Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 4
Internet Traffic Optimisation Using Genetic Algorithm
Zeng Jie;Chen Fangjiong;Wei Gang
..............page:125-127,134
A New DRM System Based on PKI
Zheng Xiaolin;Jin Jiwu
..............page:128-131
Research on Grid Task Scheduling Algorithm Based on Communication and Computing Cost
Cao Huaihu;Yu Zhenwei;Wang Yinyan
..............page:132-134
Case-Based Reasoning for Intrusion Detection Correlation Analysis
Zeng Rugang;Guan Xiaohong;Zan Xin;Zheng Qinghua
..............page:138-141
Ideal Secret Sharing Schemes with Multipartite Access Structure
Li Ka;i Luo Guiming
..............page:142-144,182
Optimization to Firewall Rule-Matching with Statistic Analysis
Ren Anxi;Yang Shoubao;Li Hongwei
..............page:162-164
A Fast Algorithm for Mining Association Rules in Distributed Databases
Chen Geng;Ni Weiwei;Zhu Yuquan;Sun Zhihui
..............page:165-167,194
The Research of Personalized Web Content Mining Based on XML
He Bo;Yang Wu;Huang Xianying;Zhang Jianxun
..............page:168-170
WordNet-based Concept Vector Space Model for Text Classification
Zhang Jian;Li Chunping
..............page:174-178
Extending XML Schema with Inheritance
Zhang Xiaolin;Tan Yuesheng;Zhou Jian
..............page:179-182
Parallel 3D-CT Reconstruction Using MPI
Sun Cuili;Lu Hongnian;Yang Min;Zhao Fei
..............page:213-214,221
A Contrast Fuzzy Enhancement Algorithm Based on 3D Medical Image
Tian Yun;Hao Ningbo;Xue Gengjian;Hao Chongyang;Han Peiyou
..............page:215-217
A Grey-histogram Based Traffic Detection System
Geng Kai;Yao Danya;Zhang Yi
..............page:222-225
Design and Implementation of a Java Card Application
You Daian;He Jiutian;Jiang Suiping;Liu Dongmei;Chen Hongyan
..............page:229-232
Research on Faults Model and Testing Method of Null Pointer Dereference
Zhang Wei;Lu Qingling;Wan Lin;Xiao Qing
..............page:71-72,94
Public-Key Based Kerberos in Distributed Authentication
Liu Zhuang;Guo Heqing;Zhang Juanjuan
..............page:121-124
The UML-Based Software Architecture Development Methodology
Ma Chongming;Zhang Xuewang;Fan Shikping
..............page:118-120,148
Product Development Process Modeling on Mapping Dividing
Qiu Fusheng;Liu Wenjian
..............page:114-117
Performance Evaluation of H.264/MPEG-4 AVC Video Encoder
Liu Danghui;Shen Lansun;Qiang Xiuli
..............page:111-113
Design and Implementation of a Mass Storage File System
Chen Zhiling;Cheng Yaodong;Liu Aigui;Chen Gang
..............page:108-110,117
The Evaluation of Information System Security Risk
Chen Lian;Wen Jufeng;Han Bingqing
..............page:145-148
Technique of QoS and Project Based on DiffServ in IP Net
Du Huijun
..............page:152-155,225
Study of Information Flow Model Based on Fluid Analogy
Lai Yingxu
..............page:156-157,164
Collision Attacks on OCB
Liao Jia;Wang Lipeng;Chen Lusheng
..............page:158-161
Performance Optimization of Web Topic Search
Tian Xuedong;Li Shucheng
..............page:183-185,188
A Text Filtering Model Based on Concept
Zhao Fengnian;Liu Lin;Shang Jianyun
..............page:186-188
Risk Appraisal Based on Fuzzy Multi-Attribute Decision for Virtual Enterprise Formation
Zeng Zhibin;Li Yan;Li Shujuan
..............page:189-191,228
The Implementation of Object Oriented Semantic in Engineering Design
Hou Wenbin;Zhang Hongzhe;Liu Dayou;Hu Ping
..............page:195-197
Study of Extracting Ontology Concept for Tendering Structures
Xu Ying;Xu Fuyuan;Li Shengqi
..............page:198-200,206
Remote Dynamic Configuration of Web Services Based Information System
Li Ruibo;Liu Lu
..............page:201-202,232
An Efficient Multi-Round Electronic Auction Based on Knapsack Theory
Zhang Zhiming;Deng Jiangang;Yu Min
..............page:207-209
Vehicle Routing Optimization Problem Based on Immune Algorithm
Fan Jianhua;Wang Xiufeng
..............page:210-212,217
A Robust Blind Watermarking Algorithm
Wang Xiaomin;Wang Chen Huang;Shenghua
..............page:81-83
Research of Image Denoising Based on Simulated Annealing and Genetic Algorithm
Yang Xuexing;Ding Haijun
..............page:79-80,86
Fast and Robust Super-resolution Image Restoration Algorithm
Zhang Zhengxian;Jiang Dawei;Zhang Ying;Wei Caihua
..............page:76-78
A New Method for Removing Recursion
Chen Yanhui;Xing Jing;Luo Yu
..............page:73-75,141
Modified Evolution Strategy and its Application to Neural Network Training
Ke Jing;Jiang Jing;Li Qiqiang
..............page:68-70,141
Research on Algebraic Structure and its Similarity Assessment of Cases
Zheng Haosen;Tang Yin;Peng Hong;Zheng Qilun
..............page:65-67
Real-Time Navigation of Cubic Panorama Based on PDA
Wang Taochun;Xu Dan
..............page:61-64
A DNA Algorithm for the Graph Vertex Coloring Problem
Sun Chuan;Zhu Xiangou;Liu Wenbing;Xu Jin
..............page:58-60,67
Attribute Description of Human Face from Graph Spectra Decomposition
kong min; kong min ; zhao hai feng ; luo bin
..............page:54-57
The Mind Operations Description of Software Programming Tasks Process
Wang Lei;Li Yongjan
..............page:51-53,97
Image Filter Based P2DHMT Model in Wavelet Domain
Li Huifang;Pang Wenjun;Xu Ruiping
..............page:45-47,83
New Method for Obtaining the Center of Structured Light Stripe
Jin Jun;Li Dehua;Li Heping
..............page:42-44
Research to Improve the Generalization Ability of Neural Networks
Feng Naiqin;Wang Fang;Qiu Yuhui
..............page:38-41
A kind of Method for Quick Constructing Optimal Coalition Structure
Liu Jinglei;Tong Xiangrong;Zhang Wei
..............page:35-37,44
New Strategies for Developing Loop Invariants and its Application
Shi Haihe;Xiao Zhengxing;Xue Jinyun
..............page:105-107,161
Wafer Quality Detecting System of Automatic Die Bonding Machine
Liao Guangjun;Hu Yueming;Qi Qifeng;Zhang Hao
..............page:102-104
Implementation of General Cipher Processor Based on FPGA
Zou Houwen;Liu Lei;Wang Feng;Tang Yi
..............page:98-101
Extensible Hashing System and its Improved Lazy Algorithm
Xu Fenggang;Xu Junkui;Pan Qing
..............page:95-97
Attribute Petri Net Model and its Reasoning Algorithms
Zhou Ruqi;Feng Jiali
..............page:91-94
Simulated Annealing Algorithm for Weapon-Target Assignment Problem
Wu Ping;Liang Qing
..............page:87-90
A Survey of Bio-inspired Fault Tolerance Computing Techniques
Zheng Ruijuan;Wang Huiqiang
..............page:30-34
Computing the Problem of Object's Orientation by Resultant Methods
Li Yaohui;Xue Jiwei;Feng Yong
..............page:27-29
A Low Power Banked Multi-Ported Vector Register File Design for V-PIM
Wen Pu;Yang Xuejun
..............page:24-26
The Study on Xiao's Hyperelliptic Curve Limited Proxy Signature Scheme
Xiao Youan;Zhou Zude
..............page:20-23
The Trusted Supporting Framework Design and Study of the Application Mode
Chen Youlei;Shen Changxiang
..............page:16-19,64
Optimal Stopping Time for Maintenance After a Deteriorating Failure Occurrence
Gao Diguang;Pan Quan;Liang Yan;Zhang Hongcai
..............page:10-12,57
Knowledge Discovery of Semantic Grid Platform on Knowledge Element
Wen Youkui;Wen Hao;Xu Duanyi;Pan Longfa
..............page:4-6,34
Acquisition of Translation Equivalences Based on Multiple Linear Regression
Zhang Chunxiang;Zhao Tiejun;Li Sheng
..............page:1-3,26