Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2002 Issue 2
Reliability Evaluation of FMS Mechanical Technological Systems
wu xiao yue ; jiang ping ; zuo wan li
..............page:77-79,95
A Survey on Path Delay Testing
li hua wei ; zuo ying zuo ; li zhong cheng
..............page:80-83
A Queue Model of the Distributed Database System Based on the C/S Mode
tian jun feng ; wang feng xian
..............page:88-91
Data Clustering Based on ART1 Artificial Neural Networks
zuo zuo ; tan ming feng
..............page:92-95
Design of a House-Keeping Computer System for Satellite TS-1.1
qu feng ; cui gang ; yang xiao zong
..............page:96-98,104
On the Discretization Methods for Numerical Attributes
li chu min ; wu zhong fu ; wang kang
..............page:99-101
A New Logical Inference Method on Petri Net
wang zhi jian ; cai zi xing
..............page:102-104
Design of an Out-Patient Doctor Workstation System
cheng dong mei ; kang ya bin
..............page:105-107
Optimal Design for the Testability of Circuit Boards Based on Boundary Scan
liu guan jun ; wen xi sen ; yi xiao shan
..............page:73-76
Design and Implementation of the RAM EDAC Module in the House-Keeping Computer of the TS-1.1 Satellite
qu feng ; cui gang ; yang xiao zong ; tang xin yue
..............page:70-72,76
EASTT: An Embedded Application Software Test System
li zuo ; mei lin ; ling hui ; xu yong sen
..............page:66-69
Task-Based Authorization Control and Its Implementation
hong fan ; deng ji bo
..............page:62-65
A Fault Simulation Algorithm for Dynamic Current Testing
zhu qi jian ; zuo ji shun ; zhang da fang
..............page:54-58
The Improvement of the Method IPI for Object-Oriented Cluster-Level Testing
sun yu xia ; chen huo yan
..............page:47-49
Linear Partition Model Computation of Data Distribution in Parallel Compilation
hu nan jun ; liu yong ; chen dao xu ; xie li
..............page:42-46,58
Bisimulation Checking Algorithms Based on Symbolic Transition Graphs
li zhou jun ; chen huo wang
..............page:34-41
The Implementation of Realtime Communication by PowerBuilder
ling ke liang ; jia shu sen
..............page:32-33,53
Design and Implementation of Port Scanners Based on Windows 2000
huang kun ; zhang da fang
..............page:29-31
Design and Implementation of a Protocol Analyzer Based on Shared Segments
xie zuo ; zhang da fang
..............page:25-28
A Network Management Model Based on CORBA and Mobile Agents
cai hong bo ; zhang da fang ; cai li
..............page:22-24,28
Fuzzy Data Mining in Intrusion Detection
li zhi tang ; liu zuo
..............page:18-21
The Formal Verification of Safety in System V of Linux
wu dan ; liu fang ; dai kui ; wang zhi ying
..............page:13-17
Research on Resource-Oriented Firewall Models
li zhi tang ; zhang yun he
..............page:9-12,17
Information Security Engineering
shen chang xiang ; cai yi ; zhao ze liang
..............page:1-8