Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Modernization
1006-2475
2009 Issue 2
Features Extraction and Recognition of Lip-movement Based on Inner Lip
WANG Xiao-zhong;PAN Bao-chang;ZHENG Sheng-lin
..............page:5
An Optimal Routing Algorithm for Mobile Agents in Wireless Sensor Networks
LANG Xi-gui;YU Hong-biao;CUI Wen-hua
..............page:27
Design of McBSP Interface Based on Testboard of Radar Signal Processor
REN Yong-feng;AN Rong;LI Sheng-kun
..............page:24
An Adaptive Rotation Deformation Algorithm Based on Unorganized Point Cloud
YIN Dan;ZENG Zhi-jun;YANG Bo
..............page:13
Trademark Image Retrieval Using Shape Features Based on Texture Analysis
REN Yong-hua;WANG Guo-ying;MA Jun-wei
..............page:8
Application and Integration of ESB Architecture in Enterprise Informatization
REN Li;YANG Guo-qiang;WAN Guo-hui
..............page:71
Application of Improved Complex Algorithm in Product Combination Optimization
ZHOU Jing;LU Hu-sheng;CHEN Peng
..............page:67
WIDS: A Software Defect Management System Based on CMM
FENG Lei;YAO Li
..............page:54
Research and Application of Berkeley DB Java Edition Data Structure
ZHOU Li;YANG Xiao-song
..............page:48
Design and Realization of SIP Stack
FAN Shu-bin
..............page:45
Design of PIM-SM Based on IPv6
KONG Ting
..............page:42
Design of Single Sign-on System Based on Agent
LEI Bo;GUO Yu-dong
..............page:39
Web-based Cross Language Information Retrieval Technique
ZHAO Xin;DENG Ming-xing
..............page:35
Research on UDDI-based Web Service Discovery
WANG Xu-hui;YAO Shi-jun;JIAO Zhi-yong;HAN Qiang
..............page:31
Application of Database Technology in Thesis Online Guidance
DING Rong-chun;ZHANG Li-fen;DAI Jun
..............page:111
Protection of Dynamic Graph Watermark Based on Multiple Constants Encoding
TANG Chun-xia;CHENG Jian-hua;WANG Fei-peng;ZHU Jiang-tao
..............page:108
A New Rekeying Scheme for Multicast Based on LKH Tree
ZHAO Bo-hua;YU Mei-sheng
..............page:105
Analysis and Improvement of Snort Detection Engine
ZHOU Wei;JIANG Ze-tao;LI Ke-wei
..............page:102
A Method of Doubly Detecting Rootkit
LIU Yong;JIANG Ze-tao;GAN Sheng-ke;LI Ke-wei
..............page:98
Research on Increment Association Rules Mining Algorithm
ZHENG Wen-zheng
..............page:92
Method of Operating MDB Database in LabWindows
ZHANG Peng
..............page:89
Application of Self-adaptive Filter in System of Electricity Measure
YU Rong-gui;YE Shui-sheng
..............page:122
Sigma Delta Modulators Behavioral Modeling Based on Verilog-A
NI Jie;YAO Jian-nan
..............page:125
Design and Implementation of Embedded GPRS Based on ARM9
LIAO Jia;ZHOU Xing-bin
..............page:129
Research on PlayCards Arithmetic in Google Code Jam
YU Rong-hua;L Wei-xian
..............page:132
Analysis and Design of 3D Game Engine Based on Design Patterns
LI Tian;FEI Yao-ping
..............page:135