Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2003 Issue 3
Application of Dynamic Link Library in Building the Virtual Instrument System
luo jin ; meng chen ; su zhen zhong
..............page:176-177
Study on Printed Tibetn Character Recognition
wang wei lan ; ding xiao qing ; chen li ; wang hua
..............page:37-38,94
Performing SDHs Physical Layer Operation and Maintenance Testing by Physical Layer Interface
liu shu bin ; lu zeng yuan ; wu yi bao ; shen wen bo ; wang yan fang
..............page:35-36,41
Research and Algorithm of Constrained Delaunay Triangulation
li hai sheng ; yang qin ; chen qi ming
..............page:33-34
Simulation Software of PID Self-tuning Based on Kingview, Excel and Matlab
xu jiang hua ; sun rong ; shao hui he
..............page:27-29
Cooperation of Multiple Autonomous Micro Mobile Robots Based on Behavior
yang yu jun ; cheng jun shi ; chen jia pin ; li xiao hai
..............page:24-26
Study on Product Disassembly & Assembly Modeling Oriented for Maintenance
gao ming jun ; yu yong li
..............page:22-23,60
Study on Multi-S Integration Application in Engineering Exploration Information System
liu gang ; wang xin qing ; li wei zhong ; liu cong yuan
..............page:19-21
Quick Modeling of Road Networks in Urban Area Based on Vector Graphics
pan guo shuai ; ren ai zhu
..............page:16-18,65
Data-Flow Processing in RWCS
hou tai ping ; gu da quan ; wang bai chun ; zhu hong wei
..............page:173-175
Design and Implementation of Network Management System About Shanghai TVU Distance Education
zhang yong zhong ; han la ping ; ma hai zhu
..............page:171-172
Agent Based Multi-site Queries in I-commerce System
yao wei xin ; huang li hua
..............page:169-170,194
Remote Process Call Based-transaction Object
liu jing lei
..............page:166-168
Design and Verification of MPU with VHDL
nie xin yi ; wu yue ; yang hong bin ; tang yi
..............page:178-180
Method of Constructing Web-based Application with Java & XML
chen jun ; shan zuo ; zhao heng yong
..............page:181-183
Automatic Work Distribution System of Large-scale Corporation's Telecom Department
li xiao fan ; zhao heng yong
..............page:184-186
Development of Device Driver for PCI Dada Acquisition Adapters Working in OS NT/2k
chen feng ; chen jin shu ; chen xing liao
..............page:189-191
A New Distributed Computing Technology--Web Service
ning kui ; zuo jin fang
..............page:192-194
Agent Communication Framework Based on Web
jin ming yu ; di yu qing
..............page:195-197
An Extensible System for Data Cleaning
guo zhi zuo ; yu rong hua ; tian zeng ping ; zhou ao ying
..............page:95-96,183
Comparision and Research on Models of Software Project Risk Management
zhang zuo ling ; li shi xian
..............page:91-94
A New Fast Weighted Median Filtering Algorithm
chen yong ; shen yong zeng ; ji jian bing ; li guo jun
..............page:89-90
Research on Metadata-based Representation of Office Document
zheng jia heng ; wu qiong
..............page:86-88
Design and Implementation of HTTP Proxy Firewall with High Speed Cache
li jia xin ; ni liang ; wang cheng
..............page:84-85,175
A Robust Analysis for Watermarking Algorithms in DCT
yu yan zhong ; wang xin wei
..............page:81-83
Network Technology of Toll Collection System in Expressway
ma zuo ; su yan bin
..............page:158-160
Design and Implementation of GBN ARQ Protocol Based on Modem
dai xue wu ; li jian guo
..............page:155-157
The Design and Implementation of WebGis
zhang hong wu ; xie zhong ; wu liang
..............page:152-154
Study and Implementation of the RAID5-based Disk Cache
wang xiang na ; jiang ben shan ; xu jian
..............page:149-151
Study of Real Time AI Technology in Information Appliance
du yu qing ; wang xin wei
..............page:147-148,165
Development of Drilling Fluid Management System Based on CORBA and MIDAS
wang zi qiang ; feng bo qin
..............page:142-143,191
Research of TAP Interface Based on Boundary-scan Technique
wang rang ding ; ye fu le ; du cheng tou
..............page:139-141
EC Solution for "Enter, Sell, Deposit" of Middle and Small Scale Enterprise
tan jie ; chen li jiang ; zou yi ren
..............page:136-138
Effect of Traffic Control Algorithms on Performance of ATM Network
ni hong bo ; liu qiu rang ; wang fu bao
..............page:134-135
Research on Internet Traffic Prediction
zheng jian hua ; cao yang ; liu li ; chen an na
..............page:129-130
Distributed Multimedia Synchronization Designing Method Based on Java
dai chen zuo ; chen lin
..............page:126-128,180
Parallel Loop for MPI Based on Dawning-2000
han cong ying ; he guo ping ; zhang guang mei
..............page:47-49
Study on Using Scatter/Gather Operation in RAID
tong zuo ; feng dan ; zhang jiang ling
..............page:45-46,49
Analysis of Random Number Generators and Their Applications in Secure Information System
xue ying hua ; lv shu wang ; guo sheng quan
..............page:42-44
Characteristic Scale and Multiscale Analysis-based Texture Segmentation
luo xiao zuo ; li jian wei
..............page:124-125,168
An Approach to Contrast Enhancement of Fingerprint Image Based on Fuzzy Logic
su fei ; feng jian jiang ; sun jing zuo ; cai an ni
..............page:122-123,160
Research on a Speech Endpoint Detection Method
liu qing sheng ; xu xiao peng ; huang wen hao
..............page:120-121,138
Application of MPEG-4 in VoD Operation
liu hong guang ; cao cheng zuo
..............page:117-119
A Clock Management Solution of VP - An Unix's OLTP Middleware
zhu wei min ; huang lin peng
..............page:97-98,186
Introduction of A High Availiable Fault-Tolerant Mechanism of Mobile Agent
wang xia ; shang hai zhong ; wu rong quan
..............page:99-101,175
A Semantic Logical Relation Expressing Model
huang qi zuo ; zuo jian qing
..............page:102-104
A Multidimensional Declustering Method Based on K-D Tree
wang bi ; huo hong wei
..............page:105-107
A New Method of Storing and Querying Historical Data in the Computer Control System
feng lei ; li jun ; xia yu ren
..............page:108-110,180
A Neural Network-based Intrusion Recognition Technique
jin yi zuo
..............page:111-112,119
One Face Detection Method Based on Color and Shape
gao yan fang ; ni zhong kuang ; zhou mei ming
..............page:113-114,191
Study of Genetic Algorithms with Different Location Mutations
zhong guo kun ; zeng bi ; yu yong quan
..............page:115-116,194
Study on Applications of XSLT, Xpath & DOM
chen qi
..............page:14-15,44
Theoretical Structure Research of Virtual Products Development Technology
wang jing kun ; ai xing ; zhang jin sheng ; huang ke zheng
..............page:11-13
JPEG2000 Image Compression Algorithm and Its Application in Network
wu yong hui ; yu jian xin
..............page:7-10,32
Research on Main Issues in Rough Sets and Its Application
shi hong ; shen yi ; liu zhi yan ; fu jin zong
..............page:1-3,29
A Four-layer Internet Application
yan jun ; cao zuo ; qian zhong ; xu jia zuo
..............page:187-188,封三
Research of Multicast Communication Security
hu xin ; xu lin ying
..............page:78-80
Implementation of VPN Based on IPSec Under Linux
ma ru jun ; zhou wei hua ; tan cheng xiang
..............page:76-77,83
Research on IPSec Prameter Negotiation Process Based on IKE
yang wei ; su jin hai ; zhang yong fu
..............page:73-75
Safe Communication Based on Group Signature
lu li ; xu yong ; zhang ling
..............page:71-72,146
A New Advanced Encryption Standard--AES
wang xian pei ; zhang ai ju ; xiong ping ; zhang jun
..............page:69-70,186
Research of User Privilege Security Management in Integrated System Based On CSCW
shao xiu li ; dong sha sha ; liu ming ming ; tu feng sheng
..............page:66-68
Cross Certification Based on SET
zhang da lu ; shi hui
..............page:63-65
Application of VHDL Language in Describing and Simulating 8051
leng ming ; tang yi ; wu yue ; yang hong bin
..............page:61-62,157
Research of Agent-based Three-tier Data Warehousing
xu zhong jian ; yuan jie ; yang zuo
..............page:58-60
XML-based Knowledge Fusion and Knowledge Base Construction
bao jun peng ; liu xiao dong ; shen jun yi
..............page:56-57,138
A Co-evolution Algorithm for Optimization Design of Supporting Structure of Deep Foundation Pits
wang xing wen ; li tao shen ; wu heng ; zhou dong
..............page:54-55,104
An Implementation Scheme of Non-blocking Omega Network
wei zun ce ; chen shi ; sun ji zhou
..............page:52-53,133
Research on the Computer Immune
lu yang ; chen lei ; yang wen quan
..............page:50-51,68
Development and Prospect of Quantum Search Algorithm
zuo hai zhen ; huo hong wei
..............page:4-6