Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Engineering and Design
1000-7024
2002 Issue 2
Discretization of continuous-valued attributes using information theory
xu ru yan ; lu han zuo ; guo qi sheng
..............
page:62-64
Application and implementation of randomization in hill-climbing
mao wei ying ; zuo ming ; he gui ming
..............
page:60-61,64
Using flowing-media technology to implement the transmit of video and audio in the web
zhang cheng ; zhu qing sheng
..............
page:57-59
The design and application of autoconnection through dial
zhang da xing
..............
page:54-56
Combination of workflow and object-oriented for the implementation of hospital MIS
wang yue
..............
page:51-53,56
Exploiting active networks for efficient distributed network management
li zeng zhi ; han dong ; wang jian guo ; li gang
..............
page:47-50
An application of order method in software quality assessment
shi zhu ; he xin gui
..............
page:45-46,50
A user identify and privilege control system based on C/S model
yu ze yuan ; lei xiao chuan ; liu mei ru
..............
page:43-44,17
Real-time multi-task dispatch system of electrostatic precipitator simulation training software
yang guan ping ; hu zhi guang ; hu man yin ; gao xiang lin ; wu xiao li
..............
page:40-42
Assurance on the information security——the bi-directional print-mark check system
diao cheng jia ; zhao hong ; shi ru jun
..............
page:36-39
The implementation of data integrity constraint based on client/server
shi ya hong
..............
page:33-35
Dynamic information issue technique based on JSP
hong xi jun ; tian yong tao ; li cong xin
..............
page:29-32
Design a telepresence system for controlling an automobile on a PC platform
huang wei ping ; he han gen ; zhu xiao cai
..............
page:26-28,32
An architecture model of ebusiness platform which supports cooperation and intelligent decision
lv zuo ; gu jun zhong
..............
page:21-25
Research on VPN technique and implementation
qi zhong hou ; feng wei ; han jun ; feng deng guo
..............
page:18-20
The analyse of firewall technology
wang hai xia ; zhao zheng jun ; liu ji ping
..............
page:14-17
A data storage and replication tactic on multi-point databases
chen zhen ; xiong gui xi
..............
page:10-13
Technologies on geographical information data warehouse
chen lin ; du you fu ; wang yuan zhen
..............
page:7-9
Reconstruction research of tension signal based on wavelet
wan zhen kai
..............
page:4-6,13
Research based on supply-chain of integrated system of enterprise's intelligent function
qian xu ; zhao tai sheng ; xu shi fan
..............
page:1-3