Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 24
A Construction Method of Network Emulation Environment Supporting Multicast on LAN
sui hua zuo ; ma dian fu ; zhao lu
..............page:143-147
Developing E-commerce Application with Java2 Platform Enterprise Edition
zhang hong mei ; yu bin
..............page:139-142
Impact Use of Biped Robot Foot on the Ground During Fast Movement
zhou yun long ; hao li na ; xu xin he
..............page:48-50
Implementation of Secure Peer Group in Peer-to-Peer Network
li zu peng ; zhao xiu bin ; huang dao ying ; zhuang lei ; huang jian hua
..............page:51-53,59
Multi-agents Cooperation Strategy for Soccer Robots
zhong bi liang ; zhang zuo ; yang yi min
..............page:60-63
A Technology of Automatical Rule Knowledge Acquisition Base on Inductive Learning
yi wei ; zheng qi lun ; peng hong
..............page:83-84,102
The Compiler Technology of NGS on the Grid
cong yang ; wang lei ; zhu kai jia ; liu you cheng
..............page:85-87,142
Study on Networked Test Technology
zhou nan de
..............page:91-93
Adaptive Subdivision & Area Graph Segmentation and Edge Detection Method Based on Grid Computation
li chang he ; qin xin ; zhang er hu ; shi zheng hao
..............page:94-96,109
Oakley Key Deternination Protocol
fang yong ; zhou an min ; liu jia yong ; cai jian
..............page:148-149
An Efficient Certified E-mail Protocol
gan yuan ju ; shi rong hua ; yang zheng yu ; cao gang
..............page:150-151,228
An Implementation of CA Based on SSL and CORBA
xu chun lin ; li tao ; wang wu rong ; zhang wei ; wu liang fu ; zhao hui
..............page:152-153
Data Preparation in Web Usage Mining
yi min zuo ; wang sheng ; zhang you ren ; chen bao shu
..............page:154-157
Interoperability and Trust Models of PKI
liu hai long ; zhang qi shan ; wu jin pei ; yuan cang zhou
..............page:97-99,125
A Digital Image Watermark Method Based on ECC
mei shi chun ; li ren hou ; dang hong mei
..............page:100-102
A Method for Automatic Segmentation of Visual Moving Objects
cui yan hua ; lu chao yang
..............page:103-105,112
The Development of Data Acquisition System Based on USB
yang zhi jun ; tian di ; yu qing song ; hao xin zuo
..............page:110-112
Implement Automation of the Application Via Mouse Autocontrol
hu zhi wen ; chen lian yun ; yu zeng liang
..............page:113-114,157
A Realization Method of Fast Algorithm of Mallat Orthogonal Wavelet Transform under Labview
duan chen dong ; li ling jun ; he zheng jia
..............page:115-117,186
Design and Implementation of Distributed Workflow Execution Service
li hong xin ; fan yu shun
..............page:118-120
Designing Conception of Software Configuration Management Tool(SCMT)
ren ji ping ; liu wen hong ; cui zong xue ; zhu guo qing
..............page:121-125
Linux and Windows Systems each other Operating Methods
wu min quan ; zhang zhi yi ; liu jun ping
..............page:126-128
A Voice Browser Based on VoiceXML
cheng long ; yang hai lan ; wu gong yi
..............page:129-130,220
An Interactive Real Time Simulation Based on Matlab/Simulink
chang qing ; xing chao ; li yan jun
..............page:131-132,153
The Implementation of Flash Memory Based File System
zhong xin ; mu chun zuo
..............page:133-135,162
Key Technique for System Conformity by Using .NET
qiu yan ; wang qing ling
..............page:136-138,162
A New Method of SAR Image Segmentation Based on the Fractal Theory
xue xiao rong ; zhang yan ning ; zhao rong chun
..............page:27-29
A Robust Change Detection Algorithm for Varying Illumination,Shadow and Reflection Conditions
ming ying ; bian zuo zuo ; jiang jing zuo ; wang gang
..............page:23-26
Survey of the Network Measurement and Behavior Analysis
lv jun ; li xing
..............page:19-22,44
Research on Integration of Mobile Computing and ERP
pan xing ; liu lu ; li chao
..............page:15-18
Simulation for Principal-subordinate Robot Scene 3D Computer Visualization
hu jun ; li jia ; liu wen jiang ; hu huai zhong
..............page:12-14
A Fuzzy Neural-Net Model for Software Reliability Evaluation
wang tie jiang ; zuo meng
..............page:37-39,63
Desulphurization Prediction Model Based on GRBF Neural Network
huang ying song ; liang xie xiong ; cao chang xiu
..............page:218-220
The Techniques of Data Visualization and Application of CFD in Process Metallurgy
xiao gang ; zhang shi jun ; jing zhong liang ; li jian xun ; fan jun fei
..............page:221-224,228
Application and Construction of Bayesian Networks Based on Fault Trees
li jian chuan ; hu zuo qing ; qin guo jun ; wen xi sen
..............page:225-228
A Combination of Electrical and Mechanical Braking Optimum Control and Simulation for an Electric Transmission System
zhang yu nan ; ge yun shan ; zuo ke mao ; ma xiao jun ; yan nan ming
..............page:229-232
The Relation between Value-patterns of Condition Attributes and Decision Classes
wang li hong ; wu geng feng
..............page:45-47,50
A Survey on the Basic Issues and Developments of Three-dimensional GIS
wang ji zhou ; li cheng ming ; lin zong jian
..............page:40-44
Cloud Model Based Interpretations of Some Issues in Spatial Data Mining
wang shu liang ; shi wen zhong ; li de yi ; wang xin zhou
..............page:33-36
A Study on Autonomous Agent Distributing Type Intrusion Detection System
zhang jian ; ruan xin xin ; jin hai
..............page:30-32
Measurement of the Requirement Management Key Practice Area
zhu li juan ; qian hong bing
..............page:64-66,76
An Introduction to Region of Interest Coding Techniques in JPEG2000
sun wu ; wang you zuo
..............page:67-68,71
Design and Realization of Genes Recognizing System Based on Hidden Markov Model
liu qing ; yan xiang dong
..............page:69-71
Model Selection of SVM with RBF Kernel and its Application
wang peng ; zhu xiao yan
..............page:72-73
The Evaluated Calculation for Poisson Curves
zuo yong wei ; jin jian guo
..............page:74-76
Immune Mechanism of Education Agent:Principles and Applications
gong tao ; cai zi xing
..............page:77-79,147
Research and Realization for Modeling and Visual Method of Three-Dimensions Stratum Model
meng jun ; yu xiao bing ; wang xiu kun
..............page:215-217
Research and Analysis of Scheduling Algorithms in Packet Switching Networks
yi peng ; jin zuo guo ; zhang xiao hui ; guo yun fei
..............page:177-180
E-Commerce System Based on Multi-Agent Using XML Message
xu de zhi ; lai tong qing ; wu min
..............page:181-183,192
A Method of Functional Dependencies Inference Control
wu heng shan ; zuo zhi dong ; zhu hong
..............page:184-186
Incremental Updating Algorithm for Mining Maximum Frequent Itemsets
jiang yu quan
..............page:187-188,201
An Efficient Self-organizing Based Data Reduction Algorithm
wang jia cai ; chen qi ; yu rui zuo
..............page:189-192
Removing Noises from Binary Image by Model Analyzing
fu jing guang ; xu gang ; wang yu guo
..............page:88-90
Architecture of Sybase Database and its Application in the System of Industry and Business Management
feng dong qing ; zhang xin hong ; zhang xue wei
..............page:193-195,217
Application of Computer Control in Central Heating System of Gas Boiler
liu xue ming ; chen zuo
..............page:209-211
A Study of Order Strategy for Distribution System Based on Self-Adjustable Genetic Algorithms
zhang sheng hui ; chen xin du ; chen xin
..............page:212-214,228
A Representation and Implementation of the Multi-agent Interaction Protocol
zhao zhi ; sheng qiu zuo ; gao xiang ; shi zhong zhi
..............page:8-11,29
New Strategy to Develop DCS Simulator Using Control Configuration Software
wang yu hong ; huang de xian ; gao dong jie ; jin yi hui
..............page:5-7
Matrix-view of Association Rules Generated by a Maximal Frequent Itemsets
yu li ; liu ying jie ; liu lu
..............page:1-4,36
LAN-Based File-agent Design
wang liu ping ; liu hong
..............page:160-162
Research on the Technology of Multiprotocol Label Switching
zhao yi cheng ; wang yao yong
..............page:163-165,204
Improved RML Routing Algorithm and its Application in MAS P2P Framework
qiu rong hao ; dong jian quan
..............page:166-168
Study and Implementation on Web-based Device Management Technology
zhang zuo ; zhang yin fu
..............page:169-171
An E-Commerce Framework Based on Negotiation and Agent
xie zuo ; meng bo
..............page:172-174
Construction of an Embedded E-mail Sender Platform
zhang zhi chang ; wang jin dong ; zhao hai
..............page:175-176,232
The China Patent Examination OLAP Based on Data Warehouse
li zhong hua ; zhang li jun ; guo ying
..............page:196-199
Kernel PCA for Sci-tech Journals Evaluation
zhang ai li ; liu guang li ; liu qing shui
..............page:200-201