Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2006 Issue 16
Algorithms of indexing of audio data based on content
LIU Wei-hua;CUI Tao
..............page:3003-3006
Research on method of data dimension reduction
WU Xin-ling
..............page:3000-3002
Research and implementation of webserver based on embedded system
LEI Tao;HAO Fu-zhen
..............page:2992-2995,3006
Interface adaptive technology for pervasive computing
RAO Wen-bi;ZHANG Li;YI Jian-kang;GAN Quan
..............page:3007-3009,3014
Research on SET authentication software architecture and RSA algorithm model
YIN Ming-wei;WAN Lin-rui
..............page:3010-3014
Empirical study on stock through GARCH based on PSO algorithm
XU Wen-bo;XI Mao-long;SUN Jun
..............page:3015-3017
Dynamic generation of safety test case based on minimal cut sets
HU Zhi;YIN Ren-kun
..............page:3018-3020
Design and implementation of electronic whiteboard based on B/S
DU Cheng-wei;LI Wei-rong;WU Guo-xin
..............page:3021-3023
Design and implementation of airplane power source ground automatic test system
WANG Yang;ZHANG Jing-zhou;HU Gang-cheng
..............page:3051-3054
Approach to protect data on tax-controlled system with uClinux
ZHANG Jian;WANG Jin
..............page:3055-3057,3061
Mechanism of recovering lost packets in reliable multicast
ZHANG Xin-chang;DU Xue-dong
..............page:3058-3061
Design and implementation of OLAP in CRM system based on ASP. Net
CHEN Jie;CAO Qu-jiang
..............page:3062-3063,3068
Kernel-level Rootkit detection model based on static analysis
YI Yu;JIN Ran
..............page:3064-3068
Design and implementation of client/server model based on agent
ZHENG Wei;PAN Jiang;LU Ju-kang
..............page:3069-3071,3075
Security analyse of elliptic curve cryptosystem
LIU Pei;TENG Ling-ying;SHE Kun;ZHOU Ming-tian
..............page:2943-2945
Embedded networked video acquisition and compressed system based on RTP
SUN Yan-jing;LI Shi-yin;DONG Yang
..............page:2939-2942
Dynamically controllable remote job management system based on JMX
WU Li-guo;WANG Qing;MA Bo
..............page:2935-2938,2942
Format string vulnerability rationale, exploiting, detection and prevention
XU Liang-hua;ZHU Lu-hua;WANG Guo-xin;LIU Fei
..............page:2931-2934
Windows application development based on markup model
LIANG Bo;GE Qing-ping
..............page:2928-2930,2934
Research on fault diagnosis method of substation based on rough set and bayes classifier
SU Hong-sheng;LI Qun-zhan;HAO Wen-bin
..............page:3099-3101
Solution based on route protocol to Ad Hoc network's congestion
OUYANG Zhi-peng;SHEN Fu-ke
..............page:3102-3104
Test-driven development method combined with design pattern
CHENG Ye;GAO Jian-hua
..............page:3105-3107
Virtual reconstruction 3D system of anyang yin ruin's museum
DUAN Xin-yu;LIU Chen-xi
..............page:3108-3110
Design and implementation of control system of computational node in grid for cryptograph computing
XIAO Jian-fang;LIN Dong-dai;JIANG Zhong-hua
..............page:2911-2913,2948
Research on intrusion detection techniques in high-speed networks
ZHAO Yue-ai;PENG Xin-guang
..............page:2985-2987
Aircraft deicing vehicle temperature control based on fuzzy self-tuning PID controller
SUN Yi-gang;HUANG Jing-jing
..............page:2982-2984,2987
Comments on BH algorithm
YANG Sheng-yun;LAI Guo-ming;HUO Hong-wei
..............page:2979-2981
Research of web text information retrieval based on XML and ANN
ZHANG Biao;HE Guo-hui
..............page:2973-2975
Research and implementation of cooperation of IPSec and firewall based on IPv6
LI Li;YUAN Xin-zhi;ZHENG Chao-mei;WU Fang-yu
..............page:2970-2972
Data obtain and automatic orientation of 3D facial model
YUAN Fang-lin;ZHONG Jin-gang
..............page:2966-2969
New differentia operator based on principle of "selecting the superior and eliminating the inferior"
LUO Zhi-qing;DAI Guang-ming;ZHAN Wei;ZHENG Wei
..............page:2964-2965,2991
Design 429 interface card based on PC 104 bus using CPLD
WU Xiao-jie;ZHAI Zheng-jun;GUO Lin-na;LI Lan-lan
..............page:3036-3039,3042
Design and implementing of distributed OA system of fire company based on web
ZHAO Jin-dong;GUO Chang-zhong
..............page:3040-3042
Design of internet communication based on ARM7 kernel chip
GUO Yu-hui;WANG Yan-yu
..............page:3043-3044,3047
Worst case execution time estimation based on distribution function
HU Ming-hua;TANG Ming-duan
..............page:3045-3047
Implementation of reporting tool based on semantic objects
YIN Cheng;XU Li-zhen
..............page:3048-3050,3054
Study and application of fuzzy control technique for roller mill system
LI Qing-liang;ZHANG Xin-cheng;QI Xin-bo;CHEN Xue-guang
..............page:2961-2963
Application of TETRA technology in city railway wireless communication system
WANG Hui-qin;CAO Ming-hua;GAO Feng-ge
..............page:2958-2960,2963
Group signature scheme based on RSA
LI Feng-yin;YU Ji-guo;JU Hong-wei
..............page:2955-2957
System-level low power dissipation analysis in real-time systems
XING Jing-yu;ZHANG Li-chen
..............page:2952-2954
Research on web services publication and discovery mechanism based on P2P
ZHANG Zhi;LI Rui-xuan
..............page:2949-2951
DEXEL based on modeling in aircraft composite part design
GAO Xin-rui;ZHANG Shu-sheng;HOU Zeng-xuan
..............page:2946-2948
Energy optimized strategy based on clustering arithmetic
LI Zhi-wei;GUO Zhong-wen;YU Zhong-da;ZHAO Yang-fan
..............page:3072-3075
Association transformation from UML model to Java model in MDA
XIA Lei;OUYANG Song
..............page:3078-3081
Fast construction of computer vision system based on DVT technology
ZHU Zheng-tao;PENG Xiao-hui;LIU Mao-qi
..............page:3082-3084,3087
Design of intrusion detection system's response unit
ZHANG Long;DOU Wei-ping;LI Chuan-lin
..............page:3085-3087
Design and implementation of embedded SQL system in GKD-base
YAN Qing;YANG Guo-gui;CHEN Hong-sheng;JING Ning
..............page:3088-3091,3095
Design and implementation of embedded and secure memory management
ZHAO Yue-hua;CAI Gui-xian;HUANG Wei-ju
..............page:3092-3095
Research on modeling resources in manufacturing grid
SHI Sheng-you;MO Rong;YANG Hai-cheng;CHEN Ze-feng;CHANG Zhi-yong;ZHANG Chuan-shun
..............page:2925-2927,3027
Study and implementation of data-exchanging center for digital gas field
MA Zhong-gui;YE Bin;WANG Zong-jie;WANG Cheng-yao;TU Xu-yan
..............page:2921-2924
Protection against buffer overflow in embedded system
DU Jiao;JING Ji-wu;LI Guo-hui
..............page:2918-2920,2924
Research of mechanism of load balancing for network computer cluster
ZHANG Pu;WANG Qing;YANG Li-guang
..............page:2914-2917,2981