Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2002 Issue 17
Automatic Chinese Characters Location in Complex Color Images
qu shao lin ; wang wen yuan ; sun jun
..............page:75-78
A Kind of Software Architecture Operators
liu hai qing ; li zuo
..............page:73-74
An Interactive Parallelizer for CFD
ding xiao ning ; fu you ; kang ji chang
..............page:79-81,84
Research of Iris Recognition System
han fang ; lu heng li
..............page:82-84
Reusable Software Patterns
zhou zuo gang ; kang jian chu
..............page:87-90
Research on the Missegmented Character Rejection in Document Recognition
chen zhen gang ; ding xiao qing ; liu chang song ; peng liang rui
..............page:69-72
The Implementation of WPDL Conforming Workflow Model
zhang zhi jun ; fan yu shun
..............page:65-68
The In-depth Analysis of Task Scheduling in the Metacomputing Environment
liu xiong wen ; lu zuo da
..............page:62-64,72
A Character Segmentation Algorithm Based on Synthetic Decision
liu gang ; ding xiao qing ; peng liang rui ; liu chang song
..............page:59-61,72
Chinese Sign Language Finger Alphabet Recognition Based on Color Gloves
li yong ; gao wen ; yao hong xun
..............page:55-58
Design CAI of Teaching Experiment Platform Based on Internet
jia dong yao ; tang su xiang ; wang ren huang
..............page:160-161,169
A Secure Broadcasting Scheme Based on the Distributed Systems
shi rong hua ; hu xiang ling
..............page:175-176,183
Research on Distributed Multimedia Network Collaborative Platform
zhang hua zhong ; zou jian ; hao xin gang
..............page:172-174
A Delay-bounded Constraint Multicast Routing Algorithm Based on Genetic Algorithm
chen zuo ; liu lin
..............page:170-171,183
Analysis and Realization of GSM Reception and Inspection System
liu hui ; chen xiao su
..............page:167-169
The Design and Implementation of General Query Algorithm Based on Terminal
zheng chun ; yang xue liang
..............page:162-163
Security Research of PDM System Based on Internet and MSSQL Server Environment
zhang jian yu ; tian ling ; li qiang
..............page:164-166,179
A Systematic Design Method of Two-Degree-of-Freedom Computer Servo Controller and the Research of Control Software
liu qi cheng ; wang pei jin ; song yi bin ; li kai li
..............page:157-159,205
High Performance Video Display in Video Conferencing System
wang qiu zuo ; zhou jing li ; yu sheng sheng
..............page:154-156
The Implementation of Component-based MMC Text-Speech Browser
wang jin dong ; wu sheng yuan ; rong xiao xia
..............page:151-153
The Research on Multi-Communication of the Peer-Peer Communication and the Group-Communication on DIS
liu chang yun ; zhang jie ming ; liu jin mang
..............page:146-148
Process-Oriented Software Requirements Automatic Generator
li xin rong ; zhang li
..............page:143-145,148
The Design of a Chinese Search Engine Based on Full-text Retrieval
chen yan na ; shao zhi qing
..............page:196-198
A Sniff Protection Method Based on ARP Protocol
li zeng zhi ; chen zuo ; shen yong ; lu jian ping ; xue wen ge
..............page:194-195,198
Mining of Generalized Fuzzy Association Rules Based on Fuzzy Class Hierarchy
wang xin ; wang yong
..............page:206-207,220
The JAVA Application in Middleware of Web Database
yu dong mei ; zhang qiu yu ; zhang tao ; wang hai jun
..............page:208-210
Research on Web Database System Based on CORBA/Agent Technology
guo yin zhang ; xu yu bin ; zeng jian chao
..............page:211-212,217
Study on a HSRM-based Distributed Floor Control Model and Application
pan zuo tao ; wang zuo ; wu ling da ; jiang zhi hong ; huang ying jun ; zhang jun ; huang bing
..............page:190-193
FICoM :a Firewall and Intrusion Detection Cooperative Model
zhang shao lian ; zhou li feng ; ou yang yi ; huang zuo ; xie jun yuan
..............page:187-189
Research and Implementation of the Network Sniffer System
liang li ; huang zhang qin ; hou yi bin
..............page:184-186,226
The Network Secure Transport Tunnel Technologies' Research
li cheng you ; jiang dong xing ; xia chun he
..............page:180-183
The Honeynet Security System Based on Proactive Defence
wang li lin ; xu zuo sheng
..............page:177-179
Research on LAN Performance Analysis and Evaluation Technology
liu shu gang ; liu pei yu
..............page:199-201,205
Study on Hierarchical Structure of Workflow Security Domains
fu qian ; zhang shen sheng ; hu tao
..............page:110-112,142
A Fast and Effective Algorithm of Pulse Noise Filtering for Imaging Data
huang qing hua ; zhou he qin ; feng huan qing
..............page:113-114,210
Application of Knowledge Interface in NKI
feng dong hui ; cao cun gen
..............page:115-118
A Automatic Thresholding Algorithm for Image Segmentation
geng yin yin ; cai an ni ; sun jing zuo
..............page:119-122
Application of the Design Pattern in Designing Component-based Frameworks
tong li ; ma yuan liang
..............page:123-124,128
Research on Testability Improvement Maximizing in Computer-aided Designing for Testability
liu guan jun ; yi xiao shan ; liu xin min
..............page:16-17,51
Extensible Model Design for Distributed Archieves Management System
chen ze lin ; zhang xiang dong ; huang yong cheng
..............page:248-250
Application of Content-based Image Database in Secure-Access System
liu hai feng ; guo bao long ; feng zong zhe
..............page:251-253
The Application of Web GIS in VIQS
yu feng ; zhu yue long
..............page:254-256
The Research on KDK-Knowledge Discovery Based on Knowledgebase's Structure
yang bing ru ; chen zuo zuo ; xie yong hong
..............page:14-15,30
Application of Morphological Edge Detectors in Image Corrupted by Noise
yang shu bin ; peng fu yuan
..............page:91-92
Three-dimension Human Body Free Form Deformation Method Based on NURBS
wang jian zhe ; jiang zuo ming
..............page:95-97
MPEG-7 and Content-Based Image Retrieval
li zuo ; feng gang
..............page:98-99,102
An Approach of Learning Augmented Bayesian Classifier
ma yao hua ; he zuo
..............page:100-102
Bisection Evolutionary Algorithms and Program Design of Fractals
guo wei bin ; wang neng chao ; shi bao chang
..............page:103-105,189
A New Method of Software Requirement Analysis Based on Workflow
zhang zhi yong ; tian qi jia ; shi zhong zhi
..............page:106-109
Study on Apple Class Identification Based on Fractal Theory
liu quan liang ; wang hong
..............page:244-247
Formal Requirements and Verification for Security Protocols
liu zuo wen ; li wei qin
..............page:125-128
Post-processing Algorithm for Reducing Blocking Effects in Stereo Video Coding
zhu zhong jie ; jiang gang yi ; liu xiao ; yu mei ; wu xun wei
..............page:18-20
A Solution to Animations in Engineering Distance Learning Course
wang cheng yong ; shen yong sheng ; tang xiao zuo ; hao zhi xiu
..............page:138-140
Fuzzy Synthetically Evaluation on Enterprise Information System
tang zhi wei
..............page:129-130,137
Implementing Research of RSA Cryptosystem
liu hong wei ; wang zhao shun ; ban xiao juan
..............page:52-54,78
Agent-based Intelligent Control-Maintenance-Technical Management System and Application in Pumping Station Control
yang han cheng ; sun jing zhong ; suo li sheng ; chen shou lun
..............page:46-48,118
The Design of SCUT Intelligent Virus Defence System(IVDS)
qi ming ; kang min ; yang wen
..............page:43-45
Multi-Video-Stream Render Based on QoS
gu yun hong ; jia geng xin ; su shi mei
..............page:40-42
Application of Computer Simulation Technology in Special Load Problems
lu xin zheng ; jiang jian jing
..............page:12-13,68
Study of Enterprise Competitiveness Based on Simulation
deng hong zhong ; li ji
..............page:9-11,250
Study for Obstacle Avoidance in the Multigent System Based on the Method of Complex
guo zuo ; hong bing rong ; wu bo ying
..............page:6-8
A Prototype of Wearable Remembrance Agent
zhao hui qun ; sun jing ; gao yuan
..............page:4-5,36
A Knowledge Navigation System for Scientific Document Retrieval
zhang ming ; deng zhi hong ; chen jie ; yang dong qing ; tang shi wei
..............page:1-3,24
The Study on Verification Method of Digital ASICs Former Design
luo zuo ; zhao lei ; yin jian hua ; yang zuo wei ; wang lin ; cao yang
..............page:37-39,58
Statistic Chart Definition Using SVG
yuan ye ; shen jun yi ; he zuo
..............page:33-36
Design the Weights of Feed-forward Neural Networks Based on Immune Algorithm
lv gang ; tan de jian ; zhao he ming
..............page:31-32,45
Using Genetic Algorithm to Mine First-order Rules
yang xin wu ; liu chun nian ; zhang jun qing
..............page:28-30
Cooperative Distributed Planning in Artificial Intelligence
tao lei ; fei qi
..............page:25-27,134
The Relationship between RDB and Rough Sets Based on RSDA
an qiu sheng ; shen jun yi ; wang guo zuo
..............page:21-24
Using Dynamic Data Source in the Data Warehouse
ye ting hua ; wang ze bing ; feng yan
..............page:213-214,217
A System to Design and Realize General Query in a MIS by Using PB
liu hong ; shao ming
..............page:215-217
Interactive Instruction and Security Management on Long-distance Teaching
mo zan ; feng shan ; tang chao
..............page:218-220
Design of the Computer-Aided Management System for Some Enterprise
feng yun fang ; wang shu ning
..............page:221-223,241
Nucleus Enterprise Supply Chain Management System Based on Enterprise Dynamic Alliance
zhou bin ; lin xiu hua ; ren li hong ; ding yong sheng
..............page:224-226
Construction and Modeling of CGF System in Field Air Defense
wang zuo ; hou chao zuo ; feng tian fei
..............page:232-234
Design Meeting Arrangement System Based on mobile Agents
jin che qing ; chen de ren
..............page:235-237,256
Design and Application of General Software of Automatic Firearm Dynamic Analysis
li qiang ; peng jing qi ; yang zhen
..............page:227-228,231