Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 4
Design of LS MPP Parallel C Language
cheng xiang ; hu bao cheng
..............page:143-144,188
Event Driving Mechanism of High Available System Software HHA
wang li ; li xin ming ; li yi ; liu shao nan
..............page:145-147
The Design and Implementation of IS Based on Software Component Technology
shao zeng zhen ; liu hong ; gao lei ; liu lei
..............page:148-151
Analysis of Triple-thread Structure in ChineseHacker Virus
cui xiang ; ji zhen zhou ; yuan quan
..............page:152-153,191
Several Network Bandwidth Measurement Algorithms and Their Comparison
li dong ; jia hui bo
..............page:154-156
The Technique of Authentication and Encryption and for the Application of Network Forensics
lin hui ; yang ze ming ; lu xiao fei
..............page:157-159,203
System Management Kernel Communication Based on High Speed Ethernet Fieldbus
fang bo ; feng dong qin ; jin xin yu ; zhang shou miao
..............page:160-161,226
Honeypot-Network Trap
ma yan li ; zhao zhan sheng ; huang xuan
..............page:162-165
Intrusion Detection System Based on Data Mining
wu ji ; huang chuan he ; wang li na ; wu xiao bing
..............page:166-168,191
A Congestion Control Scheme of Unicast Streaming Video over IP
chen dan ; he hua can
..............page:169-171,226
Research of Large-scale Distributing Intrusion Detection System
song jing han ; li tao ; zhu wei ; chen chuan bo
..............page:172-174
A Novel DiffServ-based Packet Discarding Algorithm
wang zhi ge ; zheng feng ; yang zuo ; gao chuan shan
..............page:175-177
Firewall Group Security Protection Architecture Based on Trust Model
cheng zhi rui ; jiang dong xing ; wu hai yan ; zhou lin ; liu qi xin
..............page:178-180
The Realization of an Algorithm for the QoS Model Based on Scalable Core
yang fu meng ; yuan xiao bin ; zhou kang yuan ; shi jun ; lian bing
..............page:181-182,229
Research on VPN's NAT Traversal and System Design
li jian ; wang kun ; cao jin ke ; xie pei tai
..............page:183-185,188
Research of QoS Management in Optical Transport Networks
xue wen ge ; wang yu ; li zeng zhi ; wang zhi wen
..............page:186-188
Research of Smart Image Card
dai yong
..............page:139-142
A Method of Using Web Log Mining to the Performance Evaluate of Network Station
liu bing xiang ; sheng zhao han
..............page:189-191
Study of Automatic Counterpart Monitoring Technology Based on Distributed Environment
cong li zuo ; xia xiu feng ; yu ge
..............page:192-194
Wavelet ANN-based Head Detection
li he heng ; zhang xing ming
..............page:86-88,101
Study on Application of Flexible Polyhedron to Genetic Algorithm (Ⅰ)
xiao hong feng ; liang feng ; tan guan zheng
..............page:83-85,111
A Study on Semantic Rules in Chinese Sentential Input Systems
gao sheng ; wang xiao long
..............page:80-82
Standard Description of Components Based on XML
zhan de chen ; wang zhong jie ; xu xiao fei
..............page:89-92
The Design of C4.5 Decision Tree Presentation Algorithm
jiang xin ; xu liu tong ; zhang lei
..............page:93-94,97
A News Video Scene Segmentation Method Based on Semantic Information Extraction
xu jun ; li ling qing ; zhou dong ru
..............page:204-206,221
The Design Method of the Report System in MIS Development
zhang ju jian ; gan zuo chu
..............page:207-208,212
A Formal Verification Method for System Safety
wang hai feng ; lv yong bo ; zhang zhong yi
..............page:48-49,107
A Flexible Multilevel Transaction Model FMTM and its Implementation by EJB
zhi xiao li ; lu zuo da
..............page:50-52
An ASP-Oriented Process Information System Platform for Magnesium Alloy Machining Trade
jia xiao liang ; zhang zhen ming ; xu jian xin ; zhu ming zuo ; huang nai kang
..............page:56-58,65
Spatial Data Organization and Implement Based on ORDB
wang ying hui
..............page:45-47,142
Constructing a Beowulf Parallel Computing System Based on Windows and MPI
chen xing ; huang ka ma
..............page:59-61
Research of Chinese Person Names Identification Based on Surname
zhang yang sen ; xu bo ; cao yuan da ; zong cheng qing
..............page:62-65
The Framework of Virtual Enterprise Based on Multi-Agent System
peng zuo zuo ; xia an bang ; zhang chang zuo
..............page:72-74,82
A Secure and Efficient Digital Multi-signature Scheme
zheng zhi hua ; xu qiu liang
..............page:75-76
Communication and Coordination in IARS-MAS Model
xu de zhi ; wu min ; sun ying ; zeng guang ping
..............page:77-79,97
Research on Open Distributed PDM Systems Based on Linux and Web
zhang guo gang ; wang jian hua ; geng ying san
..............page:209-212
Data Mining in the Research and Application of Telomere Shortening
liu juan ; cao jia heng ; wei zhi ; lin zhi
..............page:195-197
Adaptive Query Processing:Solution for Internet Data Querying
cui qing guang ; ding lu ping ; xu cai xin
..............page:198-200
Strategy of the Document Management in Computer Supported Cooperative Design
zhang peng cheng ; li ren hou ; qin ming ; gu xin hua
..............page:201-203
Design and Development of a Safety Remote Supervisory and Control System
yao yi sheng ; ma zeng liang ; zou yi ren ; zeng zuo fang
..............page:219-221
The Research of Real_time Sampling Information in Far Control Syetem
wang xiao feng ; wu ping dong ; ren chang qing ; huang jie ; ma shu yuan ; chen zhi long
..............page:227-229
A New Wavelet Image Coding Algorithm Based on Regions of Interest
zhang li bao ; wang zuo
..............page:22-25
Stereo Video Surveillance System Calibration Based on Survey
zhang chun sen ; pan he ping
..............page:18-21
A Requirements-Based Model for Software Project Risk Management
huang meng
..............page:14-17,101
An approach of Route_Segment-Based Collision Alert Technology
xu guo biao ; yu jiang
..............page:213-214
Study on the Collision Term of Powder and Binding Two-phase Flow
zheng zhou shun ; qu xuan hui
..............page:215-216,232
The Searching Strategy Based-on Layered Causal Module
guo yong hong ; fu ze tian ; li dao liang
..............page:4-8
Equipments' Simulation by Using VRML
wu yao hua ; wang yan yan ; wang chang xiang ; liu hui
..............page:230-232
Knowledge Integration for Information Integration
he yan li ; yang hai cheng ; he wei ping ; zhou jing tao
..............page:38-41
The Analysis of Stream-Copy in Multimedia Servers
tan yu bo ; peng yu xing ; zhang yong jun ; chen fu jie
..............page:36-37,44
Study on Discrete Manufacturing Process of Digital Automatic Line
huang xue mei ; zhao ming yang ; chen shu hong
..............page:33-35
Information Security Analysis for Supply-Chain Enterprises Based on Internet/Intranet
wang hai hang ; li qiong ; ge qin geng ; wei hui
..............page:30-32
A New Associative Memory Neural Network Using Loop as Storage Unit
wang jian ; mao zong yuan
..............page:26-29,52
Comparison and Analyse between Genetic Algorithm and Hopfield Network to Resolve TSP
liu ning zhong ; yang jing yu
..............page:95-97
Systematical Study on Design Knowledge Management Based on Web
qi yuan sheng ; peng hua ; fang xing ; yang ming zhong
..............page:98-101
A Method for Extracting Head Images Based on Acknowledge
chen mian shu ; fu ping ; yan su
..............page:105-107
Modeling of 3D Geological Attribute Body Based on Volume Data
wu zuo ; ma dian fu ; hua gang
..............page:108-111
Research on System Model in XML Environment
chen ning ; wu qi zong
..............page:112-114,130
The Basic Algebra Characteristic for the Matrix Model of the State Automata
zhu zheng yu ; zhu qing sheng
..............page:115-119
Vision-based Moving Objects Detection in Complex Scenes
liang zuo ; huang xin han ; wang min
..............page:120-122,165
Data Field Theory and Application on Handwritten Signature Verification
chen zuo ; li de yi
..............page:123-126,134
The Research and Realization of Braille-chinese Machine Translation System Based on Mixed Language Model
zhou chun geng ; zhang bing quan ; huang he yan
..............page:127-130
Using IC Card to Achieve a Secure E-Mail Design
li yang hui
..............page:131-134
Design and Implementation of Telepresence System for THMR-V
fan tie zuo ; ding dong hua ; he ke zhong
..............page:135-136,147
The Design of Voice Communication Software Based on LAN
li ning xi ; zhang xia
..............page:137-138,177