Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2005 Issue 17
A Study of Fuzzy Clustering Analysis in Data Mining
Xu Haiyang;Wang Guoan;Wang Wansen
..............page:177-179
Feature Extraction of Document Based on Semantic Model
Li Kairong;Lin Ying;Hang Yueqin
..............page:173-176
A Whole Rate-Distortion Optimize Pronounce Based on Statistics Theory
Zhang Jian;Cheng Yonggang
..............page:170-172
Research of the Semantic Data Mining Model Based on the Dynamic Web Site
ZHU Qingsheng;Zou Jinghua;Zhang Jiang
..............page:167-169,196
A Fast Hash-table-based Algorithm for Extracting XML Model
Qian xiaojun;Hou Changchang
..............page:180-182,214
Sales Model Research Based on Association Rules Mining
FENG Yucai;Lǖ Jianfang
..............page:183-185
A Design and Implementation of Data Exchange Scheme
Chen Huazhi;Zheng Ning;Ge Yinglong
..............page:186-189
A Research for Personalized Search Engines
Zuo Xionghui;Mi Qi
..............page:190-192
Intelligent Tutorial Planning Based on Extended Knowledge Structure Graph
Duan Zhuohua;Jiang Yunfei
..............page:193-196
Application of C4.5 Algorithm in the Analysis of Customer Churn Insurance
Gui Xiancai;Peng Hong;Wang Xiaohua
..............page:197-199,214
Design of Bank Rechargeable System Test Case Based on TC Orthogonal Arrays
Li Wenfeng;Tao Peiji;Li Hui
..............page:200-202
Application of JNI Technology on Platform-Independent Power Automatic System
ZHAO Nan;He Guangyu
..............page:203-205,232
Application of Origin in Curve Fitting
Wu Xin;Zhang Yongsheng
..............page:206-208
Design of a Case-Based Reasoning Cotton Crafts and Arts Expert System Inference Model
Yang Kaiying;Guo Song;Hu Yingjiu
..............page:209-210,217
Application of ModBus Protocol in Wireless Monitor System
Hu Pingping;Wang Dongxing;Wang Jingjie
..............page:211-214
Multiple Fuzzy Synthetic Judgement Method to the Partner-Selection in Dynamic Alliance
Zeng Zhibin;Li Yan;LI Shujuan;Zhang Hongbing
..............page:218-220,232
Remote Alarm System of Infrared Equipment
Wang Kanwei;Fang Zongde;Cao Shuangsheng
..............page:225-227
Design and Implementation of a Telecommunication Traffic Analysis System
Wu Yangyang;Chen Xiaofeng
..............page:228-232
An Evaluation and Control Model of Quality of Security Service (QoSS)
Cao Yang;Li Weipeng;Lu Bo
..............page:147-148,172
An Access Control Model Used in the P2P Network
Xu Qiaozhi;Liu Linqiang;Song Rushun
..............page:149-152,189
A Distributed Intrusion Detection Technique Based on Immune Fusion Method
Zhang Nan;Li Zhishu;Zhang Jianhua;Li Qi
..............page:153-155
The Measurement of the Communication Performance of Cluster Systems
Yao Miao;Pei Wei;Shan Shan;Meng Bo;Yang Yulu
..............page:156-159,196
Design and Implementation of a FSM-based SDRAM Controller
Duan Ran;Fan Xiaoya;Zhang Shengbing;SHEN Ge;Liang Jie
..............page:110-112,132
The Design and Realization of A Real-time Card Character Recognition and Verification System
hong yi ping ; yi jian qiang ; zhao dong bin ; zhang yao hua
..............page:113-115
The Study of Path Planning Algorithm for Curving Assembly
Liao Zhuhua;Liu Xiaoping;Liu Songlin
..............page:116-119
The Interface of CK· CORE Embedded Debugger
ren ; sun kang
..............page:120-122,142
Research on Safety Test for Interlocking Software Based on Petri Nets
WEI Zhen;Zhou Xia;Bao Hongjie;HAN Jin
..............page:123-125,138
A Logic-based Semantic Model of Lymphocytes Applied to Process-based Anomaly Detection
Guan Gang;DONG Hongbin;Tan Chengyu;LIANG Yiwen
..............page:39-42,78
The Study of Symbol Database Based on Graphical Element Method
Li Bing;Ye Haijian;Fang Jinyun;Xiao guo
..............page:36-38,45
EFOM Method for Validating Cluster of Gene Expression Data
Yin Airu;Li Dong;Huang Yalou
..............page:53-55,71
Linux Secure Operating System Audit Mechanism Analysis and Design
Liu Hongzhe;BAO Hong;Xu De
..............page:50-52,87
On Conformance Testing Methods and a New Algorithm for Generating UIO
Gu Jun;Cai Guoyong;Dong Rongsheng
..............page:46-49
An Object-Oriented Framework for Role Based Access Control
DING Zhong;ZUO Chun
..............page:43-45
Security Audit Model Based on Optimized Clustering Algorithm
Shi Xingjian;Li Weihua;Wang Wenqi
..............page:1-2,29
The DNA Genetic Algorithm Applied for Flow Shop Scheduling Problem
liu yi ; ye chun ming ; shen yun hong
..............page:85-87
Research on Block Partition Mode Selection Method Based on Bit-rate in H.264
Guo Jianjun;Dai Kui;CHENG Yun;Wang Zhiying
..............page:82-84
Comparative Research on Support Vector Machine Training Algorithm
Bai Liang;Lao Songyang;Hu Yanli
..............page:79-81,84
Color Image Segmentation and Recognition for Soccer Robots
Wang Wei;CHEN Jirong;Xu Jingye
..............page:68-71
Research of Heap Memory Management Mechanism in Windows
Hu Zhaoyang;Xie Yuqiang;SHU Hui
..............page:59-61,64
A Text Classifier's Design and Realization Based on Neural Networks
Li Dou;LI Bicheng
..............page:107-109,119
Design and Study of an Simplified SMS Server Based on Bounded Queue
He Tao;Jiang Liangzhong;Yuan Binyou
..............page:105-106,155
The Design and Implementation of an Encrypted Filesystem for Linux
Xing Changliang;Qing Sihan;Li Liping
..............page:101-104
Sentence Generation Based on Context-dependent Rule Coverage
Shen Yang;Chen haiming
..............page:96-100
A New Feature Definiton to Object Shape
Wang Liangshen;Yu Jingnuo;Hou Jie;OU Zongying;Zhu Yucai;Chen Yan
..............page:90-92
Application of a Content-based Video Retrieval System for E-Government
Sun Zhonghua;Sun Xiaoye;Fu Ping
..............page:22-25,49
Performance Report of LongXing Network Computer Based on Transparent Computing
Guo Guanfei;Zhang Yaoxue;Wei Li
..............page:19-21,95
Hash-based Rotating Right Technique(HDRR) for Streaming Data Reorganization
Yin Jie;Zhang Song
..............page:33-35,100
An Algorithm for Homomorphic Blind Deconvolution Based on ICA
Yang Hongwei;Yang Li;Wang Bingxi
..............page:30-32
MPEG-4 MAC Based Multiview Video Coding Methods
Zhang Hu;SUN Lifeng;ZHONG Yuzhuo
..............page:26-29
Global Computing System and Study of Its Key Technologies
HE Kai;Yang Yulu
..............page:129-132
Security-Enhancement of Linux File System Based on LSM framework
Luo Jun;Tan Xinglie
..............page:133-135,189
Performance Analysis of Pattern Matching Algorithms for Intrusion Detection
Tang Qian;Zhang Dafang
..............page:136-138
Shortest Path Problem with Uniform Distribution Weights
Wang Zeyan;DIAO Xingchun;Wang Ting
..............page:139-142
Improving the Efficiency of Intrusion Alarm Based on Environment Information
Niu Jianqiang;Chen Xin;Cao Yuanda
..............page:143-146,155
Design and Implementation of Network Processor Programming Model Based on Software Component
Zhang Fan;Zhou Xingshe;Yan Shoumeng
..............page:15-18,29
Security Analysis of A Group Key Agreement Protocol
Cao Tianjie;Lin Dongdai;XUE Rui
..............page:13-14
R&D Issues of Wireless Sensor Networks Based on Smart MicroNotes: a Survey
Bing Zhigang;Liu Jingtai;Chen Tao;Huang Xingbo;Sun Lei;Lu Guizhang
..............page:9-12
Parallel Implementation of CT Image Reconstruction
Sun Cuili;Lu Hongnian
..............page:7-8,12
Study on Internet Traffic Forecast of BP Neutral Network Based on Chaos Theory
Wu Wenqing;Zhao Liming;Liu Jiakun
..............page:3-6