Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2008 Issue 22
Bayes Tracking for Moving Point Target Based on Position and Velocity
YU Wei-jun;Askar;LUO Wan-fu
..............page:223-225,228
New Mining Algorithm for Quantitative Association Rules
WANG Er-feng;CUI Du-wu;CHEN Hao;CUI Ying-an;FEI Rong
..............page:77-79,82
Learning Incremental Bayesian Algorithm Based on Class Support
DING Li-hua;ZHANG Xiao-gang
..............page:218-219,222
Key Technologies for Trusted Computing Environment on Embedded Terminal
WANG Zhen-yu;LIU Xin-jie;REN Jie;LIU Hai-lei;WU Jie
..............page:239-241,244
Research of Workflow Based on Outlier Detection
JING Bo;LIU Ying;HUANG Bing
..............page:268-270
Multicast Routing Protocol Based on Hierarchical Structure
SUN Xue-mei;ZHANG Zhi-qiang;LI Chun-qing
..............page:112-114
Data Source Management in Grid Data Fusion System
XU Zhi-lin;LU Chao-jun
..............page:63-65
Automatic Summarization Method Based on Extracting Sentences from Local Topics
XU Chao;WANG Meng;HE Ting-ting;ZHANG Yong
..............page:49-51
SYN Flood Detection Method Based on Heavy-tail Property
XU Xiao-don;YANG Hai-liang;ZHU Shi-rui
..............page:179-181
Super-resolution Reconstruction Based on Mixture Prior Model
YI Hai-lun;WANG Qing
..............page:210-212
Implementation of SPI-4.2 Interface Within FPGA
FAN Hong-yong;ZHANG Jin;Zhang Jia-jie;WANG Bin-qiang
..............page:132-134,137
Design and Realization of VR Simulation Platform in Automatic Storage and Retrieval System
ZHANG Peng-ju;CHEN Kun-chang;LI Ren-wang;ZHANG Zhi-le;YANG Gui
..............page:250-252,255
Society Cognitive Optimization Algorithm Modified with Self-organizing Migrating Algorithm
WANG Ling-juan;WEI Cheng-jian;LI Cheng-xiang
..............page:201-203
Stream Execution Model of Graphics Processing Unit
LI Hai-yan;ZHANG Chun-yuan;LI Li;REN Ju
..............page:258-260
Kernel Level Rootkit Defense Under Kylin
CHEN Bin-bin;WU Qing-bo;WEI Li-feng
..............page:156-158
Dynamic Detection of Buffer-overflow Vulnerabilities in Binary Environment
XIA Chao;QIU Wei-dong
..............page:187-188,191
Grid Service Programming Model Based on WS-Notifications
ZHU Bi-cen;XIA Qing-guo;ZHU Zheng-zhou
..............page:89-90,102
Improvement Method of TCG Command Validation Protocol
KANG Xin-zhen;WANG Zhen-yu;XU Rui
..............page:159-161
P2P Streaming Model Oriented to Real-time Interactivity
XU Cheng;CAI Hong-ming;JIANG Li-hong
..............page:103-105
Modified Credential Chain Discovery Algorithm Based on Trust Worthiness
CHEN Bo;LI Ming-chu;REN Yi-zhi
..............page:174-176
Ubiquitous Network Simulation Platform Based on Social Network Analysis.
TANG Lun;CHEN Qian-bin;ZENG Xiao-ping;LI Yun
..............page:271-273,276
Simulation System on Equipments and Network Environment
WANG Ruo-wen;ZHANG Yue-guo;LI Jian-hua
..............page:106-108
MIM Attack to Secure Authentication Protocol with 802.1X-EAP
LI Yong-qiang;WANG Hai-hang
..............page:192-194,197
Routing Protocol for Wireless Sensor Networks Based on Least Hop
YANG Qin;SUN Ting
..............page:129-131
Stream Scheduling Algorithm of Providing Service Time Guarantees
HONG Zhong;TANG Yi-zhu
..............page:124-126
Software Project Risk Assessment Model Based on Bayesian Networks
TANG Ai-guo;WANG Ru-long
..............page:91-93,105
Design and Implementation of WLAN Protocol Analysis System
WU Ya-jun;HU Ai-qun;SONG Yu-bo
..............page:140-142
Authentication Service System Based on Parallel Computation
LI Hui;HOU Yi-bin;HUANG Zhang-qin;HE Fu-gui;CHEN Rui
..............page:184-186
Octree Search Algorithm and Its Application in Computer-aided Surgery
CHEN Xiao-jun;SHU Kuan;ZHANG Jian-guo;QIAN Li-wei;WANG Cheng-tao
..............page:16-18
Grid Independent Task Scheduling Algorithm Based on Fuzzy Clustering
LI Fu-fang;QI De-yu;ZHANG Xian-guang;ZHANG Li-min
..............page:19-21,24
Wireless Network Routing Based on Frequency Hopping Technology
SHI Hao;WANG Zheng
..............page:145-147
Framework Design of MHS Based on STANAG
YAN Hong;YA Wen
..............page:121-123
Intelligent Web Cache Framework Based on AOP
DENG Lei;CHEN Zhi-gang;HUANG Jian;QIU Liang
..............page:283-封3
Configurable CMS Document Lifecycle Management Method
YAN Yong;WAN Shu-chao;YANG Yan;HUANG Tao
..............page:40-42
Energy-aware Routing Protocol Based on Reliable Link Layer Model
BAO Yan-ru;CHEN Hai-ming;SHU Yan-tai;QIU Xiao-hong
..............page:10-12
Analysis and Test of Approximation Greedy Algorithm for K-median Problems
XIAO Jin-jie;XIE Qing-song;LIU Xiao-hua
..............page:213-214,217
Application of Secure Data Exchange Technology in HIS
YANG Hong-qiao;WU Fei;LIU Yu-shu
..............page:195-197
Improved AODV Scheme for Equilibrating Energy in Wireless Sensor Network
LIU Wen-wen;MA Rui;XU Hai-bin
..............page:143-144,147
Design and Application of Embedded Virtual Instrument System
KONG Xiang-yan;CHEN Liang-liang;CHENG Tian-tian;LI Yun-fei
..............page:274-276
PID Controller Based on Fuzzy RBF Neural Network and Its Application
OUYANG Lei;HUANG You-rui;HUANG Yi-qing
..............page:231-233
Spatial Data Clustering Method Based on Improved Evolutionary Algorithm
LAN Xiao-ji;XU Hong-wei;PAN Wei-feng;SU Jian-qiang
..............page:29-31
User-oriented Concurrency Control Policies for Mobile Real-time Transactions
DANG De-peng;LIU Yun-sheng
..............page:4-6
Reverse Analysis of Software Based on IDA-Pro
QIN Qing-wen;WANG Ji;SUN Xu-guang;MEI Wen-hua
..............page:86-88,99
Requirements Verification Method Based on Directed Spanning Graph
RONG Hui-gui;ZHOU Ning;LU Shao-fei;XIAO Shuang
..............page:25-28,31
Enhanced Compatibility Solution Between NAT-PT and IPSec
ZHANG Zhi-long;DU Xue-hui;QIAN Yan-bin
..............page:148-149,152
P2P File Sharing Mechanism Based on Category Tree
CHENG Wei;YANG Shou-bao;WEI Dong;WU Bin;GUO Liang-min
..............page:135-137
Code Cache Index in System-level Dynamic Binary Translation
XING Chong;FU Yu-zhuo
..............page:253-255
Indoor Location Algorithm Based on RFID Technology and Its Improvement
HAN Xia-lin;ZHAO Wei-dong;JI Jun;WEI Gang;LIU Xian-hui
..............page:266-267,270
Cache Consistency Technology Based on Oracle DCN
ZHANG Pu
..............page:46-48
Pronunciation Quality Scoring Algorithm Based on Universal Background Model
LI Jing;HUANG Shuang;ZHANG Bo
..............page:207-209
Dual-core EFI-based Security Architecture
XIE Yong;LAI Xue-jia;ZHANG Xi-zhe
..............page:177-178,181
Safety Analysis of Safety-critical Software Based on UML Sequence Diagrams
HUANG Yi-jun;XU Zhong-wei
..............page:37-39
General security Co-processor
SUN Ji-feng;YUAN Chun-lin;SHENG Yan-qing;LIU Bin
..............page:168-170
Efficient and Secure Transfer Framework for Rich Internet Application
WANG Yu-hui;CHEN Hao-peng
..............page:189-191
Human Gait Tracking Method Based on Multiple Cameras
HU Qin;WANG Wen-zhong;XIA Shi-hong;LIU Ren-ren;LI Jin-tao
..............page:220-222
User-context Adaptive Website Architecture Based on Multi-Agent
ZHENG Wei-ping;QI De-yu;XIANG Jun;XU Ke-fu
..............page:226-228
Hardware-based Algorithm for Reorder of Disordered Packet
WANG Sheng;SU Jin-shu
..............page:7-9
Design of Multiple Scan nee with Extended Compatibilities
LIU Zhi-hua;YOU Zhi-qiang;ZHANG Da-fang;CHENG Yong-sheng
..............page:234-235,238
Intelligent Transportation Monitoring System Based on GPS/GPRS/GIS
ZHANG Feng-chuan;MIAO Yu-bin;LIU Yin-feng;LI Lian-feng
..............page:277-279
Implementation of Bus-on-chip System with Master-slave Pattern at Transaction Level
HUANG Qing-quan;HONG Sha;WU Yuan-fu
..............page:236-238
Communication Protocol of Centralized WLAN Architecture
XIANG Wang;WANG Zhi-wei;GAO Chuan-shan
..............page:115-117
Intelligent Technique of Information Acquisition and Processing in Digital Gas Fields
MA Zhong-gui;WANG Zong-jie;TU Xu-yan
..............page:13-15
Research on IP Fragments Algorithm and Its Application in Embedded System
RONG Feng;WANG Wei;LU Xiao-cui
..............page:100-102
Software Metric Based on UML
DONG Lin
..............page:55-56
Automatic Web Information Extraction Based on Repetitive Pattern
HU Ren-long;YUAN Chun-feng;WU Gang-shan;PU Xiao-jia
..............page:73-76
Method of Building Electronic Countermeasure Domain Ontology Based on Upper Ontology
SHI Yi;WANG Xin-lin;LU Ting-jin
..............page:22-24
Information Regulation of Home Network Based on XML
WANG Zhong-ming;CAI Li-min
..............page:263-265
Stack Protection Mechanisms in Windows Vista
CHEN Yang;ZHU Yue-fei;MEI Qiang
..............page:182-183,186
Research and Design of Topic-specific Meta-search Engine Based on Bogus Crawler
MA Yi-ping;ZHUANG Yi;YE Yan-feng;ZHANG Xia
..............page:70-72,76
Network Fault Diagnoses Expert System Model Based on Decision Tree
Qu Zhao-yang;GAO Yu-feng;NIE Xin
..............page:215-217
Limited Flooding Routing Protocol Based on Direction
LIU Feng;LI Ming-lu
..............page:118-120
Terminology Translation System Based on Self-training and Web
LI Zhi-sheng;SUN Yue-heng;HE Pi-lian
..............page:280-282
Interrupt Handling Strategy in System-level Dynamic Binary Translator
LONG Kai-wen;FU Yu-zhuo
..............page:245-246,249
Urban Geological Domain Information Management and Service System Architecture
WU Zi-xing;PAN Mao;QU Hong-gang;ZHU Lei
..............page:247-249
Mobile Search Based 0n MMS and Web GIS
AI Ju-mei;ZHOU Shu-min;PENG Jian
..............page:256-257,260
Optimization Algorithm Based on GVF-Snake for Body Contour Extraction
CAO Zhi-Jiang;HAO Kuang-rong;DING Yong-sheng
..............page:204-206
BOM Generating System Based on XML
CHEN Kai;WEI Shen;ZHU Chang-an;WANG Cheng-en
..............page:34-36
Detection of Hosts Number in LAN Based on Packets Capture Technique
SHE Hua-jun;JIANG Kai-da
..............page:94-96
ID-based Key Management Scheme in Ad HOC Networks
LIU Pei-shun;WANG Xue-fang;LAN Shun-guo
..............page:150-152
Safety-component Model Based on Colored Petri Net
CHEN Xu;XU Zhong-wei;YU Gang
..............page:165-167
Research and Improvement of Unstructured P2P Network Search Algorithm
YUAN Jing-bo;SHI Hong-wei;DING Shun-li
..............page:109-111
Packet Aggregation Mechanism for P2P Massively Multiplayer Online Game
SHI Xiang-bin;LOU Pei-li;DU Ling;BI Jing;XIA Xiu-feng
..............page:138-139,142
Intrusion Detection Model Based on Detection Information Exchange for Wireless Mesh Networks
LIU Hong-jiang;SANG Nan;LUO Hui-qiong
..............page:171-173
Certificate Revocation Notification Scheme Based on Subscription
HUANG He;WANG Ya-di;HAN Ji-hong
..............page:97-99
Component Composition Towards Safety Requirement
HAN Jing-jing;XU Zhong-wei;YU Gang
..............page:153-155
Index Approach of Rough Relational Database
QIU Tao-rong;YUAN Xin-di;WEI Ling-ling;XU Su
..............page:80-82
Text Segmentation Algorithm Oriented to Small General-text
CHEN Yuan;CHEN Rong;HU Jun-feng;LIN Lin;ZHANG Jing-bo;YU Zhong-hua
..............page:43-45
Dynamic Stereo Matching Algorithm Based on Epipolar Line Segment
PENG Jun-jian;LIU Ji;GENG Yan-feng;HAN Jian-da;TANG Yan-dong
..............page:198-200
Design and Implementation of Web Service to Predict Flight Delay
RONG Yao;WANG Jian-dong
..............page:66-69
Performance of Storage System Based on FC-SW Storage Area Network
LIU Zhen-guo;JIANG Lie-hui;LIU Hui;ZHAO Zhao;ZHOU Wu-ming;WANG Ying
..............page:83-85,96
tou gao xu zhi
..............page:封2
FPGA-based Triangle Rasterization Module
HUANG Rui;FU Yu-zhuo;ZHAO Feng
..............page:242-244
XML-based Heterogeneous Data Integration System in Grid Environment
ZHENG Rong;MA Shi-long
..............page:52-54
QoS Constrained Service Discovery Based on SLP
NI Xiao-fan;NIU Ji-zhen;WANG Fan
..............page:261-262,265
Parametric Modeling for Hyper Sonic Vehicle Structure Based on PCL
XU Lin;GUO Zhong-quan;CHEN Xiao-qian;WANG Zhen-guo
..............page:1-3,6