Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 10
Error Recovery for H.263+ Video Transmission
li wei
..............page:165-167
Implement Hiding Signature Using the Image Transform of Frequency Domain
tang guang ming ; sun zuo feng
..............page:162-164
Principles Analyzing and Protection of Two kinds of Novel Buffer Overflow Attacks
yao jian dong ; qin jun ; gu zhi min
..............page:156-158,164
C2NI Applicative Management Model of Security
qi ming ; kang min ; li jian chao
..............page:154-155,205
A Solution to the Encryption of the Secret Report Files Based on PKI
yuan yi fang ; yang da kai ; xu mao sheng
..............page:151-153
An Interactive Net Search Engine for Chinese Text and Its Self-learning Ability
du a ning ; fang bin xing ; hu ming zeng ; yun xiao chun
..............page:148-150,212
Real-Time Data Transport and Synchronization Scheme Based on RTP/RTCP
ren yan zhen ; yu zhan wu ; hu rui min
..............page:144-147
An Intrusion Detection System Framework Inspired by Immune Principles
liu li jia ; ou yang ming guang ; pan feng ; zhang yong ; wang wei nong
..............page:141-143
An Extensible Artifical Immune System Platform :iNet
chen lei ; cai shu zhen ; lu yang
..............page:139-140,147
The Lymphocyte Evolution Approach of Digital Sequence Antigen
si ma yun rui ; liang yi wen ; wang shu guang ; zhao shi qi
..............page:70-72
A Comprehensive Architecture for Monitoring and Controling Network Information
gu guo fei ; wang xiao ning ; zhang shi yong
..............page:168-170
A Smart Intrusion Detection Module with the Ability to Seek Help
bao zheng yu ; xu wen bo
..............page:171-173
Research on Control Maneuver of Network Security Based on Access-lists
chen lin ; zuo li juan ; he hua
..............page:174-176,212
Analysis and Design of Operation Mode in E-stamp System
hu xiang dong ; wang ping
..............page:177-179
Image Distinguishing Technology of Cells for the ASIPP Microbeam
wang xiao hua ; luo jia rong ; hu zhi wen ; chen lian yun ; yu zeng liang
..............page:77-78,102
Multi-Parent-Crossover Based Evolutionary Multi-Objective Optimization
chen wen ping ; kang li shan
..............page:79-82
Clustering and Classification Based Self-studying Expert System Module
ma guang zhi ; long shuo zhu
..............page:83-84
Self-Contractile Evolutionary Algorithm and Its Application in Layout Optimization
li jing zhi ; kang li shan ; chen zuo ping
..............page:85-89,96
Web Mining Research Survey
tu cheng sheng ; lu ming yu ; lu yu chang
..............page:90-93
Genetic Orthogonal Algorithm and It's Application
xue wei ; gao wei dong ; wu you zuo
..............page:94-96
Hybrid 3D Structure and Image-based Modeling and Rendering for Complicated Scene
gao yue fang ; zhang huai sheng ; zhang you sheng
..............page:100-102
Intersecting Dimension Algorithm and Application Using Space Vector Product
tu yan ; chen jin shui ; wang qiong
..............page:103-105,112
Research on Decision Structure for Aerial Defence C3I System Based on Petri Net
sun jin ping ; zhang lei
..............page:106-107
Extending Lattice Machine and Application in Text Classification
xu jian chao ; hu ming
..............page:108-109,123
SAR Image Compression via M-band Wavelet Filter
zhu gui hua
..............page:110-112
Using Entropy Threshold for Identifying Scene Cuts
cai li hua ; zheng peng
..............page:113-115
The Research of the Conception Model Based on Object-Oriented Technology
jia ; hao zhen ming ; xu xiao dan
..............page:116-117,232
FTA as a Reliability Analysis Technique for Component-Based Software
hu qing pei ; bai cheng gang ; cai kai yuan
..............page:118-120,127
Key Technologies and Implementation of Electric WhiteBoard in a Virtual Classroom
he guang ming ; he zuo lian ; meng zhao peng ; sun xue jun
..............page:121-123
Knowledge Management Based Personalized Service
dong zuo ; zhang xiao gang ; li xiong feng ; li ming shu
..............page:67-69,76
Strategy and Technique of Testbench Design in Verilog
li zuo ; zhang sheng bing ; gao de yuan
..............page:128-130
The Implementation of Network Driver of pSOS Embedded System with PCI Bus
lin zhu xiang ; chen wen zheng ; zhang chao yang
..............page:134-136,219
Modeling Software Architecture Based on Patterns
zou lin da ; zuo xi yao
..............page:137-138
A New Method for the Initialization and Reinitialization of Level Set Function
zhang li fei ; yang hong bo ; zou mou yan
..............page:26-32
A Method Based on Evidence Theory for Target Recognition
dang hong she ; han chong zhao
..............page:24-25,36
Study on Geographic Information Integrative Management
liu qiao xi ; mao shan jun ; ma ai nai
..............page:22-23,72
Selectively Basis Alignment Algorithm of Point Matching under Affine Transformation
jin sheng ping ; zeng mei lan
..............page:19-21
CIMS Architecture and Manufacturing Execution System for Process Industry
wang ling ; wang xiong
..............page:16-18
A Framework for Network Performance Metrics Definition
zhang wen jie ; qian de pei ; bai yue bin ; xu da zuo ; zuo zhong zhi
..............page:14-15,21
The Research and Design of A Metasearch Engine Based on Agent
chen jun jie ; xue yun ; song han tao ; lu yu chang ; yu xue li
..............page:33-36
An Architecture for Supporting Traffic Balancing in Ethernet
liu jun ; lei zhen ming
..............page:49-53
A HLA-based Interactive Simulation Method in Distributed Virtual Environment
shi yao bin ; sheng si yuan ; zhan shou yi
..............page:46-48,53
Networks Platform for E-government Based on MPLS-VPN
lin jin xian ; shen jun yi
..............page:43-45
Software Failure Predication Model Based on Multiple Markov Bayesian Network
bai cheng gang ; yu meng huai ; hu shang xu
..............page:40-42
Build Mathematical Model of Agent in RoboCup
wang chang da ; cheng xian yi ; zhao zuo bin
..............page:37-39
Research of Network Telecommunication in the Environment of Virtual Reality
zhang yong ; deng zhong liang
..............page:12-13
Display Control Implementation for Dynamic Hierarchical Objects
shang jian yun ; fang jia zuo ; wang chang wu ; diao lian wang
..............page:8-11
Research on Information Extraction:A Survey
li bao li ; chen yu zhong ; yu shi zuo
..............page:1-5,66
Molding Tools of Data and Their Implementatin on DSS
jiang shao sheng ; zhang zu ping ; chen song qiao
..............page:202-205
Design of LonWorks-based Uptown Automatic Energy Billing System
wang zhi gang ; wang jing cheng
..............page:206-208
Research on Evaluation Information System of Parceiland Price Based on VB and MapX
xie ze lin ; dong qi guo ; huang ke long
..............page:209-212
A 3D Industrial CT Image Processing and Analysing System Based on PC and it's Application
tian jie ; wu qing zhi ; zhang zhao tian ; zhao ming chang ; he zuo guang ; cao yu ling ; guo guang ping
..............page:213-216
Approach to Constraint Inductive Logic Programming
zheng lei ; liu chun nian
..............page:63-66
Knowledge Representation in an Expert System of Fish Disease Diagnosis
fu ze tian ; wen ji wen ; zhang xiao shuan ; xing ke zhi
..............page:60-62
Research on Framework of Integrate Intelligent Forecast Analysis System
mao hai jun ; zhang shi lin ; tang huan wen
..............page:57-59
The Realization of Identification for the Mouse Imitating Dynamic Digital Input
shi yue xiang ; cai zi xing ; sun guo rong
..............page:54-56
Data Exchange of XML-based Mata Data System
zhang zhe
..............page:180-184
A Reduction Algorithm in Rough Set Based on Association Rules Mining
bai xiu ling ; cui lin ; wang xiang yang
..............page:185-186,190
Analysis of Predictive Model Markup Language-based Applications
zhang xiao jun ; meng xiang wu
..............page:187-190
Data Preprocessing Method Research for Web Usage Mining
zhang jian pei ; liu jian dong ; yang jing
..............page:191-193
The Research and Design of Distributed Database System Based on LAN
liang yin ; zhou jie ; zhang hong
..............page:194-196
A Tool for Tanslating Table into Object
ruan wen jiang
..............page:197-198,225
The Modeling Analysis of Flow Supply Chain Based on Petri Net
peng chen ; yue dong
..............page:199-201
A Flaw Inspection Method for Ceramic Tiles Surface Based on Mathematical Eorphology
dai yong ; zhou cheng ping ; zhong ke hong
..............page:220-222
Digital-storage of Plan and Implementation of Mathiematical Model of Engineering Quantity Calculation
sun jing bo ; hou xiu ping ; zheng hong
..............page:223-225
Research for GIS-aided Administrative Demarcation Visualization Based on Spatial Behavior Process
wang hai qing ; jiang jie ; cao zuo
..............page:228-232
A Network Solution for Software Testing Management
chen wen hai ; qin xiao
..............page:131-133,143