Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2004 Issue 4
Simulation and design of circuits based on Multisim
wang ting cai
..............page:654-656
Design of telecommunication NMS with object-oriented
wang ; xu cheng dong
..............page:546-549
Research of secure mechanism in Internet key exchange (IKE)
chen zhuo ; zhang zheng wen ; wang rui min
..............page:540-542,549
Application & research of sniffer technology in network management
chen qian ; ma jian feng ; jiao zheng ; xu hua hu
..............page:536-539
Two approaches of designing and displaying pictograph function in VFP
zhao yue ai ; zhao zhong xiao
..............page:533-535
Research and design of reporting engine based on MS-Excel
chen guo hua
..............page:526-529
Effective algorithm for 3D solid reconstruction
li ru ; wang jian qi
..............page:523-525,653
Mobile IP (IPv6) based on cellular wireless network technology
zhang quan xin ; song zuo tao
..............page:520-522,649
Intrusion detection based on algorithm of multi-decision tree
shi chang qiong ; yi ang
..............page:518-519,529
FCM and aiNet methods in data cluster
jiang jia fu ; luo xiao ping ; tang xian zuo ; zhu jin hao
..............page:515-517,588
Research on knowledge integration technology of CAD/CAPP/CAM based on feature
zhao fu qing ; yu dong mei ; yang ya hong
..............page:512-514
CP-PRA--Fault-tolerant real time scheduling based on checkpointing scheme
zhang zhi chao ; sang zuo ; xiong guang ze
..............page:508-511,602
NIOS based SOPC design
fang zhuo ; peng cheng lian ; chen ze wen
..............page:504-507
Design and implement of embedded computer system
an jun she ; sun cai ; liu yan qiu ; xin min cheng ; zhou sheng yu ; sun hui xian ; he hua can
..............page:501-503
Research of structure of information intelligence integration chain-group
qian xu ; peng su ping ; ning shu nian ; li chen
..............page:493-495
Design and implementation of iSCSI storage solution
yu sheng sheng ; liu jun ; jiang ming hua
..............page:486-489
Off-line electronic cash scheme embedded expiry
ma chun guang ; yang yi xian ; hu zheng ming
..............page:484-485,500
Research on Web multimedia courseware system based on.NET
wang hai dong ; zhao
..............page:550-553
Research and implement on firmware of DVD video player
xie chang sheng ; ding hong ; huang hao
..............page:554-556
Object-oriented analysis in KMS
an shi hu ; fan ming qu
..............page:557-560
Genetic algorithm to FDP
wu yong ; guo jing lei ; wei chang hua
..............page:561-563
Study on computer vision-based approaches to estimate positionand orientation of unmanned helicopter
liu shi qing ; hu chun hua ; zhu ji hong
..............page:564-568
Research on heuristic algorithm in multi-constraints QoS routing
zhu wen zuo ; zhang de xiang ; chen ya lin
..............page:569-571,578
Architecture J2ME for mobile telephone application
zuo yong ; chen zuo
..............page:572-574
Research on messaging service for enterprise software systems based on CORBA
wang cheng yao ; xie xu hua
..............page:575-578
Researches on mobile Agent system security
zhao jin ; yuan chun feng
..............page:579-582
Implementation technologies of object based on embedded JavaScript
yang fu min ; cao jia yin ; hu guan rong ; zhou zheng yong
..............page:583-585
Comparison and analysis of IPSec-based and SSL-based VPN
xu jia zhen ; chen zuo meng
..............page:586-588
Analysis and comparison of Java technologies in development of distributed applications
huang xiao qin ; li xing xing ; zhu qing sheng
..............page:589-592,595
Managing denial of service attacks based on survivability
liu jian qiang ; wang zuo ; xiang yang xia ; wang chang sheng
..............page:593-595
Application analysis of DNS technology
tan ming jia
..............page:596-598
Security model of DiffServ network based IDS and IPSec
lin peng ; zhang gen du ; jing jin hua
..............page:599-602
Web service and SET protocol based payment system
zheng xiao mei ; mao lei ; xia yang
..............page:603-605,608
Electron tax system based on J2EE technology
deng hai wei ; xu qiu liang ; wang zhong tian
..............page:606-608
Activity-centered software process metamodel
zhang ying ; shi hai hu ; liu jun fei
..............page:612-615
Design and implementation of enterprise vulnerability management system
zhao li ; lin zhong
..............page:616-618
Design and realization of conference system based on IP video phone
xiong ping hua ; yang jian gang
..............page:619-621
Programming architecture for multimedia applications implemented on VxWorks
zhong hong quan ; zhu qun xiong ; li fang
..............page:622-624
Two-step method for region labeling and edge detection based on markov neural networks
zhang ze biao ; li shi ju ; cheng min
..............page:625-628
Management and implementation of tree-based knowledge in ITS
zhang yan gu ; xu guan dong
..............page:629-631
Application of multi-thread technique in visual basic.Net
wu yun gao wa
..............page:632-633,636
Design of general tax-chackage system
yang zhi
..............page:637-639
Remote exam system based Java
wang xiao fan ; yao quan zhu
..............page:640-641,645
Design of integrative signal source for shipboard weapon systems
yuan sheng zhi ; zhao jian jun ; liu ai dong ; yu wei
..............page:642-645
Design of simulating and testing system for an unnamed training missile based on WIN32
meng ling po ; du hai wen ; zhao hui ; ma hong bin
..............page:646-649
Implementation of intelligent node in system of complicated measuring and controlling equipments
shi xiao hong ; zuo xian zhang ; liu jun tao ; yuan liang
..............page:650-653
Distributed model of intrusion detection system based on immunology
qi ; zhang zuo ; liu feng yu ; zhong yi
..............page:481-483,563