Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 16
A Real-Time Walkthrough Algorithm of Large-Scale and Complex Scene
wang jun ; tang xiao an ; jing ning
..............page:88-90
Study of the MPLS Packets Loss Model Based IP Network
du yong bo ; li zuo zuo
..............page:183-184
Optimization for Limited Memory in Mmdbms
zheng zeng wei ; wu zhen hua ; lin huai zhong
..............page:185-187,211
ILP Method Applied in Spatial Association Rule Mining
li hong ; cai zhi hua
..............page:188-191,197
A New Algorithm for Automatic Rectangular Mesh and Mesh Refinement
shen shu zuo ; bao ya ming
..............page:91-93
A New Blood Cell Image Split Algorithm Based on the Skeleton
yang bo ; wang wei xing ; li yan wen
..............page:94-96,145
High-availability Mainframe Server Cluster with Load-Balance
li feng ; chen ming sheng ; sun zhi hui
..............page:97-99
The Unification of List Open and List Closed
feng nai qin ; wang sui hua ; zheng yan bin ; feng guo
..............page:100-101,125
The Linked Operators of a Software Architecture Operator Set
liu hai qing ; li zuo ; zheng peng
..............page:105-106,174
The Research of Large XML File's Partition and Dynamic Loading
sun jing ; song yang ; hu jin xing ; hao yin quan
..............page:107-108,125
Parallelization of Video Coding Algorithm
li ming ; hu rui min ; li wei
..............page:109-112
A Real-Time System Architecture Style Description Language: NewRob
yang jie ; wu guo qing ; zhu li song
..............page:113-117
An Embedded Software Development System Based on the PC Environment
zheng jun ; guo xian chen ; liu yu shu
..............page:121-122,130
Research on Automatic Generation of Path Coverage
lun li jun ; ding xue mei ; li ying mei
..............page:123-125
Learning the Center Number of Clustering Algorithms Using Genetic Algorithms
zhan yan ; yang fang ; wang xi zhao
..............page:86-87,99
Image Retrieval Based on Combined Color Features
liu fang ; wang gai mei
..............page:83-85
The Design and Implementation of P-F Engine
tang yi ; zhou zhi ying ; zhuang jian gang
..............page:126-127,135
Realization of Illegitimate-Information-Carrying E-mail Cheching in Linux Kernel
qian bang fu ; fu ru lin
..............page:128-130
Design and Implementation of System Software for Development and Configuration of BACnet Device
liu ning ; hui xiao shi ; liu xian de
..............page:133-135
Research on Screen Painting and Fast Repainting Techniques of Graphics System
bai rui ; zhou gan
..............page:136-138,204
An Innovative Network Management Model Based on Services Cloud
wu di ; yang jing ; zhang guo qing
..............page:139-141
A Comparison of Packet Loss Probability Between Macro-mobility Proposal and Micro-mobility Proposal
tang hong ; wu zhong fu ; yu hong ; zhao jun ; li hua
..............page:61-64
A Part-oriented Segmentation Method for Assembles During the Reverse Design of Production
wang jing ; zhang shu sheng ; sun hong wei ; wang peng ; liu xiao xiang
..............page:58-60
Index Using Pyramid Technique for High-dimensional Data Spaces
liu hong bo ; wang xiu kun ; zhao jing
..............page:56-57
CBRDI:Data Integration Using Case-Based Reasoning
li bao lin ; wang xiu feng ; lan zuo ; duan fei
..............page:52-55
Implementation of CORBA A/V Streams Specification and its Application in Remote Education System
li fu gang ; shen zhuo zuo ; feng ming zheng ; yang peng
..............page:142-145
Design and Implementation of General Multithread Servers
zheng zuo ; fang si xing
..............page:146-147,184
The Constructing and Activating Function of the Alternative Covering Networks
wu tao ; zhang ; zhang yan ping ; zhang ling
..............page:43-45
Disk Load Balancing Method for RAID Disk Array Based on the Genetic Algorithm
dong huan qing ; li zhan huai
..............page:41-42,93
An Blocked SVD Image Watermarking Algorithm with Chaotic Encryption
zhang zhi ming ; li rong yan ; wang lei
..............page:38-40
Study on Enhancing Network Security Based on the Authentication Technology
cao hui fang ; xu wen bo
..............page:148-149,229
An Analysis of the WEP Protocol and the Description of Its Statistical Model
li qiang ; liu qiu fang ; dan hong
..............page:150-152
Design and Implementation of Remote Video Surveillance System through Public Telephone Network
hao da yong ; he ji chun ; liao shi zhong
..............page:153-155
Design and Analysis for the Security Function Requirements of VPN Based on IPSec
wang zuo bai ; wang hai hang ; lv shu wang
..............page:156-158
The Research of Active Network Management Layered Design Pattern
cui jian qun ; xiao de bao ; wu li bing
..............page:159-161
Analysis and Design of Distributed Web Crawler
li sheng zuo ; cheng zuo ; yu zhi hua
..............page:162-166,182
The Algorithm of Network Intrusion Detection Based on ART2
du yan hui ; ma rui ; liu yu shu
..............page:167-168,229
Research into Internet Teaching System Based on Multi-agent
chou mang xian
..............page:169-171,211
Implementation of HTTP Proxy Server
sun yong hui ; jiang zuo ming
..............page:172-174
A Survey of Error Control in Reliable Multicast and Hot Spots
huang jia qing ; du xu ; cheng wen qing ; yang zong kai
..............page:175-179
An Technique for Minimal-Length Conformance Test Generation Based on Basis Paths Set Algorithm
meng yi fa ; chen yuan kai ; xu hui min
..............page:180-182
A New Approach for Image Edge Detection Using PCNN
gu xiao dong ; guo shi de ; yu dao heng
..............page:1-2,55
A Cryptographic Solution to Access Control in Security DBMS
wang yuan zhen ; wei sheng jie ; zhu hong
..............page:195-197
Mining of Rough Set Theory for Large Data Table
ma zuo ; sun you xian
..............page:198-200
A Monitoring Study and Software Design for Measurement Process
wang su li ; zhao feng yu
..............page:201-204
The Research on Advance Deployment of Manufacturing Resources for CAPP
peng wen li ; zhang ding hua ; yao chang feng ; qin zhong bao
..............page:205-207
The Application of the Queue Theory in Muitipoint Communications
ma bing peng ; cao ju ; yang shu tang ; yu sheng sheng
..............page:212-214
Research and Implementation of BPR Integration Platform Based on J2EE Standard
wu qing zuo ; zhang hao ; qiao fei ; xie xiao xuan
..............page:215-218
Application of EJB Technology in Developing Information Infrastructure of Bank
cheng guo qing ; zhou xiao feng
..............page:221-223,232
The General Design Schene of OA System Based on the Lotus Notes
lu jian jiang ; qian pei de
..............page:224-226
Solution of Binary Data Storage in GCC Information System
yao hui ; zhao xiu sheng
..............page:227-229
Approach to Getting Road Area Based on 2D Gray Image
tang guo wei ; li jing hui ; zhao jian min
..............page:230-232
Application of the Homotopy in Feature Modeling
sun li zuo ; fang zuo zuo ; zhang dan yu
..............page:78-80
Blood Cells Image Decomposition Based on Circular Assumption and Polygonal Approximation
qi guo sheng ; ye dan ; hong qiang ning ; xu duan yi
..............page:75-77,85
Analysis and Improving on DRM-based GDSS
liu jing ; meng bo
..............page:73-74,90
The Research of the Strategies for Disk Cache in the Parallel Video Servers
liu zhi ming ; peng yu xing ; tao yang
..............page:70-72
The New Research Advanced in Grid Computing
sun pei de
..............page:65-69,72
A Panorama System for the Walkthrough of Vegetable Base
fang xian yong ; qiao xiao jun ; pan zhi geng
..............page:46-48,51
Decision-making Layers and Model in the Supply Chain
yu hai jiang ; yang de li ; sun
..............page:36-37
Concept,Prototype and Implementation of Live Knowledge Component
zhang xiao yang ; huo da ; yang jun xue
..............page:32-35
Application Study on Metadata in the E-Gov Official System Realization
yu zuo ; wang yan zhang ; chen xue long
..............page:28-31
The Implementation of a Fingerprint Verification Algorithm Based on DSP System
zhang tang hui ; tian jie ; liu xu
..............page:25-27
Active Models:a Survey
zhang ai dong ; zhang tian wen
..............page:21-24,64
Intelligent Integrate of Genetic Algorithm and Chaotic Optimization
zhang jing dong ; liu xiao hui ; deng fei qi ; liu yong qing
..............page:17-20
Research on Universal Fuzzy Logic Controller
lu bin ; he hua can
..............page:13-16,112
Multi-sensor Data Fusion Method Based on Fuzzy Reasoning
han hong ; han chong zhao ; zhu hong yan ; wen rong
..............page:9-10,60
Research and Application of Material Design Tool Based on OpenGL
wang ke ; le wan de ; lu chang de
..............page:6-8
An Eigen Mouth Based Audio Visual Continuous Speech Recognition System in Noisy Environments
xie lei ;i.cravyse; jiang dong mei ; zhao rong chun ;h.sahli;werner verhelst;j cornelis;ignace lemahieu
..............page:3-5,35