Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 20
Research on the Design and the Model Formalization Representation for Mechanical Kinematic Scheme
ren gong chang ; wang xi ming ; zhang you yun ; liu yong hong
..............page:213-215
Self-adjustive Techniques for Control Engineering of Genetic Algorithms
he su liang ; yu shou yi
..............page:210-212
Plant's Leaf Dynamic Growth Based on the Combination of Image and Graphics
xiong hai qiao ; jiang li hua ; li lei ; liu xiao dong
..............page:207-209
The Analysis and Design Based on UML of the Mould and Die's Network Negotiation Management System
chen yuan zuo ; chen qing xin ; mao ning
..............page:201-206
Classification of Evoked Potential Signal During Anesthesia Monitoring with Wavelet Transform
zhang lie ping ; mo zuo ; niu qin zhou
..............page:198-200
Study on Design and Application of Web-based Product Configuration System
li ren wang ; qi guo ning ; wang xian mei ; pan shui feng
..............page:195-197
MP4 Transmission Using Turbo Codes
fang zhi jun ; zhou yuan hua ; zhou jun ; zou dao wen ; xie zhi hua
..............page:15-17
Deriving User Profiles for Relational Database Using Distance Measure
zhang yong ; feng yu cai ; zhu hong
..............page:13-14,41
The Web Service Semantic Description Model for Dynamic Application Integration
wang feng jin ; cheng bo qun
..............page:8-12,17
Analysis of High Performance Router Architecture
sun bao lin ; li la yuan ; lu wei
..............page:5-7,58
Speech Recognition Studying in Noisy Environment
yang da li ; xu ming xing ; wu wen hu
..............page:1-4
The Development of a Customized Virtual Control Platform for the Distributed Manufacturing
fu chao ; chen you ping ; huang jie ; zhou zu de
..............page:192-194,226
Query Method and Optimization Based on Skew Data Sources on Internet Database
hong xiao guang ; lu ping
..............page:185-188,200
The Research of Clustering in Data Mining
luo ke ; cai bi ye ; wu yi fan ; xie zhong ke ; zhang li
..............page:182-184,218
Design and Implementation of Chinese Full Text Database Base on Lucene API
zhao ting ; meng xiang wu
..............page:179-181,197
Searching Standard Latin Square Algorithm with Order
tang ke ming ; yin xin chun ; chen
..............page:107-109
The Integral Representation of Measures of Similarity Between Vague Sets
dang ping an ; zhang cheng yi
..............page:105-106
3D Recursive Searching Block Matching Algorithm Applied in Video Format Conversion
wang jian guo ; zhou yuan hua
..............page:102-104
Technology of Location Management in Mobile Communication System
cui li ; yang geng ; chen shan shan
..............page:154-156
Implementation of RBAC in PKI
jiang feng ; yuan wei zhong ; huang zuo ; xie jun yuan
..............page:150-153
An Implementation of Multicast Routing MIB on Linux
wang jia hao ; cheng wen qing ; wu xiao jian ; du xu
..............page:148-149,156
Web Method PABX Console
gu kai
..............page:145-147,229
The Design and Implementation of a Linux-based Protocol Stack
zhou zong zhao ; huang jian ; yang zong kai ; du xu
..............page:143-144,178
Research of the Automatic Mining System of the Electronic Documentary Information
cai li jun ; zhang da fang
..............page:139-142
The Disadvantage of SET Protocol and the Improved Scheme
gan yuan ju
..............page:137-138,160
Research of Mixed-transmission Technology for Real-time Multimedia on Intranet
li hai fang ; fang jun ; fan sheng yin ; zhang guang wei
..............page:133-136,209
Implementation Methods of Vlan in Linux OS
luo jun ; tan xing lie ; shen chang xiang
..............page:129-132
A Microfocus X-Ray Radioscopy Scanning Control and Image Acquisition System
xiao yong shun ; li zheng ; chen zhi qiang ; kang ke jun
..............page:113-114,121
Visualization of the Mathematics Model
sun hai tao ; liu hong ; gao li ping
..............page:115-118
BCI Based on Imitating-Reading-Event-Related Potentials
xie qin zuo ; yang zhong le ; chen ya guang
..............page:119-121
Extension of Text2D of Java 3D and Its Applications
feng qiao sheng ; chen yu hua ; liu dan fei ; duan peng
..............page:122-125
The Design of an Authoring Tool for Teaching Presentation
lu hai tao ; wang zuo ying ; sui ming wei ; zuo yu zhong
..............page:126-128,132
PACS System Based on Wireless Local Area Networks
tong ming ; bian zheng zhong ; li xiao hui ; zhang liang
..............page:29-31
A Simple Algorithm for Removing Salt and Pepper Noise from Gray-scale Image
dong ji yang ; zhang jun ying
..............page:27-28,65
Implementing Content Filtering Based on Network Security in WWW Proxy of TIS
he jing ; liu hai yan ; gong yun zhan
..............page:25-26,109
Improved Approach to Resisting TCP DoS Attacks
zheng wei bin ; zhang de yun ; gao lei ; wu zhan
..............page:22-24,31
Design and Realization of Broadband Access System Based on the Concept of RSN
wei ke ; duan hai xin
..............page:18-21,47
Software Reuse and Variation Points Handling Research on ERP Developed for Discrete Manufactures
zheng hai ; zhao zuo bin ; song shun lin
..............page:216-218
Automatic Testing and Simulation of Digital Circuit Board
wang da zuo ; dong wei
..............page:219-222
Study and Implementing on a Testing System of Computer Foundation Based on Web
guo qing bei ; qu shou ning ; wang yong yan
..............page:223-226
Research and Application of Role-based Access Control in B/S System
huang kai ; chen yun ; yan ru zhong ; zhang kai tao
..............page:227-229
Mining Medical Image Based Association Rule to Diagnose Breast Cancer
jiang liang xiao ; cai zhi hua
..............page:230-232
Study of Database Connection Middleware
zhu xiao ming ; liu wei dong ; zuo wei min
..............page:176-178
A Framework for SQL Conformance Test
li ming ; lian qiao ; yang xi kun ; yao jian fei ; ye xiao jun ; wang jian min
..............page:173-175
The Design and Implementation of a Metadata Interoperable Architecture Supporting OAI-PMH
wang shu an ; wang meng ; zhang ming
..............page:168-172
An N-to-1 Protection Method Based on MPLS-DiffServ
wang hua ; wang zuo ; sun ya min
..............page:165-167,232
The Design and Implementation of Powerful Message System
wang zuo zuo ; jin lian fu
..............page:161-164
A Study of Computer Network Vulnerability Assessment
dong liang xi ; wang jia zuo
..............page:157-160
A Method of Audio Scene Analysis Based on Hidden Markov Model
wei yu hong ; han ji qing ; zhang lei
..............page:85-86,191
Researching of MPEG-4 Motion Coding and Decoding
zhang hui ; he gui ming ; liu yun peng
..............page:80-84,121
Biometric Identifition Techniques
xia hong bin ; xu wen bo ; liu yuan
..............page:77-79,153
Classified Image Denoising Method Based on the Wavelet Package
diao hong xiang ; jiang jia fu ; tang xian zuo
..............page:74-76
A New Line C1ipping Algorithm Based on Window and Line Geometry Transformation
shang ming qing ; lu guo dong ; tan jian rong
..............page:71-73,121
An Adaptive Immune Algorithm Applied to Optimization Computation
zuo xing quan ; li shi yong
..............page:68-70
A New Filter for Removing Heavy Impulsive Noise of Image
wang bao ping ; li zong ling
..............page:51-52
Human-Like Abstract Logical Inference Controller
wang pei jin
..............page:48-50
Texture Segmentation with M-band Wavelet Transform and Fuzzy C-Means Clustering
li feng ; cai bi ye ; chen zhi jian
..............page:45-47
Analysis of Remote-Sense Image on Gray-Level and Fractal
xu ming ; zhao rong chun
..............page:42-44
A Method for Circle Detection Using Modified Hough Transform
sun yi nan ; liu wei jun ; wang yue chao ; sun yi peng
..............page:35-37
Study on Modeling Method of Manufacturing System Based on Fractal Theory
peng wen li ; zhang ding hua ; qin zhong bao ; yao chang feng
..............page:32-34,94
Binary Trade-Mark Retrieval Using Entropy and Moment
huang yuan yuan ; guo li ; yang jing yu
..............page:100-101,142
Optimization of Discrete Hidden Markov Model Based on an Improved Tabu Search Algorithm
liu jiang hua ; chen jia pin ; cheng jun shi
..............page:92-94
A Formal Transformation from UML Models to COOZ Specifications
huang chun rong ; li xuan dong ; zheng guo liang
..............page:89-91
The Research on the Virtual Process Planning Based on the Agent Technology
xie sheng li ; huang qiang ; lin lan fen ; dong jin xiang
..............page:87-88,222
An Algorithm about Using Bezier Curve to Close with Sampling Point
jiang li hua ; luo zuo xian ; liu guo rong ; liu xiao dong
..............page:66-67,76
The Extension of UML on Business flow Description
gu rong ; zuo chun
..............page:62-65
A Fast Multiplier for Elliptic Curve Cryptosystems over Composite Fields
lu jun sheng ; zhang wen xiang ; wang xin hui
..............page:59-61
A Network Model Fitting MPEG-4 Video Transmission over IP Differentiated Services
chen min ; zhu xiao song ; wei gang
..............page:53-58