Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2005 Issue 16
Process Model of Software Requirements Acquisition Based on Use Case Driven
CHEN Jianming;CHEN Jugang
..............page:66-68,129
Hot Path Enumeration Tool for Assembly Code
ZHANG Junchao;ZHANG Zhaoqing
..............page:64-65,104
Modified SPIHT Algorithm Based on Ladder Property of Subband Extreme Value
Su Dongwei;Ci Linlin;Chen Xiaofeng
..............page:152-153,162
A Statistical Method of Improving Efficiency on Sequential Patterns
LU Shen;Li Chunping
..............page:69-70,91
Research of NodeOS-EE APIs in Active Networks
YI Jun;HUA Bei;LI Zheng
..............page:71-72,76
Summarization of Message-oriented Middleware
XU Jing;XU Wei
..............page:73-76
Pattern Decomposition Algorithm Based on FP-tree
CONG Dan;WANG Junpu;YANG Wen;ZHANG Shaoyi
..............page:77-79,88
Support and Optimization of Memory Management System for NUMA
YANG Mengmeng;LU Kai;LU Xicheng
..............page:80-82,109
Efficiency Analysis and Improvement to Freeswan IKE Random Algorithm
Liu Guoliang;GAO Xiaopeng
..............page:83-85
A Structural Join Algorithm Based on Improved B+ Tree Index
Wu Hengshan;Xu Xiaojun;GUI Hao
..............page:86-88
Description of Service-oriented Architecture Based on UML
ZHANG Tao;YING Shi
..............page:89-91
An EAI Architecture Based on TAO and ACE
Wang Mingming;WANG Weiping
..............page:92-94
Optimized Loading of Container Persistent Management of JTone Application Server
JIANG Tao;HOU Di;ZHU Jian;QI Yong
..............page:95-96
Approximate Query Based Online Aggregation with Group-by and Application
FENG Yucai;Zhang Pengcheng
..............page:97-99
Research of MOM-model Based on P-S
FENG Jiang;WANG Xiaoyan;XIAO Lingling;KUANG Xianyan
..............page:100-101,146
Analysis and Design of Database-access Middleware Based on Web Services
WANG Weimin;SU Defu
..............page:102-104
Design of Full Snapshot System SsMirror Based on Copy-on-Write
Xu Guangping;WANG Gang;LIU Jing
..............page:105-106
Multicast Routing Algorithm of Ad Hoc Networks Based on Layered Structure
Chen Niansheng;LI Layuan;SUN Qiang
..............page:110-112
RTT Unfairness of HSTCP and Its Analysis
SU Fanjun;PAN Xuezeng;Ping Lingdi;Lv Yong
..............page:113-114,187
SINOMP: Simulation System for Interconnection Network Communication Performance of Multi-processor
YU Yang;Chen Yuming;XU Jingpeng;YANG Yulu
..............page:115-117
Incentives Model in P2P Network Based on Game Theorey
CHEN Zhiqi;SU Defu
..............page:118-120
Energy-efficient Multicast Routing Protocol in Mobile Ad Hoc Networks
LUO Ying;HUANG Chuanhe;ZHANG Yuanyuan;YU Xiongwei;ZHOU Hao
..............page:121-123
Caching Strategy for Chinese Search Engine on FlyingSender
MIN Gaozhao;Shao Zhiqing
..............page:124-126
A Distributed Communication Protocol for the Optical Information Network
GAO Liwen;YAO Yaowen
..............page:127-129
Strategy and Mechanism for Mapping with Resource Co-allocation in Grid Computing Systems
LIU Li;YANG Yang;TIAN Zhimin
..............page:130-131,149
Study of Intrusion Detection Based on ECA Rule
Gao xiufeng;HU Changzhen
..............page:132-134
Rule-based Data Fusion Model of Intrusion Detection
Wang Kaiyun;Chen Zhiwen;Jiang Jianguo;ZHAO Weifeng;GAO Xingyu;LIU Yuan
..............page:135-136
An Improved Scheme of CRL
WU Jian;Xu youjun
..............page:137-138
A Method of Software Running Protection
Chen Wujun;LV Zhijun;LIU An;WU Kun;ZHONG Haijun;ZENG Qingkai
..............page:139-141,143
An Efficient Digital Signature Scheme with (t,n) Shared Verification
SI Guangdong;ZHANG Jianzhong;LI Yanping
..............page:142-143
Security Access Control Model Using Fast Table for PKI and PMI
YANG Gang;Zeng Guangzhou
..............page:144-146
A Remote and Distributed Sniffer Detection System Based on WAN
HUANG Shuo;WANG Lihong
..............page:147-149
User Behavior and Developing Strategy in MIS Exploitation
LI Yiwen;LIU Jie
..............page:61-63
Framework for Analyzing the Real-time Data Stream
LI Qinghua;Chen Qiuxia;Jiang Shengyi
..............page:59-60,63
Research on the Model of Interoperable Software Component Registry and Repository Based on MMF
WANG Qiang;HE Keqing;LI Bing;Zhuo Shi
..............page:57-58,172
Network Backup Resource Assignment Based on Genetic Algorithm
Li Yunqiang;Yu Zhaoping
..............page:150-151,159
Many-to-many Multi-issue Automated Negotiation Model Based on Genetic Algorithm
Weng Ming;Liang Junbin;SU Defu
..............page:154-156,193
Word Sense Disambiguation Based on Word Sense Indicators
QUAN Changqin;He Tingting;JI Donghong;LIU Hui
..............page:48-50
Research of Chinese-English Word Alignment Algorithm Based on Bilingual Dictionary
DENG Dan;LIU Qun;YU Hongkui
..............page:45-47
Protocol Conformance Test Suite Design and Implementation for Home Agent of Mobile IPv6
ZHAO Daguan;Xie Gaogang;Zhang Dafang
..............page:43-44
Testing and Analyzing Report of VIABM
HAN Wei;CHEN Yu;Du Zhihui;LIU Yukun
..............page:40-42,56
Implementation of Transaction Scheduling in Embedded Real-time Database System ARTs-EDB
LIAO Guoqiong;LIU Yunsheng;Wang Lina;WANG Hongting
..............page:37-39
Design of Image Database System Based on Wavelet Analysis and Oracle8i
Xue Wentong;Song Jianshe;HE Xiaotao;YUAN Lihai
..............page:35-36,39
Multi-source Image Fusion Scheme Based on àtrous Wavelet and Fuzzy Region Feature
LIU Gang;Jing Zhongliang;SUN Shaoyuan;Li Jianxun;LI Zhenhua
..............page:33-34,94
A Relation Pattern of Clark-Wilson Integrity Policy
LIU Wenqing;HAN Naiping;WEN Hongzi
..............page:30-32,88
Feature Selection Method Based on Genetic and Simulated Annealing Algorithm
Liu Suhua;Hou Huifang;Li Xiaoxia
..............page:157-159
Optimization of Feedforward Neural Network with Real-coded Genetic Algorithm
Ye Deqian;Kang Jianhong;YANG Ying
..............page:163-164,175
Technology of Intelligent Monitoring and Diagnosis Based on Multi-agent
Xiao Xiaofeng;Cai Jinyan;Ma Sasa
..............page:165-167
Interpolation Face-based Face Recognition Technology
Yang Yuwang;Yang Jingyu;TAO Jun;TU Xiaoyong
..............page:168-169
Study on SCI Interconnecting
LI Bo;LI Chengwei;NI Ming;Wu Rongquan;CHAI Xiaoli
..............page:205-206,227
Provincial Science and Technology Foundation Projects Management System Based on Internet
Jiang Xiaolin;DANG Yanzhong
..............page:210-212,封三
Application of TMS320C6701 in Strapdown Inertial Navigation System
LUO Yi;XIA Shenjie;NI Ming;CHAI Xiaoli
..............page:213-214
A Shortest Path Searching Algorithm of Returning Starting Past Many Places in GIS-T
ZHANG Xinchang;DU Xuedong;Gao Ziyou
..............page:215-216,227
Strong (t, N) Key-insulated Blind Signature Scheme
Ming Yang;WANG Shangping;WANG Xiaofeng
..............page:54-56
ServerScope: A Framework for IntegratedPerformance Evaluation System
LI Xiaohua;JIAO Limei;Wang Qirong
..............page:51-53,56
Research of Fight Agent Body Structure
XU Runping;WANG Shuzong;GU Jian
..............page:173-175
Multimedia Remote Monitoring System for Machinery Facilities
YE Shulin;HUA Rui;Chen Jiu;Yang Aiying
..............page:176-178
A Rate Control Algorithm of MPEG-2 Video Streams Splicing
Wang Zhaolin;Zhou Yuanhua;Chen Guohua
..............page:179-181,201
Implementation of Valley Simulation System Based on Virtual Reality Technology
Huang Wenbo;HUANG Jianxi;WU Bingfang
..............page:182-184
Improved Method Based on Extraction of Dominant Color in MPEG-7
Wang Haixia;Qin Tuanfa
..............page:185-187
Research and Implementation of High Availability Toolkit Based on QNX
CHANG Zhengwei;FU Peng;CHEN Haichun
..............page:188-190
Data Mining-based Decision Support for Costume
Sun Yongjian;Li Renwang
..............page:194-196
Urban Fire Control Dispatching System Research Based on GIS
LIU Juefu;Yuan Kefeng;FENG Huibin
..............page:197-198
Architecture of Intelligent Call Center in Analytical CRM
ZHAO Hua;SONG Shunlin
..............page:199-201
FPGA Implementation of Fast Floating-point Adder
GUO Tiantian;ZHANG Zhiyong;Lu Huanzhang
..............page:202-204
A Grid Resource Scheduling Architecture Based on Virtual Resource Pool
MA Yongzheng;NAN Kai;YAN Baoping
..............page:24-26
A Modeling Method of Extended UML Based on DEVS: UML-BD
Jiang Jinlong;ZHOU Xianzhong;SUN Yongcheng
..............page:21-23
Noise Elimination of Radar Picture Based on Improved Wavelet Packet Analysis
Li Tianwei;JIA Chuanying;Li Chunxin
..............page:17-18
A Service Model in Grid Environment and Its Application
TANG Feilong;LI Minglu;PAN Qunhua
..............page:14-16
Proxy Blind Signature Scheme and Its Application to Electronic Cash
GU Lize;ZHANG Sheng;YANG Yixian
..............page:11-13
Off-line Electronic Token System for P2P Transaction
Liu Yichun;Wang Lina;Zhang Huanguo
..............page:9-10,13
A Partial Least-squares Regression Method Based on Principal Variables Selection
LI Shouan;Zhang Hengxi;GUO Jilian;Men Ke
..............page:7-8,26
Research on Global Query Transformation in Multidatabase Systems
LI Ruixuan;Huo Xiaoli;WEN Zhumu;Lu Zhengding;LI Bing
..............page:4-6
Geo-workflow Model Based on Petri Nets
GAO Yong;LIU Yu;WU Lun
..............page:1-3
Implementation and Test of IA-32/Linux Compatibility on IA-64/Linux
YUAN Yuan;YOU Jinyuan
..............page:219-221
Migration Mechanism of Mobile Agent Based on Itinerary Graph
Zhang Zhengqiu;ZHANG Zhiming;YU Min
..............page:222-224
Application of Software FIFO in Communication of Multi-DSP
LIU Wei;Lei Yingjie;NI Ming;CHAI Xiaoli
..............page:228-230
Query Engine Architecture Based on RDF
HUANG Dapeng;CUI Duwu
..............page:231-封三