Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2011 Issue 8
Distributed Spatial Join Query Based on Kd-Tree Recursive Partitioning
ZHAO Qing-Hua;CHEN Luo;JING Ning
..............page:167-172
Research on Parametric Modeling of Airport Virtual Scenes
WANG Li-wen;ZHOU Zhi-nan
..............page:95-101
Design of a Wireless Sensor Network Management System Based on NETCONF
WANG Jin-yi;YAN Bao-ping
..............page:1-7
Realtime Shallow Water Rendering Based on the Irrlicht Engine
LI Yi-bing;ZHANG Li-xue;MENG Ting
..............page:102-105
A LWAP-Based Smooth HandoffMechanism for IEEE 802.11 Networks
PEI Wei-Jun;CHEN Bing
..............page:33-38
Design and Implementation of the Chassis\'s Fault Diagnosis Expert System
LENG Xiao-yan;ZHAO Hao;ZHANG Yi
..............page:190-194
The Post-Processing Technology of Finite Element Simulation Based on Direct3D
GAN Hai;DONG Xiang-huai
..............page:122-127
A Trust Management Mechanism Based on Time Decay and Feedback in Web Services
GONG Wen-tao;XIA Ling-yun;HONG Tao
..............page:70-73
On the Analysis and Optimization of Network Admission Control Systems
YU Wei-wei;LU Ze-xin;KANG Dong-ming;WU Jian-guo
..............page:39-44
A Stream Implementation of Transform Encoding in HD H.264
SU Hua-you;WU Nan;WEN Mei;REN Ju;WU Wei;ZHANG Chun-yuan
..............page:148-153
A Method for Distributed Spatial Metadata Retrieval Based on Directory Services
HU Ming-ming;TANG Yu;LI Jun;CHEN Hong-sheng
..............page:162-166
A Variable-Size Block Matching Based Color Correction Method for Multi-View Video
YU Li;XIONG Wei;ZHONG Gang;DENG Hui-ping
..............page:138-142
Research and Implementation of a Fault Tolerant Compiler Based on GCC
WANG Fa-hong;ZHOU Hui-ping;JIA Li-li;HE Tao
..............page:89-94
A Network Security Situation Awareness Model Based on Stream Cube
CHENG Wen-cong;ZOU Peng;JIA Yan
..............page:8-13
Identification of Traffic Signs Based on the Hopfield Neural Network
YANG Shou-jian;CHEN Ken
..............page:132-137
Analysis and Verification of the FMM Algorithm Based on the Cell/B.E.Processor
TANG Zhen;ZHANG Zhuo;CHAI Ya-hui;XU Wei-min
..............page:79-83
Investigation and Implementation of Freehand a Vecterization Technology
YANG Yu-lai;WANG Yu-mei
..............page:128-131
Research and Implementation of a Process Checkpoint Technology That Supports Database Access
WEI Zhong-wei;CHEN Hai-tao;WANG Qiang;SHEN Zhi-yu
..............page:84-88
An Edge Detection Algorithm Based on Improved Morphologic Operators
MENG Ting-ting;YU Liang;LI Shou-min;CHEN Xue
..............page:112-116
Research of Embedding onto Exchanged Hypercube Networks
LIANG Jin-ye;LIANG Jia-rong
..............page:74-78
A QoS Scheme of Next Generation Campus Network Based on Traffic Identifications
LIU Zi-yan;HUANG Yi-cheng;HU Feng
..............page:58-62
Research on Fast Inter-Prediction Mode Decision for AVS-M
YANG Dan;YAO Wei-xin;ZHOU Ming-zheng
..............page:158-161
A 3D Virtual Sound Synthesis System Based on the TMS320C6416 Chips
KANG Xuan;FU Zhong-hua;JIANG Dong-mei;TIAN Xiao-hai;XU Ming;WANG Bo
..............page:143-147
An Adaptive Gradient Edge Detection Algorithm Based on Wavelet Transformation
JIN Huan-di;WANG J un-feng;ZHANG Xu-bo;YANG Yong-yong
..............page:117-121
Vulnerability Tree Modeling for Host Security Attributes by Efficiency Priority
LU Zhi-yong;JIANG Liang;TANG Chao-jing
..............page:45-52
Study and Application of the Integration of Struts and Web Services
WANG Chuan-li;LI Jin-cai;WU Yi-tao
..............page:181-184
Simulation and Analysis of Large-Scale BGP Prefix Hijacking
WANG Jun-qiang;MAO Yu-gang;ZHU Pei-dong
..............page:19-26