-wei;SONG Chao
..............page:201-203
Hybrid Orthogonal Genetic Algorithm for Global Optimization
JIANG Zhong-yang;CAI Zi-xing;WANG Yong
..............page:204-206,209
Job Shop Scheduling Based on Self-adaptive Clone Heuristic Algorithm
XU Li-fang;MO Hong-wei
..............page:207-209
Research and Implementation of Group Animation Based on Particle Swarm Optimization
NIE Jing;LIU Hong;WANG Qi
..............page:210-211,214
Fault Diagnosis Method Based on WPA-SVM
XIAN Guang-ming;ZENG Bi-qing;TANG Hua;XIAO Ying-wang
..............page:212-214
Segmentation for Accumulation of Qusic-circular Object with Multiplex Methods
LUO San-ding;CHEN Qian
..............page:215-217
Deblock Algorithm for Compressed Image Based on Adaptive Space Domain Filtering
ZHANG Xue-quan;GU Xiao-dong;SUN Hui-xian
..............page:218-220
Multi-focus Image Fusion Based on Region Acutance
ZHANG Su-lan;WANG Zheng
..............page:221-222,225
Image Segmentation Algorithm Based on Nodes of Vector Flow Field
LI Qi-he;LUO Yu-pin;XIAO De-yun
..............page:223-225
Software Method of Noise Cancellation in Voice Systems
ZHENG Yu;WANG Bo
..............page:226-228
Performance Analysis of H.264/AVC Multi-generation Coding
ZHU Zi-yuan;LIN Tao
..............page:229-231
Design and Implementation of Portable Video Decoding Terminal Based on ARM
ZHANG Yun-chuan;WANG Zheng-yong;QING Linbo;WANG Hua-zhang
..............page:232-234
Research on Real-time Performance of Embedded Video Surveillance System
HE Su-qin;YANG Mei-hui
..............page:235-237,240
Selective Replication Policy in CMP Cache Hierarchy
GUO Hui-fang;JIANG Kun-peng;ZHAO Rong-cai;YIAO Yuan
..............page:238-240
Research and Implementation of Pattern Information Processing for New Industrial Embroidery Machine
LI Xiang-wei;BAI Rui-lin;ZHAO Tao-tao
..............page:241-243
SDRAM Controller with Time-hiding Feature for Data Block Access
WANG Bin;XIONG Zhi-hui;CHEN Li-dong;TAN Shu-ren;ZHANG Mao-jun
..............page:244-246
Design of Multi-processor System Supporting Dynamic Interconnection
ZHANG Cheng;HOU Wei-min;CAI Hui-zhi
..............page:247-248,251
Design of Efficient and Reusable SoC Verification Platform for USIM Card
XU Ying;FENG Jun;XU Bo-xing;WANG Xi-nan
..............page:249-251
Real-time Stable Audio-video Supervise and Record System for Trial in Procuratorate
LIU Mei-de;CHEN Zhi-gang;DENG Xiao-heng
..............page:252-254
Genotyping System of Newcastle Disease Virus Based on Web
LU Wang-hong;CAO Yong-zhong;ZHANG Jian-feng
..............page:255-257
Design of Web-based Statistical Electronic Map Distributing System
HUO Jia;WANG Ying-jie;WANG Ying-hui;YU Zhuo-yuan;LUO Bin
..............page:258-260,264
Data Cooperative Model Based on Service-oriented-architecture
YI Zheng-rong;BU Wei;GE Xu-feng;LIU Ying-na
..............page:261-264
Design and Implementation of Battlefield Situation Simulation System Supporting HLA
MA Ya-ming;ZHANG Ya-jun;ZHANG Jiang-shui;WU Lili
..............page:265-267,270
Polarization Dehazing Algorithm Based on Atmosphere Background Suppression
WANG Yong;XUE Mu-gen;HUANG Qin-chao
..............page:271-272,275
Study and Design of Communication Between LIS and Machines Based on DCOM & ASTM
HE Jian-hu;ZHOU Qing-li
..............page:273-275
Embedded Fingerprint Authentication and Management Terminal Based on B/S Structure
YANG Yong-huan;YANG Bin
..............page:276-277,280
Research on Speech Quality of VoIP Based on E-Model
ZHANG Ze-ming;HU Lei;REN Jiu-chun;GAO Chuan-shan
..............page:278-280
Research on Simulation Technique of Gun Unit Based on HLA
XIA E;HUA Zu-yao
..............page:281-282
Reconfigurable Parallel Embedded System
JIANG Jing-fei;TANG Yu-hua;NING Hong
..............page:283-285