Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 34
Pretreatment of Rays Method for Real-Time Volume Clipping
WEI Jun;QI Hua;WANG Yi;ZHAO Hai-tao;WEI Meng-qi;FAN Yang-yu;HAO Chong-yang
..............page:225-227
Open Framework of DLs' Interoperability Based on SOA
XU Hong-fa;WANG Wei-ping
..............page:221-224
Zero-Knowledge Proof Scheme of Identity Authentication Based on ElGamal Digital Signature
ZHANG Xiao-min;ZHANG Jian-zhong
..............page:131-132
Analysis of Arithmetic of Cost Calculation for Dynamic Inventory in ERP
XU Xian-lin;CAO Jian
..............page:199-200,204
Reliability Research on Radar Scene Matching Based on Gray Scale Contrast
JIANG Biao-chu;CHEN Ying-ying
..............page:196-198
Scrambling Mechanism of Digital Broadcasting Stream
LAI Jia-zhe
..............page:194-195,213
Research on Recommendation System Combining AHP and Data Mining
FU Chang-jian;LENG Zhi-hua
..............page:191-193
Crack Detection in Wheel Crack Detection System
TU Zheng-zheng;WU Hai-bin;LUO Bin
..............page:188-190
Subcircuit Extraction Algorithm Based on Subgraph Isomorphism
LI Chang-qing;ZHANG Fu-bin;PENG Si-long
..............page:185-187
Real Time Remote Monitoring and Control for Networked Appliance over Internet
LIU Ying-xue;LI Hui;HUANG Zhang-qin;HOU Yi-bin
..............page:228-232
Multi-Dimension Random Parameter Insertion Algorithm in HTTP Protocol Communication Hiding
ZOU Xin-guang;JIN Hai-jun;HAO Ke-cheng;SUN Sheng-he
..............page:127-130
Malware Defence Incentive Mechanism for P2P File-Sharing System
DONG Jian-quan;XIE Cheng-hao;LI Chao
..............page:122-126
Key Feature Selection for NIDS Using GA and SVM
ZHANG Yue-jun;CHAI Qiao-lin;WANG Shao-e;WANG Hua;LIU Yun-lu
..............page:119-121
Analysis of Channel Distortion for Video over Internet
CHENG Jian-xin;GAO Zhen-ming;ZHANG Zhi-chao
..............page:116-118,132
Schema Discovery of Semi-structured Data Based on OEM Model
LV Cheng;WEI Chu-yuan;ZHANG Han-tao
..............page:162-165,181
Method of Data Reduction Based on Boolean Matrix
HUANG Long-jun;ZHANG Zhi-ming;ZHOU Cai-ying;HUANG Ming-he
..............page:160-161,181
Chinese Text Classification Based on DCM
LUO Chang-ri;ZHANG Xin-hua;HE Ting-ting;LUO Shi-guang
..............page:157-159
Improved Role Based on Access Control Model
DU Ping;LIU Hong
..............page:154-156,198
Rule Based Process Evolution Mechanism
CHEN Jing;WANG Jian-min
..............page:150-153,177
Walsh-Haar Type Transform Based Edge Detection
LU Xiao-yan;LU Li;SHI Bao-chang
..............page:23-25
Relation-Decomposing Mapping Between Full Feature Model and Relational Model
DENG Ji-qiu;BAO Guang-shu
..............page:13-18
Speech Recognizing Network Optimization Design Based on "Growing Tree"
HUANG Bin;ZHANG Ming-xin;WANG Jin-lin
..............page:10-12,32
Ontology Registration Based Approach for Trustable Semantic Interoperation
HE Yang-fan;HE Ke-qing;WANG Chong
..............page:8-9,25
Adaptive Recursive Kalman Filtering Algorithm Based on Least p-Norm Criterion
GUO Wen-qiang;QIU Tian-shuang
..............page:19-22
Research and Manufacture of New Type Copper-Aluminum Explosive Compound for CPU Radiator
ZHANG Jian-chen;ZHOU Zhi-gang;YANG Wen-bin
..............page:92-94,97
Elman Neural Network-Based Improved Model and its Applications to Stock Market
LI Ming;HAN Xu-ming;WANG Li-min
..............page:218-220
Comparison of SVM and Neural Network Model for Incident Detection
QIN Pin-pin
..............page:214-217,232
Research of Driver's Eye States Detection
HU Tao;LIU Gang
..............page:211-213
Maximum Scatter Difference Discriminant Analysis and Face Recognition
LIU Yong-jun;CHEN Cai-kou
..............page:208-210,227
Numerical Simulation of Infection Dynamics Model with Delay
WEI Wei;SHU Yun-xing
..............page:205-207
Study on Open Vehicle Routing Problem with Time Windows Limits and its Genetic Algorithm
ZHONG Shi-quan;DU Gang;HE Guo-guang
..............page:201-204
Function Extension of ArcPad Based on COM Technology
CHEN Dun-gen;JIANG Hao-yu;FAN Yue-zu
..............page:89-91
Design and Implementation of Experiment Platform Based on Reconfigurable Device
JI Jin-song;SHI Zheng;WANG Heng-cai
..............page:86-88,121
Service-Oriented Mathematics Programming Markup Language(MPML)
LI Zhen-fang;LI Lian;ZHAN Jian;YANG Yi;LIU Li
..............page:81-85,111
Design and Implementation of E-Open-Business Library Based on Web
LI Hua;WU Liu-ai;QU Xia
..............page:182-184,187
Randomized Approximation Algorithm for MAX-CNF
LI Wei;ZENG Wen-hua
..............page:39-41,69
Modified PSO Algorithm Solving Flow-shop Scheduling Problem with Fuzzy Delivery Time
SHEN Bing-hu;LIU Yi;PAN Rui-fang
..............page:36-38,72
Interactive Method for Image Segmentation Based on Cloud Model
XU Kai;QIN Kun;PEI Tao
..............page:33-35,52
Algorithm of Completion for Strong Orientational Texture Images
WANG Zhong-qing;TAN Jie-qing;HE Lei
..............page:29-32
Applying Research of Information Visualization Technology in Intelligence Analysis
DONG Xian-zhou;HU Xiao-feng;SI Guang-ya
..............page:175-177
Improved Algorithm of Approximate Chinese String Matching
FAN Li-xin
..............page:172-174,207
Frequent Closed Itemsets Mining Algorithm Based on FP-Tree
CHEN Jun-jie;CUI Xiao-hong
..............page:169-171
Improved Digital Image Watermarking Based on K-Means Algorithm
GUI Qi;BAI Sen;SUN Jing
..............page:166-168
Design and Implementation of Inner-net Information Monitor System
HU Hong-yun;HU Jing;HUANG Chen;XIE Jun-yuan
..............page:147-149,193
Research on FPGA Implementation of Block Ciphers
WANG Jiu-lin
..............page:144-146
Research for Tunnel Dynamic-Switching Mechanism Based on IPsec
QIAN Yan-bin;CHEN Xing-yuan
..............page:142-143,159
Research and Design of Message Communication Mechanism Netlink in IPsec VPN
ZHANG Xiao-ming;DU Chun-yan;LU Jian-de
..............page:139-141
New Multi-signature Scheme with Proxy
LUO Jun;SHI Rong-hua
..............page:137-138,190
Design and Implementation of Embedded PLC Software Platform Based on Network
ZHOU Chun-jie;XIONG Rui;WANG Yong-ji;GONG Yun-sheng
..............page:76-80
AMBATM wrapper for 8-bit Embedded CPU
GU Ye-hua;ZENG Xiao-yang;HAN Jun
..............page:73-75
New Method of Similarity Measures between Vague Sets
FAN Ping;LIANG Jia-rong;LI Tian-zhi
..............page:70-72
Memory Hierarchy Optimization Based on Empirical Search
LU Ping-jing;CHE Yong-gang;WANG Zheng-hua
..............page:67-69
New Approach to Digital Watermarking Based on OBSA Multi-wavelet Transform and Genetic Algorithms
LI Yan-zhi;YANG Jian-bo;LIU Peng;WU Hong-chao
..............page:64-66
Dynamic Optimum of Shortest Path's Algorithm Devised by Floyd
LI Hong-bo;WANG Mao-bo
..............page:60-63
Method for Estimating Fundamental Matrix Based on Improved Genetic Algorithm
LI Hong-yan;SHENG Li-yuan;WEN Jiang;LOU Ji-bing
..............page:57-59,91
Non-linear Speech Enhancement Method Based on Mathematical Morphology
WANG Guang-yan;ZHAO Xiao-qun;WANG Xia
..............page:53-56
Improving Three Step Search Algorithm According to Central Preference of Motion Vectors
XU Ming;WANG Bo;HE Yi-zheng;FANG Xiang-zhong
..............page:50-52
New Module of Neural Network Ensembles
ZHANG Xiao-yang;XU Min;SHI Hua-ji;LI Xing-yi
..............page:48-49,80
UG Redevelopment of Finite Element Grid Generation on Spatial Surface
XIE Shi-kun;HUANG Ju-hua;ZHENG Hui-ling
..............page:45-47
Ant Colony Algorithm Based on Dynamic Candidate Sets of Minimum Spanning 1-tree
ZHAO Ling;LIU San-yang;KOU Xiao-li
..............page:42-44
Obligation Action and Constrain in Trust Negotiation
YANG Qiu-wei;HONG Fan;ZHENG Ming-hui;LIAO Jun-guo
..............page:5-7,18
Fault Symptom Handling Algorithm Based on Feature Weighted
CUI Zhong-jie;YAO Shu-ping;TANG Cheng-hua
..............page:1-4,22
CMM_based Model of Information Systems Security Assurance
JIANG Chang-qing;PENG Yong;LIN Jia-jun;WANG Gui-si
..............page:112-115,126
Improved A(0) Protocol and it's Formal Analysis
CAI Yong-quan;ZHU Yong
..............page:109-111
Diff-Service Minislot Scheduling Alogrithm in IEEE 802.16 Mesh Mode
WANG Li-ping;LIU Fu-qiang;WANG Xin-hong;SHI Yuan-ji
..............page:105-108
Design and Application of Packet Generator over IP Network Based on Linux
TAN Min-sheng;ZHAO Zhi-guo;TANG Zheng-jun
..............page:101-104
Internet-Worm Detecting System Based on ISP Distributed
ZHAO Ye-hong;YANG Shou-bao;WANG Shao-lin;DONG Kuo
..............page:98-100
Implementation of Grid Computing Model Based on Campus LAN
ZENG Xiao-ning;LI Yong-jun
..............page:95-97