Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2010 Issue 13
Design and implementation of data visualization system based on third-party control
hong lu he ; cai jian li ; wu shun xiang
..............page:3096-3099
Research on utilizing cloud model to optimize LSF scheduling algorithm
chen xu hui ; yu guo long
..............page:3014-3016,3042
Blind separation of speech signal based on fast ICA algorithm
liang shu fen ; jiang tai hui
..............page:3047-3050
Inertial aided algorithm for carrier phase ambiguity resolution
zhang xiao an ; he xiao feng ; wang li bin ; tang kang hua ; zuo liang qing
..............page:3081-3083,3087
Rough set rule extraction algorithm of dynamic clustering method
song yun xue ; yu hong chao ; shi yong sheng
..............page:3054-3056
Component management model for mobile P2P applications environments
tian xiang hong ; lu yi ping
..............page:2996-2998,3069
Design and implementation of embedded high definition player
zhang hai bin ; li hui ; wu zuo ; xie heng jun ; huang xiao dong
..............page:3084-3087
Genetic algorithm strategy selection for function optimization
hong zuo ; cui du wu
..............page:3043-3046
Design and implementation of bridge structure health monitoring data analysis platform
zhang jia ; yu zhong zhong ; chen peng
..............page:3111-3114,3135
Continuous binary optimization framework based on hybrid model
guo rui ; zhou bo sheng
..............page:3007-3009
Research of program instrumentation in basic path coverage testing
shi dong mei
..............page:3025-3028
Multi-process data processing system based on message queue
yang chao ; xu ru zhi ; yang feng
..............page:3128-3131
Multiple fundamental frequency estimation based on timbre model
shi li xin ; zhang jun xing
..............page:3066-3069
Semi-fragile image watermarking based on DWT domain and fuzzy clustering theory
tang xiao fen ; lv ke
..............page:3100-3102,3107
Multi-dimensional anomaly detection system based on network processor
li yun ; ge ren hua ; li jing hua
..............page:2951-2954,2958
Improvement of SIP header parsing via static search table
jiang xiu yu ; yang feng ; cui zai hui
..............page:2988-2991,2995
Research of heuristic fuzzing data generation method in program frangibility
zhao gang ; zhao jin jing ; chen hua ; zheng wei min
..............page:3010-3013,3050
Dynamic malware analysis system to secure smart phones
yang jian qiang ; wu zuo ; li xue feng
..............page:2969-2971,3065
Intrusion detection based on program\'s legal function area
zhang zhi fan ; wang yi gang
..............page:2966-2968,2975
Design and implementation of light-weight platform emulation experiment system
xiang chao yang ; tang run hua
..............page:3077-3080
Perspective image rectification technology based on stratification and Radon transformation
yu ming ; ma qing li ; zhu jiang ; li jia zuo ; yan gang
..............page:3108-3110,3131
Research on user\'s trust model based on machine learning
gao xiao fang ; zhu zhen min ; liu jin gang ; wu xiu lan
..............page:2947-2950
Research on intelligent decision support system model based on multi-Agent
yu li na ; xiong zuo fang
..............page:3057-3061
Research and development of information security risk assessment system based on XML
kuang jie yan ; dang de peng ; li shu ren ; wu jian jun
..............page:2943-2946,2965
VOD proxy service scheduling algorithm based on fuzzy clustering
yang zhen lun ; jiang ya jun ; zuo hua qing
..............page:2984-2987
Research and realization of mobile value-added service based on parlay/OSA
liu lei an ; wang hong jiang
..............page:2980-2983,3046
Research of scene simulation developing method with MAK stealth
zhao jin ping ; yang ren nong ; wang zhong ; pang jing
..............page:3074-3076,封3
Low-dose CR image enhancement algorithm
tong ying
..............page:3132-3135
Multilevel security model
yu ; zhu zuo ; shen chang xiang
..............page:2939-2942,2950
Research and design of trusted running environment based on windows
fan yao xue ; yu zong
..............page:2955-2958
Research of digital book and English course interactive learning RIA platform
cheng guo xiong ; hu shi qing
..............page:3103-3107
Research on visual navigation for agricultural mobile robot
zhao ying ; sun qun ; zhang min
..............page:3032-3035
Research and implementation of IPSec VPN gateway based on multi-core systems
bai jun feng ; deng zu pu
..............page:2992-2995
Fortran Win32 DLL invoking VB form by callback
bi su ping ; zhou zhen hong ; zhang cheng cai
..............page:3092-3095
Adaptive particle swarm optimization algorithm with dynamically changing inertia weight
deng ai ping ; wang hui fang
..............page:3062-3065
Syntax of unification meta-model for procedure blueprint
liu jian bin
..............page:3017-3021
Optimization of Q.922 protocol in wireless base-station communication system
fu hai ; yao xiao dong
..............page:2972-2975
Research on public health emergencies warning system based on data warehouse
qin yong ping ; wang li ping ; sun qing ; li zhe
..............page:3119-3122
System design of auto-sales management information based on barcode
fan yue zhen ; jiang fa chao
..............page:3115-3118
Summary of software reliability technology in digitalization improvement of antiaircraft gun
tian zhi gang ; wang zhong xu ; yang shao yu ; jia hai peng
..............page:3022-3024,3028
Design of large-scale network system data synchronization
chang cheng ; yao wen ming ; zhang su wei ; he yong
..............page:2976-2979
Design and realization of telecom value-added service platform SP management subsystem
zhang ke ; li yang ; liu yang ; cui zheng guang
..............page:3136-3138,封3
Research and design of parallel programming model on multi-core
cao zhe bo ; li qing
..............page:2999-3002,3056
Implementaion of RSA algorithm
zhang shu fen ; hao fu zhen
..............page:2962-2965
Research on re-redirection of overlapped address spaces
wu zhen hai ; liu fu yan ; li xue min ; yi song
..............page:3003-3006
Research of data synchronization of personal space of information management system
huang lan hui ; zhou bin
..............page:3123-3127
Private information retrieval program in cooperation
li hong jia ; liu guo hua ; li jin cai ; qi feng
..............page:2959-2961,3127
Research and design of WAP browser based on Windows CE system
yang xin hua ; chen shu yu ; fan cheng ze
..............page:3088-3091
Simulating model of crowd evacuation based on force
jiang gui mei ; ji qing ge
..............page:3070-3073,3080