Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2001 Issue 3
The Improved Adaptive Minutiae Preserving Median Filter
zhu ju hua ; yang xin ; li jun
..............page:93-95
Analysis and Implementation of a VoiceEmail System
xu jing dong ; zhang jian zhong ; wu gong yi
..............page:96-97,123
Development Method of Real-time Multi-processor Operating System
ren ai hua ; du yue dong
..............page:98-103
Multiblind Signature Scheme and Its Applications
qi ming ; shi guo qing
..............page:91-92
The Mechanism of P-F Model Process Reuse
xu wei hua ; zhou zhi ying ; qian ling
..............page:88-90,120
Vision,Speech and Text for Video Segmentation
zhu ying ying ; zhou dong ru
..............page:85-87
A Good-point Set Genetic Algorithm for TSP
zhao chun ying ; zhang ling
..............page:83-84,117
The Study and Implementation of Enterprise Process Modeling System
wang lei ; zhang li ; zhou bo sheng
..............page:74-75,87
Web-based Distributed Information System Architecture Model
song jia xing ; zhou yue zhi ; liu wei dong
..............page:71-73
Using AO Algorithm to Solve a Difficult Intelligent Puzzle
zhu fu xi ; yu liang ; huang gan ping
..............page:69-70,87
Genetic Algorithms Based Approach for Quardratic 0-1 Distribution Problem
liu kun ; yan gang feng
..............page:65-66,73
The Architecture Recovery Research of the Linux Kernel
zhou jian guo ; wang lei ; jin mao zhong ; zhou bo sheng
..............page:42-44
Analysis of Internet Key Exchange Protocols
zhang yong ; ao qing yun ; bai ying cai ; wang ya di
..............page:1-3
Testing the Consistency of Component Transaction
zhao hui qun ; sun jing ; wang guo ren ; gao yuan
..............page:4-6,15
Research on OIM XML Encoding
dai chao fan ; liu qing bao ; deng su ; gao shi guang
..............page:7-9
Prosodic Phrase Analysis based on Probability and Statistics
zuo wei jun ; lin fu zong ; li jian min ; zhang zuo
..............page:10-11,34
Fuzzy Retrieval Model for HTML Documents
ding yong sheng ; zhou bin ; yang wen chun
..............page:12-15
Application of Framework in Designing Securities Trading System
zhang xiao jing ; chen jun ; wang zhi bao ; wang xiu feng
..............page:16-19
Design of A Imperfect Testing Based Algorithm of Distributed Computer Systems Diagnosis
zuo de cheng ; yang xiao zong ; gao wei
..............page:20-22
Deadline Optimizing Approach for Scheduling Aperiodic Tasks in Hard Real-Time Environment
peng liang zhi ; dai jin hai ; gui xian zhou
..............page:23-24,29
Research on Integration Models of Heterogeneous Distributed Object Systems
dui ji ying ; shen zhuo zuo ; gu guan qun
..............page:25-29
The Parallel Application Template Based on Extrinsic Supported in p-HPF
hu chang jun ; lu ai sheng ; jiang wei ; xu zhuo qun
..............page:30-34
A Probe on Criteria for Internet Business to Consumer Electronic Commerce
guo rui ying ; zhang shu jie ; zhou su jing ; lu shou qun
..............page:35-37,41
Analysis and Comments of Novel Feathers of CORBA 3.0
li tian ning ; wei ming liang ; xie li
..............page:38-41
Migrating from RMI to EJB
zhou ming hui ; wu quan yuan
..............page:104-105
The Research and Design of the Graphics Collaborative Plotting System
guo min ; fang jia zuo
..............page:106-108
A Mailbox File System Based On E-mail
li li chun ; wang zuo
..............page:109-111,115
Design and Implementation of Language Learning System
jiang ning ; chi zhong xian ; fu jian guo ; xiu zhi hong
..............page:116-117
A Study on the Multi-agent Cooperative Design of Parts in Assembly
zhang ben sheng ; cao yan jie ; yu yong li
..............page:118-120
A Method for Developing the Specific FEM Code with Friendly User Interfaces
xian fei jun ; yang he ; liu yu li
..............page:121-123
Development and Application of Computer-Aided Classical Control System Design and Analysis Software Using MATLAB
sun zhi juan ; xu du ; jiang yong ping ; zhong shun cong
..............page:124-126,127
Using the SIMAN Source Code to Implement Win32 Simulation Application
liu fu xian ; xing qing hua
..............page:127-129
Principle of System Vulnerability and the Analyse of Attack
wang yu chen
..............page:62-64,92
Uncertain Reasoning for Feature Recognition
han shui hua ; lu zheng ding ; chen chuan bo
..............page:60-61
Study of Enterprise Model Simulation Technology Based on WEB
zhou qiu zhen ; zhang hao
..............page:57-59
Several Problem in Enterprise Information Resource Integration Management
shi shuang yuan ; zhang jin long ; cai shu qin
..............page:54-56
Analysis,Comparison and Implementation of Directory Service Protocols
xu zhi da ; bai peng ; nan xiang hao
..............page:51-53,56
Collective I/O Technique in NOW
li ji ; liu hai tao ; chen gui hai ; xie li
..............page:48-50
Extension and Implementation of Spatio-temporal Model Based on Event
zheng kou gen ; yu qing zuo ; pan yun he
..............page:45-47,61