Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2005 Issue 6
New proxy blind signature scheme
GONG Shao-lin;Zhao Zemao
..............page:1543-1544,1547
Combining XP and RUP to develop small projects
LI Hui;TAO Pei-ji;LI Wen-feng
..............page:1678-1680
Emulate technique application in flood forecast and flood-control system
ZHAO Ying;LIU Yu-hui;WANG Wan-dong
..............page:1673-1677
Development of SMS gateway for small and medium-size Enterprise
WU Qing-qiang
..............page:1669-1672
Developing campus Web GIS based on MapXtreme
QUE Yi-meng
..............page:1667-1668,1680
Research and application of embedded mobile database based on dieting management system of WLAN
ZHU Bing-zhang;LI Zhen-kun;JI Ying
..............page:1664-1666,1672
Application of Nucleus event group in substation automation
HAN Ming-feng;WAN Xiang-yang
..............page:1662-1663
Application of share memory technology to Radius service
ZHENG Bo;CHEN Zheng-yang;ZHENG Jun
..............page:1660-1661,1672
Designing of database application program for managing MATLAB graph information
ZHANG Jing-qiu;HAN Yu-wei;HU Yan-yu
..............page:1657-1659
Application of mobile multi-Agents in mobile E-commerce system
ZHANG Xiao-bo;CHENG Liang-yu;QIU Ke-ning;ZHONG Run-lu
..............page:1654-1656,1659
Graph-based data mining for intrusion detection system
WU Shi-peng;OUYANG Wei-min;CHEN Ning-yu;XU Chun-rong
..............page:1651-1653
Design of industrial ethernet remote monitor system
Kang Jun;DAI Guan-zhong
..............page:1633-1635,1638
Basic study and practise on remote control of computer
ZHENG Chang-bo;QIN Qian-qing;YUAN Jun;JIAN Hua
..............page:1636-1638
Design and implementation of Windows2K client accounting system based on remote thread
XIE Zhi-peng;WU Qing-jiang
..............page:1639-1641,1644
Design and matanence of short message service platform
ZHAO Wei;Xiao Zhang
..............page:1642-1644
Design and implementation of news promulgation system based on .Net
CAI Zhao-quan
..............page:1645-1647,1650
Realization of RAID technology under solaris 9
ZHOU Shu-ping;LIU Ya-hui;SHAO Wen-zhu;WANG Xin-liang
..............page:1648-1650
Research and design for co-operation between IKE and NAT
GUO Xiang-fa;LI Da-xing
..............page:1551-1553,1556
Design and implementation of time window module for satellite mission-plan system
ZONG Jian-jian;LI Meng-jun;YAO Feng;HE Ren-jie
..............page:1554-1556
Methods of medical-image segmentation
Qiu Ming;ZHANG Er-hu
..............page:1557-1559,1588
Recognition and decoding of QR code
LIU Hong-wei;YAN Yan
..............page:1560-1562
Hierarchy RBAC model based on separation of duty
LI Qing;QIAO Yuan-song;ZHENG Hui
..............page:1563-1565,1585
Implementation of secure reinforcementer based on Oracle
WANG Ming-gen
..............page:1566-1568
Realization and application of Web database access Agent of oriented Applet
GAO Yun-feng;LU Jin-gui;WEI Hong
..............page:1569-1571,1575
CDS-based routing algorithm for sensor networks
HUANG Yuan-jiang;TANG De-you
..............page:1572-1575
Ways of network sensor data sharing
ZHOU Xiao-Yong;XU Hai-gang
..............page:1576-1577,1608
Design and implementation of floating point calculator based on FPGA technology
ZHOU Ning-ning;CHEN Yan-li;Li Ai-qun
..............page:1578-1581
Arithmetic achieve of predictive function control
ZHAO Ming-sheng
..............page:1582-1585
Research and implementation of reliability on three layer distributed application system
CHEN Yi-hong;CAO Xie-dong;ZHOU Yong-hong;XING Hui-min
..............page:1586-1588
Research and implementation of multiuser power control in hospital information system
ZHANG Wei;WEI Xia;ZHANG Qing-guo
..............page:1589-1591,1605
System design of recognition of handwritten digits by support vector machine
MENG Geng-xiang;FANG Jing-long
..............page:1592-1594,1598
Urban traffic system based on bluetooth technology
ZHENG Long;TIAN Tian;YU Xiao-feng
..............page:1599-1601
Theory and implementation of UDDI
RUI Xiong-jian;WANG Zhong-min
..............page:1602-1605
Design for debug system in embedded system
SUN Gui-Hua;CHEN Zhang-long;CUI Liang
..............page:1606-1608
Design of embedded control system for dynamic low-voltage reactive compensation
HUANG Jun-kai;CHANG Zhou-lin
..............page:1609-1611
Strategic negotiation model for resource allocation
LIN Hua
..............page:1612-1613,1644
Implementation of rapid assembly loading in logistics system
GUAN Feng;WU Yao-hua
..............page:1614-1615,1618
Improved weighting formula in auto text classification
KOU Sha-sha;WEI Zhen-jun
..............page:1616-1618
Design and realization on courses managing system based on C/S construction
XIA Bi-yu;LIU Guang-chang
..............page:1623-1625
Research and implement of security middleware based on J2EE
LI Wan-ting
..............page:1548-1550
Research of face detection algorithm based on skin and lip color
PENG Bo;CUI Yong-pu;HUANG Dan-xia;LU Xiao-qing
..............page:1500-1502
Production management system based on principle of MRPⅡ and its application research
ZONG Si-sheng;Yu Yong-ling;SHI Jin-fa
..............page:1497-1499
Research into means of coke image processing and recognition
NIU Lian-qiang;CHEN Yan-jun;LIU Shou-ren;REN Yi
..............page:1494-1496,1499
Study of fuzzy consistent matrix
ZHANG Yan-gu
..............page:1491-1493
Research of technology of data mapping based on model driven
WANG Shou-xin;WEN Bi-long;ZHOU Fang;HAN Yu-xiang;FANG Xiu-mei
..............page:1488-1490
Special attacks in mobile Ad hoc network
LIU Nan;HAN Fan-gxi;ZHANG Wei-yong;CHENG Yu-song
..............page:1486-1487,1537
Study on stealth of computer network scanning techniques
LIU Jing
..............page:1481-1485
Study of user management based on computing grid
CHEN Jing;KONG Ling-fu;LIU Qi;DONG Jun
..............page:1475-1477
Foundation test and analysis of router-to-router VPN experiment Net
DONG Yun-yao;GENG Jin-feng
..............page:1472-1474,1477
Fuzzy and hierarchy analysis of IP trace back DoS attack projects
QI Yan-wei;LIU Huai-liang
..............page:1469-1471
Design and realization of multi-channel analyzer based on CPLD
Wen Feng;SHANG Feng-jun;PAN Ying-jun;ZHOU Rong-sheng
..............page:1466-1468
Design and implementation of GIS based on J2EE frame
XUE Gang;WANG Hong
..............page:1545-1547
CPNs model of fast message passing based on request response mode
XU Xiao-hui;WANG Zheng
..............page:1538-1542,1562
Research and implement of Jabber instant messaging system based on Agent
ZHOU Jun;XU Lin;LI Zheng
..............page:1534-1537
Intergrating routing and resource reservation mechanisms in real-time multicast protocol
XU Xian-bin;ZHANG Chi;YUAN Xing-chuan
..............page:1531-1533
Anti-attacking technology for ASP websites
XU Xiao;DU Yi-hong
..............page:1529-1530
Access control model for web services based on SAML and XACML
JIANG Wei-chao;XIA Yang;HUANG Xiao
..............page:1525-1528
Dynamic load balancing in time warp-based parallel logic simulation
CHEN Jin-jun;WU Yue;YANG Hong-bin
..............page:1463-1465
Online learning-based auto-revise algorithm on combination investment
PENG Jia-hong;PENG Jia-wen;HE Zhi-yong
..............page:1460-1462
Design and implementation of object oriented software metric tools
HOU Hui-fang;PENG Cheng-han
..............page:1447-1449
Study and design of intrusion defense-in-depth system
LIU Lin-qiang;SONG Ru-shun;XU Feng
..............page:1522-1524
Model of evaluating severity of network attack on concrete computer
WANG Lei;YU Hong-kui;XIE Hui
..............page:1519-1521
Penetration testing model based on attack graph
Zhang Jiye;XIE Xiao-quan
..............page:1516-1518,1533
Algorithm for arranging seat number of examination
ZOU Run-qi;LU Li-ping
..............page:1514-1515
X- 10 Home Net
MA Rong-fei
..............page:1511-1513
Survey of volume rendering algorithm for 3D finite element data sets
CUI Han-guo;WU Fan;CHEN Jun
..............page:1508-1510
Research of monitoring and management of GIS about cable safety
Xiang Ying;DAI Zhi-chao
..............page:1506-1507,1510
Research of intelligent DSS of city defending and salvaging for disaster
GU Yan;Feng Hua
..............page:1503-1505,1513
Analysis of TCP/IP abnormal status transform and its security risk
ZHANG Da-xing
..............page:1441-1443
Analysis and research on J2EE security mechanism
WEI Chu-yuan;LI Tao-shen;ZHANG Zeng-fang
..............page:1434-1437
Application of encryption and digital signature based on online bidding
XU Li-xin;WU Xiang-lin;ZHANG Xin-cheng
..............page:1431-1433
Research on natural language watermarking based on semantics
YANG Chao;LI Ren-fa;JIANG Bin;LEI Yan-feng
..............page:1428-1430,1443
Application of data extraction and semantic analysis in Web mining
YUAN Zhan-ting;ZHANG Qiu-yu;LI Wei
..............page:1425-1427,1437
Intelligent extraction and Chinese word segmentation of Web corpus
CHEN Zhan-rong;ZENG Yi-ping
..............page:1422-1424
Design for iris-based network identity certification system
ZHAO Jie;XU Qiao-zhi
..............page:1419-1421,1424
Design and realization of grating auto testing instrument
LI Tian-wen;GAO You-xing
..............page:1416-1418
Implementation of priority inheritance protocol in Linux
LI Hai-yan;ZHAO Zhi-guo
..............page:1411-1415
Design of spam-based worm defense system
ZHANG Li-juan;WANG Hai-jun;WU Hao
..............page:1408-1410
Design and key technique research on internet-oriented pipeline information system
CHEN Han;WU Qun-yong;WANG Qin-min
..............page:1406-1407,1462
Analysis on capability of 802.1 1b WLAN in resisting radiated interference
CHEN Yi-tian;YU Ai-min
..............page:1444-1446,1485
Routing algorithm for priority-based dynamic operation in WDM network
Xu Bao;GAO Sui-xiang;RAN Min
..............page:1404-1405,1415
Research on key technology for differentiated services performance measurement
YANG Mian;QIN Qian-qing
..............page:1401-1403