Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2005 Issue 29
Online Recognition of Handwritten Chinese Character Free from Stroke Order and Connection
Cao Zhejiong;Wang Yongcheng
..............page:167-169,199
A Model Driven Information Security Risk Assessment Approach
Li Song;Memg Yaping;Sun Tie;Liu Haifeng
..............page:159-162
Intelligent Packet Filtering Model for Defending against DDoS Attacks
Li Xuan;Ye Qi
..............page:156-158,166
Testing and Evaluation for GreeNet Internet Access Control System
Yao Junfeng;Xu Renzuo
..............page:154-155,166
Development of MapObjects Control in Visual C++
Liu Shuang;Jia Chuanying;Chen Peng
..............page:170-173
A System of End-to-End Admission Control Supporting Overlay QOS
Qiu Chunrong;Yang Guanzhong
..............page:151-153,173
A Mechanism Based on Differentiated Service Quality in Web Server
Huang Guimin;Yang Mingfu
..............page:145-150
Study of the Uplink VBR Data Services with High Bearing Speeds in 3G WCDMA
Yang Hongsheng;Li Kexiang;Song Guowen
..............page:141-144
Some Improvement on the Multicast Routing Algorithm of KPP
Zeng Feng;Yao Lan;Wang Dong
..............page:137-140
Design of Intrusion Toleration System
Guo Dawei;An Ning
..............page:134-136
Risk Index-based Stochastic Routing Strategy
Zhang Yingbin;Shi Haoshan;Lu Xuanmin
..............page:130-133
Study on Comprehensive Assessment Method for Network Security Based on AHP and ANN
Xu Fuyong;Shen Jian;Li Jianying
..............page:127-129
The Design and Implementation of Rsync-based Administrative System of Network Center
Tong Duan;Li Jiyun;Xu Hong
..............page:123-126,162
Software Maintenance Process Study Based on CMM
Zhu Xiaodong;Wang Xiaowei
..............page:66-69
A Method of Extracting Parameters of Fractal Graphics
Mu Wenying;Liu Xiaoxian;Wang Wenning
..............page:70-73
Improved Polygon Morphing Using Mean Value Coordinate
Gu Liuxin;Liu Kexuan
..............page:74-76,106
Automatic Classification of Remotely Sensed Images Based on Artificial Ant Colony Algorithm
Wang Shugen;Yang Yun;Lin Ying;Cao Chonghua
..............page:77-80,116
Evaluation for Component Software Reliability Using SPN in Early Stage
Li Guangyuan;Chen Yongzhang
..............page:84-87
A New All-pairs Shortest Paths Algorithm Based on Edge List
Xu Xiaoling;Peng Jing;Shi Baomei;Fang Quanxin;Zhang Jing
..............page:88-90,103
A Modified Algorithm for Endpoint Detecting of Speech Using FER
Guo Jiyun;Wang Shoujue;Liu Xuegang
..............page:91-93,103
Optimization Strategies of Process Address Space Storage in Checkpoint System
Li Yanhong;Meng Dan;Zhou Yingchao;Wu Linping
..............page:94-96,113
An Algorithm and Hardware Implementation of Multiscale Dot Distribution
Gao Ke;Cao Qixin;Fu Zhuang
..............page:100-103
Architecture Optimizing for Deblocking Filter of H.264/AVC Video Decoder
Niu Xiaolei;Dai Qionghai;Liu Yebin
..............page:104-106
The Key Technology of Multi-Target Evaluation about Digitized Industrial Design
Gou Bingchen;Zhou Xian;Yu Suihuai
..............page:107-109
The Design of Embedded Communication Equipment Based on uClinux and Jupiter
Gao Shiwei;Liu Yali;Chen Xiuping
..............page:110-113
The Design of a Single Chip Audio Decoder
Sun Fujia;Shen Bo;Zhang Qianling
..............page:114-116
Probing into the Detail on Realization of BGP/MPLS VPN
Dong Ling;Huang Yang;Xu Saihong
..............page:117-119,136
Improvements on CBRP in Mobile Ad Hoc Networks
Wang Hao;Zhong Xiaofeng;Wang Youzheng
..............page:120-122,150
Research on Non-Uniform Information Distribution for Grid Resource Discovery
Wang Yifu;Chen Songqiao;Fan Guochuang
..............page:27-31
The Research on the Spatial Clustering Algorithm Based on GIS
She Xiangyang;Peng Wenxiang;Xue Huifeng;Li Jijun
..............page:24-26,31
Catastrophe-particle Swarm Optimization Algorithm and Its Application to Traffic Control
Dong Chaojun;Liu Zhiyong;Qiu Zulian
..............page:19-23
Two Issues of Spreading Model for Network Viruses
Han Lansheng;Chen Wei;Han Shuxia
..............page:16-18,23
An Improved Octree for 3D Object Representation
Zhao Haifeng;Luo Bin
..............page:8-10,15
A Survey of Flow Measurement Algorithms
Liu Weijiang;Gong Jian;Ding Wei;Cheng Guang
..............page:1-3,7
Research of Classification Method Based on Information Theory Network
Zou Hanbin;Lei Hongyan;Liu Qiong;Zhang Wei
..............page:174-176,183
Applying OCI Class to System Transplantation between Oracle and Other Database
Pang Weihan;Chen Youqing
..............page:177-179,192
An Effective and Efficient Algorithm for Text Categorization
Shi Zhiwei;Liu Tao;Wu Gongyi
..............page:180-183
Compression Algorithm for Radar Original Video Signal Based on DPCM and Adaptive Huffman
Li Lingzhi;Jiang Jing;Liu Zhigao;Ma Xiaoyan
..............page:184-186
Tracking Control Based Cross-Coupling and Expert-Fuzzy for Tracked Vehicle
Chen Feng;Gui Weihua;Wang Suiping;Han Xiaoying
..............page:187-189,207
The Query System of Environmental Geology Spacial Database
Zhang Lizhong;Zhang Yongbo;Zhou Xiaoyuan;Liang Guoling
..............page:190-192
A Signal Processing Procedure for Radar in Safety Driving Assist System
Yu Liping;Mu Chunlian;He Kezhong
..............page:193-195
Research and Realization on MAS-based Roles Assignment in CSCL
Wu Jinghua;Zhou Zhurong;Xi Xiaoxia
..............page:200-203,207
An Improved Contour Tracing Algorithm
Liu Xiangbin;Xiang Jianchi;Xie Linhai
..............page:61-62,87
Introduction of The XTR Public Key System
Dai Jinxiu;Tang Xiaohu;Zheng Yu;Lu Xianhui
..............page:63-65,99
An Classification Algorithm Based on Immune Network Applying to Audit Fraud Detection
Huang Xiaohui;Zhang Sihai;Wang Xufa
..............page:204-207
Use J2EE Framework Technology to Design the Reusable Web Application
Xi Xiaofeng;Lü Liangshuang;Lu Peng
..............page:208-210,214
A Distributed Object Oriented Report System for Integrated Services
Niu Mingbo;Shi Haoshan
..............page:211-214
A Recommender System for the Real Estate Based on PSO Algorithm
Liu Lin;Wei Chengjian
..............page:215-217,232
Dynamic Invokation of Web Services Based on EJB and OSS
Chen Wen;Yang Dehua
..............page:218-222,228
Design and Implementation of Manuscript Assessment & Analysis System
Hu Yifeng;Zuo Chun
..............page:223-225,232
Study on the System Integration of CAD/CAPP/PDM/ERP
Sun Jiakun;Gao Qi;Yang Chaoying;Zong Xianliang
..............page:226-228
Models of Graph Software Architecture
Zhang Yousheng;Li Xiong
..............page:58-60
Comparative Study of Corner Detection Based on Freeman Chain and Area Ratio
Fan Qiufeng;Yang Guosheng;Wang Yingjun;Ma Xiaoyan
..............page:55-57,69
Evolutionary Design of Parameters of Robust Controller for Robot
Xing Xiaoxiao;Zhong Yisheng;Shi Zongying
..............page:48-51,54
A Robust and Transparent Digital Audio Watermarking Algorithm in DWT
Li Yueqiang;Sun Xingming
..............page:42-44,47
Design of Equation Diagnosis Algorithm about Malek Fault Models
Wen Xuezhi;Xuan Hengnong
..............page:39-41,60
A Technique for Estimation of Crowd Density Based on Multi-scale Analysis and Fractal
Wang Erdan;Li Xiaohua;Shen Lansun
..............page:35-38
Automatic J2ME Code Generation from Hybrid Automata
Wang Tiantian;Liu Qiang
..............page:32-34,38