Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2004 Issue 7
Application of PKI by ECC
zhang qing sheng ; ye zhen ; zhou bing bin ; li zhi liang ; guan shui neng
..............page:1229-1231
Application of web services technology in B2B integration
jia chun xiu ; cheng liang yu ; du hui
..............page:1226-1228,1231
Automatically efficient fairing algorithm for NURBS curves
jiang ling yu
..............page:1223-1225
Vehicle tracking based on genetic alogorithms clustering
zhou zhi yu ; wang ya ming ; huang wen qing ; zhu guang hui
..............page:1218-1219,1222
Pattern based audio-stream segment and control system
shen le jun ; cheng xiao ping
..............page:1211-1213
Knowledge base designing based on modularization
qian xuan ; zhao ke ; li kai
..............page:1208-1210
Solution of job shop problem based on self-adaptive heuristic algorithm
duan ya nan ; he zuo ; zuo bin sheng
..............page:1206-1207,1217
Real data process of internet- based power monitor system
zheng qian yi
..............page:1204-1205,1217
Ubiquitous computing and its location-aware system
fu wei quan ; sun zhi ren ; cao qi ying
..............page:1200-1203
Master station software design of electric power remote monitoring and management system based on CAN-bus
jiang yue chun ; zuo zhao sheng ; zhang xiang cheng ; gao yun peng
..............page:1197-1199
Realization of kalman filtering algorithm of two dimensions in aerial information processing system
yue cheng qing ; gao jin feng ; zuo zhi yang
..............page:1195-1196,1213
Synchronizable test sequences generation methods in statecharts
qiao mu ; zeng yi ; lin hong
..............page:1188-1191
System-prototype of visual data mining based on OLAM
liu xu chong ; lei wei jun ; zeng xiao jun ; zhu jing ; chang yan hua
..............page:1185-1187
Design of decision support system oriented to CRM based on data warehouse
yang bin bin ; zheng xiao zuo
..............page:1182-1184
Query semi-structured for data on web
shen xiao juan ; liu yuan
..............page:1178-1181
Achieving query and scan for remote data and image with custom-built control
li jian yong ; meng xin ; hu zuo
..............page:1175-1177
Study and implementation based on clustered-parallel VOD system
liu zhi ming ; tao yang ; tan yu bo ; peng yu xing
..............page:1076-1079
Framework for product creative design platform
fan chong gui ; wen gui hua ; wen jun ; ding yue hua
..............page:1074-1075,1079
Divide-and-conquer algorithm to generate gray code
song chuan ming ; wang xiang hai
..............page:1072-1073
New scheme of intelligent tolling system for expressway
qiu yan ; qin sheng ping ; sun xiao zhong
..............page:1080-1081,1115
Internet communication application in internet universal laboratory system
huang zhou zuo ; huang wen da
..............page:1082-1085
Research and development of unit-data based on XML
wang jin tao ; bai nai xia
..............page:1086-1088,1103
Effective testing strategy for object-oriented system
zhu xiao jun ; gao jian hua
..............page:1107-1110,1113
Application and research of GIS in sewage design and management
yuan guo bin ; hu da
..............page:1111-1113
New algorithm for finding vertices-constrained shortest path
zhong zi fei ; huang shui song ; wu lei
..............page:1114-1115
Knowledge management in small and medium-size software corporations
liu kuan hong ; yin ren kun
..............page:1116-1119,1126
Research on methodology of fuzzy retrieving
huang yan juan
..............page:1120-1121,1123
Study kind of new way of improving J2EE project efficiency
li jing ; huang guo qing
..............page:1122-1123
Research of agent technique in jini architecture system
ding jun ming ; wang ze bing ; chen hai yan
..............page:1127-1129
Performance analysis of mobile ad hoc network routing protocol
xiao shu cheng ; tang xue wen ; wang kang ; zou zong hui ; luo zuo
..............page:1133-1136
Penetration to network security
li yi ; li xin ming
..............page:1137-1139
Research on applying UML to analyze agent-oriented system
weng wen yong ; wang ze bing ; feng yan
..............page:1140-1142
Study on computer vulnerability taxonomy
yang hong lu ; liu hai yan
..............page:1143-1145
Soft-switch technology
zhang mao yao
..............page:1146-1149,1191
Wireless access and terminal mobility in CORBA
zheng da zhi ; chen jian xun
..............page:1150-1151,1181
Software agent technology and analysis of reference architecture based on FIPA
zuo rui xin ; wu shu zuo
..............page:1152-1155
Design and implementation of large-scale radius server
tang lei ; jin lian fu
..............page:1159-1161
Realization of office automation system based on lotus domino/notes
liu qiang ; bai yun qiao
..............page:1162-1163
BP neural network modeling for futures foresting
wang ke ming ; yang jian gang ; zhou zuo tong
..............page:1164-1166,1169
Convenient matrix calculation method for critical path in twin code network chart
wei hong bo ; hui xiao bin ; zhang feng ming
..............page:1167-1169
Design of enterprise's OA system based on technology of groupware
xi zhen yuan
..............page:1170-1172,1203
Design and realization of system for fan selecting based on internet
chen xue jiang ; qin guo liang
..............page:1173-1174,1194
Multi-agent layered coordination model and its application in robocup
zuo bo ; wu min ; liu xing dong ; nie zhe
..............page:1069-1071
Research of data collection system design in trustable e-commerce
dan yong liang
..............page:1065-1068
Research of mining ordering rules
sai ying ; sai zuo
..............page:1063-1064
Design and implementation of 3G -based insurance surveying scheduling system
gong xiao zuo ; zuo chun
..............page:1059-1062
Key technology for realizing Chinese character input method
kang hai yan ; yu zheng tao ; he xiao yang
..............page:1089-1090,1103
ERP system under e-commerce model
xu zuo
..............page:1091-1092,1095
Implementation of RSA encryption algorithm using DSP Tms320C54X chip
zhang xiao ping ; zhou da shui
..............page:1093-1095
Challenge and development of intrusion detection technology
zhang xue qin ; gu chun hua ; lin jia jun
..............page:1096-1099
Governmental document work flow system based on relational database
li xin ; zhang ji dong ; wu rong ; pan ya nan ; ren yu ping ; sun yu fang
..............page:1104-1106
Multicast routing problem in computer networks
wang xue ping ; liu san yang
..............page:1056-1058
Software and hardware co-verification of embedded microprocessor
hao zuo ; wang dong sheng
..............page:1053-1055,1058
Study on three-dimension visualization digital model for construction site layout
zhu hui rong ; zhong deng hua
..............page:1049-1052
Improved model on SET protocol
niu yun ; luo shou shan
..............page:1047-1048,1052
Design of internet simulator for operator training based on J2EE
yu huan jun ; cao rui jin ; hu shang xu
..............page:1044-1046
Study on modeling method of hydroelectrical simulation based on information fusion theory
wang gang ; wei shou zhi ; zhao hai
..............page:1041-1043