Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2004 Issue 15
A Hidden Markov Model Based on Factor Analysis and its Training Algorithm
wang xin min ; yao tian ren
..............page:79-81
An Improved Adaptive K Near Neighbor Clustering Algorithm
huang xiao bin ; wan jian wei ; zhang yan
..............page:76-78,130
Gender Identification Using HMM
deng ying ; ou gui wen
..............page:74-75
An Improved Genetic Algorithm for Transceiver Placement Problem in Radio Network Design
zuo he ren ; guan lin ; xie sheng li
..............page:72-73,191
ISODATA Based Fuzzy Cluster Analysis Algorithm and its Applications
qian xi yuan ; shao zhi qing
..............page:70-71
Time-domain Based Reed-Solomon Encoding and Decoding Algorithms and their Optimum Realization Using AVR
wang quan ; ma xu dong ; qi chun ; luo xin min
..............page:141-144
The Design and Implementation of Stand-in Honeypot
geng yan ; zhang xin jia ; wang pei ; dai guan zhong
..............page:145-147
The Principle and Implementation of a Network Simulator with Open Source Code
wang xiu li ; wang yong ji
..............page:137-140,147
IPv4 Routing Lookup and Analysis of its Algorithms
xiao yu ; lan ju long ; liao ying ; hu yan
..............page:131-136,229
Design and Implementation of a Mechanism of Intrusion Evidence Audit and System Recovery in Open Systems:Eudemon
zhong hai jun ; wu zuo ; liu an ; zeng qing kai ; huang zuo
..............page:126-130
Grouped Cryptographic Algorithms' Implementation on Itanium Processor
chen xun ; jiang jing fei ; zhang min xuan
..............page:40-42,208
A Rule-statistic Model Based on Tag and an Algorithm to Recognize Unknown Words
su fei ; wang dan li ; dai guo zhong
..............page:43-45,91
Lossless Image Coding Scheme Based on Lifting Wavelet and Context Modeling
yu jin hua ; chen jian hua ; shi xin ling
..............page:49-51,118
Research on Feature Selection Using Genetic Algorithms
zhao yun ; liu wei yi
..............page:52-54
Mining Fuzzy Associate Rules and Response in IDS
zhu tian qing ; wang xian pei ; xiong ping
..............page:148-150
The Application of Data Mining on Log Management
yu shao hua ; guan yong ; dai yi qi
..............page:178-181
One Algorithm for Discovering Frequent Itemsets without Candidate Generations
zhou huan yin ; zhang yong ; zuo peng
..............page:182-185
The Application of Point in RDBS
chen yun liang ; cai zhi hua
..............page:186-187
Iterative Backtrack Algorithm of Query Optimization
han meng ; hong xiao guang ; zhang yong
..............page:188-191
Research of Standard Secure Network Management MIB
liu lan ; li zhi tang ; lin jun
..............page:151-153,177
Research and Implementation of Interworking between MGC and MGC
zhu mu cheng ; zuo xian hua ; yuan zuo chang
..............page:154-156,160
OWL Based Webpage Vision Constructure Ontology and Web Data Mining
lin zuo ; he qin ming
..............page:157-160
Design and Implementation of the Net Monitor System for Application Softwares Based on SNMP
fei hong xiao ; kang song lin ; shi rong hua
..............page:122-125
New Dynamic Key Management Schemes for Access Control in a Hierarchy
lu jian zhu ; chen huo yan
..............page:23-25
Implementation of GABDMS :a Genetic Algorithm Based Prototype System for Data Mining
shen wen wu ; wang cheng liang ; cheng ke fei ; zhang qin
..............page:26-27,125
Fault Tolerance of Mesh Networks Based on Node Failure Probability
liu xian feng ; wang gao cai ; chen jian er ; chen song qiao
..............page:28-30,106
An Adaptive Audio Digital Watermarking Algorithm Based on Frequency Masking
wang rang ding ; xu da wen ; chen jin er
..............page:31-33,64
A Unified Integrating Method for Structured and Semi-structured Data
li sheng zuo ; xu fu yuan ; xu ying
..............page:34-36,100
An Algorithm for Location Analysis in Location Dependent Query Scheduling
gao yin yin ; yang jian jing ; lin huai zhong ; chen chun
..............page:37-39
On the Spread Frequency Sequences in Anti-interference Integrated Information System
zhao dong zuo ; wang zuo da ; ru le
..............page:161-164
An Improved Key Recovery Technology of IPSec
fu xiao qing ; yu wen jun
..............page:165-167
Multi-Level Orthogonal Architecture Models of Agent Organization
zhang you sheng
..............page:20-22
A Dynamic Multicast Routing Algorithm with Multiple QoS Constraints
xu yi ; li la yuan
..............page:17-19,22
A Neural Computing Model for Entire Parens Recombination Genetic Algorithm
gong dao xiong ; ruan xiao gang
..............page:13-16,174
Combining Classifiers for Aircraft Type Recognition
yang li ying ; zuo zheng ; wang xiang hua
..............page:10-12
Research and Implementation of CRBTS Based on CPH in Mobile Intelligent Network
wang chun ; liao jian xin ; shen qi wei
..............page:6-9
Item-based Collaborative Information Recommendation Algorithm
zhang jian ; guo yan hui ; zhong yi xin
..............page:4-5,181
Multi-sensor Parameter Estimation Data Fusion Based on Least-Square Criterion
duan zhan sheng ; han chong zhao ; tao tang fei
..............page:1-3
A New Anonymous Correspondence Mechanism:Research of Anonymous Socket Based on the P2P Network
li zhi zuo ; dong jian quan ; li wei
..............page:168-170
Research on Modular Architecture for Software Wireless Communication Systems
qiu yong hong ; liu shan jian ; ji shu lang
..............page:171-174
A Study on the Reducing Method of Rough Set Decision Table Based on Fuzzy Cluster
zhang shu hong ; sun jian xun ; zhang jin long
..............page:175-177
Combined Digital Watermark and Digital Signature Scheme for Binary-image Authentication
zhou yong lei ; wang jing chun
..............page:55-58,61
The Triangulation Algorithm of Scattered Data Based on the Compatibility of NURBS
cai qing hua ; liu wei jun ; zheng peng ; li wen long
..............page:59-61
Information Hiding Based on Turbo Coding
chen xin hao ; chen jun bo ; chen ya guang
..............page:62-64
Core-point Searching in Poor Quality Fingerprint Image
hu hua ; liu guo ping
..............page:65-66,84
On the Refinement for the Semantics Model of BAN Logic
fei ding zhou ; deng da qiang
..............page:67-69,121
The Design and Implementation on the Agent Based on AlbertII
zuo chuan hui ; li long zuo
..............page:85-87
Implementation of Two Multicast Methods in Mobile IPv6
ye chi ; sun li min
..............page:88-91
Schedule Control in the Audit of Information System Engineering
hao xiao ling ; li ming ; hu ke zuo
..............page:92-94,185
Developing and Performance Analysis of Device Driver for Encryption Card under Windows 2000
jiang ming hua ; zhou jing li ; cai shi gui
..............page:95-97
Design and Implementation of Mail Receiver for Blind Person
liang zhe zuo ; song xiao bo ; zhu zhen min ; liu ren ren
..............page:98-100
Research and Application on Robot Controller Based on C/S Model with LabVIEW
shen jin qi ; zhu jing
..............page:101-103,113
Research on Sharing CAD Data by Multi-user in Real Time
wang xian xiang ; wu chang sheng
..............page:104-106
Design and Implementation of Security File System in Windows2000/XP
xu fang ; shen chang xiang
..............page:107-109
The Design and Implementation of a Workflow Definition Tool
yan fen ; yin xin chun
..............page:110-113
An Online Parameter-tuning System for Apache Web Server Based on COM
long tu jing ; sun zheng shun ; li chun wen ; jiang pei gang
..............page:119-121
Research on CORBA Based Spatial Database Access Technology
wang xiao cheng ; cai zuo
..............page:192-194
XML-based Knowledge Input of Virtual Crops Platform
li hui ; liu xiao dong ; cao yun fei ; wang zuo feng
..............page:195-197
Application of VRML to 3D Visualization of Simulation Results for Grain's Shape
wang ren fang ; li wei ; chen jia xin ; yang yun lin
..............page:198-200,205
A Fuzzy Logic Based Asking Strategy for Seller Agents in E-commerce
yu ming ; di yu qing
..............page:201-205
Micro Programmable Controller Based on the Intelligence Data Collector
zhang qi ; lin kui
..............page:206-208
Applications of Kernel Fisher Discriminant on Gender Classification
he guo hui ; gan jun ying
..............page:209-210,221
Design and Implementation of Workflow Management System Based on XML and ASP.NET
liu hai chuan ; chen pei jiu
..............page:214-217
Geographic Information Modeling of WebGIS Based on GML
luo yan min ; tu chao
..............page:218-221
A VLSI Implementation of CCSDS for Meteorology Image Lossless Compression
jiang hong xu ; zhou xiao kuan
..............page:222-225