Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2008 Issue 1
Research of resource query based on rumor-spreading in P2P-Grid
WANG Rui-feng;LIU Fang-ai
..............page:56-58,108
Message-oriented middleware design and implement for large-scale data integration
LI Jian-feng;XU Shu-ren;MA Jian-gang
..............page:51-55
Approach to improve robust performance of Mel frequency coefficient cepstral
HAN Chun-guang;LI Hua
..............page:160-162,180
Research on query semantic expansion based on mutual information
XIA Lei;ZHOU Zhu-rong
..............page:163-166
Study on MVC design pattern in ASP.NET
LIN Qing;ZHU Cui-miao;ZHENG Guang-cheng;JIA Hong-yan;WU Min
..............page:167-169
Modeling and implementation of power production MIS based on.NET platform
CAO Guo-min;CHEN Gen-cai;SHI Wen-xing
..............page:170-172,233
Application of E-Commerce personality searching based on RSS
LIU Jing;YANG Wan-cheng
..............page:173-174
Design and realization of management system in DIS
JIANG Zi-cheng;TANG Guo-jin;WANG Yue-feng
..............page:175-177
Research of dispersed waveform and adventure in logic simulation
LIU Yan;BAI Yan;LI Jing
..............page:178-180
Study of user profile technology based on hierarchy
ZHANG Yan;ZHANG Yong-kui;AN Zeng-bo;WANG Peng
..............page:181-183
White cell's auto recognition based on SVM
WU Jian-bin;LI Jia-zhi;LI Tai-quan
..............page:184-186
Analysis of real-time voice service based on 802.11
CHEN Lu
..............page:62-64,222
Research on resource discovery mechanisms in grid
HUANG Chen;LIU Fang-ai
..............page:65-67
Active queue management based on PID control with grey prediction
XIA Dong-xue;YANG Shu-hong;YANG Bin
..............page:68-71
Algorithm of reliability measures of complex networks based on sampling
DENG Xue-lian;WANG Li-hu
..............page:72-75
Method of symmetric NAT traversal of UDP through NATs based on guess-pseudorandom
SHI Shuo;LIN Li;LI Jiu-zhong;ZHANG Pu-sheng
..............page:76-79
Enhanced RED algorithm with adaptive parameters
YAO Liang;LU Hui-bin
..............page:86-88
Distributed subscribe/notification framework with supporting of mobile clients
LU Hai-lian;LI Bo;ZHANG Ke-wei
..............page:89-91
Research of MRME algorithm of video compress coding method based on wavelet representation
LU Xi-ning;WANG Zheng-zhou;KANG Mu-ning
..............page:95-98
Research of textile detecting method based on machine vision
ZHAO Da-xing;ZHU Jin-lei;LI Jiu-ling;YAN Yun-hui
..............page:99-101
Study of intersections for subdivision surface with convex hull
ZHENG Li-yin;ZHANG Li
..............page:102-104,242
Fundamental frequency contour prediction based on prosodic rules
CAI Run-shen;ZHU Yao-ting
..............page:105-108
Key frame extraction based on video segmentation
YE Jun;ZHOU Hui;LI Jian-liang
..............page:109-111,209
Fast fractal image encoding based on mean deviation
YI Chuan-jun;XU Tao
..............page:112-114
Design of hard real-time micro-kernel in embedded operating system
GUO Yang;WANG Xin-she
..............page:115-118
Design and implementation of recovery subsystem of E-RTDB
LI Kun;LI Chun-hui;WANG Yong-yan;WANG Hong-an
..............page:119-122
Research of constructing evaluating architecture of embedded database
LI Qing-cheng;LU Tao;LIU Jia-xin
..............page:123-125,195
Embedded pulsed laser ranging system based on μC/OS-Ⅱ
SUN Yan-jing;ZHANG Zheng
..............page:126-128,166
Control system of aviation digital camera based on P89C668 SCM
DU Yun-fei;LIU Bo;CAO Jian-zhong;ZHANG Bo-heng;Hu Bin-liang;TANG Yao;WANG Hua-wei;LU Mei
..............page:129-130,141
Physical layer modeling for wireless sensor networks based on spread spectrum under Qualnet platforms
HE Hong-lu;HUANG He-qing;YAO Dao-yuan;LIU Hai-tao
..............page:47-50
Design of dynamic authentication based on digital signature
JI Peng;ZHANG Yong
..............page:45-46
Solution of SIP server PAM attestation based on LDAP
CHEN Ye-gang
..............page:42-44
Study of two-way authentication based on B-spline curve
XU Wen-bo;ZHOU Yang-hua;LIN Yi
..............page:39-41
Research of authentication model in grid environment
LIU Su-qin;LI Bai-dan
..............page:37-38,41
Network intrusion detection method based on novel support vector machine
LI Xu-fang;WANG Shi-tong
..............page:34-36
Dual watermarking algorithm of colored images based on wavelet transform
GAO Pi-lian;HOU De-wen;LI Peng
..............page:31-33
Software security testing methods and tools
SHI Yin-sheng;DENG Shi-wei;GU Tian-yang
..............page:27-30
Overview of differential evolution algorithm and its improved algorithms
CHEN Liang;DAI Guang-ming;ZHANG Quan-yuan;XIE Bai-qiao
..............page:131-134,255
Resourch on feature and model of human being evolutionary
HAN Quan-ye;DANG Jian-wu;ZHAO Shu-xu
..............page:135-137
Direct generalized predictive control based on RBF neural network
WANG Bao-wen;ZHAO Yang-li;LIU Wen-yuan
..............page:138-141
Learning Bayesian network structure with missing data
SUN Yan;TANG Yi-yuan
..............page:142-143,250
Dynamic fuzzy clustering based on AR model
LIU Yu-hong;WANG Shi-tong;XU Hong-lin
..............page:144-147,159
Research on architecture of ILS information system based on Agent
HUANG Jian-jun;YANG Jiang-ping;PENG Fei
..............page:148-150
Hierarchical clustering algorithm based on rough set and niche genetic algorithm
LIAO Xi-xun;LUO Ke;ZHAO Min
..............page:151-153
Adaptive pre-processing for fingerprint image
XUE Jun-tao;WANG Shu-cheng;LIU Zheng-guang
..............page:157-159
Design and implementation of road lamp economizing and supervising system based on GPRS/WEBGIS
LIU San-mei;CHENG Tao-bo;Hu Zhan-hu
..............page:187-189
Practical cluster monitoring system
FAN Jun-tao;LI Guo-qing
..............page:190-192,212
Research on 3D terrain visualization based on OpenGL
GUO Tao;PING Xi-jian
..............page:193-195
Design and realization of traveling wave recording device based on PXI bus
TAO Ling;FAN Sheng-tao;LI Xia-qing;CAO Ze-chun
..............page:196-198
Transactional workflow concurrency control based on isolation spheres
HAO Li-bo;LI Jian-hua
..............page:199-202
GASA admixture algorithms applied in airline crew rostering system
CHEN Jun;LIU Wei-guang
..............page:203-205,219
Design of architecture of virtual physics laboratory system based on 3D and VIRTOOLS technologies
HU Shan;YU Guang;ZHOU Ming-xiu;TAN Liang;YANG Chun
..............page:206-209
Analysis and simulation of non-linear circuit based on software of 20-sim
ZHENG Yue-yi;MA Yong-jie;BAI Yu-long;LI Wan-jiang;LIU Chang-sheng
..............page:210-212
Implementation of seat-picking on web based on SVG
ZHANG Hong-bin;LI Guang-li;ZHANG Yue-jin
..............page:216-219
PLC based light railway precise rectifier control system
TAN Xiao-hui;WANG Dong-tao;LOU Guo-huan;WANG Jian-min
..............page:220-222
Disposal method for volume data stream in bridge health monitoring
LIU Xin;LI Yong-gang
..............page:223-224,238
Design and analysis of overlay multicast watermarking protocol based on GSAKMP
LU Zheng-fu;WANG Tao
..............page:225-229,258
New method for improving remote accessibility of spatial data
YU Ming-yuan
..............page:230-233
New method and implementation for spatial data model selection
FENG Tao;LIANG Hong;CHENG Man;LIU Rui
..............page:234-238
Research on web application system development based on MDA
HONG Xia;WANG Guang-ming
..............page:239-242
Table structures comparison of earthquake precursor database based on Oracle
LI Jing-gang;YAO Yun-sheng;LI Sheng-le;ZHENG Shu-ping
..............page:243-245
Research on ontology modeling of learning resources
LI Jing;ZHOU Zhu-rong;GAN Cheng-zhi
..............page:251-255
Memory-optimized of collision detection algorithm based on AABB tree
WANG Xiao-rong;JIN Han-jun;WANG Meng
..............page:256-258
Analysis and modeling of management platform of futures corporation based on UML
DENG An-yuan;WANG Dao-qian;WEN Jun-hao
..............page:259-封3
xin chun ji yu
..............page:封4
Efficient sequential digital multi-signature scheme
LIU Zhen;SHEN Kai;YU Zhao-ping;DONG Tao
..............page:25-26,30
Research on exploiting DNS for DoS attack and defence
ZHANG Xiao-mei;ZHAO Rong-cai;SHAN Zheng;CHEN Jing
..............page:21-24
Computer network defense description language for attack and defense exercise
ZHANG Hong-bing;LI Xiao-jian;WEI Yu-di;XIA Chun-he
..............page:18-20,24
Multi-secret sharing scheme with general access structures based on ECC
YUAN Jin-hui;GUO Yuan-bo;LI An-na;ZHOU Hong-wei
..............page:16-17,75
Coordinate access control model for electronic documents
HUANG Min;JING Ji-wu;GAO Neng
..............page:12-15
Algorithm of digital image watermarking technique combined with HVS
GUO Yu-hui;GAO Shi-wei
..............page:9-11,118
Design of trusted godson bootloader tPMON for embedded system
WU Shao-gang;XU Hua
..............page:5-8
Approach of integrating DRM scheme with trusted mobile computing
TIAN Jie;ZHANG Xin-fang;WANG Tong-yang;YANG Qiu-wei;SONG Yi-lin
..............page:1-4,8