Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2007 Issue 8
Design and Implementation of Cluster Intelligent Builder Based on Agent Technology
ZHANG Han;ZHANG Zhihong;ZHAN Jianfeng;HONG Xuehai
..............page:112-114
Communication Model of Anycast Service on Application Layer in IPv6
WANG Xiaonan;QIAN Huanyan
..............page:109-111
Research and Implementation of Random-sleep Node Dissemination Algorithm for Sensor Network
HE Zhaosun;SHI Gaotao;LIAO Minghong
..............page:115-117
Novel Algorithm of Multi-area and Multi-subnet Ethernet Physical Topology Discovery
XIA Xiaozhong;XIAO Zongshui;QIU Yihong;FANG Changjiang
..............page:118-120
Uncertain Modeling and Simulation for MANET
ZHAO Chunxiao;WANG Lijun;MA Jingshan;WANG Guangxing
..............page:121-123
Fault Diagnosis System Based on BP Neural Network and Expert System
GONG Wenke;LI Xinguang;ZHAO Jie
..............page:199-200,204
Researh on Efficient Inter Mode Selection Approach for H.264
ZHOU Wei;LU Lu
..............page:210-212
Design of Still Medical Image Compression Based on JPEG2000
WEI Junxia;JIAO Guohua;GAO Xiaohui
..............page:213-215
Design and Implementation of Binocular Visual System Based on EVision
FAN Luqiao;JIANG Liangzhong;WANG Wei;YAO Xifan;HE Chunbin
..............page:216-218
Research on Object-oriented Anti Tactical Ballistic Missile Simulation System for Air Defense
CHEN Langzhong;LI Weimin;WANG Guannan;FAN Rong
..............page:219-221,226
Application of Cellular Automaton Model in Traffic Flow of Five Crossings
WANG Shuohe;WAN Jianru;GUO Yonglin;MA Sheng
..............page:222-223,229
Dual Fault-tolerant System Based on Task-level Synchronization
LIU Dong;ZHANG Chunyuan;LI Rui
..............page:224-226
Feature Weighted Based Category ART Network and Its Application
DING Zhiguo;LIU Yue;WU Gengfeng
..............page:201-204
A New SVM Iterative Algorithm in Large Training Set
TIAN Xinmei;WU Xiuqing;LIU Li
..............page:205-207
Construction of 3D Urban Model Based on Image Sequence
DENG Fei;ZHANG Zuxun;ZHANG Jianqing
..............page:208-209,212
Adaptive Bit-leaking for SDH 2Mb/s Network
HUANG Haisheng
..............page:227-229
Implementation of Simulation of iSCSI Protocol
YAO Yukun;HUANG Wei;DU Ning
..............page:241-243,246
Design of Fuzzy Control About Fixed Current in Water-resistance Load Station
LU Yongkun;XUE Zhengyu;LIU Chengchen
..............page:244-246
Research and Implementation of Collaborative CAPP System Oriented Network-based Manufacture
ZHU Haiping;ZHANG Yao;HUANG Xin
..............page:247-249,252
Research on Ontology-based Description Model of Part Information
LI Wenjie;FENG Zhiyong;ZHAO Dexin
..............page:250-252
COTS-based Fault-tolerant Server and Its Fault Recovery Techniques
LI Haishan;OU Zhonghong;YANG Shengchun;YUAN Youguang
..............page:253-255
Design and Realization of Information Security Products Evaluation Platform
CHEN Chi;FENG Dengguo;ZHANG Min;XU Zhen
..............page:256-258
Implementation of 6S Algorithm in DSP Systems
MEI Wangsheng;HUANG Lu;LIU Tonghuai;HU Xinwei
..............page:233-234,237
Research on Radio Resource Management of Centralized WLAN Network
CHEN Kan;LI Hua;PAN Chunjian;TAN Hongyan
..............page:124-126,129
Anti-spam Technique Based on Users Feedback
LI Yang;FANG Binxing;WANG Shen
..............page:130-132
Study of Complicated Information System Model and E-government Case
WANG Kun;YIN Zhonghai;ZHOU Lihua;YUAN Feng
..............page:133-135
Improvement of Athena Approach Based on Strand Spaces Model
DONG Rongsheng;WU Guangwei;GUO Yunchuan;GU Tianlong
..............page:136-138,144
Research on Propagation of Worms in P2P Networks
HAO Xiangdong;WANG Kaiyun;ZHANG Chunrui;LI Jia
..............page:139-141,147
A Video Watermark Scheme Resistant to Geometric Attacks
YANG Xiaoyuan;NIU Ke;WEI Ping;WANG Yumin
..............page:142-144
Approach to Autonomous System Classification
WANG Dadong;YUAN Jing;WANG Hongjun;GAO Yuan
..............page:106-108
A New Attack Method for Watermark Systems
LI Xiren;WANG Yong;LIU An
..............page:145-147
Security Flaw in Revocation Algorithm
WANG Fenghe;HU Yupu;WANG Chunxiao
..............page:148-149
Design and Implementation of Cryptographic and Certificate Authority Center for User in VoIP System
LIAO Wei;LIU Gang;HOU Bin;ZHANG Ru
..............page:150-151,159
Research on Intrusion Detection Method Based on Neural Network Ensemble
GONG Wenke;LI Xinguang;ZHAO Jie
..............page:152-153,156
Study on Distributed Intrusion Detection System
WANG Qiang;JIANG Tianfa
..............page:154-156
Information Hiding Algorithm Based on Visual Perception and Optimal LSBs Substitution
LIU Jiandong;CHEN Guiqiang;YU Youming;TIAN Ye
..............page:157-159
Design of Interpretable Fuzzy Model Based on Clustering and Genetic Algorithm
ZHANG Yong;XING Zongyi;XIANG Zhengrong;HU Weili
..............page:160-162
A Refined-match Method Based on Fuzzy Reasoning
QIAN Jianfei;HE Qinming;CHEN Hua;YU Ruizhao
..............page:163-164,167
Ensemble Text Classification Model Supplemented by Strong Rules Learning
LIU Jinhong;LU Yuliang;ZHOU Xindong
..............page:165-167
Research on Image Enhancement Algorithm and Evaluation Method
SUN Lei;WEN Youkui;LI Bingchun
..............page:168-169,172
Hybridization Clustering Algorithm of Particle Swarm Optimization Based on Density
SHAN Shimin;DENG Guishi;HE Yinghao
..............page:170-172
Method of Inconsistent Knowledge Processing Based on Semantic Tableau
LIU Quan;FU Yuchen;LING Xinghong;SUN Jigui
..............page:173-174,177
Location and Binarization of License Plate Image Based on Modification
HONG Jian;CHEN Jirong
..............page:175-177
Improved Generalized Hough Transform for the Recognition of Irregular Objects
WANG Xin;JING Jing;GE Qingping
..............page:178-179,184
Chinese Automatic Summarization Based on Thematic Sentence Discovery
WANG Meng;LI Chungui;TANG Peihe;WANG Xiaorong
..............page:180-181,189
Research on FSL-SP
SHI Jia;SHARDROM Johnson;ZHANG Wu
..............page:182-184
Minutia Detection of Fingerprint Based on Tracing Ridges
JIANG Hongchao;ZHANG Gaowei
..............page:185-186
Fast Learning Algorithm of Adjustable Parameter Feedforward Neutral Network
PENG Xiaoqi;WANG Wen;SONG Yanpo;ZHANG Jianzhi
..............page:187-189
Application of Quasi-Newton Method in Kernel Parameters Optimization of SVM
GE Hongwei;YANG Xiaoyan;ZHANG Yanfeng
..............page:193-195
Electricity Fee Payment System of Bank and Power Supply Enterprise Network Based on Proxy Design Pattern
LIU Yongping;HAO Zhifeng;TIAN Xiang;FENG Yingchang
..............page:259-261
Design of Web-mode-based Antiterrorism and Social Stable Maintenance Command System
LIANG Ying;ZHANG Qing;MA Minghui
..............page:262-263,266
Realization of Fire Effect in J2ME Mobile Games Based on Article System
XIAO Chunxiu;ZHANG Haixiang;CHEN Chun
..............page:264-266
Design of UML Syntax-analyzer Using BISON
JIANG Guoming;WEI Yangsu;SONG Jinyu
..............page:267-269,272
MPEG-4 Video Compress Card Driver on Linux
CHENG Xiaoyu;BI Duyan
..............page:270-272
SIP-based E-education System
LI Xiaohua;WUSHUR Islam;LIU Shuxian
..............page:273-275
Research on Method of Operational Capability Evaluation Based on TOPSIS-AHP-simulation Method
GONG Deliang;HUANG Yanyan;WU Dongpo
..............page:276-278,281
Error Analysis of USB System Based on ISP1362
LIAO Junqing;YANG Xiaofei
..............page:279-281
Implementation of Ontology in E-learning Resource Repository Based on Semantic Web
ZHONG Luo;WANG Hui;LI Ruitao;SONG Huazhu
..............page:282-封3
tou gao xu zhi
..............page:封2
Improvement of TCP-Westwood over Satellite Networks
HUANG Lei;LIU Lixiang
..............page:103-105
Service Composition Algorithm on Overlay Multicast Network
PAN Yun;YU Zhenwei;WANG Yinyan
..............page:100-102
Application Layer Multicast Protocol Based on Adaptive Hierarchical Clustering Algorithm
CHENG Peng;WU Qiufeng;DAI Qionghai
..............page:97-99,102
Memory Management on VxWorks
CHEN Yang;HU Xiangyu;YANG Jianhua
..............page:94-96
An Effective Approach to Eliminating Noises in HTML Pages
LUO Cheng;LI Bicheng;ZHANG Xianfei
..............page:89-91
Evaluation Model of Informatization Projects Based on Analytic Hierarchy Process
WANG Yuanfang;YU Xiaoan;XUE Yang;JING Zhongliang;ZHOU Hongren
..............page:68-70
Approximate k-median Clustering for Categorical Data
ZHAO Heng;ZHANG Gaoyu
..............page:66-67,70
Implementation Skeleton of CORBA/SNMP Gateway Event Management
WANG Zhendong;SUN Minghai;FENG Chongxi
..............page:63-65
Active Real-time Concurrency Control Algorithm Based on Coupling Model
HAN Qilong;HAO Zhongxiao
..............page:60-62
Security Analysis and Improvement of Proxy Signature Scheme with Privacy Protection
XIN Xiangjun;GUO Xiaoli;XIAO Guozhen
..............page:54-56
Logic of Metric Space and Time
XIE Qi;LIU Dayou;YU Qiangyuan;LV Ce
..............page:45-47,50
An Improved Priority Inheritance Protocol and Its Algorithm
WANG Jigang;GU Guochang;XIE Shibo;LI Yi
..............page:41-44
Research on Emotional Control Model of Single Softman
NING Shurong;BAN Xiaojuan;AI Dongmei;ZENG Guangping;TU Xuyan
..............page:39-40,44
Normalization Method Based on Rough Set Theory
PANG Qingle;SUN Tongjing;YANG Fugang;ZHONG Maiying
..............page:36-38
Rate Adaptation Algorithm in Multi-rate WLAN
DUAN Zhongxing;ZHANG Deyun
..............page:33-35,38
Service Adaptation Model and Its Applications
XING Na;JIN Beihong
..............page:30-32
Forward-secure Undeniable Digital Signature Scheme Based on Zero-knowledge Proof
WANG Xiaofeng;WANG Shangping;ZHANG Jing;ZHANG Yaling
..............page:27-29
Grid Intrusion Detection Model Based on Immune Multi-agent
NI Jiancheng;LI Zhishu;SUN Feixian;LIANG Gang;CHEN Liangyin
..............page:23-26
Effective Algorithm for Depth-first Mining Generator Representation
WANG Bingzheng;HUANG Yalou;DONG Hengjing
..............page:20-22,26
Availability Fuzzy Evaluation Based on Stochastic Petri Net for Repairable System
YUAN Jumei;HOU Chaozhen;WANG Xiaoyi;WU Qin
..............page:17-19
Method for Discovering Users' Frequent Access Patterns Based on Close Patterns
CHEN Min;MIAO Duoqian
..............page:14-16,19
Research on Number Trend Sequences and Whole Sequence Matching Algorithm
CHEN Dangyang;WANG Huiwen;JIA Suling;JIANG Hao
..............page:10-13
Framework of Automatic Test Data Generation for Software Structure
CHEN Jifeng;SHEN Junyi;WANG Zhihai;WANG Xinjun
..............page:6-9
Fault-tolerant Model for RAID of High-reliability Based on V Codes
WAN Wunan;MENG Qingchun;WANG Xiaojing
..............page:3-5,13
Research on Modeling Method for Spatial Data Cube
FAN Bo;LI Haigang;MENG Qingguo
..............page:1-2,9
Integration of UML Software System Modeling with Security Modeling
ZHANG Sainan;YIN Zhaolin;LIU Houquan
..............page:86-88,91
Method of Personalized Portal Construction Based on Web-page Fragmentation
LI Junhuai;SUN Jian;ZHANG Jing;LIU Lijuan
..............page:83-85
Approach to Feature Selection of Spam Filtering Based on Contribution Difference
ZHANG Wenliang;HUANG Yalou;NI Weijian
..............page:80-82
XML Query Method Based on Path Fragment Index
CHEN Dongxia;JI Genlin;XIAO Yuan
..............page:77-79,82
Experiments on Factors of Affecting File Systems Performance
CHEN Huan;FAN Zhihua;XIONG Jin;SUN Ninghui
..............page:74-76
MDA-supported Modeling Approach for PIM
HOU Jinkui;WAN Jiancheng;ZHANG Yuyan
..............page:71-73