Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2004 Issue 11
An Efficient Group Signature Based on GDH Assumption
deng dong hua ; zhao yi ming
..............page:31-33,83
Design and Implementation of Logical Volume Manager in iSCSI Storage System Under Linux
yu sheng sheng ; wang guo hua ; zhou jing li
..............page:29-30,127
A High Efficiency Algorithm of ABM for Mining Associataion Rules
niu xiao fei ; shi bing ; lu jun ; wu ke
..............page:118-120
An Algorithm for Clustering Quantitative Association Rules Based on Geometric Properties of Grid
ma guang zhi ; zhang ai fang ; liu yu liang
..............page:121-122,167
An Algorithm for Mining Maximal Frequent Patterns Based on FP-tree
feng zhi xin ; zhong cheng
..............page:123-124
Study and Implementation of Situation Assessment Models
wang bao shu ; shen tu xiao feng
..............page:125-127
A New Method for Slant Correction in Recognition of Handwritten Numerals
wang you wei ; liu jie
..............page:128-129,137
A Hybrid Agent Architecture and Its Decision Algorithm
zuo bo ; wu min ; liu xing dong ; nie zhe
..............page:130-131
Modeling of the Leaf Shapes Using L-systems and Genetic Algorithms
lv hui qiang ; li yi ming ; kong fan sheng
..............page:132-134
Network Adaptive Transmission Control Technique for Video Communication
wang cheng liang ; zhang hui
..............page:135-137
Application of Virtual Reality Technology in Equipment Battle Damage Simulation
bai mei ; liu peng yuan ; zhang xi en
..............page:138-140
Multimedia Transport Technology Based on JMF
fu zuo ; qu chao xia
..............page:141-142,167
Research and Design of Two-way VSAT Real-time Distance Learning System
xiao ren zhong ; shen rui min ; jiang ji
..............page:143-145
Algorithm of BP Neural Network-based Face Detection
zhou jing li ; wu gui lin ; yu sheng sheng
..............page:34-36
Design and Implementation of A Secure SSL/TLS Web Proxy
chen zuo xian ; liao hong zuo ; feng deng guo
..............page:40-42
A New DSR-based Energy Saving Routing Strategy in MANET
xu li ; wang min qiang ; zheng bao yu
..............page:43-44,120
Persistence for Official Business Object in Relational Database
wang tao ; wang yan zhang ; lu yan xia
..............page:45-47
Conformance Test of Distributed Transaction Service
xu chang ; jin zuo hong
..............page:48-49,100
Method of Groundwater Numerical Model Simulation Based on GIS
yang xu ; yang shu cai ; huang jia zhu
..............page:50-51
Development of Workflow Based Business System
cao zuo ; liu da zuo
..............page:52-53,145
Design and Implementation of Auditing in B1 Secure Database
cheng wei guo ; tian yuan ; wang de qiang ; xie jun yuan
..............page:54-56,140
System Analysis and Implementation on EJB-based OGDSS
kong bin ; tian jun ; tan jun feng
..............page:57-59
Verification of Temporal Consistency in Workflow
ren guo zhen ; gong lei ; wang hai yang ; huang fu jie
..............page:60-62
Web-based Integrated Query System in Distributed EMC Database
hu zhi hua ; zhang guo fu ; chen hong sheng
..............page:63-65
Nearest Neighbor Queries of Multi-object
liu yong shan ; bao shu kui ; zhang qiang ; hao zhong xiao
..............page:66-68
Grid Resource Management System Based on Agent
fang juan ; zhang shu jie ; zuo rui hua
..............page:69-70,93
Performance Analysis of MPI Collective Communication
ren bo ; wang cheng
..............page:71-73
DAFS Implementations and Applications in NAS Cluster
yu sheng sheng ; tang sha zuo ; zhou jing li ; luo qiu ming
..............page:74-76
Dynamic Configurable Protocol Design in Mobile Network
zeng bin ; liu meng bin ; xu fan jiang
..............page:77-80
IPv6/IPv4 Dual Stack Ethernet Access Router with Authentication and Mobility Support
zhang yu ; hou zi qiang ; gao ji ming
..............page:81-83
A Virtual Router Architecture and Its Implementation
liu gang ; zhang de yun ; li sheng lei ; zhang xiao
..............page:87-88,112
An Embedded Image Coding Method Based on DCT
wang dong hua ; zhou yuan hua ; wang jia
..............page:27-28,36
Automatic Analysis for Plumpness and Slenderness of Tongue
wei bao guo ; shen lan zuo
..............page:25-26,68
A Meaningful Blind Watermarking Algorithm Based on Wavelet Transform
yuan yuan ; zuo wen hua
..............page:23-24,59
The Implementation of Disguising the OS by Using Netfilter and Iptables
cao ai juan ; liu bao xu ; ruan wei jun ; xu zuo sheng
..............page:21-22,109
A Study on the Contract Method of Software System Construction
jiang hong ; liu lu
..............page:19-20,76
Research and Implementation of Real Time Middleware Oriented Message
yu la sheng ; wang lu peng
..............page:16-18
Key Management Scheme for Network Environment Based on Elliptic Curves Cryptosystem
zhou xuan wu ; yang xiao yuan ; huang de guan ; zhang zuo
..............page:89-91
A (t,n) Threshold Anonymous Authorization Scheme Based on RSA
ma chun bo ; he da ke
..............page:92-93
A Detection-oriented Attack Classification and Its Application in IDS
xiang zuo ; cao yuan da
..............page:94-95,173
An Electronic Vote Protocol Without Authority
su yun xue ; zuo hai jun ; zhu yue fei
..............page:96-97
Intrusion Detection Based on Boosting Algorithm
chen ai bin ; xia li min
..............page:98-100
Defending Against Redirected Attack in MIPv6
hu xu dong ; yu jian hua ; zhang gen du
..............page:101-102,117
A Classification Method of Network Security Incidents for Response
ma xin ; zhang yu qing ; gu xin ; feng tao
..............page:103-105
Correcting Candidate Suggestion Algorithm and Its Realization Based on Statistics
zhang yang sen ; cao yuan da ; xu bo
..............page:106-109
Face Classification Based on SVM
zhang min gui ; pan quan ; zhang hong cai ; jiang zuo
..............page:110-112
Text Clustering Method Based on Non-negative Matrix Factorization
huang gang shi ; lu jian jiang ; zhang ya fei
..............page:113-114,176
Approaches to Check 3D Mechanical Model with Related Engineering Drawings
wang wei guang ; wang zhi yan
..............page:159-161
Decision Support System Based on Remote Data Collection
zhu zhong liang ; qian song rong
..............page:162-164
Application and Implementation of Digital Network Security-Monitoring System in BA
hang zhong wen ; zhang zhi hao
..............page:165-167
VPN Application in Guangxi Welfare Lottery System
lin gang
..............page:170-173
Computerized Servo Control System
fan xiao zuo ; wang hao ; zhang dao zhong
..............page:174-176
Implementation of Synchronized Sight-view Simulation in Missile Simulation System
li sheng chao ; xie jian
..............page:177-178
Design and Implementation of Web Reporting Tool Based on XML/XSL
xu zuo ; tang min ; li zhao yuan ; an zuo
..............page:179-182
A Method of Reprogramming Remote Terminal Unit
zhang ai wu ; lu xin chun ; zhu hui ming
..............page:183-184
Application of Taguchi Method in Experiment Design of WSMR Virtual Prototype
xiong guang ming ; lu ji lian
..............page:185-186
The Design of a Kind of Digital Surveillance System Based on C/S Structure
feng hong cai ; chen yong qiang ; du xiao qin
..............page:187-188,封3
Implementation of E-mail Client Software Under Embedded Linux and MiniGUI
liu wen jun ; du xu ; yang zong kai
..............page:189-191,封3
Streaming Media Client Based on Real-time Streaming Protocols
jin hai ; shao yan ming ; han zong fen
..............page:192-194
A Design of a Transparent Gateway
zhou gong ye ; weng yu ; qiu jian yong
..............page:195-封3
Design of Audio Conference System Based on OLAN
zhao dai qiang
..............page:146-148
Application of XML in TV Program Personalization
zuo zhi wen ; zhou xing she ; zhang yong ; gu jian hua
..............page:149-150,182
Qualitative Analysis of Gasoline Based on Artificial Neural Network
wang rang ding ; liang zheng feng
..............page:151-152,161
Practices of Technology of Virtual Reality in City Planning
qian le xiang ; liu run da
..............page:153-154,158
Application of TI C6211 DSP in Multi-channel Telemetry Demodulator
yang jian guo ; zhang can
..............page:155-156,封3
UDDI-based Knowledge Services
wen hao yu ; tao li yan ; xu guo hua
..............page:157-158
Improved Fuzzy C-mean Classifier and Comparison Study of Its Clustering Results of Satellite Remotely Sensed Data
ha si ba gan ; ma jian wen ; li qi qing ; liu zhi li ; han xiu zhen
..............page:14-15,91
Kernel-based K-means Clustering
kong rui ; zhang guo xuan ; shi ze sheng ; guo li
..............page:12-13,80
A Full Search Motion Estimation Algorithm for Collateral Implementation
wang ci ; fang xiang zhong ; yu hong bin
..............page:10-11,73
The Augmented Reality Based on Environment Mapping
gu yao lin ; wang jun ; ni tong guang
..............page:7-9
Development and Analysis of Measurement Technology of Dynamic Network Structure
chen le ; wang xiu mei ; wang ji long
..............page:4-6
Research on the Automated Intrusion Response Systems
zhang yun kai ; zhang yu qing ; wang chang guang ; wang fang wei ; ma jian feng
..............page:1-3,42