Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2004 Issue 1
4D-MDCT Coding of Color Video Based on Prediction and Compensation
du xiang wen ; chen he xin
..............page:41-42,50
An Application of a Coupled Algorithm by the Artificial Immune and RBF Network
zhou ying ; zheng de ling ; zuo zhi liang ; liu cong
..............page:39-40,46
Security Vulnerabilities and Improvements of the Needham-Schroeder Protocol
shi shu dong ; li zhi tang
..............page:136-137,189
Research on the Issues Related to Information Systems Security Architecture
jiang chun fang ; yue chao yuan ; chen tai yi
..............page:138-140,219
Research on SDH Network Management System Based on UML
liu xing wei ; yan bing
..............page:141-143
Research and Implementation of a Distributed-Computing Model Based on Web Service
zheng xiao dong ; wang zhi jian ; zhou xiao feng ; fei yu kui ; xu feng
..............page:144-147
An Agent-Based SOAP Application Framework
ma chang dong ; xu wei ; li jing
..............page:148-152
Study on Real-time Detection Method of Moving Target Based on Optical Flow
wang xin yu ; zhang gui lin
..............page:43-46
Particle Swarm Optimization Algorithms Based on Simulated Annealing
gao ying ; xie sheng li
..............page:47-50
Nonlinear System Identification Based on Hybrid Evolution Strategy
ke jing ; li qi qiang ; qiao yi zheng
..............page:51-53,156
Research on Some Algorithms in Data Preprocessing of GIS
li fang yu ; pan zuo
..............page:54-55,232
A New Approach for Content-based Shot Retrieval by Fuzzy Classification
dong qing jie ; peng yu xin ; guo zong ming ; xiao jian guo
..............page:56-57,102
Chinese Textual Topic Identification in Domain-dependent
gu yi jun ; yu jiang de ; liu qun ; fan xiao zhong
..............page:58-59,70
Survey of Watermarking for Secure Image
zhang yong ping ; guo bao long
..............page:60-62,67
Automata and Model Checking
shen hao ; sun yong qiang
..............page:63-64,122
Research on Heartbeat Mechanism of Linux High-Availability Cluster
xie bin ; gao yang
..............page:65-67
A New Method about Attribute-reduce in Uncertain IS
cheng yu sheng ; hu xue gang ; jiang xiao yao
..............page:68-70
Channel Robust of Speech Recognition Based on Multi-band HMM and BPNN Fusion
yao zhi qiang ; dai zuo zuo ; li hui ; huang wei
..............page:71-73,82
Search Algorithm for Game of Checkers Based on Knowledge Inference
jiang jia fu ; chen ai xiang ; tang xian ying
..............page:74-76,156
A Spatially Adaptive Redundant Wavelet Denoising Method Based on Image-Segmentation
gan ya li ; tu dan ; hu hui li
..............page:79-82
Ridgelet Transform and It's application to Image Denoising
yuan xiu gui ; zhang an
..............page:83-85,118
The Signature Scheme Based on NTUR Arithmetic
bu shan yue ; wang chong hui ; yan yun yang
..............page:86-87
A New Method of Drawing Vectorization
sun jing rong ; xu lu ping
..............page:88-89,92
Calibrating Algorithm for Vision-augmented Environments
zhao zhuo ; hou yi bin ; liu jing
..............page:90-92
An Object Marker Method with Class Selection Function in Cell Image Process
wu wen qin ; feng hao ; zhang jun qiang
..............page:93-95,105
A Study of Node-Based Vectorization Algorithm for Scan Image of Chart
shen meng hong ; cui yun feng
..............page:96-98,232
A New Classification Method with Fuzzy Rules Based on Heuristics Search
zhang yan ; yuan shu qing ; lu han zuo
..............page:99-102
Study on Technology of Snapshot in Storage System
hu feng hua ; you zhi yong ; li zuo
..............page:103-105
The Design and Implementation of a 3D Speech Animation Chat-room
wang zuo ; zhang dao yi ; dong lan fang ; wan shou hong
..............page:106-108
Design and Realization of an IP Protocol Simulator
liu zhong xin ; guo jia lin ; lin hui xue ; lou guang ; chen zeng qiang ; yuan zhu zuo
..............page:134-135,200
Design and Implementation of Share Whiteboard in Virtual Classroom
zhu qiu xiang ; shen jun
..............page:153-156
A Method for Design and Implementation of NAT in Router
wu you ; chen xiao su
..............page:157-159
A Design of IP Network Management Model Based on Mobile Agent
gao chun ming ; quan hui yun
..............page:160-161,197
The Research of Intelligence Computer Assisted Instruction System Based on Intranet
jiang tian fa ; zheng chong wei
..............page:162-164
A Research of Construction and Design on WWAN Based on GPRS/SMS/CSD
he zuo ; lin jin xian
..............page:165-166,229
Global Design of Micro Payment System
liu rong hui ; liu guang chang
..............page:167-168,175
Sip for Internet Conferencing
zhang yuan ; wu gang ; xiang li ; song yu yan
..............page:169-172
A SVG-based GIS and Its Spatial Analysis Technology
zhao jun ; zuo yu zhong
..............page:109-111,115
Improving Data Access Performance Through V-GridFTP
hu xiao long ; liu qiang
..............page:112-115
The Research on Component Modeling Based on UML
zhang hai bo ; duan hui chuan ; li ya wei ; yao jin
..............page:116-118
A Valued-Added Short Message Service System Based on XML
qi guan peng ; kang jian chu
..............page:123-125,211
Design and Implementation of Alumni Address List Module Based on WAP
wu xiao qiong ; xu jian yong ; xiao yan hua ; shao shi huang
..............page:126-128
FTP Files' Distribution Characteristics and Their Implications
chen hua ; wang ji min ; han jin qiang ; xie xin
..............page:129-133,178
Cryptographic Key Management of Enterprise_oriented Application System
wang wen long ; zhang gui xu ; wang ze cheng
..............page:230-232
A Novel Nonlinear System Identification Method Based on Robust Wavelet Network
lv li hua ; song zhi huan ; li ping
..............page:32-34
An Artificial Immune Model Based on the Computer Viruses' Conservative Patterns
song ming qiu ; deng gui shi
..............page:29-31
Research on Technology of Honeypot Based on DivertSocket
he ju hou ; li wei hua ; lu zuo ; zhang bo
..............page:26-28,34
An Efficient Algorithm for Categorical and Mixed Valued Data Clustering
lin pei jun ; wang yu
..............page:190-191,204
Research on Association Rules Mining Algorithm Based on Power Set
zuo zuo ; cui du wu ; fu chang long
..............page:192-193,200
Design of General-purpose Measurement Control Board for Safety Driving Assist System
yu li ping ; he ke zhong ; ding dong hua
..............page:194-197
The Detection of the Changed Building in City Based on Change Detection Technology
gu wen jun ; zhao zhong ming ; wang zuo zuo
..............page:198-200
The Intelligent Quality Detection Method for Rolling Bearing Based on Support Vector Machine
xiao jian hua ; wu jin pei ; xiong huan ting
..............page:201-204
Applying RT-CORBA to Distributed Virtual Battlefield
yang sen ; zhan shou yi ; li feng xia
..............page:205-207
Enterprise Scheme Management System Based on ASP.NET and XML
li qing hua ; zhang jing ; li jun huai
..............page:208-211
A Solution for Churn Management of Telecommunication Company Based on Data Miming Technology
zhu hao gang ; sun zuo ou ; dai wei hui
..............page:215-219
Expert System of Water Curtain Cooling on Mid-plate
zhao yu gang ; chen gang
..............page:220-222,226
3D Solution to Digital Community in Digital City
tian yi ping ; li wei zhong ; he zhen wen
..............page:223-226
An Active Model for System Vulnerability Handling
liu bo ; liu hui ; huang zun guo
..............page:24-25,38
Analysis of the AIMD Congestion Control Algorithms
liang feng ; weng ge qi
..............page:173-175
The Principle of IP Micro-mobility Protocols
su xiao ping
..............page:176-178
Realize General Data-Tier Component Based on ADO.NET Technology
zhang hong guan ; liu qiang
..............page:181-184
Research on Decision Tree in Data Mining
ma xiu hong ; song jian she ; dong zuo fei
..............page:185-185,214
Algorithm and Application of the Decision Attribute Classification Based on Information Entropy
shu hong ping ; you zhi sheng ; jiang jian min
..............page:186-189
Analyzing the Attacks Types on the Cryptographic Protocol
li li ; zhang huan guo
..............page:16-19,46
A Survey on the Fundamental Issues and Research Progress of Topological Relations
deng min ; feng xue zhi ; liu wen bao
..............page:12-15,34
Research and Analysis of the Development of CSCW
song hai gang ; chen xue guang
..............page:7-11