Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2004 Issue 3
Compiling Optimization on Code Lengths in Embedded Systems
jiang wei hua ; ma guo kai ; zhang qin feng ; zuo bin yu ; zhu chuan zuo
..............page:102-109
Design of Device Drivers Based on WDM
shen li xiang ; guo mai cheng ; huang zhao xiang ; chen zhong ju
..............page:94-97
Research and Analysis on Program Characteristics of Multimedia Applications
peng shao liang ; zuo yong ; li zuo zuo ; jin li zhong
..............page:98-101
Research on the Simulation Engine for theEfficiency Evaluation of C3I Systems
gu xi zuo ; ling yun xiang ; qiu di shan ; wang zhi yong
..............page:90-93
The Representation of Knowledge in IntelligentComputer-Assisted Instruction
tong hong xia ; xie shen quan
..............page:87-89
Application of J2EE with UML in Enterprise Systems
ning bo
..............page:82-86
Derivation Set Tracing for the Transformation Diagram Based on Wivern
dai chao fan ; yang qiang ; deng su ; chen wen wei ; liu qing bao
..............page:76-78
A Seismic Signal Processing Software System
song jiang jie ; zeng xin wu
..............page:74-75,78
Materialized View Maintenance in Data Warehouse Environments
shen bo ; pan jiu hui
..............page:69-73
Schema Mapping in Multidatabase Systems
li rui xuan ; lu zheng ding ; xiao wei jun ; li bing
..............page:65-68
A New Unicast-Based Fault-Tolerant MulticastAlgorithm for Large-Scale Mesh Networks
wang gao cai ; chen jian er ; chen song qiao
..............page:61-64
A New Classification Method Based on Fuzzy Rules
huang xiao bin ; wan jian wei ; zhang yan
..............page:57-60
A Method of Edge Detection Based on Canny′s Regulations for Granular Images
shi chang qiong ; yi ang
..............page:52-54
Performance Analysis of the Group Key Management Protocols in Mobile Ad-Hoc Networks
kuang xiao hui ; zhang nian ; hu hua ping
..............page:4-7
Design and Implementation of a Safe Cache in IP-SAN
xie chang sheng ; dai ming
..............page:1-3,28
The Buffer Management Model in an Uncompressed Digital Playing System for TV Stations
wang shuo ; zhang jiang ling
..............page:49-51,54
Real-Time Video Transmission Based on BACnet
yang xiao he ; hui xiao shi ; liu xian de
..............page:45-48
Research on the Statistical Characteristics of the Unipixel Gray Value of Natural Images
tan yu song ; zhou xing ming
..............page:42-44,48
Research of Removing the Image Noises Based on Texture Analysis
bai xiang hua ; zhu qi jiang ; tang shi hao ; shuai yan min
..............page:39-41
Discrete Smooth Interpolation in 3-D Surface Reconstruction from Contours
zheng wen gang ; zhao chun jiang ; wang ji hua
..............page:35-38
Windows NT-Based IPv6 Construction and Application Development
tong zhuo ; li zuo
..............page:32-34,38
The I/O Workload in Network-Attached Storage Environments
wang fang ; feng dan ; zhang jiang ling
..............page:25-28
Research on Denial of Service and IP Traceback
dong ling ; chen yi min ; zhu zheng jiang
..............page:18-20,24
The System Based on the Conception of Network Cybernetics and the Related Analysis
lu zuo ; wang yu ; wu zhong wang ; yang jian kang
..............page:14-17,28
Using CORBA to Implement a Network Management System Based on SNMP
liu zuo ; xu zhi gen
..............page:11-13
Design and Implementation of the H.323 Gatekeeper Component Based on COM
zhang yong ; zou zuo chang ; xu li na
..............page:8-10,28