Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2004 Issue 31
An Intelligent Tube Flaw Detection System Based on Multi-thread Technology
zhang jing yong ; zhang lei ; cao qi xin ; fu zhuang ; li jie
..............page:210-212
Fast Algorithm 3-D CT Based on FDK Method
zhang xiao fan ; he ming yi
..............page:208-209,221
An Improved DSP-based Speaker Verification System
wang zuo ; zhang zhi hua ; wang bo ; wang bing xi
..............page:204-207
Petri Net Based Scheduling for IC Manufacturing
hao dong ; jiang chang jun ; lin lin
..............page:200-203
The Research of an EPC Workflow Model Established by Gantt Chart
yang fei ; xie yan dong ; dai guo zhong
..............page:213-214,232
An intelligent Surveillance System Based on A/V Information Fusion
li chao ; xiong zuo ; meng yan ; han jun
..............page:218-221
Liver and Its Internal Piping Visualization system Based on the Images of CT
zhang jian xun ; han feng qing ; ji gang
..............page:222-224,229
Key-links in Establishing Knowledge Base of Intelligent Systems to Control Metallurgy Process
tang shao xian ; chen jian er ; zhang tai shan ; zhou yong xiao
..............page:225-229
Algorithm for Precisely Inspecting Round Spindle Diameter Based on Machine Vision
yang min ; ye bang yan ; mou li ; zhu ruo lei
..............page:230-232
The Role-based PMI Security Model for E-government
wu li jun ; su kai le
..............page:117-119
A Case Based Survey of Web Caching:Architectures and Inter-Cache Communication Protocols
wang jiong ; han jiang hong ; wei zhen chun
..............page:120-123,168
Characteristic Extraction in Web Content Filtering
lv hong wei ; tang xiao li ; wang shen
..............page:145-146
Fuzzy Intrusion Detection Based on Mining Fuzzy Association Rules
peng zuo ; zhuang zhen quan ; li bin ; yang jun an
..............page:152-155,196
Research of Real-time Video Transmission and Processing System Based on Adaptive Control
ji zuo ; lu xuan min ; shi hao shan
..............page:156-158
Dealing with RDBS Based on Three-layers Structure
wei xiao mei ; li shi jun ; li fang fang
..............page:159-160,203
Implementation of the Multi-channel Digital Television Platform Based on System-on-Chip
chen xiao chun ; zhou zu cheng ; luo jian ping
..............page:183-185,203
Service Based and Rule Extended Workflow Model
yu liang ; wei jun
..............page:186-189
The Application of Computer Simulation of Crop Growth in Digital Agriculture
li xiao juan ; chen cun she ; zeng de chao
..............page:190-192
J2EE_based Distributed Project Management System Model and Application
guo jian she ; yin chao wan ; luo huan zuo ; zheng hong xing
..............page:193-196
A New Ship and Dock Target Segmentation Method Based on Geometry Feature
chen zuo ; chen xue
..............page:197-199,221
OOM in Object-Oriented Compiler Test Tool
shi jin ; chen ying ; sun wen can
..............page:114-116
Design of a Multiresolution Motion-compensated Wavelet-based Codec of Video
zhang yi rong ; xian ming ; xiao shun ping ; wang guo yu
..............page:110-113,142
Applying Design Patterns in Auto-Unit-Testing-Framework
hou zuo ; lin he ping ; yang wei
..............page:106-109
Modulo Scheduling Combining with DFA and Realization in gcc
wu pei hua ; guo yong ; qi feng bin
..............page:102-105
An Algorithm of 3D Reconstruction by Structured Light
di ming ; wang nian ; liang dong ; zhou zuo zuo ; bao wen xia
..............page:93-94,126
Image Retrieval Based on Clustering Algorithm
zhang pei zhen ; fu ping ; xiao jun
..............page:46-48
Group Validity of Chromosome Detection Model
zhang jing jing ; liang yi wen
..............page:44-45,101
The Applications of MEC in Image Analysis
sun cheng yi ; long zhi xiao ; wang wan zhen
..............page:90-92,109
A Scheme of Authenticated Certificates Issuance
zhang hao jun ; chen li ; zhu yue fei ; xu hai tang
..............page:124-126
Constructing Correlations in Attack Connection Chains Using Active Marking
li qiang ; liu jian feng ; ju jiu bin
..............page:127-130,207
File Operation Monitoring Based on Windows System
zhao bin ; liu chang qi ; dai ying xia
..............page:131-133,168
Adaptive Rate Streaming of Real Time for MPEG4
zhou zhi bo ; cao zhen hai ; zhang lei ; chen yi qiu ; qian song rong
..............page:134-136
An Enhanced Remote User Authentication Scheme Using Smart Cards
zhang li hua
..............page:137-138,212
Research of Link Bandwidth Measurement on IP Network
ding chang ping ; liu yin ; xu xiao dong
..............page:139-142
Face Animation Parameters Extraction and Driving
wang zuo ; ma shu yan ; yin bao cai ; guo jin tong
..............page:86-89
Pitch Estimation Based on Correlated Square Function of Time-domain
wang yan fen ; yu hong zhen ; liu wei dong ; zheng xiao hong
..............page:83-85
Interactive Generation and Rendering of 3-Dimension Terrain
song han chen ; gao yu ; wei ying mei ; wu ling da
..............page:80-82
The Research on the Model of Classifying Consensus of Heterogeneous Spatial Information
man jun feng ; shen zhi hui ; peng san cheng
..............page:161-163,189
Data Cleaning Model Based on Rough Set Theory
huang da rong ; huang xi zuo
..............page:164-165,182
A Study on New Real-time Optimistic Concurrency Control Protocol
fang lai hua ; wu ai guo
..............page:166-168
A Data Mining Algorithm Based on the Rough Sets Theory and BP Neural Network
xu ze zhu ; wang lin
..............page:169-172,175
Architecture of Mobile Database Based on Agent
su zuo ; ci lin lin
..............page:173-175
Credit Risk Assessment in Commercial Banks Based on SVM
hou hui fang ; liu su hua
..............page:176-178,192
An Investigation on Perception Modeling in Design Process
li gui qin ; liu xiao jian ; li jie ; lu chang de
..............page:179-182
Restoration of the Image Blurred by Motion at Arbitrary Direction
gao mei ; chen shu yue
..............page:59-60
A Novel Algorithm of Attacking Digimarc Watermark
chen yan hui ; kang feng ; huang jiong
..............page:57-58,63
A Kind of Artificial Mark for Object Tracking
zhu fang wen ; li de qiang ; yuan zheng peng ; wu jia zuo
..............page:54-56
Parallel Computing for Primality Testing
zhu jian zhong
..............page:52-53,98
An Endpointing Algorithm of Speech Using FER
guo ji yun ; wang shou jue ; yuan hai tao
..............page:49-51
The Design and Implementation of Remote Sensing Retrieval System Based on COM
wang dong dong ; qin qi ming
..............page:99-101
A Novel Algorithm for Uncorrelated Discriminant Analysis
xu yong ; zhu ning bo ; yang qiang ; yang jing yu
..............page:95-98
An Adaptive Audio Mixing Method Oriented Multi-point Interaction
zheng qing hua ; yao li ; liu jun ; huang jin tong ; sun guo ji
..............page:40-43
Simulation and Analysis of a QoS Scheme Used in IPSec Security Device
he jun ; tan xing lie ; zhou ming tian
..............page:36-39,77
Fuzzy Self-Organizing Feature Map Networks for Segmentation in Reverse Engineering
zhang li ning ; liu yuan peng ; zhang ding hua
..............page:33-35,56
Application of Image Fusion in Surgical Navigation
zhou zhen huan ; liu xing dong
..............page:31-32,51
Measures of Similarity Between Rough Sets and Its Applications
wang hong kai ; guan yan yong ; shi kai quan
..............page:29-30
A Component Model for Software Communication Architecture
wang bao jin ; wang zhi gang ; li ming shu
..............page:25-28
Consistency Maintenance of Security Policy
liu zuo zuo ; zhang you liang ; wang hui fen
..............page:21-24
Research and Implementation of Network Information Based on Active Probing Technique
zhang tao ; hu ming zeng ; yun xiao chun ; zhang yu
..............page:17-20,43
The Improved Design of Embeded SIMD Coprocessor
zhou guo chang ; wang zhong ; che de liang ; feng guo chen
..............page:13-16
A Real-time Transaction Scheduling Algorithm with Temporal Constraints by Exploiting Data Semantics
han jian jun ; li qing hua ;abbas a.essa
..............page:9-12
A New Fast Scan Line Filling Algorithm for Complicated Connecting Region
zhang zhi long ; li ji cheng ; shen zhen kang
..............page:6-8
Design of Unlimited Integer Class
kong wei guang
..............page:78-79,89
An Algorithm for Fairing of Surface Based on Image
wang hong tao ; zhang jun ; peng guo hua
..............page:75-77
The Watermark Extraction Technique with Errors
wang chun zhi ; xia jing ; shao zuo ; chen hua chao
..............page:72-74
An Improvement of Aydos et al's Wireless Authentication Protocol
qiu hui min ; yang yi xian ; hu zheng ming
..............page:3-5
The Neural Network Method for Intrusion Detection Based on Improved BP Algorithm
wang lei ; liao xiao feng
..............page:69-71,119
The Discussion on the Similarity of Cluster Analysis
li gui lin ; chen xiao yun
..............page:64-65,82
Similar Shape Retrieval Using a Modified Geometric Hashing
su huan ; li zuo cheng
..............page:61-63
Hybrid Recording Heat Domino Simulation Experiment
xia you xin ; huang hao ; pei xian deng
..............page:1-2,16