Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2008 Issue 7
Energy Efficient Routing Algorithm for Wireless Sensor Networks
YUE Shi-cheng;WANG Pei-kang
..............page:113-114,117
Network Management System Based on CORBA and Mobile Agent
WANG Yu-jian;BAO You-wen;TONG Jian-xin;YUAN Jia-zheng
..............page:110-112
Minimum Cost Fuzzy Decision System and Related Algorithms
YUAN Xiao-feng;XU Hua-long;CHEN Shu-hong
..............page:200-202
Bio-entity Recognition Based on Combination of Conditional Random Fields and Contextual Cues
YANG Zhi-hao;LIN Hong-fei;LI Yan-peng
..............page:203-204,208
Connectivity-based Localization Algorithm for Sensor Networks Nodes
LI Shan-liang;HUANG Liu-sheng;WU Jun-min;XU Hong-li
..............page:115-117
WLAN Indoor Coverage Distribution System Module
ZHU Yu-hong;XU Chang-qing
..............page:118-119,122
Design and Implementation of Anycast Service in Mobile IP Network
WANG Xiao-nan;QIAN Huan-yan
..............page:120-122
Research of Tactical Data Link Network Architecture
WANG Wen-zheng;ZHOU Jing-lun;LUO Peng-cheng
..............page:123-125
Worm Containment Model Based on Negative Selection
HONG Zheng;WU Li-fa;WANG Yuan-yuan
..............page:126-128
Threshold Shared Verification Signature Encryption Scheme Based on Elliptic Curve
WANG Jie;ZHANG Jian-zhong
..............page:129-130,144
Fast IP Traceback Schemes Based on Variational Probability
LU Feng;ZHENG Kang-feng;NIU Xin-xin;YANG Yi-xian
..............page:131-133,136
SIRS Worm Propagation Model and Its Analysis
PENG Jun-hao;XU Guo-ai;ZHU Zhen-rong;YANG Yi-xian
..............page:134-136
Secure Web Services Discovery Method Based on Access Control
HAN Jun;HUAI Xiao-yong;ZHAO Chen
..............page:137-138,141
Detection and Defense Technology of Wormhole Attacks
CHEN Jian;ZENG Fan-ping
..............page:139-141
Relativity Based Image Steganography
ZHANG Jun
..............page:142-144
Research on Report Attack Detection in Sensor Networks
CHEN Guo-qi;HUANG Jun
..............page:145-147,170
Improved Probabilistic Packet Marking Scheme
ZHANG Li-li;CAO Tian-jie;TANG Li-juan
..............page:148-150
AODV-based Intruder Identification Protocol for MANET
LIANG Kun;ZENG Fan-ping
..............page:151-153
Provable Security Mobile Agent Routing Protocol
TIAN Xu;LIU Ren-jin;CHEN Ming-hua
..............page:154-156
New Trojan Horse Communication Model Based on WebMail System
WANG Juan;GUO Yong-chong;WANG Qiang
..............page:157-159,170
Mandatory Access Control Mechanism of Executable Program Under LSM
LIU Wei-peng;HU Jun;LV Hui-jun;LIU Yi
..............page:160-162
Reconfigurable Design for Encryption/Decryption of AES Based on FPGA
WANG Jian-yu;ZHANG Lu-guo
..............page:163-164,167
Secure Access Control Scheme for Peer-to-Peer Networks
WANG Xiao-ming
..............page:165-167
New One-off Public Key System
LI Yi;ZHANG Shao-wu;ZHUANG Yuan-yang;CAO Yong-gang
..............page:168-170
PLC Encryption Control System of Hydraulic-brick-machine Based on FPGA
WANG Ji;LUO An;ZHANG Jing;XU Ming
..............page:171-172,175
Distributed Design and Realization of Security Mechanism in Core Router
HU Yu-xiang;LAN Ju-long;CHENG Dong-nian;WANG Hao-xue
..............page:173-175
Particle Swarm Optimization Arithmetic Based on Hybrid Information
HUANG Hui-xian;CHEN Zi-bin
..............page:176-177,183
Application of Improved Particle Swarm Optimization Algorithm in UCAV Path Planning
YE Wen;ZHU Ai-hong;FAN Hong-da
..............page:178-180
New Adaptive Particle Swarm Optimization Algorithm
LIN Chuan;FENG Quan-yuan
..............page:181-183
Fault Diagnosis Technology Based on PCA and Neural Network
WANG Wei;WANG Rong-jie;HU Qing
..............page:184-185,188
Fault Diagnosis in Flight Control System Based on Improved Algorithm of Neural Network
LIU Xiao-xiong;ZHANG Wei-guo;LI Guang-wen
..............page:186-188
Image Registration Based on Wavelet Transform and Hybrid Optimization Algorithm
ZHANG Qian;YANG Jing;JIA Ding-ding
..............page:189-190,193
Distributed Multi-level Directory Based NetFlow Flow Data Retrieval
JIA Guan-xin;YANG Bo;PENG Li-zhi
..............page:107-109
Artificial Fish School Algorithm for Finding the Largest Module of Roots of Polynomial
WANG Dong-dong;ZHOU Yong-quan
..............page:194-196
Configuration Problem Solving Method Based on Non-binary Constraint Satisfaction
SHAN Mi-yuan;YUAN Ji-jun
..............page:205-208
Event-triggered Sensor Network Time Synchronization Algorithm Based on Skew Calculation
WEI Nuo;GUO Qiang;LI Chun-jie;LIU Rui-xia;KONG Xiang-long
..............page:95-97
Data Cleaning Technologies for RFID Network
XUE Xiao-ping;ZHANG Si-dong;WANG Xiao-ping;CAO Xiao-ning
..............page:92-94,97
Application of Host Identity Protocol in Heterogeneous Wireless Network
WANG Quan-li;FU Yan
..............page:87-88,91
Research on High Performance Implementation Mechanism of GOTOBLAS General Matrix-matrix Multiplication
JIANG Meng-qi;ZHANG Yun-quan;SONG Gang;LI Yu-cheng
..............page:84-86,103
Approach for Extracting Thematic Terms Based on Association Rules
LIU Fei;HUANG Xuan-jing;WU Li-de
..............page:81-83
Integrated Case-based Reasoning and Its Application in Diseases Diagnosis System
YU Juan;NI Zhi-wei;LUO Qin
..............page:209-211
Behavior Recognition Method in Complex Environment Using HMM
ZHANG Li-jun;WU Xiao-juan;SHENG Zan;QI Lei
..............page:212-214,228
Fingerprint Recognition Algorithm Based on Two-dimensional Principal Component Analysis
JIN Li-li;LI Yong-ping;WANG Yong-xu;WANG Lin
..............page:215-217,220
Half Face Recognition Scheme
DONG Shi-du;HUANG Tong-yuan;WANG Hua-qiu;WANG Sen;YANG Xiao-fan
..............page:221-222,225
Prediction Financial Distress of Firms Based on GA-SVM
CEN Yong;ZHONG Ping;LUO Lin-kai
..............page:223-225
Real-time Moving Object Segmentation and Retrieval Algorithm
XIAO Guang;SHI Xu-li
..............page:226-228
Extraction Method of Texture Features Based on Multi-layer Ideal Filters
LIU Qiong;ZHOU Hui-can;WANG Yao-nan
..............page:229-231
CircleSearch: P2P Search Algorithm in Streaming Video-on-Demand Environment
LIN Qing-song;XIONG Yan;ZHANG Wei-chao
..............page:232-234,237
Research and Design of Low Rate Reconfigurable Vocoder
JING Tao;WANG Qin;ZHAO Hong-zhi
..............page:235-237
Dynamic Rate Control Scheme for JPEG-LS Image Compression
XU Yan-ling;LIU Bei
..............page:238-239,271
Reliability Design and Analysis of DC Power Distribution Box
GAO Cong-ying;LI Xi
..............page:240-242,256
Evolvable Hardware Based on Virtual Reconfigurable Circuits
DING Guo-liang;YUAN Liang;ZHAO Qiang;ZHU Jie
..............page:243-244,256
Clock Synchronization in Multi-FPGA Designs
SONG Wei;FANG Sui-ming;YAO Dan;ZHANG Li-chao;QIAN Cheng
..............page:245-247
Real-time Hardware Face Detection Based on Adaboost Algorithm
TANG Qi;SU Guang-da
..............page:248-250
Design and Realization of Data Storage Module with U-Disk Based on Index File
DONG Pei-chen;SUN Zhen-guo;CHEN Qiang;ZHANG Wen-zeng
..............page:251-253
Reliability Analysis of Avionic System Based on Vague Fault Tree
ZHANG Chao;MA Cun-bao;SONG Dong;XU Jia-dong
..............page:254-256
Aero Engine Numerical Simulation Platform Based on VC++ Language
WU Yu;YU Long-jiang;PIAO Ying
..............page:257-259
Imitation Development Platform of Computer Monitor System
MA Yu-chun;LIU Jie-min;SUN Chang-sheng
..............page:260-262
Application Integration of Shipbuilding Virtual Enterprise with SOA and Web Service
LI Yu-gang;JI Zhuo-shang;LIN Yan
..............page:263-265
Structure of GNSS Software Receiver and Its Realization
ZHANG Ting;CHEN Xiu-wan;ZHU Zhuang-sheng;ZHANG Li-na
..............page:266-268
Monitor and Alarming System over Internet Based on Push Technology
SUN Jun-man;FANG Hua-jing;SUN Hui-jun;ZHANG Mei-feng
..............page:269-271
Implementation of Guide and Measure System in Emulational Environment of Command Control
FENG Qi;YU Xin-sheng;TANG Li-ping
..............page:272-274,277
Optimization and Scheduling of ICAI Instruction Pattern Based on Association Rule
LIU Yan;LU Yu-chang;CHEN Hai-hong
..............page:275-277
Novel Label Placement Algorithm in Digital Map——Grid Method
ZHAO Jing;LUO Xing-guo;ZHANG Ru-yun
..............page:278-279,282
Design and Development of Dynamic Vehicle Scheduling System
CAO Jian-dong;ZHENG Si-fa;LI Bing;XIA Heng;LIAN Xiao-min
..............page:280-282
tou gao xu zhi
..............page:封2
Design and Implementation of Network Management System for Next Generation Internet
YANG Liu;LI Zhen-yu;DU Ning;ZHANG Da-fang;XIE Gao-gang
..............page:104-106
Research on P2P Overlay Network Based on DHT
LI Pu-cong;WEI Wen-hong
..............page:101-103
Improved DSMCast Scheme of DiffServ Multicast
LI Ming;ZHOU Jie;GAO Xue-song;LIU Hui;LIU Shu-ying
..............page:98-100
Analysis of DataWindow Frame Based on Ajax
WANG Dong;SUN Bin
..............page:79-80,83
Implementation of MathML-based Web Mathematical Expressions Editor
ZHAO Yan-juan;LI lian;SU Wei;LI Guan-yu
..............page:76-78
Application of Bidirectional Semi-order Net in Best Path of Two Nodes
LIU Li-jia;SHENG Ye-hua;LU Ming-yue;CHEN Min;HUANG Yun
..............page:73-75
Model of Mining in Risk Estimation Information of ERP Implementation Based on Web
ZHU Zong-qian;JI Hao;YANG Dong-min
..............page:70-72,75
Data Storage Management System in Nodes of Wireless Sensor Network
YE Dun-fan;ZHOU Fei-fan
..............page:67-69
Implementation of Optimized Array Data-flow Analysis Technique
JIANG Fan;PANG Jian-min;ZHAO Rong-cai;REN Hua
..............page:64-66
Design and Optimization of Retargetable Instruction Set Simulator
HAN Xiao-kun;JIANG Lie-hui;YIN Qin;CHEN Liang;ZHOU Bo
..............page:61-63
Communication Optimization Based on Elimination of Linear Inequalities
LIU Lei;ZHAO Rong-cai;GONG Xue-rong
..............page:59-60,63
Deep Web Sources Focused Crawler
LIN Chao;ZHAO Peng-peng;CUI Zhi-ming
..............page:56-58
Pruning Method of URL Index Model Based on CPat-Tree
ZHAO Ze-yu;YAN Hua
..............page:53-55
Improved Risk Evaluation Model in Software Project Investment
FENG Nan;LI Min-qiang;KOU Ji-song;FANG De-ying
..............page:50-52,55
Design and Implementation of Universal Management System Based on Roles and Scopes
ZHANG Chen-xi;LI Jiang-feng;LIU Yi;ZHAO Wei-dong
..............page:47-49,58
Symmetry Intelligent Nesting Based on Graph
ZHANG Yu-ping;LI Xin;CHEN Huai-li;JIANG Shou-wei
..............page:44-46
Construction Approach of Large-scale Corpus Based on Web
LI Pei-feng;ZHU Qiao-ming;QIAN Pei-de
..............page:41-43,46
Object Recognition Based on Part Vocabulary
WEN Ming;HAN Hui;WANG Lei;ZHUO Qing;WANG Wen-yuan
..............page:38-40
Trustworthiness Measuring Model for Subject's Behaviors
ZHOU Zheng;LI Jian;ZHANG Jun
..............page:35-37
Multiple Robots Cooperative Pursuit Based on Motor Schema
ZHOU Pu-cheng;HAN Yu-sheng;XUE Mo-gen;HONG Bing-rong
..............page:32-34
Ego Motion Measurement of Monocular Zooming Camera Based on Calibration
ZHANG Xiao-miao;SHANG Yang;YU Qi-feng
..............page:29-31,37
Adaptive Variety-pattern Search Algorithm
ZHANG Ming;BI Du-yan
..............page:26-28
Convergence Degree-based Dynamic Hierarchical Routing Algorithm
SUN Ting;LU Dong-xin;YANG Yong-tian
..............page:23-25
Document Similarity Strategy Based on Document Index Graph Model
GAO Mao-ting;WANG Zhen-gou
..............page:19-22
Analysis of Electronic Voting Protocol Without Authority
LI Yun-feng;HE Da-ke
..............page:17-18,22
Ad hoc Network Troubleshooting Method Based on Dempster Rule
LI Qian-mu;HOU Jun
..............page:14-16
Comparison of Variable Precision Covering Rough Set Models
SUN Shi-bao;LIU Rui-xin;QIN Ke-yun
..............page:10-13
Two-dimension Force-directed Schedule Algorithm for RFCC-VLIW Architecture
ZHOU Zhi-xiong;HE Hu;ZHANG Yan-jun;YANG Xu;SUN Yi-he
..............page:7-9
Blue Whale Distributed File System Metadata Service
YANG De-zhi;XU Lu;ZHANG Jian-gang
..............page:4-6,9
Choice of Edge-preserving and Sparse Prior Models in Image Restoration
WANG Guang-xin;WANG Zheng-ming
..............page:1-3