Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2005 Issue 20
A Fuzzy Concept Lattice Defined from Implication Operators
Song Xiaoxue;Zhang Wenxiu
..............page:19-21,32
A Dynamic Transposition Cipher Based on Chaotic System
Xu Jiangfeng;MIN Lequan
..............page:15-18
Derived Signature Mining Algorithm of Intrusion Based on Known Characteristic
Niu Jianqiang;Chen Xin
..............page:127-130,134
The Configuration and Model for Long Delay NCS
Wu Chunxue;YU Zhenwei
..............page:22-24,141
Tasks' Granularity and Mapping Analysis of Parallel Algorithms
Zhang Yuliang;Zhang Lichen;LI Daiping
..............page:44-47,94
Testing Data Dependencies of Multi-Dimensional Arrays in Software Pipelining Field
QIAO Lin;HUANG Weitong;Meng Wei;Tang Zhizhong
..............page:48-50,97
Solution of MAX-SAT Problem Using Molecular Beacons
Chen Rui;Xu Jin
..............page:51-52
A Method for Noise Speech Recognition Based on Modulation Spectral Feature
Ma Xin;DU Limin;He Chenglin
..............page:53-55
Colour Correction Based on White Balance
GUO Yonggang;Ge Qingping;GUO Nan
..............page:56-59
Overview of Artificial Immune System and Algorithm
Xie Keming;Guo Hongbo;Xie Gang;Xu Xinying
..............page:77-80,84
Research of Feature Extraction from Spectrogram Based on Pulse Coupled Neural Network in Speaker Recognition
Ma Yide;Yuan Min;Qi Chunliang;Liu Yue;Liu Yingjie
..............page:81-84
Compose Operation of Petri Net Control Structure
Zhang Jijun
..............page:85-88,214
Design of the Single Board Computer Based on PowerPC Host Processors
Shan Huiping;YANG Shuyuan
..............page:89-91
Generation of Linux Peripheral Device Driver Based on IP
Chen Yonghui;Lu Deliang;Chen Zewen;Peng Chenglian
..............page:92-94
Research and Implement of WebGIS Based on Java
Wang Zuocheng;Xue Lixia;Wang Linlin;Li Yongshu
..............page:95-97
Research of Distributed Visual Surveillance System
Qin Hongwu;SU Kaina
..............page:114-116,208
Design of Equipment Agent's Graphic-User-Interface
WANG Honghai;Zhou Zude;Chen youping;Xu Cheng
..............page:117-119,221
A Review of Location-based MANET Routing Protocols
Zhang Fan;Li Demin;Tao Li
..............page:120-123
A Video Watermarking Scheme Resistant to Synchronization Attacks
Dai Kanfei;Chen Zhenyong;TANG Long
..............page:124-126,147
Dependent Sequential Multiple Signatures Based on Pairing Function
Shi Hongsong;He Mingxing
..............page:135-138
A Mobile Agent Based IDS Model for MANET
Li Lingjuan;Wang Ruchuan
..............page:139-141
A Noise-Tolerant Heuristic Algorithm for Extension Matrix
Wang Xingqi;Kong Fansheng
..............page:25-28,55
Extensions and Simplification and Classification of Default Rules
FU Li;Wang Guojun
..............page:33-36
A Gradual Shot Transition Detecting Method
Yang Bitian;WANG Xufa
..............page:37-39,59
Research on JPEG2000 Image Information Hiding Based on Elliptic Curve
Xiao Deqin;Feng Jianzhao;Zhang Huanguo
..............page:142-144,180
Principal Component Neural Networks Feature Extraction with SVM for Anomaly Detection
Gao Haihua;Yang Huihua;Wang Xingyu
..............page:145-147
Totally Ordering Reliable Broadcast on Switched Ethernet
XU Heng;Wang Zheng
..............page:148-151
An Authenticated Encryption Scheme Based on Self-certified of Public Key
Zhao Zemao;LIU Fengyu
..............page:152-155,211
A Real-Time Streaming Media Testbed
Xu Zhigang;Song Jianxin
..............page:156-158,195
High Speed IP Routing Lookup Algorithm Based on RAM and TCAM
YIN Ke;Deng Yaping
..............page:159-161
Homomorphic Encryption Scheme in the Range of the Real
Xiang Guangli;Chen Xinmeng;Ma Jie;Zhang Junhong
..............page:12-14
Pipeline Hazard Recognizer and Parallel Scheduler in GCC
Ye Wei;Ma Jie;HOU Chaohuan
..............page:10-11,18
A Study on Ontology Learning for the Knowledge Grid
Liu Baisong;Gao Ji
..............page:1-5
On the Generalized Bezier Scheme for Curve-Fitting
Song Ruixia;Wang Xiaochun;Ma Hui
..............page:60-63
A New Approach for Detecting Grid in Images
TANG Jin;Zhu Wan;BAI Tao;Chen Yue
..............page:64-66
Security Route Protocol of MANET
MENG Tao;Shi Haoshan
..............page:162-165,214
Research of Firewall Matching Arithmetic Based on Rules
Liang Jingzhang;Zhao Qibin;Chen Xueguang
..............page:166-168,172
The Study of an Instance for the Mapping between Parlay APIs and SIP
Han Yanfeng;Lu Meilian
..............page:169-172
Design and Implementation of P-persistent CSMA/CD LAN Simulation System in C4ISR
Gao Xiaojuan;ZHONG Lianjiong
..............page:173-175
Ontology-Based Personalized Recommendation System
Pan Hongyan;Lin Hongfei;Zhao Jing
..............page:176-180
An Attribute Reduction Algorithm Based on Association Matrix
Yan Deqin;Wang Yang
..............page:181-182,191
Technology and Implementation of Designing Data Report Form Based on Software Integration
Deng Shijian;Geng Bingcheng;Zhang Chao;Deng Jie
..............page:98-101
Research of Modifications and Implementing of Real-time Support of Linux
Gao Xin;Lu Yang
..............page:102-104,205
Establishing Load Model of Product in Pro/Engineer
Liu Aihua
..............page:105-107
Research and Implementation of Virtual Instruments Based on Agent Technology
LI Yunfei;Jiang Xiaofeng
..............page:108-110
Design of Nonlinear Feedback Ramp Controller in Freeway and its Simulation
Liang Xinrong;Liu Zhiyong;Mao Zongyuan
..............page:111-113
A Novel K-means Clustering Based on Particle Swarm Optimization Algorithm
LIU Jingming;Han Lichuan;HOU Liwen
..............page:183-185
The Bidding Strategy with Multi-Agent Based on Double Auction
Zhou Xin;Bao Zhenqiang;LI Changyi
..............page:199-201
Research on Secure Mode of OAS
TAN Jihong
..............page:202-205
A Database Encryption Scheme Providing Multi-user Accessing and High Availability
Zhang Liqiu;Chang Huiyou;Liu xiang
..............page:189-191
Form Definition and Management in Web-Based Workflow System
Liu Yingchun;Lan Yuqing;Jin Maozhong;Yin Wenping
..............page:192-195
Separate Algorithm for Overlapping Cell Images Based on Distance Transformation
You Yingrong;Fan Yingle;PANG Quan
..............page:206-208
An Ontological Model of The Reader's Demandable Information
Tan Jinyan;Zhu Guojin
..............page:209-211
Optimal Research on the Offset of the Urban Traffic Main Road
Zhu Wenxing;Jia Lei
..............page:212-214
Software Modeling of Intelligent Meter Reading Management System
YE Tao;Zhu Xuefeng;Li Xiangyang
..............page:215-218
A Method Using Wavelet Approximation to Remove the Electrocardiogram Baseline Wander
Zhang Wenqiong;Liu Xiaolin;Wu Tao
..............page:222-224
Map Matching Technology and its Application in ITS
Sun Dihua;Zhang Xingxia;Zhang Zhiliang
..............page:225-228