Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2005 Issue 18
Study on JSP Based on Hybrid-Genetic Algorithm
TAO Ze;Xie Liyang;Hao Changzhong;LIANG Di
..............page:19-22
A Study of Concurrency Control and Recovery in Real-Time Client/Server Database Systems
LEI Xiangdong;ZHAO Yuelong;Yuan Xiaoli
..............page:15-18,26
SANS--Design and Implement of IP-SAN Simulator
Zhang Xiao;Li Zhanhuai;Chen Jianquan
..............page:23-26
Survey of Ontology Mapping Approaches
Huang Yanbo;Zhang Hongyu;Li Jianhua;Tan Liqiu;Li Zhi
..............page:27-29,33
A Qos-Based Routing Algorithm for Dynamic Operation in WDM Networks
Xu Bao;Gao Suixiang;RAN Min
..............page:124-126
The Design of CF Card Drivers in Embedded Linux
Wu Zhonghan;Sun Zhifeng
..............page:115-116,199
Sockvia-a High Performance Socket in Clusters
Yu Yansong;Huo Zhigang;Ma Jie;MENG Dan
..............page:117-121,218
Performance Analysis of the Voice Transfer Based on TCP Protocol
Zhang Zhixiang;Yuan Tao
..............page:122-123,126
Improved Group Signature Solution Based on Discrete Logarithm
LIN Song;He Dequan
..............page:139-142,165
Audio Encryption Based on Hyper Chaos and Its Web Communication
Wan Juan;Wu Chu;Zhang Yuanan
..............page:154-156
Mutual Authenticate Framework Based on x.509
Li Ning;Wu Yaohua
..............page:157-161
Filtering Spam System Based on Improved Bayes
Ding Wenbin;Li Bin;LUO Hao
..............page:127-130
Design and Implementation of Network Applications Monitor System
Qian Jun;Zhang xingjun;Liu Tao
..............page:131-133
Analysis on the Exploits of Buffer Overflow Vulnerabilities
Qiu Xiaopeng;ZHANG Yuqing;FENG Dengguo
..............page:134-135,175
Research of C3I Network Management System Based on Web Service and CORBA
Chen Jianxun;Zhang Zihe;Xia Xuezhi
..............page:136-138
Volume Reconstruction Based on Multiple Viewpoint Rendering
Li Kexun;Wei Sui;Zhang Ziyun;Cao Yuru
..............page:36-38
Research on Component Service Framework Based on Data-driven
Chen Zhang
..............page:39-41,105
Denoising Algorithm Based on Finite Ridgelet Transform
Liu Zhuhua;Zou Daowen;Zhong Hua;Deng Chengzhi;Wang Shengqian
..............page:42-44,87
Design of Moving Path Based on Simplified Terran
Du Anhong;Dai Guangming
..............page:45-47,206
Study of Prediction Model in the SimuroSot Based on Kinematics Theory
Shi Haobin;Li Weihua;Wang Difei;Yan Jianfeng
..............page:48-50,80
PSO for Multiple Sequences Alignment
Zhang Pengshuai;Huo Hongwei
..............page:84-87
A Study on the New Rough Set-Neural Networks Based on SOFM
Feng Jinglei;Zhang Xibin;Zhang Hengxi
..............page:88-90,102
Designing Video Encryption Transform Filter Based on DirectShow
Yao Ye;Xu Zhengquan;Li Wei
..............page:91-93
Implement Message Authentication Module on IPSec Security Net Card Using FPGA
Chen Zanfeng;Wang Jinghua;Zhang Xinjia
..............page:143-146
Research of RSVP Security Policy
Jiang Huayang;Ling Li
..............page:147-150
The Digital Watermark of Relational Database Based on Error Control
Zheng Guangming;Sun Xingming
..............page:166-168,203
A Design and Implementation of Spatial Database Based on XML-SVG
Wen Jianting;Li Yan
..............page:169-175
Study on Anti-phishing and Disaster Recovery Based on IPv6
Zhang Bo;Li Weihua
..............page:13-14,156
Learning Bayesian Network Structure Based on Nodes Ordering
Wang Shuangcheng
..............page:11-12,187
NoC Mapping Based on Ant Colony Optimization Algorithm
Zhou Ganmin;Yin Yongsheng;Hu Yonghua;Gao Minglun
..............page:7-10,150
A Smart Card Access Control Model for Multi-application with Single Issuer
Tang Ye;Zhang Shensheng
..............page:4-6,98
Research on Formalization Requirement Analysis Methord Based on Component
Yao Quanzhu;ZHANG Zhifeng;Ren Xueli;Zhang Zuopeng
..............page:176-178,232
Detecting and Partitioning of Data Objects in Complex Web Pages
Cheng Fenhua;Ye Shiren
..............page:179-183
Application of Case Retrieval Algorithm Based on Rough Set in Fish Disease Diagnosis
Hu Liping;Zhou Yun;Tian Dong;Fu Zetian
..............page:184-187
Application of Tri-Phase Connected Mode Based Evolving Fuzzy Neural Network
Zhuo Ming;Sun Zengqi
..............page:188-190
Research and Application of FRED and DWT in the Musical Tone Recognition
Xu Guoqing;YANG Dan;Wang Binjie;Wen Junhao
..............page:191-193,211
Real-time Data Processing System on the Ground Implemented with DSP and CPLD
Wang Hao;Wang Xiuqin;Chen Wei;Li Zhijun
..............page:194-196,199
The Nonlinear Enhancement of the Ultrasound Medical Image Based on Wavelet Analysis
Wang Xiuxin;HU Weiping;Liang Dongdong;Qin Yiwei;Zhou Jianling
..............page:197-199
The Segmenting Method of Ferrographic Wear Particle Image Based on Two-Dimension Entropy Threshold Value
FU Jianping;Liao Zhenqiang;Zhang Peilin;Wang Chuanzhong
..............page:204-206
Automatic Categorization Technology and Its Applications in Enterprise Competitive Intelligence Systems
Bai Guanghui;Lian Hao;XU Hongbo;Cheng Xueqi
..............page:212-214
Data Mining for Marketing Based on Customer's Attribute of Relation
Sun Maoyan;Xie Kanglin
..............page:215-218
The Design and Implementation of Real-time Patient Care System
Chen Ping;Chen Yan
..............page:219-223
Conceptual Design for Geostationary Meteorological Satellite Ground Application System
Qian Jianmei;Shi Jinming;Li Xiaorong
..............page:224-228
Competence-based Human Resource Management System and Its Security Model Analysis
Zeng Lianming;Zhong Yong;Rao Zheng
..............page:229-232
Event Analysis of Variables Narrowing in CLP
Yi Junkai;Xiao Yang
..............page:51-53,60
Off-line Signature Recognition Based on Moments and Evidence Theory
Chen Gang;LI Bicheng;ZHUANG Jun;Liu Anfei
..............page:57-60
Adaptive Genetic Algorithm Based on Parents' Similarity
Tian Xiaomei;Zheng Jinhua;Li Hejun
..............page:61-63,187
An Improved Adaptive Genetic Algorithm
Jin Jing;Su Yong
..............page:64-69
Toward a Reusable Security Aspect
Zhang Lufeng;Huang Minhuan;WANG Chunlei
..............page:70-72
Optimization and Improvement of DMA Controller
Zhang Jun;Zhang Shengbing;Fan Xiaoya
..............page:94-95,161
The Realization on ARM of μC/IP Stacks Based on μC/OS-Ⅱ
Wu Guanglin;Bai Ruilin
..............page:99-102
High-Precision Measurements of Code Running Time in Linux
Tang Jianguo;Zhang Zhongshu;Wu Qinzhang
..............page:103-105
Study on USB Interface System Used in Data Transfer of Micro Fiber Spectrometer
Zhao Huabing;Wu Yihui;Guo Jingfu;Sui Yongxin
..............page:106-108,111
A Detection Instrument of EEC System Based on APCI Bus
Zhang Wei;Xie Shousheng;Qian Kun
..............page:109-111
The Research for the Knowledge Base System of Motorcycle Concept Design
Feng Hao;He Yulin;Ma Fanglan;Deng Haiping
..............page:112-114,138