Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2009 Issue 18
Standard scalability evaluation system of packet classification algorithms
ZHOU Jing-di;CHENG Dong-nian;LIU Qin-rang
..............page:4141-4145,4150
Study on length computation method of Chinese-English sentence alignment
ZHANG Xia;ZAN Hong-ying;ZHANG En-zhan
..............page:4356-4358,封3
DataSet in real-time play of network audio and video data
ZHANG Jing-feng;LI Ying;ZHANG Yun-feng
..............page:4359-4360,封3
Protein-protein interactions network PSE based on web service
ZHAO Zhi-kang;XIE Jiang;LI Song-bei;ZHANG Wu
..............page:4326-4329
Vision based real-time fire detecting method
JIN Hong;ZHANG Rong-biao
..............page:4330-4332
Research of automatic test paper composition based on genetic algorithm in traffic law
LI Hui-min;ZHANG Ren-jin;MA Gui-ying
..............page:4333-4335
Study on new coordination work platform supporting dynamic consultation
SUN Ya-qin;ZHOU Liang-chen;LI An-bo
..............page:4336-4338,4341
Modified Kalman filter of TDOA in ultrasonic flow measurement
LI Fang;LI Ai-hua;WU Chao-jun
..............page:4353-4355
Study on a class of quadratic TC-Bézier curve
CHEN Su-gen;SU Ben-yue;HUANG You-du
..............page:4350-4352,4355
Analysis of handover based on GSM-R wireless railway communications system
CHEN Yong;HU Xiao-hui
..............page:4342-4345
Research on speech recognition system based on forward and backward HMM
YU Xiao-ming;BAI Song
..............page:4339-4341
Kind of network device simulation platform based on click system
ZHANG Wei;WANG Tao;LI Hua
..............page:4167-4171
Design and implementation of hosts quarantine system with cooperation support in LAN
HUANG Ai-rong;XIANG Zheng-tao;CHEN Yu-feng;DONG Ya-bo
..............page:4163-4166,4171
Research of multiple tree video multicast protocol over mobile Ad HOC networks
HU Jie;CHEN Bing
..............page:4161-4162,4198
Construction and application of wireless local area network in hospital
GUO You-yan;HAN Xiang-fei;SUN Yi;CHEN Jie;JIANG Lin;WANG Fu-guo
..............page:4158-4160
Method of square QAM signals recognition
ZHANG Chi;WU Ying
..............page:4155-4157,4187
Stochastic Petri nets applied on design of framework
ZHAO Xin
..............page:4151-4154,4160
Improved learning algorithm of RBF network and its application in similarity
HU Bin;GONG Ning-sheng;HUAN Hong-jiang
..............page:4287-4289
Study on data reduction algorithm based on rough set
HUANG Zhi-guo;WANg Duan
..............page:4284-4286,4289
Feature extraction and recognition based on fuzzy ICA
YAO Yu-wei;HE Xi-qin;LIU Xiang-dong
..............page:4281-4283
Tracking control of mobile robot based On dynamic parameter
CAO You-hui;WANG Liang-Xi
..............page:4278-4280,4283
Popularization of variable precision and degree rough sets
SHEN Jin-biao
..............page:4275-4277
Realization of medicine warehouse management based on Spring framework and ExtJS
REN Wei;LIN Xiao-dong
..............page:4312-4314,4318
Security issues in watermarking based databases ownership protection
MA Hui-juan;CHEN Yue;ZHEN Hong-hu
..............page:4309-4311
Design of framework for file system visual simulator
HE Biao;ZHUANG Yan-jun
..............page:4306-4308
Research on dynamic composition of web services
WANG Fei;ZHANG Lai-shun;LIAO Kai
..............page:4303-4305,4308
Research on P2P routing model based on semantic query
MAI Jin;DONG Jian-quan
..............page:4146-4150
Application of five-view approach in embedded systems architectural design
LI Shao-chi;WEN Yu
..............page:4172-4176
Method for image segmentation based on evolving clustering
TIAN Sheng-li;DU Gen-yuan
..............page:4299-4302
Design and implementation of database in remote supervise and control system for aircraft experiment
PEI Jin-li;CHEN Xiu-hua;FAN Hai-tao;WANG Hai
..............page:4315-4318
ying wen zhai yao shu xie yao qiu
..............page:4322
Product conceptual design schemes evaluation based on RBF neural network
CHEN Wei-wei;ZHANG Qiang;WEI Xiao-peng;ZHAO Ting-ting;ZHAO Xiu-yan
..............page:4290-4292,4302
Incremental attributes reductions based on discernibility matrix
LIU Gao-feng;MOU Lian-ming
..............page:4293-4295,4298
Solution of standard interface in digital ship building domain based on XML
CHENG Yi-xin;LIANG Long;WU Jian-bo;LENG Wen-hao
..............page:4323-4325,4329
Service delay performance analysis of MS/TP network in ceramic process monitoring
ZHOU Ning;ZHOU Zu-de;ZHU Fan
..............page:4319-4322
Design of activated sludge sewage fuzzy control system
WANG Li-juan;ZHANG Jian-feng;WANG Bin
..............page:4263-4265
Study on KNN arithmetic based on cluster
PAN Li-fang;YANG Bing-ru
..............page:4260-4262
Research on security dynamic contract net model
LIU Ling-min;CHEN Li;DUN Yu-qing;LIU Jing;DONG Gang-gang
..............page:4257-4259
Design of coaxial symmetrical spherical optical system simulation model
CHEN Lin;ZHU Xiang-zhu
..............page:4254-4256,4349
Study on comfortableness of immersing virtual reality system
ZHAO Wei;XIE Xiao-fang
..............page:4251-4253
Multi-sensor state estimation fusion with correlated measurement noise
DENG Kui-biao;QIN Chao-yin;ZHANG Zai-li
..............page:4248-4250
Dynamic simulation on down landing gear undercarriage system of aircraft
SHENG Xuan-yu;WANG Lian-kui
..............page:4245-4247,4250
Applying of XML security technology in electronic document exchange system
FAN Jie;SHANG Zeng-guang
..............page:4214-4216,4238
Priority queue-based SIP DoS flooding attack defense model
FAN Zi-fu;WAN Xiao-yu
..............page:4217-4219,4223
Security improvement of TTS group key agreement protocol
MAO Jiang-dong;ZHANG Lai-shun;GUO Yuan-bo;ZHANG Ting;WANG Lei
..............page:4199-4200,4210
Intrusion detection technology based on parsing tree
JIA Cun-hu;QIU De-cheng;LI Da-wei;XU De-qi
..............page:4220-4223
Design of temperature alarm system based on OSGi service gateway
JIANG Hua;MIAO Ke-jian
..............page:4177-4179
Dual power aware scheduling algorithm using dynamic power management and dynamic voltage scaling
LI Yong-ting;CHU De-xin;FAN Ming
..............page:4180-4183
Design of real-time video server based on AVS M and PXA-255
WANg Meng-meng;DUAN Xi-qiang
..............page:4184-4187
Design and research on embedded web server
DING Cang-feng;XUE Ning-jing;L(U) Mao-lin
..............page:4188-4191,4194
Clustering web pages based on their links and tags
LI Yuan-jun;CHEN Jun-jie;ZHAO Juan-juan
..............page:4266-4268,4271
Characteristics mining of application layer based on association rule
SUN Hai-xia;ZHOU Jian;CHENG Ke-qing
..............page:4224-4226,4230
Disclosure model based on input-triggering vulnerability
ZHENG Liang
..............page:4227-4230
Research and implementation of CA security authentication system\'s security
TANG Jian-zhong;GU Hua-jiang;SHEN Jin
..............page:4231-4234
Fast intra-prediction algorithm of AVS based on self-adapting threshold
PENG Chen;GEN Jian-feng;DING Yan;SONG Xue-hua;ZHOU Jun
..............page:4235-4238
Fast two-dimensional Renyi\'s entropy threshold method
PENG Qiu;YU Cheng-bo;CUI Yan-zhe
..............page:4239-4241
Calculation of volume for diamond grains based On image processing
LI Yin-hua;LU Xin-hui;JIN He-min
..............page:4242-4244,4345
Intercept and cleanup message hooks in Windows operating system
GUO Jin-zhi;LONG Hai;HUANG Hao
..............page:4201-4203,4206
Improved differential fault and brute force combining attack on SMS4
LIU Wen-hua;DU Xian-chao;GENG Qiao-ke
..............page:4204-4206
Methods for formal verification of large and complicated protocols
ZHAO Juan;HAN Ji-hong;WANG Ya-di;HUANG Qing
..............page:4207-4210