Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2008 Issue 24
Design and Implementation of Runtime Software Fault Injector
YE Jun-min;XIONG Hua-gen;DONG Wei;QI Zhi-chang
..............page:4-6
Multi-reference Frame Motion Estimation Algorithm for H.264 Based on Multi-resolution
FAN Zhi-hao;XU Ping;FAN Ying-le;PANG Quan
..............page:235-237
Multi-microphone Noise Reduction Based on Beamforming and SSA
DONG Peng-yu;LIN Tao
..............page:230-232
Embedded Blind Aid System Based on μClinux
YANG Chao;ZHAO Qun-fei
..............page:282-284
Efficient Calculation About Finite Field Multiplication in Optimal Normal Basis
WANG Hong-xia;ZHAO Xian-sheng;ZHOU Yun;QIN Si
..............page:79-81
Skeleton-based Real-time Deformation Method in Virtual Knee Joint Surgery
SHANG Jie;XIONG Yue-shan;XU Xin-ghua;KANG Yong
..............page:276-278
Access Control Model Based on DRT in Layered Multi-domain System
GE Fang-bin;YANG Lin;WANG Jian-xin;DING Li
..............page:71-73,76
Research of Domain Knowledge Search Based on Ontology
CHEN Li;WU Jie;MA Jing;XUE Hao
..............page:49-51
Network Mobility Modeling Based on Mobile Satellite Communication
FENG Yu-long;ZHANG Wei
..............page:246-249
Research on Stream Competition in Wireless Mesh Network
XU Tan;YANG Shou-bao;HOU Guan-bo;SUN Wei-feng
..............page:118-120,127
tou gao xu zhi
..............page:封2
Research on Conformant Plan
ZHAO Jing-jing;SUN Ji-gui;YIN Ming-hao;CAI Dun-bo
..............page:31-33,36
EST Estimation and Tasks Scheduling Based on Expanded Stochastic DAG
HU Kai;JIANG Yan;YANG Zhi-bing;ZHANG Xin-yu
..............page:52-54
ID-based Chameleon Digital Signature Scheme
LU Yi;TANG Yuan-sheng
..............page:177-179
Farmland Grade Information Publication System Based on WebGIS
LI Guang-min;CHEN Nian-sheng
..............page:261-262,265
Trust Model Based on Recommendation on P2P Network
GUO Cheng;LI Ming-chu;YAO Hong-yan;HU Hong-gang
..............page:157-159
VBR Traffic Congestion Control Mechanism Based on Hybrid Prediction Model
LI Jie;LV Bing;HAN Zhi-jie
..............page:34-36
Seamless Handover Scheme in Inter-domain of Hierarchical Mobile IPv6
CHEN Lei;YANG Peng;HE Jian-feng
..............page:85-87
Remote Sensing Data Processing Software Based on Bayesian Network
WEN Qi;MA Jian-wen
..............page:10-12
Quattor Template Auto-generation System
WENG Yun-jian;JIANG Zhuo-ming;FAN Hua-xiang;LIANG Dong;SUN Gong-xing
..............page:258-260
Semantic Web Techniques and Its Logic Foundations
YUAN Jin-ping;BAO Ai-hua;YAO Li
..............page:194-196,199
Automatic Specification Rewrite Method for Software Architecture
ZHONG Lin-hui;YE Mao-sheng;ZHENG Yi
..............page:43-45
Random Access Scheme Based on Broadband Wireless Multimedia System
LU Ye-xu;RONG Lu;LIU Qi
..............page:228-229,232
Research and Implementation of Dynamic Virtual Intelligent Traffic Environment
LOU Yan;LU Yong-ming;HE Hanwu
..............page:22-24
Design and Implementation of Data Collection System on SCATS
PENG Xin-lin;WANG Ning-ming;ZHOU Jian-feng;WANG Jing-cheng;XU Wen-yan
..............page:256-257,260
Grid Security Requirement Analysis Model Based on Virtual Organization
ZHAO Hui;LI Ming-chu
..............page:175-176,179
Construction of Simulation Framework for Service Discovery Protocols in GloMoSim
GAO Zhen-guo;WANG Chun-sheng;LI Xiang;ZHAO Jing;LIU Sheng
..............page:109-111
New Malicious Executables Detection Based on Association Rules
ZHANG Wen;ZHENG Quan;SHUAI Jian-mei;CHEN Chao
..............page:172-174
Extended Compatibility Scan Tree Construction Algorithm Based on Compatible Clique with Weight
XIAO Jian-feng;YOU Zhi-qiang;KUANG Ji-shun
..............page:241-243
Web Monitor System Based on Dynamic Load Balance
WANG Ze-jun;CHEN Xin;WANG Yong;GAO Bao-qing
..............page:115-117
Implementation of CRC Algorithm in EPCglobal C1 Gen2 Standard
LIAO Bin-bin;ZHAO Zhi-jing;ZHANG Fu-hong
..............page:128-130,133
Access Authentication Mechanism for Hierarchical M0bile IP
WU Hua-feng;DAI Xin-fa;CHEN Peng
..............page:131-133
Distributed Task Scheduling Based on Real-coded Immune Algorithm
LU Gui-ming;WANG Xiao-bing
..............page:200-202,205
Implementation of IPv6-based CAN Application Layer Protocol
DONG Jin-nan;QIN Gui-he;YU He;MIAO Li-ying;LIU Wen-jing
..............page:100-102,105
Research on Tree Parameterized Modeling under Constraint of Morphological Characters
SHI Song;CHEN Chong-cheng;WANG Qin-ming;TANG Min
..............page:250-252
Multi-group Key Tree-based Group Key Management Scheme for Application Level Multicast
CHEN Yue;KOU Hong-zhao;FEI Xiao-fei
..............page:140-142
Formal Concept Lattice Based on Composition Rough Operator
QIU Wei-gen;ZHANG Guo-dao
..............page:16-18
Research and Implementation of QoS-aware Model for Web Service Selection
GONG Xiao-yong;ZHU Qing-sheng
..............page:55-57
Eye Location Method for Driver Fatigue Detection in Dual Spaces
JIANG Shui-lang;YANG Ming
..............page:180-182
RBFNN Siding Mode Control Based on Semi-physical Simulation
YANG Peng;JIANG Wei;LIU Pin-jie;ZHANG Yan
..............page:197-199
Application Integration and Data Conformity Method in E-government
CHEN Yi-fang;CHEN Qing-kui;XU Fu-yuan
..............page:263-265
VC-tree:Spatial-temporal Database Index Based on R*-tree
ZHANG Gui-jie;YUE Li-hua;JIN Pei-quan
..............page:46-48
Scalable Automatic Handling Scheme for Event Messages
QI Wen;BAO Yu-bin
..............page:82-84
Attribute Reduction Algorithm Based on Dynamic Discernibility Matrix
SUN Ling-yu;PENG Xuan-ge;LENG Ming
..............page:216-217,220
Improved GA-based Mobile Agent Routing Algorithm
DONG Xiang-jun;SHI Hao-shan;JIANG Fei;ZHAO Yong-hui
..............page:190-193
Case Retrieval Algorithm Based on Preference Information
LI Feng;WEI Ying
..............page:28-30
N-path Redundancy Rerouting Arithmetic and Its Performance Analysis
TAO Ting;SUN Le-chang
..............page:121-123,127
Markov Chain Anomaly Detection Model Based on Characteristic Patterns
SUN Mei-feng;HUANG Fei;CHEN Yun-jing;YIN Xin-chun
..............page:155-156,159
Improving Scheme of TCP Performance in Wireless Sensor Network
LI Lu-jiao;LI Yun;CHEN Qian-bin;NIE Neng
..............page:91-93
Design and Research of Network Test System Based on IXA
HAN Ying-qiang;HU Yue-ming
..............page:106-108,111
Range-free Localization Algorithm of Sensor Networks Based on Monte Carlo
LI Chang-geng;LI Xin-bing
..............page:1-3
Multifractal Model Characteristic Analysis and Test Based on Cascades Process
ZHANG Bo;WANG Bin-qiang;ZHANG Xiao-hui
..............page:112-114,117
Design and Implementation of Collaborative Viewing and Markup System Supporting Heterogeneous Data
ZHANG Bai-hua;YE Xiao-feng;WANG Yi-gang;SHAO Jian
..............page:268-271
Tailorable Mutil-tier SmartERP System Based on.NET
ZHAO Jie;XIAO Nan-feng
..............page:25-27,30
Composite Mode Filter Model Based on Content
ZHANG Ling-da;JIN Lin;CHENG Xiu-xia;JIANG Fei
..............page:64-66
Propagation Fading Model of Container RFID System and Its Performance Analysis
CAO Xiao-hua;TAO De-xin
..............page:272-273,封3
Analysis of Amended N-S Protocol Based on Strand Space Model
GUO Yu-yan;WEI Shi-min
..............page:165-166,169
Framework for Software Dynamic Adaptation Evolution Based on Non-Functional Features
WANG Lei;PENG Xin;ZHAO Wen-yun
..............page:74-76
Service Robustness Guarantees Mechanism for P2P Live Media Streaming System
BI Xin-min;WU jie;LV Zhi-hui;ZHONG Yi-ping
..............page:221-224
ID-based Key Management Scheme for Ad Hoc Networks
WU Ping;WANG Bao-yun;XU Kai-yong
..............page:143-145
New Anti-worm Propagation Strategy Based on P2P
WANG Bin;DING Piao;TAN Yun-qiao;GUI Wei-hua
..............page:13-15
Application of Clustering Algorithms in Bank Customer Segmentation
HUA Hai-yang;ZHAO Huai-ci
..............page:37-39
Verifiable Multi-secret Sharing Scheme
LI Xiong;LI Zhi-hui;YU Jing
..............page:160-161,164
Raising Stage Algorithm for Generating de Bruijn Sequences
XIE Shen-quan
..............page:213-215
Research on Mixed Scheduling Algorithm in Networked Control System
CHEN Dan-dan;XIA Li;WANG Hai-feng
..............page:94-95,99
Public-key Cryptosystem Algorithm Based on Chebyshev Polynomial
ZHAO Geng;YAN Hui;TONG Zong-ke
..............page:137-139
Community Structure Discovering Method in P2P Networks
NIU Er-li;SHAN Ming-hui;CHEN Jun;WANG Jing-lin
..............page:7-9
Fast Steganographic Algorithm Based on Ternary Steganographic Golay Code
LIU Jiu-fen;LI Yu-hui;CHEN Jia-yong;ZHANG Weiming
..............page:149-151
Receiving and Saving Strategies for Mass Data Based on Digital Broadcasting
WANG Lei;PAN Liang;WU Guobin;NI Hong
..............page:233-234,237
Application of Real-time CoRBA Based on Semi-active Replication in DRE
LV Feng;LI Fen;WU Kai
..............page:244-245,249
Grid Resource Scheduling Model Based on Tree-Petri Net
ZHOU Juan;LIU Jue-fu;LI Pei-song;MA Feng-wei
..............page:88-90
Dynamic Combinatorial Method of Multiple Classifiers on Ensemble Learning
CHEN Bing;ZHANG Hua-xiang
..............page:218-220
Design of High Performance Radix-4 FFT Processor
DUAN Xiao-dong;GU Lizhi
..............page:238-240,243
Visual System of Formal Specification and Verification of Security Policy
LEI Xin-feng;LIU Jun;XIAO Jun-mo;ZHOU Hai-gang;ZHANG Yi-dan
..............page:162-164
Fast Design Method of Soft Keyboard in MiniGUI
ZHANG Bin;LUO Gui-e
..............page:274-275,封3
Research on Quantization Model of Adaptive Dynamic Trust Relationship
LI Xiao-yong;ZHANG Shao-gang
..............page:211-212,215
AIS-based Service Match Model
WANG Lei;LIU Ge-feng;LI Yuan-yuan
..............page:186-189,193
Flexible Mechanism of Workflow Management System
YU Yong;PENG Yan
..............page:40-42
Multi-marks 3D Tracking Algorithm in Video Motion Capture System
YAN Jian-yun;ZHENG Jiang-bin;LI Xiu-xiu
..............page:206-207,210
Greedy Routing Protocol Based on AODV
ZHU Hong;SHAN Hong;HUANG Jun
..............page:96-99
Access Control Model Based on Virtual Organization
ZHAO Xue-song;SUN Yuan-yun;MA Jun-pei
..............page:19-21
Secure Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography
TIAN Zhi-gang;BAO Wan-su;ZHANG Wei
..............page:170-171,174
Anycast QoS Routing Algorithm Based on MPLS Networks
CHEN Feng;SONG Ling;MA Qiang
..............page:103-105
Thread Autonomic Management Based on AOP
ZHANG Zhu-xi;LI De-cai;WANG Huai-min;LIU Hai
..............page:67-68,70
Extracting Attack to Sequential LSB Steganography
CHEN Jia-yong;LIU Jiu-fen;ZHOU Han;ZHANG Wei-ming
..............page:146-148
Design and Implementation of OSPFv3 Routing Monitor System
FAN Lun-ting;WANG Zhi-liang;YIN Xia;CUI Sai-hua
..............page:124-127
Description of Data Structure Based on RDFS
ZHA Qi;ZHENG Cheng;CHEN Tao
..............page:77-78,81
Digital Works Distribution Scheme Based on DRM License Mechanism
ZHANG Jin;LI Qing-cheng;ZHANG Zhen-hua;ZHAO Liang
..............page:134-136
Improved Compact Genetic Algorithm with Higher Selection Pressures
ZHANG Qing-bin;WU Ti-hua;LIU Bo;PIAO Li-hua
..............page:183-185
Temporal Rule Distribution Mining of Privacy-preserving
GENG Bo;ZHONG Hong;PENG Jun;WANG Da-gang
..............page:69-70
Combination Optimized Method of Entropy Coding for Scalable Video Bitstream
ZHAO Zhi-jie;LIU Zeng-yu;ZHANG Li-zhi;LI Yun;SHAN Da-wei
..............page:225-227
Application of Association Rule Mining in Management of Taxation Law Enforcement
YAO Liang;XU Shao-bin;HU Xue-gang
..............page:266-267,271
Tibetan Web Information Extraction Based on DOM Pruning
Zhu Jie;Ngodrup;GeSang Dorje
..............page:58-60
Object Detection in Nonstationary Scenes Based on Background Modeling
ZHOU Zhen-yi;HU Fu-qiao
..............page:203-205
Universal Design of Programmer & Debugger Based on HC08 Family MCU
LIU Xiao-sheng;CAO Jing-hua;SHEN An-dong
..............page:253-255
Water Environment Management Information System of River Delta Based on WebGIS
ZHANG Jun-yao;CHENG Yun;ZHENG Bing-hui
..............page:279-281