Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computing Technology and Automation
1003-6199
2008 Issue 3
Program Automation Based on Arithmetic
WAN Feng-song;YANG De-sheng;GUO Xing;WU Jian-guo
..............page:133-136
Research on Consensus in Group Decision-making of Service Fuzzy Matchmaking
YU Xun-quan;YANG Hui
..............page:137-140
Development of Virtual Instrument with Object-oriented Design
SONG Jia-sheng
..............page:141-144
Development and Application of the TMR Telephone Voice Search System
DING Ming-an;KUANG Hong-gang;LIU Zhen
..............page:129-132
Solution Based on the Storage of Campus Network
LUO Yue-guo
..............page:125-128
The Personalized Information Retrieval on the Basis of User-mode
WU Da-qing;YANG Xiao-hua;LIU Yuan-jian;XU gang-li
..............page:120-124
The Summary of Explicit Congestion Control
LI Ming;JIANG Zi-heng;ZHONG Zheng;PENG Li-hong
..............page:115-119
VES: Design and Implemention of an Expert System for Diagnosing Vaginitis
MENG Xiao-jing;WANG Yan-fen;LIU Qiao-ling
..............page:111-114
Research on Network Traffic Monitoring Techniques
PENG Jian;ZHU Ping;FU Ming
..............page:103-106
Based on Fourier Proven,The Non-standardized Application of Twisted Pair
GUO Wai-ping;WANG Yun
..............page:99-102
Microkernel Research in Workflow Management System Based on Agent
LIU Can-xun;BAI Shu-ren
..............page:92-94
Research on Metadata Extraction and Export for CWM-based Enterprise Metadata Integration
DING Chang-song;HU Zhou-jun
..............page:88-91,128
Design and Implementation of Component Developing Assistant Virtual Laboratory
SHAO Shuo;WANG Jian-xin;SHENG Yu
..............page:82-87
Vehicle License Plate Location Based on Adaptive Method
TAN Xi;HUANG Zhang-can
..............page:73-77
Morphological Edge Detector with Genetic Algorithm Optimizing
ZHANG Rong-tao
..............page:63-66
Intrusion Detection Method Based on Fuzzy Rules
HUANG Tie;LIU Qiao-mei
..............page:60-62
Security Analysis of NTRUSign Digital Signature Scheme
MIAO Xiang-hua;YUAN Mei-yu;YANG Yun-fei;LI Yong
..............page:52-54
The QRS Dissipativity for a Class of Time-delay Dependent Singular Linear Systems
WANG Tian-bo;ZHANG Xue-shan;FANG Tao
..............page:39-43
Neural Network PID Control Based on Chaos Variables Optimization
LI Xiang-fei;ZOU Li-hua
..............page:35-38
The Algorithm and Analysis from Experiment Data by Means of Minimum Double Multiplication
LONG Hui-ping;XI Sheng-feng;HOU Xin-hua
..............page:20-23
Rotation Invariant Texture Classification Based on Entropy-fourier Descriptor in Contourlet Domain
FENG Yi;XU Can-hui;YANG Jia-hong;ZHONG Jian-cheng
..............page:16-19
Compare and Analysis of Uastering Algorithms Oriented Tvaffic Identification System
SU Xin;YANG Jian-hua;ZHANG Da-fang;XIE Gao-gang
..............page:1-6
Bicubic Trigonometric Polynomial Coons Pacth with Shape Parameters
HUANG Chuan-jian;HAN Xu-li;BAO Chong-bing
..............page:12-15