Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Computer Engineering and Design
1000-7024
2003 Issue 4
Software architecture developing method and the application
wei qun ; xiong zuo ; zhao fang
..............
page:77-80
Applying UML to describe design patterns
chen qin ; zhu zheng qiang
..............
page:81-84
Application of ADO in expert systems for fault diagnosis
su qun xing ; jie zuo ; gu hong qiang
..............
page:85-87
An atmosphere environment forecast system based on data mining
du wei ; zou xian xia ; wei chang hua
..............
page:88-90
Design and development of message-driven bean in J2EE
deng hui ; chen yi zhou ; zhang rui jun
..............
page:91-93
Application of continuous neutral network in solving the high rate discrete problem
luo jia wei ; wang si zuo
..............
page:94-96,37
Construction of system frame based on CORBA for biding and tendering in construction engineering
qiu yan
..............
page:73-76,90
Monitor system for substantive cable web by intranet
zhang zhi li ; long yong ; liu chun tong
..............
page:70-72
Design and study of the opening and multi-protocol OPC communication server
liu hui ping ; wang zuo ; tang lei
..............
page:67-69
Design and implementation of administrative system for graphic library based on ARM
zuo zuo zuo
..............
page:63-66
Design and implementation of firewall based on web
xue ning ; wang han fei ; qian cheng ; wang bin
..............
page:60-62
An attack tolerant agent-based IDS model
li hong quan
..............
page:57-59
Design of computer rooms management system based on smart-card and mult-tier C/S structure
zhu wen qiu
..............
page:55-57,59
Design and implementation of a medical video flow acquisition system
wu hong tan ; ye han xiao
..............
page:53-54
Simulink-based dynamic systematic simulation with VR environment
yang ning
..............
page:49-52
Principle and realization of electronic countermeasures simulation
li hua feng ; qian huan yan
..............
page:45-48,69
Design and implementation of DECT telecommunication soft
sun zhe heng ; wang zuo ; jia xu fei
..............
page:42-44
Data acquisition based on USB in PCI system
wang hao feng ; wan yan zuo
..............
page:38-41
Stability analysis of asymmetric hopfield neural network
di bo ; liu shu ; li wei min
..............
page:35-37
Safety interlock analysing for the automatic alignment system for optical route by computer
zuo zhong ping ; hu zuo ; gao bing ning
..............
page:33-34,37
Network performance analysis based on ICMP
hu yan ping ; wang lian jie ; liu wu ; liu qi ming
..............
page:30-32
Research of cache coherence in website's cache design
zhang qiang
..............
page:25-29
Analysis and research of active directory in windows 2000
wang an jun ; liu ping ; wu tao
..............
page:21-24
Analysis of interlaced video signal and deinterlacing
zhang zuo ; ye zuo dong ; chen guo bin ; xu lu an
..............
page:18-20
Exploration and analysis of the capability maturity model
ma liang li ; liu meng ren
..............
page:14-17
Fuzzy decision method of threat assessing for air attack target
zhang lei ; sun jin ping ; lei ying jie
..............
page:12-13,24
Analysis on session setup mechanism in the environment of distant education
yu fei yang ; chen qin
..............
page:9-11
Study of distributed data-used mechanism based on multi-agent
zhou xiao feng ; wang zhi jian
..............
page:5-8
Study of embedded operating system for thin client
li wen jie ; wang qing
..............
page:1-4,8