Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2006 Issue 13
Inplementation of Computing Resource Integration with Grid Technology
SUN Gongxing;YU Chuansong
..............page:109-110,132
A Novel Integration of Wireless Sensor Networks and Internet
ZHU Xiaosong
..............page:106-108
A New Algorithm for Linear Features Extraction and Orientation
DENG Baosong;GAO Yu;YANG Bing;WU Lingda
..............page:198-199,202
Motion Panoramas Based on Three Points Registration
LIU Delian;ZHANG Jianqi
..............page:203-205
Research on Evolving Control Parameters in Niche Genetic Algorithm
YUAN Lihua;LI Ming;LI Junhua
..............page:206-208
P2P Overlay Network Based Replica Location Mechanism in Data Grid
CHEN Shaoyu;SONG Jiaxing;LIU Weidong;WANG Cheng
..............page:111-113
An Efficient Handoff Scheme of Mobile IP Adapting Initiative Predictive Neighbor
YUE Guangxue;ZENG Zhifeng;WU Qiyue;ZENG Nangui
..............page:114-116,119
Research of Single Sign-on in the Digital Home Application
YAN Xiang;CHEN Kefei;ZHENG Dong
..............page:117-119
Design of Multiple Channels for Real Time Network System Based on RTLinux
ZHOU Changyi;DU Xu;XU Kanru
..............page:120-122
BGP Routing Policies Verification Based on AS Relationships
ZHAI Peng;LI Dengdao;BI Jingping
..............page:123-124,127
Research and Realization of RBAC Using J2EE Security Mechanisms
ZHANG Fangzhou;WANG Dongan;LI Sheng;QIN Gang;SONG Cheng
..............page:125-127
Application of Smith Preestimating Controlling Algorithm to Event Channel
WU Yongying;YANG Zhiyi;YAO Huaxin;SHI Xiaoan
..............page:128-129,146
Implementation of IPv4-IPv6 Translation Gateway Based on NAT-PT with Netfilter Framework
WANG Shuai;LIU Lei;CHAI Qiaolin
..............page:147-149
Research of P2P Based Distributed Network Management
LI Qiang;WANG Hong;WANG Lechun
..............page:150-152
Design and Implementation of Authentication Mechanism Based on EAP and Diameter
MA Zhanfeng;LIANG Li;ZHANG Yujun;ZHAO Qiuxia
..............page:153-155,184
A Cheat-proof Multi-secret Sharing Scheme Based on General Access Structure
PENG Yinqiao;GAN Yuanju;ZHOU Jicheng
..............page:159-160,172
Analysis of Skype Security
CAI Fangping;XU Rongsheng
..............page:179-181
Identity-based Conference Key Agreement Algorithm
CAI Yongquan;WANG Yali
..............page:182-184
Research and Implementation of Identity Authentication System Based on Linux
SHAO Xiongkai;TANG Hua
..............page:185-186,189
Research on Restoration of Composite-frame Images Degraded by Motion
MENG Qinghao;ZHOU Rongbiao
..............page:187-189
Design and Realization of Auto-plotting System Based on Speech Recognition
DU Xiuping;HE Pilian
..............page:190-192
Fingerprint Matching Algorithm Using Graph
ZHANG Xianquan;TANG Zhenjun
..............page:193-195,208
Improved Genetic Algorithm for Multiple Path Coverage Test Data Generation
WANG Yuanzhen;GU Peng
..............page:196-197,205
OntoAGS: A Platform of Generating Domain Ontology Automatically
LI Lin;LIU Hehuan;LIU Chunnian
..............page:212-214
Inquiring System of Geographic Information in Shanghai Based on MapObjects
BU Jianming;CHENG Xianhua
..............page:269-271
RFID Middleware and Its Application in Warehouse Management
LIU Fagui;JIANG Ruilin;HU Yaomin
..............page:272-273,276
USB Camera Driver Development Based on WinCE.Net
ZHANG Wei;HE Saixian
..............page:274-276
Web-based Approach of Unified Identity Authorization
DIAO Hongjun;ZHU Xiaoxu;ZHU Fei
..............page:277-279
Research and Design of Correlation Analysis Engine for Security Incident
XIONG Yunyan;MAO Yijun;DING Zhi
..............page:280-282
Design and Implementation of Video Transcode Based on VLC in SNMP
ZHENG Huafei;ZHOU Jun
..............page:215-216,219
QoS-based Distributed Dynamic Routing of Multicast Overlay Network
ZHANG Li;YU Zhenwei;ZHANG Yang;LI Ning
..............page:103-105,113
Research on Scalability of Cluster Servers with Multi-replication
SHEN Haihua;JU Dapeng;SHEN Meiming
..............page:100-102
3D Simulation Design and Realization of Bump Interface Object
LUO Changhang;AI Jianliang;HU Liyong;OUYANG Jin
..............page:217-219
Application of Wavelet-based Deblocking Algorithm in Spatial Video Encoder
LI Zhicheng;ZHAO Hui
..............page:220-221,224
Supervisory and Fault Diagnosis Technology Based on Multi-agent and It's Application
YU Zhiwei;SU Baoku;ZENG Ming
..............page:222-224
Research on Software-hardware Co-design Methodology for USB2.0 Host Controller in SoC System
HUANG Hong;TANG Xiaoyan;ZHOU Xiaofang;MIN Hao;ZHOU Dian
..............page:225-227
Framework of MPLS-based Mobile Satellite Communication Networks
ZHANG Tao;ZHANG Jun;LIU Zhongkan
..............page:130-132
A Dynamic Load Balancing Algorithm Based on Transparence Computing
YANG Huajie;ZHANG Yaoxue;ZHOU Yuezhi;GUO Guanfei
..............page:133-135,163
Research on Mobile Device Adaptation System Based on Web Annotation
LI Tieshuai;LIANG Aimin;WANG Kehong
..............page:136-138
Research and Improvement of Submitting Job in MPICH
LIN Na;XI Cheng;MA Yunsheng
..............page:139-140,175
A General Parsing Method for ABNF-coded Protocol Messages
LI Wei;TIAN Ye;ZHAO Baohua;ZHOU Hao
..............page:141-143
Network Traffic Monitor System Based on Netflow and Asynchronous Service
XIONG Qibang;HUANG Mingzhe
..............page:144-146
A Trusted Computer System Based on Embedded Security System
XIAO Jing;YU Chao;WU Guoqing
..............page:246-247,279
Design of Traffic Distributor Based on IXP1200 for Network Intrusion Detection System
CHEN Jia;SI Tiange;DAI Yiqi
..............page:161-163
An Image Watermarking Algorithm for Copyright Protection and Tracing
LI Haifeng;WANG Shuxun;SONG Weiwei;WEN Quan
..............page:166-169
Research on Distributed Certificate Management in P2P Network
JIANG Bailiang;ZHANG Yuqing;ZHANG Dehua
..............page:170-172
Wireless Network and Its Security
YIN Xuewen;SU Guiping
..............page:173-175
Application of Network Intrusion Deception Technology--Honeypot System
YANG Hongyu;XIE Lixia
..............page:176-178,181
A Localization Device Combined with Pulse Encoder and GPS
LI Aicheng;YUAN Jie;DU Sidan
..............page:248-250,253
Enterprise Service Bus Technology in Enterprise Integration
WANG Shengjuan;JIANG Shui
..............page:251-253
Design and Implementation of Embedded System Online Upgrade Based on TFFS
WANG Zijian;ZHANG Jun;LUO Xiling
..............page:257-259
Research and Implementation of Grid GIS Service System
CHEN Hongying;YANG Yimin;LI Weihua
..............page:260-262
Credit Risk Assessment Model for Individual Housing Loan Based on Decision Tree
LIU Junli;CHEN Xiang
..............page:263-265,271
Implementation of Block Cipher on Embedded Microprocessor ARM
BAI Guangwen;YU Jianxin
..............page:266-268
A Grid Service-based Data Publishing System
YANG Deting;NAN Kai;YAN Baoping
..............page:97-99
Research on Internet Performance Measurement Method Based on User Traffic
WU Xiaofei;ZHOU Wenli;SU Sixi
..............page:94-96
A Survey on Network Tomography
LI Yongjun;CAI Wandong;WANG Wei
..............page:91-93
Implementation of Programming ICAI Based on JATLite Agent Platform
XIAO Zhengxing;YANG Qinghong;XUE Jinyun;SHI Haihe
..............page:88-90
Design of Network Concurrent Server Based on Communication Interface Wrapper Mechanism
WANG Ying;LI Lixin;HUANG Weijian
..............page:85-87
Metrics on Object-oriented Software Flexibility
ZHAO Qingshui;SHEN Limin
..............page:82-84
Application Research on Advanced Model-driven Developing Method
WANG Yunhua;CHEN Weiwei
..............page:63-65
Research on Integration of Database Systems in Grid Environment
ZHOU Wei;YAN Baoping
..............page:61-62,93
Immediate Processing of XPath Query with Predicates
WU Nian;ZHANG Yu
..............page:58-60
System Integrated Method Based on Windows Pipe Technology
GUO Jiashu;LIU Zhan;LI Wang
..............page:55-57
Model of Supporting Composite Event and Its Implementation in Middleware
ZHENG Zhenkun;ZHANG Kuo;WANG Xiaoge
..............page:52-54,65
Simulation of Queueing System Based on Java
TANG Yan;WANG Zhijian;WU Yin
..............page:26-28,31
IP QoS Model and Scheme Based on Chaos Prediction
ZHAO Qigang;LI Qunzhan
..............page:23-25
An Access Control Method Using Organization Structure
XU Zhen;FENG Dengguo
..............page:20-22
Study on Visualization Service for Terrain Data Based on Grid
ZHU Jun;GONG Jianhua;ZHANG Jianqin;WU Xian
..............page:32-34,37
Engineering Method for Risk Analysis of Information System
HU Yong;FANG Yong;XIAO Long;LZ Huanzhou;CAI Heng
..............page:29-31
GIS Solution Oriented to Municipal Solid Waste Management Information Assistant Decision
CAO Jianjun;LIU Yongjuan;SONG Guoshuang;LIU Yongmei
..............page:283-封三
Web Pageviews for Personalized Recommendation Model Based on Time-validity
SHEN Yunfei;SHEN Guoqiang;JIANG Lihua;QIN Zhen
..............page:80-81,99
Estimating Null Numerical Value with Cloud Model in Database
WANG Zhaohong
..............page:77-79
Query Processing Techniques for Object-oriented XML Based on Path Repository
ZHANG Xiaolin;TAN Yuesheng;DONG Huanzhi;WANG Guoren
..............page:74-76,79
X86-based System Virtual Machine Development and Application
DONG Yaozu;ZHOU Zhengwei
..............page:71-73
Formalizing Software Design Pattern in Z
ZENG Hongwei;TENG Zhongmei
..............page:69-70,108
A NFA Quantity Measurement Model for Embedded Software Components
WANG Zhigang;WANG Minbei;LUO Leifei
..............page:66-68
Algorithm for Dependent Cell Recomputation in Report System
MA Weiqin;LI Juanzi;JIN Zhenye;DING Kun
..............page:49-51
Cache Profiling
ZHOU Qian;FENG Xiaobing;ZHANG Zhaoqing
..............page:47-48
Model of Workflow Cooperation Based on Agent Service
SHI Zhikuan;XIE Junyuan;FANG Jin
..............page:44-46
KPN Based Dynamic Service Composition Model
ZHANG Xiuguo;ZHANG Weishi;SHI Jinyu
..............page:38-40
Dynamic Management and Maintenance of Whole Data Directory
CHEN Jianying;LIU Xinsong;TAN Wenrong;LIU Tao;TAN Ying;WANG Li
..............page:35-37
Traffic Model and File Evaluation Method of BitTorrent File Sharing System
ZHOU Wenli;LEI Zhenming
..............page:15-17
Privacy Preserving Distributed Data Mining Association Rules of Frequent Itemsets
HUANG Yiqun;LU Zhengding;HU Heping;LI Ruixuan
..............page:12-14
A New Form Cell Rectangle Recognition Algorithm
CHEN Youguang;GU Guoqing;ZHANG Wei;XU Yanbing
..............page:9-11,14
Wavelet-domain Image Watermarking Method Based on Information Complementation
WU Jinyong;YU Zhiguo;MA Guoqiang;XU Jianjian
..............page:6-8
Two Semi-online Algorithms for Bin Packing Problem
CHEN Jianxin;YANG Yuhang;GONG Ling;ZENG Peng
..............page:4-5,17
Research on Load Optimization of Cluster-based Peer-to-Peer Network
SHI Minghong;LUO Yongjun;BAI Yingcai
..............page:1-3
Design of Aerospace Environment Simulation Numerical Model
WANG Peng;WANG Hong;LIU Lina
..............page:228-230,245
HLA-compliant Design Project for Equipment Battle Damage Simulation Platform
BAI Mei;ZHANG Maolin
..............page:231-233,239
Research on Aggregated Equipment Support CGF System Based on Multi-agent
SHEN Yujun;SANG Jingrui;WANG Xiangfei
..............page:237-239
Distributed Traffic Signal Intelligence Control Model Based on Non-hierarchical MAS
YANG Jin;ISHIDA Toru;SU Dao
..............page:240-242