Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2005 Issue 10
The Method and Application of Contour Extraction Based on Deformable Model
Cheng Siyuan;Zhang Xiangwei
..............page:27-29,133
Some Access Control Schemes in Hierarchy
Wang Lipeng;Zhang Qingpo;Liao Jia;Chen Lusheng
..............page:25-26,70
Development in Home Heath Telemonitoring System
Zou Yanbiao;Xie Cunxi
..............page:30-34
Image Definition Criterion Based on Edge Gradient Feature
Yang Zaihua;Li Yuhe;Li Qingxiang;Guo Yangkuan
..............page:35-36,161
Improved Connected Component Labeling on High-resolution Remote Sensing Image
Wang Jing;Zhang Yanning;Luo Jiancheng;Ming Dongping
..............page:37-39,112
A Tone Transformation Method Based on Standard Tone Model
Xue Jian;Cai Lianhong
..............page:40-43,85
Digital Image Scrambling Based on Josephus Traversing
Xiang Desheng;Xiong Yueshan
..............page:44-46
Study on Event Management of Migrating Instance
Yang Gongping;Zeng Guangzhou;Lu Zhaoxia
..............page:47-48,51
The Identification Method of T-S Fuzzy Model Based on Exponent Function Partition
Zhao Qi;Liu Kaidi;Pang yanjun
..............page:52-55,79
Variable Precision Rough Set Model Based on Set Pair Analysis
Liu Fuchun
..............page:74-76,222
A New Type of Signature: Multisignature with Some of Proxy Signers
Wang Yingiong;Wang Lianhai
..............page:77-79
A Generalized Solvable Coupled Network Model
Li Yong;Wei Luoxia
..............page:80-82
A New Programming Model--the Events Model on CAR
Li Hui;Chen Rong
..............page:86-90
Ether-NBD :a High Effective Cluster Network Storage Software
Wang Liguo;Tang Rongfeng;Xiong Jin;Fan Zhihua;Wang Qin
..............page:91-92,168
The Remote Supervisory System Based on Embedded Real -Time Linux
Cui Ke;Wu Zhenwei;Liu Mingzhe
..............page:95-97
Distributed Inheritance by Binding
Xie Minling;Song Binheng
..............page:98-100
Implementation of PCI Expansion ROM Mechanism
Yin Yongsheng;Hu Yongua;Zhou Ganmin
..............page:101-103
Design Embedded Voice Gateway Based on VxWorks System
Zhang Huibing;Zhou Dexin
..............page:107-109
The Software Architecture of DVB-C Set-Top-Box
Liu Guibin;Hu Fei;Zhang Jitao
..............page:110-112
P2PSimulator:a Generic P2P Protocol Simulator
Tang Yan;Zhang Yanyuan;Zhang Lin;Ai Changquan;Hu Zhengguo
..............page:113-117
Application and Practice of Network Simulation Software
Yang Hongyu;Xie Lixia;Wang Xinglong
..............page:118-121,218
Key Escrow Scheme for Flexible Placing of Escrow Agent
Fan Qiang;Xie Dongqing
..............page:122-123,137
A Digital Rights Expression Model Based on Action States
Sun Wei;Zhai Yuqing
..............page:124-127
Research and Design of the P2P Instant Messenger Monitoring System
Wang Dafeng;Liu Zaiqiang;Feng Dengguo
..............page:128-130,144
Chinese Encoding Charsets Blind Identification Algorithm for E-mail Content Filtering
Zhu Jia;Li Shenghong;Li Jianhua
..............page:131-133
Design and Implementation of Unstructured Supplementary Service Data Center
Liu Wei;Wu Jiachun;Liao Jianxin;Ding Yi
..............page:134-137
Performance Problem Research of Intrusion Detection System
Zhao Li;Sun Min
..............page:138-140
An Anti-Spam System Based on QMAIL-LDAP
Liu Xiong
..............page:141-144
Security Flaws in a Fair Document Exchange Protocol
Li Ping;Jiang Lalin;Zhang Qinghua
..............page:145-146,182
A Document Exchange Scheme Based on New Digital Sealing
Xu Botong;Guo Heqing;Ou Yuyi
..............page:22-24
A New Algorithm of Moving Object Tracking in Video Sequences
Shi Hua;Li Cuihua
..............page:56-58
A Commingled Ant Colony Optimization Algorithm for Solving WTA Problem
Fan Jie;Liu Yushu;Gong Yuanming;Chen Yunfei
..............page:59-61
On Quantitative Analysis of Coherent Fault Tree Based on BDD
Zhang Chao;Ma Cunbao;Hu Yunlan;Xu Jiadong
..............page:62-63,158
A Fast Intra-Frame Prediction Mode Selection Algorithm of H.264/AVC
Pei Shibao;Li Houqiang;Yu Nenghai
..............page:71-73
Design and Implementation of GKD-Base PL/SQL Stored Procedure
Gao Chaorui;Xiong Wei;Wu Qiuyun;Chen Hongsheng
..............page:162-164,214
A Reliable Strategy and Design of Architecture of ETL in Data Warehouse
You Yulin;Zhang Xianmin
..............page:172-174,229
Kinematics Modeling and Simulation for Virtual CNC
Chen Youping;Tuo Aili;Zhou Jingdong;Yuan Chuning;Zhou Zude
..............page:175-178
Data Mining--the Theory of Disjunctive Kriging and Its Application in Grade Estimate
Chen Huandong;Yu Xianchuan;Hou Jingru;Yu Chen
..............page:179-182
Computer Aided Structual Health Monitoring Method
Yu Bo
..............page:183-186,196
Research on the System Frame of EDM System for Multi-enterprises Collaborative Design
Yu Xuqing;Zhang Zhihai;Zheng Li;Hu Changjian
..............page:187-190
Iterative Segmentation Method for Cervical Cell Based on Multispectral Microgram
Wang Diancheng;Zeng Libo;Zheng Hong;Gao Xijian
..............page:191-193,206
DIA-A New System for Detecting and Recognizing Dots in Color Printing Images
Hu Tao;Wang Yonggang;Zheng Mindong
..............page:194-196
Design of Real- Time Traffic Flow Simulating and Forecasting System Based on SVM
Yin Ying;Zhang Chaoyuan;Hu Guanghua;Xu Tianze
..............page:197-199
Design and Implementation of On_line Hospital Laboratory Information System
Guo Youyan;Han Xiangfei;Li Xin
..............page:227-229
A Head Electrode Points Tracking Location Approach Based on Image-sequence
Liang Gang;Zhu Hong;Zhang Jun;Li Han
..............page:230-232
A New Approach to Intrusion Detection Based on Extension Matrix and Genetic Algorithm
Yu Zhaoping;Xu Liping;Zhu Shixiong
..............page:147-148,178
TTR:A Modified Batch Rekeying Scheme for Securing Group Key Management
Ma Yizhong;Fu Dongya;Yi Jihai;Zhang Cong
..............page:149-152,211
A Watermark Technology Based on Relational Database
Huang Min;Zhang Hao;Cao Jiaheng
..............page:153-155,199
Stable Model of Semantics _ based Security Detection for Linux Process
Tan Chengyu;Dong Hongbin;Liang Yiwen
..............page:15-18
MADSPM :A Mobile Agent-based Distributed Multi-Stream-data Processing Model
Chen Peng;Lu Weifeng
..............page:11-14,18
GP-Decision Tree Optimization Algorithm and Application Based on Genetic Programming
Wang Sichun;Zhang Taishan;Yin Zhiyun;Li Ribao;Zhang Chuwen
..............page:8-10,103
Research on Technology of Background Knowledge Representation Oriented Data Mining
Zhang Jifu;Zheng Lian;Zhang Sulang
..............page:156-158
Proportion of Train-Set's Influence on Error-Rate of Decision Tree
Sun Weiwei;Liu Caixing;Tian Xuhong
..............page:159-161
Research on the Real- Time Collision Detection Algorithm in Numerical Control Machining Simulation
Zhao Jin;Zhou Laishui;Zhang Chen;Yu Zhanyue
..............page:200-202
The Research of Collaborative Learning System Based-on Grid
Yang Wei;Yuan Rong
..............page:203-206
Design and Implementation of Water Regime Automatic Measuring and Reporting System
Zhang Xinyou;Xu Dengyuan;Li Chengzhong
..............page:207-211
A Review of Routing Algorithm for Energy-Efficient Multicasting in MANET
Luo Yuhong;Chen Songqiao;Wang Jianxin
..............page:1-4,7