Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2006 Issue 23
Congestion-decreased AODV Routing Protocol
GAO Shengguo;WANG Hanxing
..............page:108-110
Management of Wireless Subnet of Tactical Internet Based on Active Network Technologies
CUI Can;CHANG Yilin;ZHENG Jianqun
..............page:106-107,110
Message-map Based Daemon Control Pattern
ZHANG Xiaoyu;JIN Lianfu
..............page:111-113
Scheme for SIP to Traverse NAT Transparently
CAI Jiayong;LI Dan;CHEN Mo
..............page:116-118
Theory and Implementation of BGP/MPLS VPN
CHEN Junhua;WANG Zhongmin
..............page:124-126
Design of Grid Information Service Based on Web Service and LDAP
CHU Rui;HUANG Yongzhong;HU Jianwei
..............page:127-128,131
A New Dynamic Constraint-based Routing Algorithm for Traffic Engineering
ZHANG Li;WANG Yongjun
..............page:129-131
Research and Design of Secure Network Computer System
ZHAO Hongzhi;WANG Qin;JING Tao
..............page:132-134
Novel Authentication Scheme for WLAN
ZHANG Haojun;ZHU Yuefei
..............page:135-136,142
Unknown Worms Behavior Profile Mining in Honeynet
FANG Dingyi;TANG Zhanyong;CHEN Xiaojiang;WU Xiaonan
..............page:137-139
Security Analysis of Authentication Based on Environment Variable in CGI Mode
QIAN Pengjiang;WANG Shitong
..............page:140-142
Fast Scalar Multiplication on Two Family of Supersingular Elliptic Curve
ZHANG Ning;CHEN Zhixiong;XIAO Guozhen
..............page:143-144,150
Research on Digital Audio Watermark Based on Complex Cepstrum Transform
LI Yueqiang;SUN Xingming;ZHOU Tianliang
..............page:145-147,161
An Efficient Designated-verifier Proxy Signature Scheme
LI Sujuan;ZHANG Futai;HUANG Xinyi
..............page:148-150
Research on Elgamal-elliptic Curve Cryptosystem Based on Brier-Joye Formula
LI Zongxiu;BAO Wansu;WANG Xiang
..............page:153-155,173
Optimizing and Realization of the Finite Field Inversion Algorithm Based on FPGA
BAO Kejin;SONG Yonggang
..............page:156-158,170
Application of WINEPI Mining Algorithm in IDS
LI Yongzhong;SUN Yan;LUO Junsheng
..............page:159-161
Task_role_based Access Control Model for Military Use
HAN Ruofei;WANG Houxiang;DU Hui;WANG Lu
..............page:165-167,179
Image Encryption Algorithm Cryptanalysis Based on One-dimensional Discrete Chaotic Map
LI Li;ZHU Congxu;CHEN Zhigang
..............page:168-170
Improved BLP Model Based on User Intension
CAO Sihua;HE Hongjun
..............page:171-173
Principle of a Kind of Differential Fault Analysis on AES-128
DU Yusong;WANG Daxing;SHEN Jing
..............page:174-176
Multi-feature Relevance Feedback Image Retrieval Based on Grey System Theory
JIANG Xiangkui;YUAN Sicong;WANG Fazhan
..............page:180-182
Grasp Modes of Robot Dexterous Hand Based on Fuzzy Logic Control
ZHOU Siyue;GONG Zhenbang;YUAN Jun
..............page:183-185
Automatic Chinese Term Extraction Based on Decomposition of Prime String
HE Tingting;ZHANG Yong
..............page:188-190
First-order Predicate Logic Proposition Proved by Using Predicate/Transition Net
FANG Huan;YIN Yulan;XU Yuyin
..............page:191-192,198
Parallel A* Searching Algorithm Based on Mixed Load Balancing
YUAN Yuan;LI Bingfa;YANG Jie;DING Ying;PENG Daiyi
..............page:193-195,215
Plan Path to Rectify Learning in ICAI Based on Association Rule
LIU Yan;LU Yuchang
..............page:196-198
High Efficient Algorithm for Network Fault Management
YANG Zhijun;ZHAO Dongfeng
..............page:104-105
Application of Fixed Priority Schedule Algorithm in CAN Bus
TIAN Jing;HUANG Yalou;WANG Liwen;LI Guohong
..............page:94-96
Implementation of Embedded Spatial Index Library for Mobile GIS
CAI Miaohong;WANG Qing
..............page:91-93
Design and Implementation of Resource Adapter in JCA
ZHANG Bing;WU Quanyuan;PENG Kun
..............page:88-90
Analysis of uC/OS-ⅡKernel and Realization of Multi-task Schedulers
SHEN Jinrong;LIU Xiang
..............page:85-87,113
Evaluation Algorithm for Impact of Requirements Change
YANG Hebiao;ZHANG Jimin;ZHU Yuquan
..............page:82-84
Research on Structural Analysis of Mathematical Expressions in Printed Documents
TIAN Xuedong;LI Na;XU Lijuan
..............page:202-204,228
Improvement of Ordinary Differential-algorithm over GP for IP Traffic Prediction
ZHANG Yongqiang;CHEN Huashan
..............page:208-210,213
Comprehensible Classification Rules Construction Based on Genetic Algorithm
ZHAO Lei;ZHU Wenxing
..............page:211-213
Multi-model Prediction Method for Software Reliability
WU Qin;HOU Chaozhen;YUAN Jumei
..............page:214-215
LPU Based on Single Side Bagging
SHEN Lei;SHI Shengping;YAN Jikun
..............page:216-217,223
Examination Procedure Construction of Examination Systematic Online
TIAN Fang;XU Xianghong
..............page:281-282
Design and Study of Landscape Lighting Information and Control Platform in Digital City
ZHANG Meihua;LI Ming;SUI Yanli;WU Yiqing
..............page:283-封3
Improvement of BM Algorithm for Pattern-matching
QU Yu;WANG Yadi;HAN Jihong;ZHAO Yu
..............page:78-81
Jump Table Recovery Technique in IA-64 Binary Code Translation
QI Ning;ZHAO Rongcai
..............page:49-51
Conceptual Model for Multidimensional Data Based on HPKM
YAN Jingui;LUO Jun;ZHOU Nana
..............page:76-77,81
Method of Timer Resolution Improvement for Embedded Linux System
WANG Xia;MA Zhongmei;HE Xiaoqing;JIANG Wenrui;HUANG Wuling
..............page:70-72,96
Improved Method of Apriori Algorithm Based on Matrix
LI Chao;YU Zhaoping
..............page:68-69
Test Case Generation for Component-based Software Based on Immune Genetic Algorithm
MA Zhen;ZHANG Yikun;LIANG Rong;LU Xiaofeng;XU Yanli;XIE Jiancang
..............page:64-67
Noise Elimination Method in Web Pages Based on the Similarity of Same Layer Pages
YUAN Mingxuan;ZHANG Xuanping;JIANG Yu;ZHAO Zhongmeng
..............page:61-63
Design and Implementation of Web-based Visualization System Based on Grid
HAN Weijie;ZHANG Wen;LI Xiaomei
..............page:218-220
Improvement of Fractal Image Coding in the DCT Domain
GAO Shangbin;ZHANG Jianwei;XIA Deshen
..............page:221-223
Technique Research of Surface Skinning Reconstruction with Cross-sectional Data
GUO Weiqing;ZHAO Jianfeng;WU Xiaogang
..............page:224-225,235
Implementation of T. 120 Data Conference in H.323 Multi-media Conference
CUI Xiutao;GUO Zhongjun;HE Li;LI Zhuohui;GU Junzhong
..............page:226-228
Techniques and Challenges of Engineering SoC
FENG Yalin;ZHANG Shuping
..............page:229-231
Design of Railcar Electro-door Control Unit Test Equipement Based on ARM9&Linux
CHEN Mingxue;ZUO Siyuan
..............page:232-235
Low-power VLSI Design of FIR Filter Based on Standard Cell
QI Yue;LI Zhancai;WANG Qin
..............page:236-237,240
Design and Realization of EPP-CAN Bus Communication on Linux OS
LI Ming;YUAN Yan;YANG Yupu
..............page:238-240
Kinematical Principles and Movement Control Program of New Miniature Bionic Hexapod Robot
ZHANG Tao;YAN Guozheng;LIU Hua
..............page:241-243,246
Thermal Noise Random Number Generator Based on SHA-2(512)
WANG Yuhua;NIU Liping;ZHANG Huanguo;SHEN Zhidong
..............page:244-246
Implementation of Parallel Signal Processing System Based on FPGA and Multi-DSP
PAN Fangsheng;ZHAO Feng;XI Jun;LUO Yi
..............page:247-249
Waveform Data Formats and Compressing Algorithms for Test Vector Translation
WU Mingxing;HAN Yinhe;HU Yu;LI Xiaowei
..............page:250-252
Technical Analyse of PCI Express Bus
MENG Hui;LIU Xuefeng
..............page:253-255,258
Design and Implementation of Commercial Bank Credit Management System
MEI Denghua;MIN Huaqing
..............page:256-258
Research and Implementation of Lossless Progressive Transmission of Medical Image Sequence
WU Jing;CHEN Shuzhen;ZENG Libo;WEI Fenfen
..............page:259-261,270
Design of WSRF-based WS-Resource
YI Ming;JIN Hai
..............page:262-264
Design and Realization of LightWeight WebGIS Middleware
QIAN Zhibin;ZHAO Weidong
..............page:265-267,277
Memory Optimization Scheme of H.264/AVC Encoder Based on Embedded Processor
XU Ning;SHI Ce;CHENG Meili
..............page:268-270
Implementation of Extended Precision Mathematical Algorithm in 32-bit Embedded System
NIE Shengwei;LU Shiqiang;CHENG Enhui
..............page:271-272,下转封3
Design of Embedded SIP Server Based on ARM9 Platform
SHENG Huixing;WANG Haibin;SHEN Jianli
..............page:275-277
Zero-copy MPI Based on Cluster Computing Communication Library HPCL_USTB
YIN Yixin;QIU Bo;HU Changjun;XU Zhengguang;WANG Jue
..............page:58-60
General Connector Model Oriented Complex Component Composition
XU Yi;PENG Xin;ZHAO Wenyun
..............page:55-57
Rules Engine Based Data Cleansing
YE Zhou;WANG Dong
..............page:52-54
Method of Modeling and Evaluating in Business Process Reengineering Based on Timed Petri Net
LI Shan;WANG Xiaoyan;WANG Jian;SHENG Yijun
..............page:47-48,67
Two Dimension Data Compression Method Based on Nonseparable Biorthogonal Wavelets
HUANG Chao;WU Qinglie;WU Zhong
..............page:45-46,51
A Novel Incremental Mining Algorithm of Association Rules
ZHANG Jianpei;YANG Yue;LIU Zhuo
..............page:43-44,60
A New Fuzzy Digital Signature Scheme
WANG Mingqiang;WANG Xiaoyun;ZHENG Shihui
..............page:40-42
Method of Load Balancing Based on Disjoint Multi-paths Routing
XU Wuping;YAN Puliu;XIA Delin
..............page:36-39
Payword Scheme Based on Two-dimensional Hash Chain
LIU Yining;LI Hongwei;TIAN Jinbing
..............page:34-35,39
Research on Availability of Web Service Workflow Based on Service Spanning Graph
HU Chunhua;WU Min;LIU Guoping;WANG Sichun
..............page:30-33,42
SST Image Blind Restoration Based on SIMO and NAS-RIF
ZHONG Weibo;JIN Shengzhen;NING Shunian
..............page:27-29
Research on OGSI-compliant Grid Schedule System Based on Agents
ZENG Wandan;CHANG Guiran;DAI Bo;ZHENG Xiuying
..............page:24-26,29
Multi-proxy Signcryption Scheme with Threshold Shared Unsigncryption
LIU Junbao;XIAO Guozhen
..............page:21-23
Recommendation of Online Auction Items Based on Collaborative Filtering
LI Xuefeng;LIU Lu;ZHANG Zhao
..............page:18-20
Effective Risk Assessment Model、 Algorithm and Process
PEI Erming;LIU Baoxu
..............page:15-17
Performance Analysis of Network Queue Based on FARIMA Model
RAO Yunhua;CAO Yang;YANG Yan;WANG Xiwen
..............page:13-14,20
Text Steganalysis Method——Breaking Steganographic Utility of Stego
WU Mingqiao;JIN Shiyao
..............page:10-12
A Modified Combination Rule of Evidence Theory
PU Shujin;YANG Lei;YANG Shenyuan;HU Weiwei
..............page:7-9
Registration in Image Guided Oral Implantology System Based on VTK
CHEN Xiaojun;YAN Shiju;WU Yiqun;WANG Chengtao
..............page:4-6