Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2003 Issue 12
Design of network cipher security system
li fei
..............page:86-88
Research of VPN technology
liu yun ling ; yang zuo
..............page:82-85
CMM model and improving software process with it
xiang yang xia ; wang zuo ; mi dong
..............page:126-128
Software autogeneration of communication protocols translator
liu shu ; li jin ; di bo
..............page:123-125,128
Research of data communication by using RS232 in VC
jin wei min
..............page:120-122,34
Design and construction of RS485-bus-aided conference auto-voting system
hu hui ; chen yao he
..............page:117-119
Application of virtual three-dimension technology based on direct3D in building planning
zhang xiu guo ; zhang ying jun
..............page:113-116
Virtual chemical laboatory based on Web
cai hai bin ; yang yue xiang ; liu ping
..............page:110-112
Design and development of GIS
chen hong bing ; lu jin gui
..............page:103-106
Use case model and development of assembly-like software systems
jiang jian min ; li deng xin
..............page:97-99
An enterprise security framework based on PKI/PMI
li zuo zuo ; zhao zheng
..............page:95-96,102
Research and design of E-mail firewall based on SMTP protocol
mi yuan jun ; wang kang ; zhang hong wu
..............page:92-94
Research and implementation of the network information security for the middle and small-sized enterprises
gui hai feng ; xin shang zhi ; chen shi ping
..............page:89-91
Implementation of a system to support e-learning platform
cao jing hua ; wen tao ; liu chun yu ; zou xiang
..............page:78-81
Research on class-valves model based on class state diagram and its application in class testing
wang kai ; zhu xue qin ; chen yong zhang
..............page:73-77
Exception handling scheme of Java
jin song ; qi zuo ; liu jun fei
..............page:65-69
Ant colony algorithm for course examination arrange problem
zhang hua ; wang xiu kun ; sun zuo
..............page:62-64
Technology of complicated face meshing and visualization applied in EMC
zhang deng kui ; qiu yang ; xu she jiao ; tian jin
..............page:58-61
Wormhole routing algorithm of multi-processors with double-layer 2 dimensional-mesh structure
zhang zuo hui ; guo xue li ; zuo han
..............page:56-57,64
Comparision of several gray image digital watermarking algorithm
dang hong mei ; li ren hou ; zuo ying min
..............page:52-55
Simple analysis of network management schemas
shi yong lin ; gao de yuan
..............page:49-51,81
Research and implement of a scanner of holes in CGI
zhang ji cai ; zhang xiang ; wang zuo
..............page:47-48,77
Design and exploitation of a flexible assistant scheduling system: AJ-system
pang qing hua ; zhou bin ; pan yu
..............page:43-46
Comparison of five pointer analysis algorithms
wang zuo ; liu jian
..............page:38-42
Design of info flow simulation in cooperative work system
zheng gang ; zuo xiang lin ; yang yong feng ; wang jun min
..............page:28-30
A distributed storage system based on messaging and queuing middleware
zhang jin yu ; li xiao ming
..............page:21-27
Study of segmentation technique for colonscopic image based on stochastic clustering
zhu dan zuo ; xia shun ren ; lou xiao min ; zhou le ping ; zhang guo xiong
..............page:18-20,69
Design and implementing of intelligent application server protocol iASP
liao yuan ; wang bao jin ; li ming shu ; wang qing
..............page:13-17,61
Researches on active queue management
wang ya lin ; wang zhong ; zhang hong yuan ; peng hai qing
..............page:1-5,88