Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2008 Issue 3
Public Verifiability Signcryption Scheme Based on Hess's Signature
YU Zhao-ping;KANG Bin
..............page:199-201,219
Petri Net Description of Usage Control Authorization Model
LI Pei-wu
..............page:196-198
Intrusion Detection Method Based on Rough Set and Artificial Immune
FU Hai-dong;ZHAO Jian-feng
..............page:194-195,198
Immune Intrusion Detection Analysis Engine Based on Genetic Algorithm
ZHOU Xuan-wu;YANG Xiao-yuan;PAN Xiao-zhong;WEI Ping;HU Yu-pu
..............page:191-193
Pedestrian Detection Method Based on Adaboost Algorithm
GUO Lie;WANG Rong-ben;ZHANG Ming-heng;JIN Li-sheng
..............page:202-204
Coverting Channel Based on Packet Length
YAO Quan-zhu;ZHANG Peng
..............page:183-185
Hybrid Anomaly Intrusion Detection Method Using HMM and STIDE
SUN Yan;LI Yong-zhong;LUO Jun-sheng
..............page:181-182
Trust Search Algorithm Based on Subjective Logic
FU Jiang-liu;GAO Cheng-shi;DAI Qing;YANG Yan
..............page:178-180,204
Comparative Evaluation of Digital Fragile Image Watermark Algorithms
ZHANG Hong;WANG Ying
..............page:174-177
Watermark Algorithm of Low Bit-rate Video Rubost to H.264 Compression
YU Xiao-jun;MO Wei;FAN Ke-feng;WANG Mei-hua
..............page:171-173
Multi Level Security Policy Model Based on Well-formed Application
ZHENG Zhi-rong;HE Fang;YUE Yang
..............page:168-170
Mobile Search Model Based on Wireless Application Protocol
CHEN Ming;SUN Li-li
..............page:205-206,209
Automated Categorization of Patent Based on IPC Knowledge Construction
LIU Yu-qin;GUI Jie;ZHU Dong-hua
..............page:207-209
Rotation-invariant Face Detection in Color Images with Complex Background
WANG Jian-guo;WANG Jiang-tao;YANG Jing-yu
..............page:210-212
Improved Genetic Algorithm for Feature Selection of Modulation Signal
XUE Fu-qiang;GE Lin-dong
..............page:213-214,222
NMF-based Image Reconstruction for Face Recognition
ZHOU Chang-jun;ZHANG Qiang;WEI Xiao-peng
..............page:217-219
Immune Genetic Algorithm Based on Group Division and Hybridization
WU Yan;LI Ru-yun
..............page:220-222
Second-order Feature Selection Method Based on Complete 2DPCA
WU Yan;XIA Ying
..............page:223-224,227
Feature Extraction Method Based on Combination of Algebraic Features and Rough Set
SHAO Jun;WU Xiao-jun;WANG Shi-tong;YANG Jing-yu
..............page:225-227
Multiuser Detector Based on Clonal Particle Swarm Optimization Algorithm
GAO Hong-yuan;DIAO Ming;JIA Zong-sheng;ZHANG Heng
..............page:228-230,233
Method for Steel Bars Recognizing and Counting Based on Multi-camera Vision Fusion
LUO San-ding;HUANG Jiang-feng;LI Yong
..............page:231-233
Research and Realization on Binocular Stereo Vision System of Robot
CUI Kai-yong;WANG Ren-jie;LIN Xiao-ling
..............page:237-240
Fingerprint Matching Algorithm Based on Fiducial Point
YUANG Hua-qiang;YE Yang-dong;DENG Jian-guang;CHAI Xiao-guang;LI Yong
..............page:241-243
Adaptive Method to Detect Anchorperson Shot in News Video
WEN Jun;ZENG Pu;LUAN Xi-dao;WU Ling-da
..............page:244-246
Data Scheduling Policy in P2P-VoD System Based on Rateless Codes
MA Yu-qing;ZHENG Quan
..............page:247-249,255
Application Research of Stream Media Technique in Securities Appraisement System
HUANG Tie-shan;WU Shao-chun;CHEN Yi-hai
..............page:253-255
Sampling Inspection Optimization Based on Quality Standard
SONG Bao-wei;MAO Zhao-yong;BAO Ya-dong;HU Hai-bao
..............page:256-257
RFID Integrated Production Line Control System Based on Field-bus
TIAN Jing-he;FAN Yu-shun;ZHU Yun-long
..............page:258-260
Design and Development of Embedded Control System of Heavy Mining Machinery
LI Hui;ZHANG Hao;SHI Lei;HUANG Di;ZOU Zhi-qiang
..............page:261-262,279
Elevator Video Surveillance System Based on Wireless Communication
TANG Yi-ping;ZHAO Xu-hua;ZHOU Zong-si
..............page:263-265
Design of Digital Power System Based on Portable Equipment
ZHANG Hua;SHAO Zong-liang
..............page:266-268,276
File Access Method from USB Device to USB Host
ZHANG Zhi;YU Song-yu
..............page:269-271
Real-time Middleware of Controller with Open Platform
FAN Liu-qun;MA Yu-min
..............page:272-273,282
Design of Local Grid Task Scheduling Platform in OPNET
XUE Gui-xiang;ZHAO Zheng;SHI Wei;MENG He;SONG Jian-cai
..............page:274-276
Rapid Form Frame-line Detection with Arbitrary Skew Angle
ZHOU Shao-guang;ZHAO Jian-quan
..............page:277-279
Communication Processor's Boot Loader and I/O Interface Driver
LIU Tun-dong;XIE Wei-sheng;YU Qi-qi
..............page:280-282
Web Application Framework Based on Page Container
CHENG Wen-qing;HU Run-qing;XIAO Yu
..............page:283-285
tou gao xu zhi
..............page:封2
Model Checking of Wireless Authentication Protocol Linear MAKEP
LIU Xia;CHEN Wei;PENG Jun
..............page:186-188,212
FB-NBAS: A Flow-based Network Behavior Analysis Model
LI Jun;CAO Wen-jun;LI Yang
..............page:165-167
Security Analysis and Verification of WAPI Access Authentication Protocol (WAI)
LI Hui-xian;CAI Wan-dong;PANG Liao-jun
..............page:163-164,177
Application of Re-encryption Technology in RFID Security
LI Zhang-lin;LU Gui-zhang;XIN Yun-wei
..............page:160-162
Provably Secure Group Signature Scheme with Authorization
ZHONG Jun;HE Da-ke
..............page:157-159,173
Analysis of E-commerce Protocol FONRP Based on ATL
ZHANG Mei;WEN Jing-hua;ZHANG Huan-guo
..............page:151-153
Novel Scheme of Predictive Fast Handovers for Mobile IPv6 Based on Pingpang Handoff
WANG Hong-mei;JIA Zong-pu;ZHANG Junna
..............page:148-150
Anonymous System TreeMix Based on P2P
WANG Meng-meng;DONG Jian-quan;WANG Hong-yu;SUN Chun-lai
..............page:145-147,150
Improved Random Early Detection Algorithm
LI Cheng-huan;ZHOU Hua;CHEN Dong
..............page:139-140,144
Architecture and Implementation of Network Information Management System Based on Content Type
XIA Xiao-zhong;XIAO Zong-shui;FANG Chang-jiang
..............page:136-138
Application of Mobile Agent in Wireless Sensor Networks
WANG Jie-tai;YANG Shao-jun;YU Hai-xun;XU Jia-dong
..............page:133-135
Policy and Modeling of Nested Software Rejuvenation Based on Component
WANG Zhan;ZHAO Yan-li;LIU Feng-yu;ZHANG Hong
..............page:78-80
Research and Design of SOA-based Business Intelligence Platform
LIU Li-heng
..............page:75-77,80
Resource and Environmental Model Composition Method Based on Flowchart
HUANG Hong-sheng;YUE Tian-xiang
..............page:72-74
Research on Software Fault Diagnosis in Software-intensive Equipment
ZHAO Peng;MU Xiao-dong;YI Zhao-xiang
..............page:69-71
Design and Implementation of Remote Sensing Image Processing Based on Design Pattern
MA Jiang-lin;ZHAO Zhong-ming;YANG Jian;YANG Jun;WANG Cheng-yi
..............page:66-68,71
Power Control Algorithm Based on Location Information in OFDM Mode
LIU Fu-qiang;LEI Xiang-dong;QIAN Ye-qing;WANG Xin-hong
..............page:130-132,135
XML-based Network Configuration Management System
ZHANG Xun;YANG Jia-hai;WANG Ji-long;ZHANG Hui
..............page:127-129
Prediction Based Load Balance Algorithm in Context-aware Application Server
XI Min;QI Yong;ZHAO Ji-zhong
..............page:124-126
Research on Buffer Size for Core Routers
YANG Mei-yue;MA Xiang-jie;LUO Min-xuan
..............page:122-123,126
Application of Software Testing Based on CPN Model Derived from UML Modes
LIU Shuo;CHEN Jun-jie
..............page:119-121
Pattern-based CPPVM Parallel Programming
LI Xiao-ying;WAN Jian-yi;HE Shou-wu
..............page:116-118
Research and Implementation of Linux Parasite Access to Dynamic Library
XIA Hong;LIU Li-yu
..............page:113-115
Edge Coloring Model with Matching Restriction
SUN Bo;ZHONG Sheng
..............page:111-112,115
Improved Algorithm of Dynamic Adjustment of Serialization Order
BIAN Yuan;YANG Jing;LU Da-yong
..............page:108-110
Selectivity Estimation of Characteristic Data Spatial Join
GAO Yu;LIU Guo-hua
..............page:105-107
Self-modifying Code Implementation on Godson-X
ZHANG Hao;QIAN Xue-hai
..............page:102-104
k Nearest Neighbor Queries of Moving Objects Based on Networks
GUO Jing-feng;LIU Han-feng;MA Qian
..............page:100-101,104
Design and Implementation of Multi-cluster Job Schedule System
MA Xue-jie;HU Kai;ZHANG Wei;GUO Wen-jing
..............page:97-99
Boundary Pattern Detection of Clusters Based on Statistics Information
QIU Bao-zhi;ZHANG Feng;YUE Feng
..............page:91-93
Intrusion Detection Technology Based on Outlier Mining
HUANG Bin;SHI Liang;JIANG Qing-shan;WU Nan-nan
..............page:88-90
Torrent File Optimization Strategy Based on Merkle Tree in Bittorrent System
LIANG Cheng-ren;LI Jian-yong;HUANG Dao-ying;LI Jian-chun;GAO Xian-cen
..............page:85-87
Test Case Generation Method Based on Reusable Function Component
PAN Li-li;ZOU Bei-ji;CHEN Hao-wen;LU Xin-guo
..............page:83-84,87
Model Decomposition of Pek Without α-Cycle When Functional Dependency Without Inside Conflict
ZHAO Ling-qiang;HAO Zhong-xiao;GU Zhao-peng
..............page:81-82,90
Improvement on Paillier-Pointcheval Probabilistic Public-key Encryption Scheme
JIANG Zheng-tao;LIU Jian-wei;WANG Yu-min
..............page:38-39,42
Optimization of Offset Assignment Problems for DSP with Quasi-PSO Algorithm
SUN Dong-yan;TONG Ji-gang;ZHAO Jia-xiang;CHEN Zeng-qiang
..............page:35-37
Element Path Model: Efficient Method for XML Schema Extraction
ZHANG Hai-wei;YUAN Xiao-jie;YANG Na;WANG Xin
..............page:32-34,37
Efficient Incremental Association Rules Mining Algorithm Based on CAN-tree
ZOU Li-kun;ZHANG Qi-shan
..............page:29-31
Enterprise Engineering Meta-methodology Based on Knowledge and Rule
JI Wen-lu;XIA An-bang
..............page:62-65
GML Spatial Data Query Based on Filter Encoding
MIAO Li-zhi;ZHANG Shu-liang;WU Lan;LV Guo-nian;JIAO Dong-lai
..............page:59-61
Region Matching Algorithm for DDM Based on Dynamic R-tree
WANG Lei;ZHANG Hui-hui;LI Kai-sheng;JU Hong-bin
..............page:56-58
TDOA/AOA Localization Algorithm Based on RBF Neural Network
MAO Yong-yi;LI Ming-yuan;ZHANG Bao-jun
..............page:52-55
Design of Grid Resource Management System Oriented to Information Service
LI Pei-feng;ZHU Qiao-ming;ZHI Li-yan
..............page:49-51,58
Task Scheduling and Matching Based on Self-adaptive Selection Genetic Algorithm
GENG Ru-nian;XU Wen-bo
..............page:43-45,65
Dynamic Self-adaptive Replica Selection Algorithm in High Energy Physics Grid
CHENG Yao-dong;MA Nan;YU Chuan-song;CHEN Gang
..............page:40-42
Three DOF Vision Servoing Method Based on Texture
LIU Xiao-min;ZHU Feng
..............page:24-26
Novel Attacking Locomotion Trajectory in Wireless Sensor Networks
QIN Ning-ning;ZHANG Lin;XU Bao-guo
..............page:21-23,61
Improved Algorithm of Transitive Mode Reputation Value Computing Based on Certain Factor
HAO Li-ming;YANG Shu-tang;LU Song-nian;CHEN Gong-liang
..............page:18-20
Sampling Localization and Refinement Algorithm for Wireless Sensor Networks
YU Ning;WAN Jiang-wen
..............page:12-14,17
New Decision Tree Algorithm Based on Rough Set Model
GAO Jing;XU Zhang-yan;SONG Wei;YANG Bing-ru
..............page:9-11
New Visualization Model of Protein Sequence
XIAO Xuan;SHAO Shi-huang
..............page:6-8
Nonlinear Time Series Forecasting Based on Relevance Vector Regression
LIU Fang;ZHOU Jian-zhong;QIU Fang-peng;LIU Li
..............page:1-2,5