Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2005 Issue 7
Design and implementation of web cache based on database
ZHANG Bu-zhong;U Qiang
..............page:1911-1914
Secure authentication scheme for migration of devices in communication
TIAN Xuan;YE Ding-feng
..............page:1915-1917
Rearch and improvement on technology of IPSec NAT traversal
LIU Ya-hui;ZHANG Quan-lin;ZHU Yue-fei
..............page:1918-1921
New requirement specification model based on Viewpoint Agent
WEI Wei;WU Guo-qing
..............page:1922-1924,封三
Research and implementation of WS-Security in Apache Axis 1.1
JING Jian-du
..............page:1925-1927,1964
Video object segmentation and tracking algorithm based on snake model
WANG Jian-zhong;JIANG Yu-ming
..............page:1928-1930
Style-group-assembling design method in transmission electricity tower's modeling system
LIU Lin;WU Jun;ZHANG Rui-qiu
..............page:1931-1932
Texture restoration based on displacement vector
SUN Yan
..............page:1933-1934,1941
Flight scene simulation based on VR
LI Jing-wei;ZHANG Li-ping
..............page:1935-1937,1952
Implementation of plane's walkthrough system of virtual scene based on OpenGL
GUO Peng-song;YIN Hong;YAN Feng;WANG Zhi-dong
..............page:1938-1941
VoIP key technology and development of voice terminal
ZENG Hong;DAI Guo-jun;LIU Hai-feng;ZHANG Xiang
..............page:1942-1943,1946
Design of rolling code encrypting transmitter-receiver based on singlechip
TIAN Wei;ZHOU Xin-li;ZHANG Jian
..............page:1944-1946
Application of OLAP technology in telecommunication field
ZHANG Zhong-ping;XU You-jun
..............page:1950-1952
Virtual instrumentation and its application in plant physiology instrument
MA Xin-guo;ZHU Liang-long;SHENG Yi
..............page:1953-1954,1960
Linux pseudo terminal device and its application in L2TP
PENG Shu-fen;ZHANG Ying-jiang;CUI Cheng-fa
..............page:1955-1957
Application of WSC middleware technology to devices information system of transformer substation
LI Hong-bo;CUI Jian-guo;Liu Qi-ming
..............page:1958-1960
Monitoring concrete temperature with information technologies
HUANG Hai-bo;JIANG Zhi-fang
..............page:1961-1964
Application research of seasonal combined forecasting model in hospital outpatient amount
YE Ming-quan;HU Xue-gang
..............page:1965-1967,1970
Application of SVG on network CAD
JIANG Kai-yao;LIU Hong-yan
..............page:1968-1970
Replication and application based on Oracle9i
WANG Qian-song;LI Ji
..............page:1971-封三
Design of proxy-based service discovery system for WAN
LIU Ye;KONG Ling-fu;ZHANG Zhi;CHEN Jing;WANG Xuan
..............page:1879-1881
Study on data access technology of distributed application
LI Yong-jiang
..............page:1882-1885
Improvement and analysis of Andrew RPC based on formal methods
BAI Han-li;CAI Hong-liu;ZHENG Guang
..............page:1886-1888
Public street lamp remote monitor system based on GSM/GPRS network
LI Ji-hao;ZHAO Rui-feng;LI Ai-li
..............page:1889-1890,1949
Design and implementation of circulation XML/EDI system
GUO Mei-hong;YUAN Jie;YANG JIAN-MING
..............page:1891-1893,1914
Dynamic query processing for data integration system
LI Zheng;ZHA Jie-min
..............page:1894-1896
Load balance clustering solution based on Unix
YANG Jian-jun;LIU Xiong
..............page:1897-1899
Design of super-collecting report processing system based on B/S mode
HU Li-hui
..............page:1900-1902,1906
Design of heterogeneous information sources based-XML
YANG Fang;TAO Shi-qun
..............page:1907-1910
Multi-level temporal data model in GIS
YIN Zhao-yang;CHEN Qi;ZHANG Zi-jian;LIU Yang-guang
..............page:1872-1874,1881
Design of knowledge warehouse schema in KMS
CHU Dong-sheng;AN Shi-hu;YIN Ai-wu;WANG Xiao-hui
..............page:1868-1871
Design and implementation of unified access control system based on LDAP
ZHENG Lan;CHEN Qi
..............page:1865-1867,1885
Research on implement of interface 3 in workflow reference mode
CHEN Shi;OUYANG Song
..............page:1862-1864
Information system safety research based on ECDSA
QIN Yong-ping;Shi Tao;QIN Yong-ke
..............page:1859-1861
Research on multi-agent system based on web service
WANG Ping-shui
..............page:1856-1858,1888
Research of network management System based on mobile Agent
ZHAO Yan-fei;SUN Yu-xing
..............page:1853-1855
Study on implement technology of components in data warehouse
GU Yan;Feng Hua
..............page:1849-1852
Research for mining fuzzy association rules algorithms on relational databases
HAN Tao;ZHANG Chun-hai;LI Hua
..............page:1842-1844,1899
Study on method of curve simulation based on BP network
BAO Jian;ZHAO Jian-yong;ZHOU Hua-ying
..............page:1840-1841,1848
Research for image smoothing fuzzy approaches based on removed-noise threshold
YUAN Yi-hong;WU Xi-sheng
..............page:1837-1839
Research on generation of design BOM and relative key technology
ZHU Lin;WANG Jun;CHEN Yong-Fu
..............page:1833-1836,1855
Real-time information publishing system of coal mine monitoring based on IP-multicast
NIU Qiang;XU Chun-yan;Hua Gang
..............page:1830-1832
Methods of software testing in GIS
DENG Hong-yan;WU Fang;ZHAO Jing-dong;LI Yong-hong;ZHAO Jian-feng
..............page:1827-1829
USB2.0 transfers type analysis
LIU Hong-wei;ZHENG Li-yun
..............page:1823-1826
Embedded wolf linux based on Harvard architecture
LI Qing-cheng;ZHANG Ke
..............page:1800-1802,1807
Schnorr blind signature based on elliptic curve
WANG Hua-qun;ZHANG Li-jun;ZHAO Jun-xi
..............page:1819-1822
Construction of decision support system in informatization of telecom enterprise
ZHANG Da-bin;ZHANG De-xi;LU Shao-peng
..............page:1815-1818
Large distributed multicast access control system MDAC
LIU Min-min;LIU Jing
..............page:1810-1814,1921
Precise digital communication method based on 422 serial port
LI Xing-Wei;PAN Yu-lin;HUANG Ke-di
..............page:1808-1809,1818
RIC enhanced service discovery technology for multiple administrative domains
GAO Zhen-guo;YANG Xiao-zong
..............page:1803-1807
Platform for one dimensional signal acquisition and processing in VC
WU Gui-Jun;ZHANG Jian-zhou;YIN Wu-long
..............page:1715-1717
Detection and removal of form lines from bill images
ZHANG Chong-yang;LOU Zhen;XU Yong;YANG Jing-yu
..............page:1778-1780
Technology of multithreading and application on computer games
WANG Ming-fu;ZHOU Zhen-huan
..............page:1775-1777
Application in distributed system based on CORBA/Java
ZHANG Qiu-yu;WANG Lu;ZHANG Dong-dong
..............page:1772-1774
Application of integration between control and information network based on DDE
CHENG Xian;DAI Guo-liang;LI Tai-fu
..............page:1770-1771,1780
Identity authentication technology in remote access service
LU Jia-yuan;BAO Yong
..............page:1762-1763,1766
Research on index technique for image database
LU Jia;SONG Yu-qing;JIN Hua;ZHOU Cheng-bing
..............page:1759-1761
New algorithm on communication for mobile Agent
FAN Sheng-tao;BI Lu-yan;JIANG Bao-chen
..............page:1756-1758
Design of software system in Layer3 switch
ZHANG Xiao-zhe;WANG Xian-lei;XU Ye;FANG Gui-Ming
..............page:1751-1755
Intelligent planning based model for plan recognition
HU Bo;WANG San-min;WANG Bao-shu
..............page:1747-1750
Multi-thread evolutionary algorithm to TSP
LI Cheng-jun;ZHANG Qiu-ming
..............page:1744-1746,1750
Research on storage area network in high performance storage system
XIA Fang;CHEN Hong;SONG Lei;ZHANG Xia
..............page:1740-1743
New dynamic password authentication scheme
HUANG Ye-jue;CHEN Qin
..............page:1735-1736,1799
Key techniques to volume rendering based on graphic hardware
ZHANG Chun;MAO Jing-xia;ZHANG Ru-hong;WU Bai-feng;PENG Cheng-lian;CHEN Ze-wen;Sun Xiao-guang
..............page:1732-1734,1822
Research on integrated data model of spatial databases based on geometadata
FENG Zhan-shen;WU Ya-zhen
..............page:1729-1731
Research of JMS-based group communication MOM
Peng Zhen;ZENG Guang-Zhou
..............page:1726-1728,1731
Research and implementation of extensible anomaly-based detection systems
ZHANG Jian-zhong;XU Jing-dong;LIAN Shu-cheng;XIN Ying
..............page:1722-1725
Research on architecture and technology of wireless CORBA
ZHOU Yi-lin;LI Ren-fa;LI Ken-Li
..............page:1718-1721,1725
Object-based any undo model
LI Chun-ping;DOU Wan-feng
..............page:1712-1714,1717
Integral wavelet transformation image compression based on DSP
SHEN Tao;SONG Jian-she;XUE Wen-tong
..............page:1698-1700
Global convergence analysis of improving genetic algorithm
YANG Shi-Da;LI Qing-hua;RUAN You-Lin
..............page:1695-1697
Encrypt data through streams module in kernel
XU Ming-kun
..............page:1710-1711
Design and implementation of mongolian display based on QT
YANG Wen-xia;SUN Yu-Fang;WU Jian
..............page:1707-1709,1711
Vision-based road detection algorithm
HU Ming-hao;YANG Wen-jie;REN Ming-wu;YANG Jing-yu
..............page:1704-1706
Protocol analysis detection mode based on data mining
LI Qing-hua;ZHAO Yan-xi;JIANG Sheng-yi
..............page:1701-1703,1826
Design and implementation of downloading tool based on ML7098
QIU Ju;CHEN Shu
..............page:1797-1799
Software process quality analysis method based on SPC
Gong Bo;HE Xin-gui
..............page:1793-1796
Study on standardization technology for virtual prototyping simulation
ZHANG Qin;MIN Jian-ping;WU Hui-zhong
..............page:1786-1788
Fuzzy K-means clustering algorithm to non-spherical shape data based on kernel
YE Ji-xiang;TAN Guan-Zheng;LU Qiu-jing
..............page:1784-1785,1792
Summary of image analysis method based on fractal
CHEN Yong-qiang;LU An-sheng;HU Han-ping
..............page:1781-1783,1832
Affine invariant parameter
PENG Kun;Zhang Cai-ming;GUO Feng-hua
..............page:1692-1694
Grid information services for distributed resource sharing
MIAO Xiang-yu;FAN Qing-feng;WU Qong-li
..............page:1688-1691,1694
Research on intelligent analysis of traffic accident information and liability judgment system modeling
XIE Jia-meng;TANG Yan-sheng;PENG Hong;YANG Dong-hui
..............page:1684-1687
Algorithmic research of inventory analysis in life cycle assessment
XIA Tian;DENG Chao;WU Jun
..............page:1681-1683