Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 17
Research on Expert System with the Natural Language Interface
wang shu xi ; liu qun ; bai shuo
..............page:35-37,52
A Design for Secure Fingerprint-based Authentication System
ren chuan lun ; li yuan zheng ; yang yi xian
..............page:33-34
Design Technology of Computer High Speed Digital Circuit
hu huai xiang
..............page:128-132
Application of OpenGL in Image Schedule of Project Entity
wang zhi gang ; dai guang hua
..............page:133-135,142
Hybrid-Tree:A Indexing Structure of Spatial Database
fu yu zuo ; guo zuo ; zhou dong ru
..............page:41-42,97
Introduction to Inductive Logic Programming
zheng lei ; jia dong ; liu chun nian
..............page:43-46,86
The Application of Granularity of the Quotient Space Theory in Database and Data Warehouse
zhang ; wu tao ; wang lun wen ; cheng jia xing
..............page:47-49,60
A Cost Accounting Model for Product Design and Its Application in PDM
zhao hong ; xiao yi yong
..............page:63-65
Study and Realization of Japanese-Chinese Translation Engine
hu chun jing ; han zhao qiang
..............page:66-68
The Building of Fault Model in Software Test
zhu rong ; xu shi yi
..............page:69-71,91
An Implementation of Remote Simulation in Matlab
li chang hong ; wang kai hong ; shao hui he ; wang jing cheng
..............page:72-73,79
The Arithmetic of High Performance Several CDROM Mirroring Audio CD and Parallelly Compressing
luo mei ; wan ji guang ; zhan ling
..............page:74-76,106
On the Limitation of Kailar Logic
guo yun chuan ; gu tian long ; dong rong sheng ; cai guo yong
..............page:77-79
Rate Derivation of Real-time Interactive Embedded System
di zheng li
..............page:80-82,222
Building User Model in Adaptive Human Computer Interface Based on Rough Set
li rong ; zhang ming
..............page:98-99,173
A New Ant System for TSPs
li yong ; duan zheng cheng
..............page:103-106
Cost Benefits Analysis of Automated Testing
yu xiu shan
..............page:107-109
Build Distributed Application System Based on Component with UML
yu bin ; he li
..............page:115-116,127
Analyzing Siemens R30/R10 Format Floppy
wu wen bin ; hao pei feng ; wang jun fei
..............page:117-118,122
GUI Interactions Design Based on UML
sun xiao ping ; wei ming zhu ; guo teng chong ; tu xu yan
..............page:119-122
Design and Development of DCS Open Configuration Software
zhu yin xin ; wang jin biao
..............page:125-127
Fast IPv6 Routing Lookups for High Performance Routers
du ping ; hu jun qiang ; li jin sheng ; hong pei lin
..............page:139-142
Research and Analysis of Intrusion Detection System Model
wang rui ; shen hai bin ; yang xiang rong ; shen jun yi
..............page:143-146,149
A Method for Path Choosing Based on Section Routing in Telecom GIS
luo da ning ; guo zuo
..............page:147-149
Hiding Information Detection System Based on RLE
chang su ; tan yun meng ; yang zong kai
..............page:150-152
Application of Data Mining Technology to Intrusion Detection System
wen zhi yu ; tang hong ; wu yu
..............page:153-156,160
Establishment of Graphics Representation Model of Workpiece in Visualization
na yong lin ; liu shu gui ; zhang guo xiong
..............page:50-52
The Penalty Strategy Based on Evolution Period
yang xin wu ; liu chun nian
..............page:53-55
Image Segmentation Based on Region-growing Method in the XYZ Color Space
bi ling yan ; yu ying lin
..............page:56-57,68
A Texture Map Algorithm Based on Harmonic Map
wu ya dong ; han yong guo ; cai yong
..............page:61-62,114
Design of Security Agent Based on Windows 2000 Access Control
guo dai fei ; li zhi jiang ; yang yi xian ; hu zheng ming
..............page:157-160
Research and Implementation of the Iptables Firewall
dong jian an ; wang yong gang ; wu qiu feng
..............page:161-163,176
Study on Message Based on SOAP in cnXML
zhang wei ; ma fan yuan
..............page:14-16,40
A STEP-based Method for Product Information Organization under IIE Circumstance
zhou jing tao ; zhang shu sheng ; wang jian ; yang bai long ; wang ming wei ; he yan li
..............page:11-13
Research on Topic Detection and Tracking
li bao li ; yu shi zuo
..............page:7-10,109
Data Schedule Serialization in Data Transformations
fang you lin ; yang dong qing ; tang shi wei ; zhang wei hua ; yu li bo ; fu qiang
..............page:4-6,187
The Research of Topological Relations between Spatial Objects in 3-D Space
zhu tie wen ; li zuo ; miao qian jun
..............page:1-3,184
Mobile Agent Interaction Based on Shared Data Space
wang hong ; zeng guang zhou ; lin shou xun
..............page:83-86
The Properties and Operators of a Software Architecture Operator Set
liu hai qing ; li zuo ; zheng peng
..............page:87-88
An Algorithm Based on Multi-Tuple Decision Table for Mining Default Rules
yang ping ; yang ming
..............page:89-91
On Measures of Similarity between Vague Sets
zhang cheng yi ; dang ping an
..............page:92-94,102
A New Account Method for Network Computing Environment
he ge ; dong xiao she ; qian de pei
..............page:185-187
The Design of MAPGIS City Planning Management Information System
wang yong ; zhang fa yong ; zhou shun ping
..............page:192-194
Design and Implementation of an Intelligent Data Mining Tool
liu jun qiang ; wang xun ; sun xiao ying
..............page:195-197
RBAC Features in Oracle DBMS
chen juan juan ; hu jin zhu ; xie ya ling
..............page:198-199,212
Research of Multimedia Database Engine and Architecture
shen zhen bing ; wu ling da ; lao song yang ; xie zuo xiang
..............page:200-202,206
WEMU:The Design and Implementation of a WAN Simulator
xiong wei ; cui bao jiang ; liu
..............page:30-32
The Research of Architecture Models for Grid Resource Management
sun zuo ; li zhi ping
..............page:26-29
Survey on Packet Scheduling Algorithms in Wireless Networks
xuan xiao ying ; shi bing xin ; zou ling
..............page:20-21,55
A Multiuser Detector Based on Greedy Algorithm for CDMA Communication
hu yan jun ; zhu jin kang
..............page:17-19,169
Research and Application of Remote Monitoring Technology in the Field of Information Appliance
li xin jiang ; liu cheng liang ; cao qi xin ; yin xiao guang ; mo yu feng
..............page:216-219
Application of CPLD in a Image Sampling System
wei hua ; li jian min
..............page:220-222
Design and Implementation of Maids-a Distrbuted Intrusion Detection System Based on Mobile Agent
xiao jian hua ; zhang jian zhong ; jiang zuo ; wu gong yi
..............page:164-165,180
A Rate-Control Stratery for Video Conference over the Internet
zuo ; zhao ming sheng
..............page:166-169
Design and Realization of Agent Communication Prototype
deng shu guang ; wang bin ; chen song qiao
..............page:170-173
Design and Implementation of DHCP & LDAP Directory Service Integrated Management System
tu xiang yun ; lu kai ning ; zou jun
..............page:174-176
Design and Implementation of a SNMP-based Intrusion Detection System
wang jun ; xiong wei ; xiao de bao
..............page:177-180
The Application of Genetic Algorithm in Data Mining
zhu jin jun ; gao kai ; zhou wan zhen
..............page:203-206
Multiagent Technology and It′s Application in the Virtual Enterprise Partner Selection
bi gui hong ; zhao bin ; yang xiao yuan
..............page:207-212
Research and Application on Role-based Mandatory Access Control Model
xu jun bo ; zhou hong zuo ; jiang ming ; bai wen yang ; xu jie pan
..............page:213-215,219
Mining Rules Based on Time Sequences for Fault Diagnosis in Electric Power Systems
yang yi dong ; sun zhi hui
..............page:223-224,232
Research on the Concept Design of Parallel Machine Tool-oriented Environment Based on Web
meng zuo ; guo zhi ping ; zhu zuo
..............page:225-226,229
Maintenance Decision System Based on Web Service
zhang xiu bin ; guo bo ; tan yue jin
..............page:227-229
Implement the Foundation Software of BACnet/IP Based on Java
wang kai hang ; liu xian de ; hui xiao shi
..............page:230-232