Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2007 Issue 10
Probes into truly select refinement of progressive mesh
YANG Jin-song;SU Hong-gen
..............page:2376-2378
Designing and application of multimedia stream system based on DirectShow
LI Yan-hui;LI Jun
..............page:2379-2380,2383
Least-squares model-based modified halftoning
WANG Xiao-hua;RIU Lina
..............page:2381-2383
Effective combinatorial preprocessing algorithm for fingerprint recognition
HU Zhi-hui;LI Xiao-yun
..............page:2384-2388
Design and implementation of embedded board support environment
YANG Fu-min;FEI Zhi-tao;TU Gang
..............page:2389-2391,2434
Kernel-debug technology of embedded Linux based on arm
HU Guan-rong;HU Yuan-hui
..............page:2392-2394,2431
Approach research of embedded system design based on UML and platforms
XIONG Lei;JIANG Ju-ping
..............page:2395-2397,2400
Application of 2DPCA in face recognition based on GA
SUN Rui-xia;WANG Ya-ming;HUANG Wen-qing
..............page:2398-2400
Utterance level feature based conversational environment speaker segment algorithm
WANG Bo;XU Yi-qiong;LI Bi-cheng
..............page:2401-2402,2416
Web user access patterns clustering based on interest degree
L(U) Jia
..............page:2403-2404,2407
Dynamic TDMA media access control protocol for Ad Hoc networks
DOU Wei-jiang;ZHANG Wei;JIA Zhong-ning
..............page:2341-2343,2347
Improvement of energy efficiency in S-MAC protocol for wireless sensor networks
LIU Jing-wei;HAO Fu-zhen;YAN Chu-ping
..............page:2344-2347
Research of question analysis based on hierarchical network of concepts theory
HAN Jie;YANG Yang;TENG Zhi-yang
..............page:2348-2351
Research of regional layered P2P system model based on web service
HU Ji-cheng;MENG Fan-rong;ZHANG Ling
..............page:2352-2354
Analysis and improvement of mobile IPv6 route technique
LIU Jin-sheng;LIU Qiu-ju;LIU Jing-hui
..............page:2355-2357
Research on data preprocessing technology in web log mining
MA Rui-ming;LI Xiang-yun
..............page:2358-2360
Design of 9/7 biorthogonal wavelet filter banks with high performance
LI Shan-shan;KANG Zhi-wei;HE Yi-gang
..............page:2361-2363
Algorithms of image edge detection based on degree connection situation
MENG Xian-hai;LIU Yian;LIU Jing
..............page:2364-2366,2370
Combined distance and correlation measurement for content-based image retrieval
WANG Jian-feng;XIAO Guo-qiang;JIANG Jian-min
..............page:2367-2370
Content-based multimedia retrieval technology
WANG Wei-hua;WANG Wei-qing
..............page:2373-2375
Packet sniffing in switched ethernet by WinPcap and ARP spoofing
SUN Hai-feng;SONG Li-li
..............page:2326-2328
Design of security protocol for hierarchical wireless sensor network
ZHOU Dong-qing;LI Yan;SU Qing-fu
..............page:2329-2331,2334
Design and implementation of online examination management system based on. NET
WANG Yu-qin;ZHU Wei-dong;CHEN Chu-xiang;WANG Xiao-ming
..............page:2475-2477
Implementation research of application software automation development
YOU Feng;WANG Xu-zhong;LI Zheng;ZHAO Heng-yong
..............page:2478-2480,2483
Application research of Excel smart client based on web services
JIANG Shan-lin;YU Feng;SUO Hong-guang
..............page:2481-2483
DSP-based fax data demodulation in non real-time situation
XIE Jun-cheng;ZHOU Da-shui
..............page:2484-2486
Application of UML in modeling carrying process schedule subsystem of material handling
YIN Qi;GAO Yong;LI Cun-hua
..............page:2491-2493,2497
Dynamic web service composite model based on QOS
WANG Ping;HOU Hong;SHAN Yun
..............page:2494-2497
Design and Implementation of vehicle monitor system based on GPS and GPRS
ZHAO Jin-dong;MA Ling-xian
..............page:2498-2500
Construction of digitized teaching resources system based on third layers model
GUO Xiang-yong;WU Guang-bin;LI Yong
..............page:2501-2505
Communication mode based on high speed interface between two computers
ZHAO Yun;TAN Hong-li;YUAN Wang-jiu;LI Xing-wei
..............page:2338-2340
Implementation of data integration based on MS BizTalk
WANG Zhen-yu;LUO Xiao-jing
..............page:2435-2438,2442
Method for curve reconstruction based on radial basis function network
YANG Yin-dong;ZHOU Yong-quan;LI Tao-shen;HOU Zhan-wei
..............page:2405-2407
Strategy of designing crossover operator for TSP
ZHONG Wen-liang;ZHAN Zhi-hui;GUO Rui-peng;HU Xiao-min;ZHANG Jun
..............page:2408-2411
Gene expression profiling in rat tissues of different status of insulin sensitivity
DENG Jian-gang;PAN Li-min;LUO Sen-lin;ZHANG Tie-mei;HAN Yi-wen
..............page:2412-2416
Grinds based on NTP city urban traffic signal control system time synchronization technology
QIAN Yong-sheng;WANG Chun-lei;WANG Hai-long
..............page:2417-2418,2421
Parameter estimation of fermentation process model based on QPSO
DU Run-long;XU Wen-bo;SUN Jun
..............page:2419-2421
Optimization assigning project designing for supplying oil in air
WANG Gong-ming;WANG Xiu-qin;WU Hua-rui;ZHAO Chun-jiang
..............page:2422-2425
Warehouse logistics control and management system based on electronic tag
LIAN Xiao-qin;WENG Yi-fang
..............page:2426-2428,封3
Comparison and latest development of message-passing mechanisms
SHANG Ya-ling;YUAN Dao-hua;DING Ying;ZENG Xiang-hong
..............page:2265-2269
Optimization of ETL execution by state space search
WU Yuan-hong;XU Hong-bing
..............page:2262-2264,2269
Designing method of software for real-time distributed systems based on hybrid Agent model
HU Xiao-hui;DANG Jian-wu;ZHOU Xing-she
..............page:2254-2258
Parallel evolutionary algorithm to TSP based on improved inver-over operator
XIE Da-tong;LI Cheng-jun;KANG Li-shan
..............page:2248-2249,2279
Modified particle swarm optimization based on random factor
CAO Hong-zhen;HU Liang;GONG Wei-wei;GUO Li-li;CHEN Su;ZHENG Yuan
..............page:2245-2247
Design and implementation of approval component in ERP system
WANG Yu-ping;WEI Yong-feng;LI Zhao-yuan
..............page:2429-2431
Design and implementation of alarming system under the credit management
REN Hong-can;LI Shi-chen
..............page:2432-2434
Research and implementation of OSD based on TW2824
FAN Qing-hui;YANG Fu-min
..............page:2469-2471,2474
Based on RS-422/485 UART interface design and application
NIU Si-xian;XIANG Zheng
..............page:2472-2474
Application of autodesk inventor in product development of oil pumping units
YU Gang;QIN De-fu;MENG Ping-de
..............page:2458-2459,2463
Research on domain ontology-based concept semantic similarity computation
HUANG Guo;ZHOU Zhu-rong
..............page:2460-2463
Study of hub- driver in linux USB system
HUANG Zhen-ping
..............page:2464-2465,2468
Design and implementation of LANs-monitoring system based on ICE
DING Dong-jing;ZHOU Ming-tian
..............page:2466-2468
Multi-layered role-based access control secure workflow model
LIN Ying-ying;CAO Qi-ying;ZHOU Jing-jing;WANG Chun-jie
..............page:2306-2308
Research on main techniques based on ACR
WANG Ting;LIU Qin-rang;WU Jun-ting
..............page:2309-2311,2315
Study of communication protocol conformance test sequence generation algorithm
WEI Yang-su;MENG Zhao-hang;SHU Ting
..............page:2312-2315
Design and realization of fire monitor system based on wireless sensor network
WANG Chun-lei;HUANG Yu;CHAI Qiao-lin;LIU Xin
..............page:2320-2322
Research and implementation of algorithms of poll and election in asynchronous network
CHEN Zhong-min;XUAN Song-sheng
..............page:2323-2325,2328
Research and design of virtual community platform based on web service
CHEN Si;XIA Yang
..............page:2446-2449
Development of optimization system for heat exchanger networks based on Microsoft Visio
WANG Chen-guang;GONG Wei-hua;YU Huan-jun
..............page:2450-2452
Bin covering problem with rejection in information management of Internet and web
YANG Ding-qiang;WANG Chen
..............page:2453-2454,2457
Description and implementation of strategies of incremental backup in file system
XIAO Ke-hui;NI De-ming
..............page:2455-2457
Computer monitor and forensics system based on Trojan
SHI Wei-qi;ZHANG Bo-yun;LIU Yun
..............page:2300-2302,2305
Application of support vector machine in intrusion detection
RAO Xian;LI Bin;YANG Shao-quan
..............page:2297-2299
Probability algorithm for calculate definite integral
HU Neng-fa;DENG Yong-fa
..............page:2294-2296
Automatic generation and test of Java store procedure
HU Hong-yin;YAO Feng;HE Cheng-wan
..............page:2291-2293,2296
Security analysis of authenticated encryption based on Oracle model
XUE Bin;PAN Lei;LI Feng
..............page:2303-2305
Research and design of XML-based web text mining model
SHEN Li-jun;MENG Fan-tong
..............page:2287-2290
Web application performance testing flow
YANG Zhi;GUAN Xin;MA Li
..............page:2284-2286,2290
Procedure identification technique for various compiler in decompiler
ZHU Xiao-jun;PANG Jian-min;YANG ke-qiao;CUI Ping-fei
..............page:2280-2283,2337
Improvement of Apriori algorithm based on characteristic of frequent itemset
GAO Hong-bin;PAN Gu;HUANG Yi-ming
..............page:2273-2275,2378
Classifier design based on adaptive distance metric
GUO Ya-qin;WANG Zheng-qun;LE Xiao-rong;WANG Xiang-dong
..............page:2270-2272