Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 5
Application of Association Rules to Selecting Real Estate Advertisement Media
Yang Hongtao;Li Guijun
..............page:230-232
Clock Synchronization Algorithms for Network Measurements
Cheng Yongsheng;Li Fengbao
..............page:121-124
Intelligent Control System of Pulsation Vacuum Sterilizer Based on Fuzzy Rules
Li Yede;Wang Zhenyou;Chen Ping
..............page:227-229,232
Wireless Digital Communication System Based on Internet for Port
Bie Yonghui;Liu Qing
..............page:223-226
A Kind of Hybrid Route Guidance Strategies Based on GIS Environments
Zhu Junling;Tian Qing;Cui Pingyuan;Chen Yangzhou
..............page:201-203,226
Access Control Service for Enterprise Applications
Zhu Donglai;Han Weili
..............page:197-200
Actuality and Technology Uptrend Analysis of Networked Manufacturing Platform
Zhang Shuhui;Liu Shijun;Zhang Lei;Lin Jie
..............page:193-196,200
The Integration and Application of Digital Image and GIS
Chen Yang;Chen Yingying
..............page:189-192,209
The Application of VR Technology in Zhalong Wetland 3D Simulation System Construction
Han Min;Meng Yu;Gu Fengfeng;Zhang Yanzhao
..............page:185-188
Rebuilding Attack Scenarios through Correlating Alerts
Liao Xiaoyong;Dai Yingxia
..............page:117-120,124
Research on the Security Mechanism of BGP
Yu Wei;Cai Kaiyu;Zhu Peidong
..............page:113-116
A New Weighted Association Rules Model
Wang Yan;Jiang Baoqing;Song Jingjing
..............page:162-164
A Kind of Machine-Statistics System Based on Hash Structure for Chinese Word Segmentation
Fei Hongxiao;Hu Haimiao;Gong Yanling
..............page:159-161
Research of Density-Based MST Clustering Algorithm
Cui Guangzhao;Cao Lingzhi;Zhang Xuncai;Wang Yanfeng
..............page:156-158,164
A Model for Protecting Host Based on Resource Operation Domain
Zhou Shunxian;Chen Haowen;Chi Peng
..............page:152-155
NS2-Based Implementation of Routing Protocol Simulation in Ad Hoc Networks
Fu Qi;Jiang Yunxia;Jiang Ruilin
..............page:149-151,155
Analysis and Convertibility Extension on Directed Signature Schemes
Xu Botong;Guo Heqing;Ou Yuyi
..............page:146-148,155
Design and Implementation of Secure Linux System Based on Mandatory Access Control
Pan Longping;Zhuang Yi;Wu Xuecheng
..............page:142-145
MAIDS-Model of IDS with Multi-Technology
Tian Junfeng;Zhang Zhe;Zhao Weidong
..............page:138-141,145
Research of Honeynet Based on Intranet
An Fengguang;Bai Shuo
..............page:135-137,145
Implementation of AODV Routing Protocol on Windows CE.NET
Zhou Jingyu;Zhou Lingling;Xu Guozhi
..............page:131-134
Detection of DDoS Attack Flow in Web Traffic Based on Wavelet Analysis
Gu Junjia;Li Ning
..............page:127-130
Encrypt Mode and the Security of Cryptographic Protocol
Wang Bin;Zhang Shaowu;Ma Zhi
..............page:125-126,130
Unstructure P2P Network Topology Models
Cao Jia;Zhang Guoqing;Lu Shiwen
..............page:23-25,53
Image Denoising Based on Dyadic Ridgelet Transform
Huang Jianping;Wang Weiwe;Song Guoxiang
..............page:69-70,79
Software Architecture Refinement and Its Application Based on UML and Z
Zhu Yi;Zhang Guangquan
..............page:59-62
A New Fingerprint Matching Method of Minutiae
Zhu Ning;Shi Ronghua;Wu Kehua
..............page:74-76
A Method for Periodical Time Series Forecast
Huang Haihui
..............page:71-73
The Research of Fuzzy Flexible Job-Shop Scheduling Problem Based on Interval-Valued Fuzzy Set
Lu Bingyuan;Chen Huaping;Gu Feng;Gu Chunsheng
..............page:56-58,73
T-S Fuzzy Model Identification for Nonlinear System Based on Improved PSO
Xiao Jianmei;Wang Xihuai
..............page:46-49
A New Decomposition Algorithm of Simple Polygon Based on AutoCAD
Liu Yanpeng;Wu Mingguang;Zhang Yurun
..............page:43-45,49
A Hierarchical Evolvement Approach to Interpretable Fuzzy Classification System
Liu Jiancheng;Jiang Xinhua;Wu Jinpei
..............page:40-42
Memory Management of Real-Time Operating System SACOS
Liu Zhongshi;Dai Jinhai;Gui Xianzhou
..............page:37-39
Fuzzy Neural Network Based on Principal Component
Xu Zixiang;Zhou Deyun;Luo Yiran
..............page:34-36
Facial Expression Recognition Based on 2DPCA
Cheng Jian;Ying Zilu
..............page:32-33,39
Study of Granular Analysis in Clustering
Wang Lunwen
..............page:29-31,65
Hierarchical Multiresolution Modeling for Point-Based Rendering
Gao Xiufen;Chen Fumin
..............page:26-28
Auto Segmentation of Brain MR Image Based on Fuzzy Anisotropic Diffusion
Zhang Jianwei;Chen Yunjie;Xia Deshen
..............page:19-22,28
A Strategy for Detecting the Changes in Cluster Model of Data Stream
Liu Shang;Huang Yalou;Ni Weijian
..............page:15-18
Research and Implementation on Web Services-based Gazetteer Service
Huang Song;Huo Hong;Fang Tao
..............page:220-222
Common Data Reference Model for Insurance Industry and the Application
Zheng Qingyu;Guo Yan;Zuo Chun
..............page:217-219,232
Study and Implement of Computer Testing System Based on Component
Liu Xiangbin;Yang Bo;Wang Shengchun;Tan Jian;Yang Tielin
..............page:210-212
The Branch-and-Bound Algorithm for a Kind of Circuit Wiring Problem
Hu Fengli;Wang Xianghai
..............page:204-206
Survey on Graph Theory based Image Segmentation Technique
Yan Chengxin;Sang Nong;Zhang Tianxu
..............page:11-14
A Static and Dynamic No Fit Boundary Approach for Ellipse-Rectangle
Li Ziqiang;Teng Hongfei
..............page:1-3,7
A Video Encryption Scheme with Multiple Security Levels
Li Wei;Xu Zhengquan;Yao Ye
..............page:107-109,112
Data-frame Parsing and Processing Driven by Formalize-Description
Peng Siwei;Zhu Qunxiong
..............page:179-181,212
The Research of Clustering in Microarray Expression Data Analysis
Ma Yu;Chen Li;Ou Liqi
..............page:176-178,206
A Lossless Compression Scheme for Scientific Data from Simulation
Wu Guoqing;Chen Hong
..............page:172-175
A XML Data Management Framework Based on RDBMS
Zhao Xiaonan;Li Zhanhuai;Ma Huibin
..............page:167-171
Algorithm of On-line Generating Paper Based on Knapsack Problem
Lin Peiguang;Fan Xiaozhong;Yu Zhengtao;Kang Haiyan
..............page:165-166,175
Design and Implement of Synthesis Column Map Drawing System Based on Database
Wang Bin;Pan Mao;Qu Honggang;Wang Zhangang;Chai Hua
..............page:104-106,171
The Development of Control System for Active Reflector of FAST Based on Ethernet
Huang Hao;Wang Qiming;Zhang Hui;Zhu Chunli
..............page:97-100
The Design of Automatic Layer of the Process-Oriented and Visual Design BPM System
Xu Tao;Cai Hongming;Jiang Lihong
..............page:91-93,103
A Coverage-driven Method to Construct Verification Environment
Chi Zhigang;Gao Deyuan;Fan Xiaoya;Jin Zhanpeng
..............page:88-90,96
A Method for Testing Floating Point Multiply and Add
Wang Jun;Wen Yanhua;Qi Fengbin
..............page:85-87,116
Adaptive Fuzzy Threshold Filter Algorithms Based on Wavelet Transform
Ouyang Chunjuan;Yang Qunsheng;Ouyang Yingchun
..............page:82-84
An Optical Flow-based Obstacle Estimation Algorithm
Yang Wenjie;Hu Minghao;Yang Jingyu
..............page:80-81
An Image Edge Detection Method Based on Multi-scale Morphology
Lian Jing;Wang Ke
..............page:77-79
The Measuring and Dynamic Adjusting Algorithm of Empty Flows
Pan Minghan;Xu Cuixia;Zong Xufeng;Liu Xin
..............page:54-55,62
Multi Mobile Agent Learning Algorithm Based on Reinforcement Learning
Liu Fei;Zeng Guangzhou
..............page:50-53