Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2005 Issue 1
A Software Tool for Software Reliability Analysis,Testing and Evaluation
Jing Tao;Jiang Changhai;Liu Yongxiang;Hu Debin;Bai Chenggang;Cai Kaiyuan
..............page:23-26,110
Analysis on Characters of Survivability and Emergent Algorithms
Zhang Hongzhi;ZHANG Yuqing;Li Xuegan
..............page:127-131
Research of Structured Overlay Network Model-Chord
Tang Hui;LI Zupeng;ZHANG Guojie;Huang Jianhua
..............page:132-135
A Safe Secret Sharing Scheme Based on Double Rejuvenescence Mechanism
Ji Chengli;YANG Xiaoyuan;Hu Yupu;Zhang Minqing
..............page:136-138
Video Data Transmission over CDMA2000 Wireless Network
Wu Jixiong;Ye Wu
..............page:139-140,160
The Intrusion Detection Based on The Alternative Covering Algorithm
ZHAO Shu;Zhang Yanping;Zhang Yuan;Chen Chuanming
..............page:141-143
System Modeling of Institutional Investors Integrated Risk Management Based on HWME
Jiang Jijiao;Yang Naiding;Wang Liang
..............page:30-32
Research of Algorithms for Visualization of Dynamic Terrain
Cai Xingquan;LI Fengxia;ZHAN Shouyi
..............page:36-37,86
Laser Induced Fluorescence Technic Applied in DNA Computer
Liu Xiangrong;Liu Wenbin;Xu Jin
..............page:38-42
An Adaptive Grid Job Scheduling Method Based on Genetic Algorithm
Yang Yong;Cai Zixing;Fu Ying;Liu Meiqin
..............page:48-50,167
Investigation of Information Hiding Technology to Palette-based Image
Wu Hongtao;Yang Yixian
..............page:51-54,76
An Extensible Workflow Meta Model
Wen Bilong;Zhang Li;Zhou Bosheng
..............page:58-60
Features Recognitioning of 2-D Part Drawing Based on RBF Neural Network
Zhang Jianxun;Li Lin;Han Fengqing
..............page:61-63
Double-Level Watermarking Algorithm Based on Chaos and SVD
Zhao Tianzhong;Xue Mogen;Li Xiaoming
..............page:70-72
Vanishing Point Detection Method for the Image of Man-Made Object
Luo Ding;Ci Linlin;Chen Xiaofeng;Zhao Rongchun
..............page:73-76
Approaches to H.264-based Stereoscopic Video Coding
Li Shiping;Jiang Gangyi;Yu Mei
..............page:77-79
Comparison and Analysis of Two Compact Algorithms for Vector Graph
Yu Guobao;Liao Husheng;Zheng Yuming
..............page:80-81,209
A Simple and Powerful Scheme to Stop Turbo Iteration
Chao Haiyan;Wei Gang
..............page:82-83,143
Modified Watershed Based on Recursive Merging
Tang Xuhui
..............page:84-86
Convergence of MEC in Bounded and Continuous Space
Zhou Xiuling;Sun Chengyi
..............page:87-91
Application of Regularization in Linear Shape from Shading
Jiang Xiaolei;Yao Hongxun
..............page:92-95
A Three-level Mode of Scheduling Strategy in Grid Computing
Xiong Lei;Li Yuanxiang
..............page:96-97,116
MPICH2 Research and Implementation on VIA
Sun Yijia;Zhang Yue;Chen Yu
..............page:98-101
Process Oriented Design in EJB
Wu Wei;Ji Guoli
..............page:102-104,123
Automatic Chinese Summarization System Based on Conceptual Vector Space Model
Wang Meng;He Tingting;Zhang Wei
..............page:107-110
Design and Implementation of a Metric Tool for Object-Oriented Software
Hou Huifang;Liu Suhua;Zhang Xueping
..............page:111-113,177
One Method of Improving the Speed of Computer Screen Bitmap Transmission
Geng Zengmin;YU Zhengtao;Kang Haiyan
..............page:114-116
Virtual Prototyping System
Zheng Xiaoxi;Sun Guozheng
..............page:117-119
One Java-based WSP Implementation and Application in Communication
SUN Shiwen;Li Songran;Liu Zhongxin;Chen Zengqiang;Yuan Zhuzhi
..............page:120-123
Study on High-speed Network IDS Based on NP & Coprocessor
Fan Huachun;Wang Yin;Yang Bin;Li Xueying;Chen Yu;Xu Rongsheng
..............page:124-126,138
Fault-Tolerant Mobile Agent Framework and Execution
Zhao Jing;Cheng Xin;Cui Gang;Yang Xiaozong
..............page:144-147
Multi-pattern Matching Algorithm Based on Eigenvalue and Realized by Hardware
Peng Shili;Tan Hansong
..............page:148-150
The Application Compare of Mobile Agent Fault Tolerance Protocol and a SPN Model of TRB
Cheng Xin;Gong Yujing;Yang Xiaozong
..............page:151-153
The Study of Goal-driven Web Service Automatic Composition
Lin Manshan;Guo Heqing
..............page:157-160
A Survery of Video Watermarking
Ye Dengpan;Dai Yuewei;Wang Zhiquan
..............page:14-18
Performance Analysis of Block-oriented and Modular-arithmetic-based Digital Image Watermarking
Sang Jun;Liao Xiaofeng;Zhu Weihua
..............page:11-13,131
Designing of Multidimensional Auction Based on Intelligent Agents
Hu Bin Liu;Zhongying
..............page:8-10,147
Computation & Mathematic Organization Theory
Yang Dongsheng;Peng Xiaohong;Liu Zhong;Zhang Weiming
..............page:4-7
Implementation of NTRU Cryptography Algorithm Based on Java Card
Wang Minghua;Yang Yixian
..............page:1-3,7
Symbolic Model Checking Analysis for Electronic Contract Signing Protocol
Chang Liang;Gu Tianlong;Guo Yunchuan
..............page:161-164
Duplicate Records Elimination in Data Warehouse with Two Thresholds
Hong Yuan;Sun Weiwei;Shi Baile
..............page:168-170,216
JDBC Transaction Processing and Application in Web Information System
Xu Xuedong;Sun Yanming;Gong Zhuping
..............page:171-173
RuleML-Based Knowledge Representation of Multi-Level Knowledge Units
Xu Wei;WANG Rujing;Yang Huafeng
..............page:174-177
An Algorithm for Computing Partial Data Cube
Chen Changqing;Cheng Ken
..............page:178-180
Study on Mobile Geospatial Information Services Based on J2EE
WANG Fangxiong;Hou Yingzi
..............page:200-202
Accurate Lane Detecting and Tracking in Structural Road Environment
Pi Yanni;Shi Zhongke;Huang Jin
..............page:203-206
Research on Application of Data Mining Technology in Product Similarity
Zhou Shixiong;Han Yongsheng
..............page:207-209
Design and Realization of Spectral Data Management in the Standard Spectral Knowledge Base
Tian Zhenkun;Liu Suhong;Fu Yingying
..............page:210-213
Visual Research for Radioactive Shield Assembly
Cheng Ping;Cheng Gengguo;Li Shouren
..............page:214-216
The Agent-based Microscopic Simulation of Traffic
Wei Yingyi;Chen Zhiyuan
..............page:217-220
An Improved Approach to Term Weighting in Automated Text Classification
Xu Fengya;Luo Zhensheng
..............page:181-184,220
Neural Network Nonlinear Inverse Control Based on Predictive Control Method
Wei Dong;Zhang Minglian
..............page:185-189
The Design of Distributed GSHP Controller and Tasks Schedule Based on UCLinux
Shi Songquan;Wang Baoshu
..............page:190-193
Study on Modeling of GIS Based Integrated System for Feasibility Analysis of Real Estate Development
Ma Zhiliang;Deng Ziyu;Li Heng;Fu Siyuan
..............page:197-199,206
Cancer Molecular Classification for SRBCT Using Gene Expression Profiles
Zhu Yunhua;Li Yingxin;Ruan Xiaogang
..............page:221-223
A Graphic Algorithm for Mining Optimal Ingredient Pattern of Traditional Chinese Medicine
Zhang Shemin;Fang Gang;Xu Jin
..............page:224-225,232
Design for Stock Trade Based on Fuzzy Control
FENG Dongqing;Wu Jie
..............page:226-228