Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2005 Issue 1
A Solution to Multiple-Instance Workflow Pattern
chen da feng ; wu quan yuan ; liu jiang ning ; liu bi xin
..............page:89-92
Research and Implementation of the CCM Component Technology
zuo lei ; wu quan yuan ; jia yan
..............page:87-88,101
Theory, Design and Implementation of the ASN.1 Encoder/Decoder Based on BER
yu ying ; fan hui ; jian chun lei
..............page:83-86
The Current Situation and Trend of the RAS Technology in High Performance Computers
jiang ju ping ; pang zheng bin ; zhou xing ming
..............page:80-82,92
Development of an Alarm and Command System for Fire Fighting Based on UML
zhang zhi bin ; chen hong sheng
..............page:77-79
A Classification Model Based on Fuzzy Integrated Estimation and Its Application
zhang li juan ; li zhou jun ; chen huo wang
..............page:74-76
On Branch Management and the Collaboration Mechanism of Software Configuration Management
chen fan ; yin li ming ; xiao wei jun ; shen quan yong
..............page:70-73
A Survey and Evaluation of Agent-Oriented Software Development Methodologies
zuo zuo ; mao xin jun ; wang huai min ; zhu hong ; qi zhi chang
..............page:67-69
Design and Implementation of BSP in the Embedded Linux
yang fu min ; wang peng yu ; tu gang
..............page:64-66
Design and Implementation of the LEAP Compiler Based on LCC
li bao feng ; zuo yong ; zhou xing ming
..............page:61-63,66
The Interface Technology of Asynchronous FIFOs Based on Gray Code and Its Application
wang dong ; ma jian wu ; chen shu ming
..............page:58-60
The CMOS Circuit Design of a High-Speed Floating-Point Multiplier
hao zhi gang ; zeng xian jun ; li guo kuan
..............page:54-57
Research and Implementation of the Multi-Functional Chip's Control Module in Embeded Systems
hu guan rong ; huang xiao feng ; tu gang
..............page:51-53
A Survey on Clustering Algorithms in MANETs
hu guang ming ; jiang jie ; gong zheng hu
..............page:48-50,53
Research and Design of the QEA Encryption Algorithm
lv jun huai ; wang bo ; liu jian yun ; chen hou qiao
..............page:46-47
Design of a Network-Based Computer Skill Test System
zhan ying
..............page:40-41,57
Spatial Data Integration Based on the Spatial Information Grid Services
fu bing ; liu yun xiang ; chen zuo ; tang yu
..............page:38-39,86
On the Natural Language Interface to Database Query
yu long ; yin jian ping ; zhang guo min
..............page:36-37,76
Research on the Architecture of a Computer- Generated Forces Platform
zheng yi ; li si kun ; zeng liang
..............page:31-35
Detecting Fast Motion Objects Based on Mathematical Morphology
wang zhi yong ; liu wen qi
..............page:27-28,45
A Dual-Watermark Algorithm Based on Wavelet Transform
xu bin ; wang run sheng
..............page:24-26
A Remote Maintenance System Based on Progressive Transmission and Dynamic Region of Interest
liu qing bo ; li guo hui ; tu dan
..............page:19-21,26
Automatic Business Processing and Transaction Processing Based on .NET
chen chuan bo ; zhang yong
..............page:1-2,5
A Scheme for Protecting Rightful Customers' Rights Based on Digital Watermarking and Digital Signature
chen xiao su ; lu zuo ; liu li gang ; xiao dao ju
..............page:3-5
Research on the Path MTU Discovery Problem Based on Firewalls
chen na ; li zhi tang
..............page:9-10,73
Security Tool Kit Design
zhu zheng jian ; ning hong
..............page:11-13
LDAP-Based Unified User Identity Management Technology in Digital Campuses
zhang hui ; yang yue xiang ; wang shi lin
..............page:14-16,35
A(t0,t1,t,n)-Threshold Signature Scheme Based on RSA
zhang peng ; xu qiu liang
..............page:17-18
Implementation and Management of an iSCSI Storage System over Different OSs with Multiusers
lu xiu zhuo ; xie chang sheng ; ren jin
..............page:93-95
Application of the Variable Precision Rough Set Model in Decision Tree Construction
wang ming yang ; wei jin mao ; yi wei guo
..............page:96-98
Research of the Design Pattern Detection Based on the Java Source Code
xu zheng quan ; dan lei lei
..............page:99-101
Study on the Supply-Chain-Oriented Production Planning Model
lin zhong xu ; lin zhong wei
..............page:102-104,110
Application and Analysis of the Network Traffic Flow Technology
tian dong ; dong de cun
..............page:105-107
A Load Scheduling Algorithm of the FTP Virtual Server System
shang yan yan ; chen guo long
..............page:108-110