Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2009 Issue 8
Fingerprint Feature Extraction from the Subareas Divided by Image Quality
HU Chun-feng;YIN Jian-ping;ZHU En;CHEN Hui
..............page:4-6,48
Research on Enterprise Application Integration Based on Web Services and MDA
SONG Xu-dong;WANG Xue-ping;LIU Xiao-bing
..............page:121-123,127
Design and Implementation of a Virtual Storage Oscilloscope Based on Embedded Systems
LU Jian-hua;HAN Bao-jun;CHEN Yao-jie
..............page:124-127
Application of Noun Clustering in NLP Systems
FEI xiao-dong;ZHAO Ke;LI Ya-tao;LIU Jing
..............page:133-136
Negotiation Research in Virtual Enterprises Based on Multi-agents
ZHOU Wei;HE Zheng-chu
..............page:140-143
Analysis and Simulation of an Effective Five Order Charge Pump Phase Locked Loops
DENG Qian;WANG Mei;LI Jia-sheng
..............page:144-146
A New Approach to the Modeling and Simulation of Brushless DC Motors Based on Fuzzy Control
LUO Wei-ling;LIU Jian-cheng
..............page:147-149,155
Design and Implementation of an Intelligent Building Light Control System Based on the ZigBee Sensor Network
ZHOU Xiao-wei;CAI Jian-ping;ZHENG Zheng-wei;YING Jing
..............page:150-152,155
Consistency Checking of the SHOIQ(D)-Based Ontology
YE Ya-xin;OUYANG Dan-tong;LIU Yao;SUN Ji-gui
..............page:7-9,56
Research on a Prefix Hijacks Detection Scheme for the Internet Based on Cooperation
LIU Xin;ZHU Pei-dong;PENG Yu-xing;ZHAO Qiu
..............page:10-12,20
An Active Queue Management Algorithm Based on the CMAC-PID Parallel Control
LI Ting;ZNANG Da-fang;XIE Kun
..............page:13-16,23
An Improved Scheme of the "Medium-Field",Multivariate Cryptosystem
CHEN Qin;HUANG Xiao-zhu;ZHANG Min
..............page:17-20
Design and Realization of a Virtual Honeynet System
HU Yi-zhao;WANG Zhen;AN Li
..............page:21-23
An Identity-Based Group Blind Signature Scheme
YUAN Yu-qing;HAN Xiao-hua;LI Qiao-liang
..............page:24-26,32
The Algebraic Immunity and Nonlinearity of Vectorial Boolean Functions
DONG De-shuai;QU Long-jiang;FU Shao-jing;LI Chao
..............page:27-29
An IDS Model Based on Alert Correlation
HE Xin-zhen;HU Wei-hua;ZHENG Qiu-hua
..............page:30-32
Research on Risk Quantitative Assessment for Network Security Based on FPP
QIN Da-li;ZHANG Li;LI Ji-hui
..............page:33-35
A Study of the Evolving Fuzzy Rule-Based Classifier in Intrusion Detection
ZHOU Yu-ping;FANG Jian-an;YU Dong-mei
..............page:36-38
Windows Registry Anomaly Detection Based on One-Class Support Vector Machines
RAO Qiu-na;ZHAO Ze-mao
..............page:39-41,45
Cross-Domain Access Control in Web Services Based on Trust Degree
DAI Chang-ying;ZHANG Hui-juan
..............page:42-45
A Hybrid Flow-Shop Scheduling Approach Based on Multi-Objective Particle Swarm Optimization
OU Wei;ZOU Feng-xing;GAO Zheng;XU Xiao-hong
..............page:52-56
Research on a Service Composition Algorithm Based on Ontology
SHEN Ji-quan;XIN Jiao-li
..............page:57-59,65
A New Method of Complete Data Reduction Based on the Boolean Matrix
GAO Ting;LIU Wen-qi
..............page:60-62,98
An Improved Maximal Frequent Itemsets Mining Algorithm
PAN Yi-ting;ZHANG Hong-juan;YAN Jian-jun
..............page:63-65
Optimization and Improvement of the Data Vortex Optical Interconnection Network Topology
DONG Lian-yong;DOU Qiang;WANG Zhi-wei;QI Xing-yun;DOU Wen-hum
..............page:69-72,127
A Study of the Applicability of Stream Processors to Scientific Computing Applications
ZHANG Ying;LI Gen;PANG Zheng-bin;LI Yong-jin;ZHANG Jun;XIA Jan;YANG Xue-jun
..............page:73-76,81
A Dual-Core Redundancy Execution Model Based on Context Saving and Recovery
GONG Rui;DAI Kui;WANG Zhi-ying
..............page:82-85,98
The Memory Size Estimation of Application Programs for the SoC Task Partitioning
ZHAO Peng;LI Si-kun;WANG Da-wei;YAN Ming
..............page:89-92
A Study of On-Chip Non-Uniform Cache Architectures
JIA Xiao-min;HUANG Cai-xia;ZHANG Min-xuan;SUN Cai-xia;QI Shu-bo
..............page:93-98
Unstructured P2P Information Retrieval Based on the Ant Colony Algorithm
LI Shao-zi;WANG Ting;ZHOU Chang-le
..............page:99-103,139
Research on the Resource Search Method for P2P-Based Media Streaming Systems
LI Li;HAN Hui-jian
..............page:104-106,120
Research on the Ontology-Based GM Matching Mechanism
DING Jian-long;CREN Cao-xiang;JIN Lin-qiao
..............page:113-116,143
Design and Implementation of a Parallel Bootloader for DSP TMS320VC5416
XU Shu-jie;LIU Hong-li
..............page:153-155
Design of a Synchronous Digital Lighting Control System Based on GPS
BAI Rui-qin;LI Bo;ZANG Dao
..............page:156-158