Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 11
Research of JXTA Technology Based on Peer-to-Peer Network
li zu peng ; huang dao ying ; zhuang lei ; huang jian hua ; liu cai xia
..............page:42-44
The Nearest Neighbor Strategy with Varied Weights
zhang guang qian ; deng gui shi ; wang zuo
..............page:40-41,60
The Summarization of the Mechanism of the Key and Signed in the Freenet
sun xiao qing ; liu bao xu ; jiang li dong ; cui shi ; feng deng guo
..............page:138-140,144
E-bank Solution Based on Fingerprint Identification
li heng hua ; tian jie ; chang ; yang zuo
..............page:141-144
A Secure Hash Function Based on Rijindael
ji jia hui ; li da xing
..............page:49-51,64
Research on the Methods of Encryption and Key Management of Database System with Subkey
wang qing mei ; wu ke li ; liu feng yu ; hu guang yu
..............page:52-54
The Modeling of C3I System Software Based on UML
he jing ; lou shou chun ; wang gang ; zhu fa shun
..............page:55-57
Reductions of a Decision Rule
li xiao xia ; chen mian yun
..............page:58-60
A Study of Registration Method between Hollow Turbine Blade's CAD Model and CT Slice Model
liu jing ; zhang ding hua ; mao hai peng ; cao hua
..............page:61-64
An Ontology-based Approach to Generate XML Schema
ma jian ; lou yu bo ; zhang liang
..............page:65-68
Threat Estimation Model Based on Expert Systems
yue shao hua ; li song ; liu jin mang
..............page:71-72,79
Investigation to our Country's Information System Security Certification and Accreditation Process
wang gui zuo ; jiang chang qing ; zhang li
..............page:73-74,83
A Hybrid Genetic Algorithm Based on Gene Bank for Traveling Salesman Problem
hu neng fa ; kang li shan ; chen zuo ping
..............page:75-76,125
A Study for Application of RFRA Algorithm in the Compass Position Sub-system of THMR-V
chen gui sheng ; he ke zhong ; liu hua ping ; liu feng qin ; jin hui ; fan tie zuo
..............page:77-79
Discussion on Technical Issues Involved in SECTCS
tang huan ling ; fu ke ming ; lu ming yu
..............page:80-83
A Fast Motion Estimation Algorithm Based on Parallel Processing
xiang you jun ; guo bao long
..............page:84-86
DOG Model-Based Detector of Corner
luo xiao zuo ; li jian wei
..............page:87-90,99
The Discussion of Control Method of Graph in the Map Drawing Computer Software
ji zuo qin ; yu guo feng ; zhao hai zhen ; li ya jun
..............page:91-92,105
Color Image Segmentation Based on Mallat Discrete Wavelet Transform without Subsample
liu chang jin ; guo li ; zhu jun zhu ; xu zuo
..............page:93-95,102
A Quantum Algorithm for Constructing Minimum Spanning Tree
huang chuan he ; jiang bei ; chen zuo meng ; liu xiao ming ; wu hong
..............page:96-99
Face Recognition Based on Support Vector Machines
wang hong man ; ou zong zuo
..............page:100-102
Intelligent Collaboration and Navigation of Multi-Mobile Robots
shi zhi guo ; wang zhi liang ; gu xue jing ; xue wei min
..............page:106-108
The Different Behavior of Java Thread on Variant System Enviroment
lu wan liang ; liu bo ; chen zuo zhong
..............page:109-110,122
Research on the Architectures of Distributed Reinforcement Learning Systems
zhong yu ; zhang ru bo ; gu guo chang
..............page:111-113
The Design of Linux General Framework of Access Control
shen xi ; xie jun yuan
..............page:114-116
Design and Implementation of Windows's Logon System Using Fingerprint Identification
duan shao xiong ; tian jie ; li heng hua
..............page:117-119,134
Design of Multi-Modem Card
zhao cong ; liu zuo ; dong xiao she ; qiao zuo
..............page:120-122
Program Design of Digital Image Processing Based on API
wang zuo ; hong xiao feng
..............page:123-125
Designing Undo/Redo in a Design-pattern-based Computer-aided Electrical Graphics Editing System(iSee3.0)
huang yi min ; yuan fan ; wang shu qing
..............page:126-128,137
The Research and Development of GIS Based on Internet
liu xian zhong ; yang ying
..............page:129-131
Design of Cooperation System between IPSEC and Multicast Communications
tan xing lie ; luo hui ; shen chang xiang
..............page:36-39,68
The Real-time Interactive Technology of Web-based Virtual Reality Wandering System
he wei feng ; feng kai ping
..............page:132-134
Research and Application of Mobile Agent
jiang lin ; wu yu hong ; liu wei wei
..............page:135-137
The Implementation of VPN Based on PPTP and DES
zhu jian xin
..............page:145-146,164
Research of Mobile Agent System's Host Security
wang ru chuan ; zhao xin ning ; sun zhi xin
..............page:147-149
Network Management Information System of Violating Traffic Rules and Regulations Based on Component
chen shu yan ; zuo gao feng ; sun yan
..............page:150-152
The Study of the Security in IC Cards System
xu zhong hua ; liu yu zhen ; zhang huan guo
..............page:153-155
The Application of MATLAB in Digital Watermarking
wang jian ; lin fu zong
..............page:156-158,175
Web Oriented Distributed Ontology System
liang bang yong ; xu jian jun ; li zuo zi ; wang ke hong
..............page:159-161,185
Design and Implementation of a Distributed Embedded Firewall
cai shu zhen ; lu yang ; chen lei
..............page:162-164
Adaptive-level Memory Cache Technique on Proxy Server
li jun feng ; jiang zuo ming
..............page:165-166,202
XML-Based Test Exercise Subsystem Application and Implementation in e-Learning
zhang xing zhong ; yu xue li ; gao bao lu ; lv jun feng
..............page:170-172,178
The Network Fault Information Distributing System Based on CORBA Event Service
chen jiong ; cao zheng
..............page:173-175
The Network Capacity Expansion Problem with the Time and Cost Constraints
wang li ping ; wang shu zhen ; xu guo hua
..............page:176-178
A Fuzzy Congestion Control Algorithm in Routers
zuo chao zuo ; song xue jun ; liu min
..............page:179-181
The Development Research on the Spatial Data Mining
zou li zuo ; wang li zhen ; he zuo
..............page:186-188,216
Application of Bitemporal Theory in the Spatial Data Model
ren jia dong ; gao wei ; ren dong ying
..............page:189-190,193
Parallel On-Line Error Correction Algorithm for View Maintenance
zuo xi yao ; zou lin da
..............page:191-193
Applying Object-Tables of Oracle to Design a Sauna-Center Management System
wan hua ; ren feng yun ; zhang chang gen ; hao jing min
..............page:194-195,198
Development of Library Reader Research System
shi yu qing
..............page:196-198
Priority Based Intelligent Production Scheduling System
zhou xing bin ; li ping
..............page:199-202
An Efficient Method of Quantitative Definition of Agricultural Meteorological Disaster
li zuo ; zhan shou yi ; shi ning zhong
..............page:203-206,209
The Research of Agent-Based ODSS
chen yu ming ; zuo chun hua
..............page:207-209
The Real-time Realization of the Fuzzy Optimization of Adjusting Parameters of Rotary Kiln under Delphi Environment in Mediva
li xue jun ; xiao you gang ; liu yi lun ; he yu hui
..............page:210-212,224
The Study of Geographic Environmental Model for the Computer Generated Forces of Ground-to-air Missile
zhang wu sen ; li gang ; liu xing tang
..............page:213-216
MIS of a Heat-supplying Equipment Enterprise Based on C/S
ji gui shu ; lu zhi yuan ; jiang le xin
..............page:217-219
The Study and Development of the Guangzhou Municipal Bridge Management System (GZMBMS)
li xin ping ; fu xin sha
..............page:220-221,232
A Real Time Roam System in Electric Industry Based on Geometry-And-Image
li zuo ; zhang shu guang ; liu ying
..............page:222-224
The Design and Implementation of Computer Drawing and Chemistry Industry Facility Management System
zhang qiu yu ; wei zheng ; dong jian she
..............page:225-227
Application of Chaos in DS-CDMA
li xiao chao ; guo dong hui ; zeng quan ; wu bo zuo
..............page:22-26
Multi-agents Based Intrusion-Tolerant Architecture
zhu jian ming ; shi ting jun ; ma jian feng
..............page:19-21
A New Improved Genetic Algorithm
ou yang sen ; wang jian hua ; geng ying san ; song zheng xiang ; chen de gui
..............page:13-15
High-Speed Application of RSA Algorithm on TMS320C62x
sun hong ; yang yi xian
..............page:11-12,18
A New Global Optimization Evolutionary Algorithm Based on Filled Function
zhou yu ren ; li yuan xiang ; wang yong
..............page:7-10
The Effect of AKS Algorithm on Modern Cryptography
liu yong liang ; yao hong xun ; gao wen
..............page:1-3,54
Study on Handwritten Numeral Recognition Using Neural Networks and SVM
zhang chuang ; wu ming ; guo jun ; wei feng
..............page:33-35,44
Generalized Principal Component Analysis and Face Recognition
gao xiu mei ; yang jing yu ; yuan xiao hua ; yang jian
..............page:31-32,48
An Approximately Fair Algorithm for Network Bandwidth Allocation
yin jian hua ; cao yang ; ling jun ; xu guo xiong ; huang tian xi
..............page:27-30