Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2002 Issue 13
Extracting the Contour of Sectional B-ultrasonic Images
zhang hui ; song guang de
..............page:73-74
Implementation of Protocol Stack in User-space
zeng bin ; huang dao ying ; huang zhi jun ; wu min
..............page:166-168
A Secure Model of Intranet Based on Kerberos
qi wen jing ; yao qing
..............page:169-172
Security Research of Network Test System Based on Web Mode
zhu gui liang ; song qing tao ; xu qiang
..............page:173-175
The Research and Realization of a Restricted Natural Language Communication Method
tan chang geng ; hu zhi gang ; wang zuo
..............page:176-179
Attack against Network-based IDS and Solutions
sun hai bin ; xu liang xian ; yang huai yin
..............page:180-182
An Improved Genetic Algorithm Coded with Real Number
han rui feng ; zhang yong kui
..............page:78-80
Metrics Model of Component Reuse Degree Based on Component-Base Management System
xue yun zuo ; wang yuan feng ; yu zhi qiang ; qian le qiu
..............page:81-84
The Analysis and Comments of Real-Time CORBA
yang peng ; du qing wei ; gu guan qun
..............page:88-90
Study on Estimate Technology of the Expert System
xing qing hua ; lei ying jie
..............page:108-110
The Research and Implementation of DECCW——a CORBA-based CSCW System
xue tao ; feng bo qin ; luo jian jun
..............page:111-112,172
Research and Analysis of Rijndael Block Cipher
chen qin ; zhou li
..............page:113-115
New Efficient Approach to Digital Image Watermarking
jiang gang yi ; yu mei ; chen xiao ming ; yu bo kang
..............page:116-118,165
The Extraction of Face Contour Line in Color Images
shi zuo zuo ; lu ju kang ; shi wen zuo
..............page:122-123,197
One Design of Optimizing PIM-SM Multicast Arithmetic
li he wu ; li feng hua ; li zhong hui ; wu jian ping
..............page:143-146,149
Study of Realizing Network Communication Security Based on PKI
song ling ; lv li jian ; jiang hua
..............page:147-149
LWIS——A Location-dependent Wireless Information Service Model
dong wen yu ; cui sheng bin ; gao xin ; dong xiao hong
..............page:153-155
The Technology of IP-based Storage Network
wei zuo wei ; xiong jian ping ; jia hui bo ; he ning
..............page:156-158,248
Simulation of Communication Systems Based on SystemView
chen shao ping ; zhu cui tao ; chen ya guang
..............page:159-161
The Methods of Public Key Certificates Revocation
wang xiao feng ; wang shang ping ; wang yu min ; he cheng
..............page:162-165
An Optimization Problem in Data Cube System Design
liang yi long ; xia shao zuo
..............page:69-72
Wavelet Transform and Fuzzy Median Filter for Image Edge Detection
nie han jun ; shen yong zeng
..............page:91-92,182
On Satisfiability of Timing Constraint of a Kind of Timed Automata
liao wei zhi ; gu tian long ; cai guo yong ; dong rong sheng
..............page:93-96
The Modeling and Display of Plants Based on the Bezier Curve
liu xiao dong ; jiang li hua ; zhao jun jun ; liu hai yan
..............page:97-98
Two Image Partitioning Strategies for Error Concealment Algorithm Based on DCT
zhou jing li ; zheng jun hao ; yu sheng sheng ; gu jian
..............page:99-102,107
Bi-level Image Compression Standard——JBIG2
bian wen kui ; he zuo lian ; xu meng su
..............page:103-104,223
The Research and Design of Intelligent E-Learning
yang wei ; yuan rong
..............page:234-235,238
Several Typical Perceptual Video Quality Assessment Models
li yan li ; jin dong zuo ; jiao bing li
..............page:66-68
Studies on Text Segment Algorithms' Influence on Chinese-based Information Filtering
zhu zuo ; ruan tong ; yu qing xi
..............page:62-65
An Integrative Framework for Decision Support System Based on Data Mining and Its Approach to Modeling
hui xiao bin ; zhang feng ming ; tong zhong xiang ; di shao wu
..............page:58-59,72
A New Type of Wireless Distributed Condition Monitoring System
wang jin tao ; jing min qing ; xie you bai
..............page:55-57,135
The Research on Personalized Study System Based on Individual Student in WEB
li hua ; he zuo ; wu zhong fu
..............page:239-242
The Design and Application of Communication Software in Network Control Based on the RS485 Bus
cao zhi kai ; jiang qing yin ; zheng zhen yao ; wu shun xiang
..............page:243-245
A Secure Encryption Algorithm of IC Card Systems and Its Application
yang nan hai ; wang xiu kun
..............page:249-250,253
Construct of Tent Map Stream Cipher on Square
yuan gan nan ; qin hong lei ; lai de sheng
..............page:124-126,175
Sharing Technology for CAE Applications Based on Web Distributed Computing Environment
han yong bin ; wang yun li ; liu na ; hao meng ; peng zhong hua ; xiao tian yuan
..............page:127-129
Research of Architecture-based Method of Application System Family Development
zheng zhi yun ; wang wen yi
..............page:130-132
Study and Implementation of Real-Time Thread Library
xu yong ; guo chang guo ; jia yan
..............page:136-137,256
The Implementation of RSA Public-Key Algorithm in Object-oriented Programming Method
xin yun zuo ; qin xiao dong
..............page:138-140,191
A Research on Application of Matlab C++ Math Library
wang ren ming ; liu zhi gang ; liu dai zhi
..............page:141-142,179
Concurrent Control Model of Database System Based on Petri Nets
zuo feng chao
..............page:198-200
Design and Implementation of an Oracle Spatial Database System
lei ying jie ; wang tao
..............page:201-202,226
The Second Generation Computer Controlled and Managed Voting System
tang jing xin ; xu huan
..............page:203-205
Research about Data Organization Models of "Digital City"Based on Metadata
wang ying hui ; zhou ming quan ; geng guo hua
..............page:206-207,245
Gait Planning of a Biped Walking Robot
zhang wei ; du ji hong
..............page:214-216
The Pointer Optimization Strategy of the Mobility Management in the Mobile IP Networks
kang kai ; guo wei ; wu shi qi
..............page:53-54,96
The Security Strategies of a Web-based Distributed Cooperative Manufacturing System
huang jie ; chen you ping ; long yi hong ; zhou zu de
..............page:49-52
Survey of Wavelet Domain Watermarking Algorithms for Digital Images
guo lei ; guo bao long
..............page:45-48
Research on Web Mining
chen xin zhong ; li yan ; xie yong hong ; yang bing ru
..............page:42-44
Study on Feature Extraction of Xixia Characters
ma xi rong ; wang xing yu
..............page:38-41
An Analysis of Database Access Control Models
jiang zuo zuo ; wu cheng rong ; zhang shi yong
..............page:183-185,194
The Research on Cooperation between XMLDB and RDB
zhou yong ; han jie ; shi zhong zhi
..............page:186-188,213
A Method of Classification Rule Knowledge Discovery
liu fu yan ; lv shao yi
..............page:189-191
Database Accessing Method Based on EJB
zhao ming ; li tao shen ; lv li jian ; gu xiao feng
..............page:192-194
New Method of Metadata-based Database Analysis and Design
chen xiao qing ; yin hong
..............page:195-197
An Automatic Recognition System of Unconstrained Handwritten Digit Form
yang ying ; yang lei
..............page:251-253
Boundary Voxel-based Shear-warp Splatting Volume Rendering Algorithm
peng yan jun ; shi jiao ying
..............page:13-16
The Design and Analysis of Credit Risk Early Warning System Based on DW
peng yan ; qi jian feng ; tu xu yan
..............page:11-12,16
A New Data Analyze Method:Artificial Immune Network
ge hong ; mao zong yuan
..............page:6-10
Threat Assessment of Network Security Based on Fuzzy Matrix Game Theory
zuo huai zhi ; hu chang zhen ; tan hui min
..............page:4-5,10
Analysis of Host Audit Trails and Their Applications to Intrusion Detection
wang wei ; peng qin ke
..............page:35-37,179
Implementing Open and Loose Couple NMS UI Using Java Reflection
li zeng zhi ; liao zhi gang ; kou ya zuo
..............page:33-34,52
Implementation of Human_like Intelligent Inference and Control
wang pei jin ; fan bao de
..............page:30-32
A Formal Software Development Method for Embedded Real-time Systems
yang jie ; wu guo qing
..............page:26-29,80
Study on System-level Intrusion Detection Technology
jia chun fu
..............page:24-25,41
The Research and Application of P2P Technology
chen zuo ; fang bin xing ; zhou yong lin
..............page:20-23
The Construction of Hybrid Local Basis for Chebyshev Spectral Element Method
zhang li lun ; song jun qiang ; li xiao mei
..............page:1-3
A Study and Development of DNC Information System
sun guo zuo ; wang yi dong ; wang jin wei ; jiang cheng yu ; wang ning sheng
..............page:221-223
Application of Unified Modeling Language in Exploiting System of Virtual Manufacture
qian ling ; zhang you liang ; huang ling
..............page:224-226
A General Model of 3D GIS
luo zhong wen ; xie zhong
..............page:227-228,231
Telemedicine Database System Based on CORBA/JAVA
yang zuo zuo ; wang hao ; chen ya guang
..............page:229-231
The Research of Parameter Model Method in Electric Load Forecasting
luo an ; wang jia yang
..............page:232-233