Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2004 Issue 6
Detecting and Tolerating Value Faults in Fault-tolerant CORBA
zheng jia ; hong mei ; gong wen rui
..............page:96-98
Design of Tunnel Monitoring System Based on FCS
he jing kai ; xu jian min
..............page:184-185
The Study and Implementation for Transportation Network System Based on GIS
cao jie ; chen xi ping ; gao zuo jun ; yu zuo zuo ; cao ai qing
..............page:186-188
The Design Speculation of the Virtual Infrared Ray Keyboard
wang zhong de
..............page:189-191
A Resource-router-based Grid Resource Management System
ju hai ling ; zhang guo qing
..............page:99-101,164
Design of 3D GIS Data Model
wu xin cai ; tong heng jian
..............page:93-95
A Testbed for TCP over MSR in MANETs
liu chao ; he bin ; wang lei ; le zheng you ; niu zhi sheng
..............page:102-103,173
Study on a Communication Algorithm of Hierarchical 2PC Protocol
liu tian shi ; zhao zuo zheng
..............page:104-105,141
Implementation of MPLS LDP Using SDL
shi kun ; zhang hui qin ; yang yang ; lin xiao kang
..............page:106-108
Effect of the Transmission Range on Performances of Mobile Ad Hoc Network
ma yun tao ; wu guo xin
..............page:109-111
Design and Implementation of Multiservice Networks
zhang da lu ; xu jian
..............page:112-113,170
Communication Between Computer and MPC860 Based on Socket Network Programming on LAN
zhang yan li ; ruan fu ming ; he zheng zuo ; an zuo ; wang yan fang
..............page:114-116
Design and Linux-based Implementation of the Data Link Layer MIB in Router
ma zuo zuo ; tian xiang chuan
..............page:117-119
Application of the Immune Principle to Computuer Secure Systems
ma jian wei ; yu zhen wei ; wang rui lin
..............page:120-123
Digital Watermarking Technology for JPEG2000 Color Image
zhou rong ; he jing peng ; yu jian xin
..............page:124-126
A Method of Detecting Computer Virus
liu jian ; tang chao jing ; zhang sen qiang
..............page:127-129
Application of Secure E-government Based on PKI
zhang fu bin ; zhang chun hai
..............page:130-132
Increasing Hard-disk Protection Function on Netcards
lan gao zhi
..............page:133-134
Security Passing Style--A New Method to Solve Security Problem of Mobile Code
lu xing hua ; zhao qiang ; liu zhi ming ; wang hong sheng
..............page:135-136
Comparison of Intrusion Detection Systems
yang zuo ; liu zhen hua
..............page:137-138
A Machine Learning Method of Joseki Database for Computer Go
gu rong ; liu xue min ; zhu zhong tao ; zhou jie
..............page:142-144,173
Research and Design of Airport Port Auto-scheduling System Knowledge Base
zhou zhi ; meng bo
..............page:145-147,161
Object Detection and Recognition in Sea SAR Images Based on Accumulative Probability Distribution
zhao bing ai ; fan xiao hong ; su hui
..............page:148-149
A New Method for Judging Reverse Color in the System of Vehicle License Plate Recognition
zheng bo chuan ; ye xiu zuo ; zhang san yuan
..............page:150-151
Arithmetic of Learning Users Interest Based on Agent and Its Implementation
chen hong ying ; yang yi min ; mao ge fei
..............page:152-154
A Data Mining Architecture Based on ANN and Genetic Algorithm
li ; gao zheng guang ; li qi yan
..............page:155-156
An Improved Scan-line Algorithm for Realistic Representation
zhang heng bo ; ou zong zuo
..............page:157-158,173
Method of Highlights Analysis from Soccer Video
wen jun ; xie zuo xiang ; lao song yang
..............page:159-161
Adjustment of PID Parameters Based on Improved Genetic Algorithms and Its Application on Heating Furnace
hou zhi xiang ; shen qun tai ; li he qing
..............page:165-167
Networks-based Remote Fault Monitoring System for Gravure Press
chen zuo ; yin guo fu ; tian da qing
..............page:171-173
Ultra High Speed Telemetry System Based on System-on-Chip Technology
li hua wen ; chen jin shu
..............page:174-176,191
Web Function Analysis of Environmental Geographical Information System in Tongchuan
yue zuo ; dang zhi liang
..............page:177-178,封3
A Method of Buildings Scene's Reconstruction
xue qiang ; zhang zhi qiang ; sun ji yuan
..............page:179-181
Structure and Implementation of New Type Hospital Information System
guo you yan ; wang fu guo ; han xiang fei
..............page:182-183,188
Research of Integrated Weapon System Database
wang sheng de ; xu zong chang
..............page:91-92
Component Construction Approach Based on Reflection in J2EE Enviroment
liu wu dong ; xu hui ; ying shi ; he ke qing
..............page:88-90
Spatial Querying Oriented Class Objects in Three-dimensional Space
yu hui ; zhang shu guang ; liu ying ; li guo ya
..............page:86-87,116
Code-to-code Translation of Legacy Software
yang wei ping ; zhao he ji
..............page:83-85
Mining System Model of Association Rules Based on Multimedia Database
li jian ; yang tian qi
..............page:81-82,85
Grid Application Based on Java CoG Kit
wang fu ; huang hong mei ; yang wen wei
..............page:79-80,154
An Algorithm of Fast 2-Dimention Data Packet Classification
fu ge ; yang ming fu
..............page:76-78
A RSA Threshold Signature Based on General Verifiable Secret Sharing
wang li ; yu xiu yuan ; wu zuo
..............page:56-57
An Immunity-based Clonal Selection Algorithm for Intrusion Detection Systems
wu ze jun ; qian li jin ; liang yi wen
..............page:50-52
A Placement Algorithm of Content Distribution Network
xiao lei ; huang chuan he ; jia xiao hua ; xiong da hong ; li huan ; cai li
..............page:46-47
Paper Management System Based on Ontology
xu jun ; liu zhi hong ; gu ning
..............page:38-41
Application of Data Mining in Telecommunication
tang xiao wen ; cai qing sheng
..............page:36-37,41
Association Analysis on IDS Audit Data
wang xu ren ; bi xue yao ; xu zuo sheng
..............page:34-35,149
Power Adaptation for an Adaptive TuCM in Mobile Multimedia Communications
wu shou hao ; song wen tao ; rong zuo
..............page:29-30,181
Design Patterns of Business Rules in Information Systems
yu zuo ; wang yan zhang ; liu ji shan
..............page:27-28,95
Neural Network-based Intelligent Signal Processing for Thermocouple Sensor
dang xuan ju ; tan yong hong
..............page:25-26,108
Study on Self-learning Method of "Artificial Fish"
ban xiao juan ; liu hong wei ; chen zuo juan ; tu xu yan
..............page:21-24
A Grey Relevance Feedback Algorithm for Image Retrieval
cao kui ; feng yu cai
..............page:18-20
Novel Secure Multicast Protocol Based on Public Cryptosystem
zhao an jun ; guo lei ; chen tao
..............page:16-17,123
Design and Implementation of Report Based on View of Reusable Software
hua zuo ; shi hao shan
..............page:73-75,136
Backup System Based on SAN
zhang xiao ; chen jian quan ; zheng zuo
..............page:70-72
System of Computer Supported Cooperative Horizontal Well Design
fang ming ; qu zhan
..............page:68-69,72
Online-monitoring System for Process Information of Vehicle Electronically Controlled System Based on Serial Communication
yin xiao feng ; tan jing xing ; lei yu long ; ge an lin
..............page:65-67
Suppleness Technology of Workflow Management System
he he li ; ni xiao ping ; sheng bu yun ; luo dan
..............page:63-64,194
Design and Implementation of BGP Simulation System
qu rong xin ; liu xing ; fu zuo zuo
..............page:61-62,167
Design and Realization of Virtual Reality Simulation of UAV
huang qun ; ye zuo
..............page:58-60
Optimizing Binary Field Arithmetics on DSP
zhang ru ; liu ming ye
..............page:12-13,126
Application of Support Vector Machine in Data Mining
zhang hui ; zhang hao ; lu jian feng
..............page:7-8,24
Design of Intrusion Detection System Based on Software Component
xu hui ; pan ai min
..............page:4-6
Geospatial Metadata and Metadata System
luo ying wei ; xing peng ling
..............page:1-3,6