Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2005 Issue 3
Development of Flash Memory Device Drivers in the Embedded Linux
FENG Xiang;LI Ren-fa;YU Fei;YI Fei
..............page:96-98,104
Research and Realization of the Real-Time Performance of the uClinux Operating System
MA Xue-wen;ZHU Ming-ri;CHENG Xiao-hui
..............page:102-104
Computation of Multi-Level Lags in Local Lag Methods
XU Chun-lei;PENG Yu-xing;LI Si-kun
..............page:105-107
An Algorithm for Digital Watermarking Based on Fractal Coding
GONG Li;ZOU Bei-ji;SUN Jia-guang
..............page:108-110
Study and Analysis of Benchmark Testing for the Fault-Tolerant Middleware FTBus
DANG Xin-mei;LIU Hui;SHI Dian-xi;WU Quan-yuan
..............page:93-95,107
Growing Distributed Systems
WU Gang;Wang Huai-min;MAO Xin-jun
..............page:89-92
The Computer Simulation Design of an Efficient Error Control Coding Scheme
MEI Jing-quan;FENG Dan;MIAO Xue-ning
..............page:86-88
A Regression Testing Method Based on Testing States
LIU Kai-feng;ZHANG Da-fang;MIAO Li;WU Hao
..............page:80-82
Agent-Oriented and Object-Oriented Software Techniques
PENG Zhi-ping;LI Shao-ping
..............page:77-79,92
Application of the Normalized Cross Correlation Coefficient in Image Sequence Object Detection
GAO Guang-zhu;Li Zhong-wu;YU Li-fu;HE Zhi-yong
..............page:38-40
Application of Random Edge Feature Matching in the Tracking Algorithms for Moving Vehicles
HONG Yu;GAO Guang-zhu;YU Li-fu;HE Zhi-yong
..............page:35-37,40
FPGA Implementation of the 2-D Discrete Wavelet Transform
HUANG Ben-xiong;DUAN Shan-wei;HU Hai
..............page:32-34,60
A New Method of Solving Over-Segmentation in Watershed Algorithms
CHANG Zhi-ming;ZHOU Hai-fang;JIANG Yan-huang;YANG Xue-jun
..............page:29-31
Solutions Based on the Translator of the RTP Protocol to Optimize Real-Time Video Transmission
YU Sheng-Sheng;LIN Tao;Zhou Jing-li
..............page:26-28
Multiplatform Multiuser iSCSI Storage System and Its Performance Analysis
WANG Bo;XIE Chang-sheng
..............page:20-22
A Security System Model Based on Mandatory Access Control and Information Flow
LI Hao;LU Qiang;YANG Ji-wen;QIAN Pei-de
..............page:16-19,110
On the Algorithm for Stochastic Autonomous Scheduling Survivability
HUANG Zun-guo;LU Xi-cheng
..............page:1-3
Using Hash to Optimize the Network Backup System
CAO An-li;XIE Chang-sheng
..............page:4-6,12
Using Types for the Verification of Security Protocols
SONG Zhen;LI Zhou-jun;DOU Wen-hua
..............page:7-9,25
HowU:An Open Network Computing Platform Based on LVS
YAN Juan;JIN Hai;HAN Zong-Fen;ZHANG Qin
..............page:10-12
Design and Implementation of Uniform Data Access in Grid
HUANG Bin;XIAO Nong;LIU Bo
..............page:13-15,31
Research on the Agent-Based Retrieval Technology and Its Application in CLMS
YANG He-biao;CHEN Hua;XU Xiang-ying
..............page:74-76
Research and Implementation of a Software Usage Model Based on UML
WANG Tao;XU Xi-shan;YAN Jiong
..............page:71-73
The General-Purpose Model and System Implementation of Component-Based Software
DENG Yong-jin;MAO Xiao-guang
..............page:67-70
Software Statistical Test Acceleration Based on Importance Sampling
YAN Jiong;WANG Ji;CHEN Huo-wang
..............page:64-66,110
The Design Method for the DDSS Development Based on Data Marts
LONG Xuan;CHEN Fu-sheng
..............page:61-63
PMML-Based Data Mining Model Management
TANG Liang;ZHENG Pi-e;CHEN Wei
..............page:58-60
A Cluster-Based Database System Prototype DMC
FENG Yu-cai;WAN Chun
..............page:56-57,76
Application of Linear Programming Algorithms in Vehicle Scheduling
CHEN Ting;HE Zhong-yuan
..............page:52-55
Indepth Analysis and Research of the Performance of the Breathing Time Bucket Algorithm
WANG Xue-hui;ZHANG Lei;HUANG Ke-di
..............page:49-51
The Computational Complexity of Packing Problems
CHEN Chuan-bo;HE Da-hua
..............page:46-48