Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2006 Issue 10
Design of multi-channel issuance subsystem in multi-channel information platform
SHI Hui-xian;ZHONG Hong-jun
..............page:1835-1837,1842
Teaching research and application of Neuman computer theory
LIU Nai-wen
..............page:1831-1834
Analysis and modeling of society trust management system
SU Li-wen;DU Gang;XU Lei;ZHAO Xiao-tian
..............page:1838-1842
New real-time mixed transaction concurrency control protocol
PAN Yi;LU Yan-sheng
..............page:1843-1845,1849
Design and realization of supply management subsystem under iS-ERP circumstance
GAO Jia-quan;HE Gui-xia
..............page:1846-1849
Security monitoring of multithread scheduling in windows environment
WANG Yun-hua;CHEN Wei-wei
..............page:1850-1851,1882
Message-level security model for web services and its security evaluation
TANG Wei-dong;ZHOU Yong-quan
..............page:1873-1875,1885
Design and implementation of bulk email sending system
FU Zhuo-jun;LUO Yi-rong;DAI Xiao-peng
..............page:1876-1878
Blind aggregate signature scheme
ZOU Jing;HAO Chun-hui
..............page:1883-1885
Preprocessing in 3D model retrieval
LI Zhong-yue
..............page:1886-1888
Design and realization of language repeater based on VB.NET
LIU You-sheng;CHEN Yi-ping;ZHU Li-xia
..............page:1889-1891
Application of iso-surface extraction technology in simulation of acoustic field of ultrasonic probes
SONG Ming-xia;XIONG Jian-she;QIN Bo;CAI Jie
..............page:1892-1894
Application of JavaServer faces in network development
TANG Qi-liang;GAO Hai-feng
..............page:1895-1898
Development of network audio conference system
GAN Hong-bo;ZHOU Ming-tian
..............page:1899-1901,1904
Development and modeling of web files management system based on B/S pattern
ZHOU Shi-bing;LIU Yuan
..............page:1902-1904
Application of SCM control in music fountain
ZHANG Chang-jun;WANG Lian-tao
..............page:1905-1907,1910
Research on application of ASN.1 and PER coding in videoconference system
QIAN Yi;ZHANG Chuan;ZHANG Lei
..............page:1908-1910
Study on application of ESB for telecom network management system based on web services
CHEN Ting-bin;XIA Qin;LIU Ye
..............page:1800-1804
Research progress and prospect of web mining based on soft computing
YI Gao-xiang;HU He-ping
..............page:1805-1807
Flexible MIS and its analysis and development process
SHEN Li-min;MA Long-long
..............page:1808-1810,1817
Research of relative locating algorithms in mobile network
LIU Yu-jun;FANG Ai-zhong;HE Yu-lan;YANG Hong-lu
..............page:1811-1813
Research and application of NAT technique
LIU Feng-hua;DING He-long;ZHANG Yong-ping
..............page:1814-1817
Research and application of 802. 1 x/EAP-PEAP
YUAN Jian-guo;ZHU Kai;FANG Ning-sheng;WU Guo-xin
..............page:1818-1820
Research and application of context-aware web services
PENG Jun;XU Yan
..............page:1821-1824
Research and implementation of multi-dimension management of meta-data based on meta-meta-model
ZHOU Fang;WEN Bi-long;WANG Shou-xin;ZHANG Wei-jing
..............page:1797-1799,1804
Study of data integration based on web services on J2EE platform
XU Guo-yan
..............page:1791-1792,1796
Study on design of system framework based on component model
ZHENG Chun-ying;PANG Xiang-yang
..............page:1852-1855
Design of activeX control for watchdog inside chip W83627HF
SHU Jian
..............page:1856-1859
Design of grid portal system based on portlet
CHEN Hai-yong;FU Han-ying;HUANG Yong-zhong;GUO Jin-geng
..............page:1860-1862,1866
Study of intranet single user authentication system nased on LDAP and PKI technology
YU Hua;CAI Hai-bin;LIU Liang-xu
..............page:1863-1866
Analysis and design of compatibility between IPsec and NAT
ZHANG Jia-wei;HU Jin-chu
..............page:1867-1869
Design of real-time courseware livecast server for modern distance education
CHEN Guang-liang;KUANG Song-bai;HUANG Ruo-hong;ZHOU Yan-hong
..............page:1870-1872,1885
Research of video object segmentation based on multi-feature
FU Xian-ping;LIANG De-qun;WANG Zhao
..............page:1777-1779
Research of image edge examination method based on multiple structuring elements
ZHANG Fen;ZOU Bei-ji
..............page:1775-1776,1785
Method of mining association rules based on ontology
PANG Shu-xia;YUAN Zhan-ting;ZHANG Qiu-yu;LI Ming
..............page:1772-1774
Iris recognition method based on wavelet packet transformation and SVM
MENG Ai-guo;ZHANG Deng-yong;CHEN Zhi-jian;LI Feng
..............page:1769-1771,1774
Analysis of security in threshold proxy signature scheme
QI Chuan-da;LI Ya-mei;JIN Chen-hui
..............page:1767-1768
Model and application of total software process management
FAN Yong
..............page:1764-1766
Key management of symmetrical cipher system on network communication
BI Fang-ming;SU Cheng;ZHANG Hong
..............page:1749-1751
Exchange and integration scheme of heterogeneous data and its application in ASP platform
ZHANG Feng;DING Xiang-qian;HU Ru;XIE Yue-fang
..............page:1745-1748
Research of connection consistency under X system
LIU Xia-lin;LI Yi
..............page:1741-1744
Application research of software metrics in development process based on TSP
LIU Ying;LIU Zong-tian
..............page:1737-1740
Research on automated testing technique for component based on metadata
ZHAO Ming-hua;CHEN Rong;WANG Xiao-ge
..............page:1731-1733,1736
Kernel-level security model of component-based and dynamically extensible operating systems
YANG Zhen-yu;WANG Wei-han;CHEN Zhi-cheng;YANG Wei-kang
..............page:1711-1714,1748
New scheme of grid user authentication
LI Bin;WU Yi;LU Jia-huang;ZHAO Ze-mao
..............page:1789-1790,1830
Design of asynchronous communication model based on message driven Bean
DING Yong;YANG He-biao;DU Jiang
..............page:1786-1788,1859
Application of UDP hole punching in video conference system
YANG Mao-lin;ZHANG Huan-qiang;CHENG Wei-ming
..............page:1782-1785
Realization of visual motion feature extraction module
ZHANG Pei-zhen;SHEN Yu-li;JIANG Hua-jun
..............page:1780-1781,1785
Improved intrusion detection approach based on sequence analysis of system calls
LI Tao-shen;TANG Ren-peng
..............page:1761-1763,1766
Research on tolls model of weigh-in-motion
HOU Ji-gong
..............page:1757-1760
Design scheme of IPsec-based multicast data origin authentication
ZHANG Chun-rui;WANG Kai-yun
..............page:1754-1756
Coal safety early-warning system base on self-organization neural networks
NIU Qiang;ZHOU Yong;WANG Zhi-xiao;XIA Shi-xiong
..............page:1752-1753,1756
Research on constructing restriction relation model of organization operational status evaluation
GAO Lu;WU Jian-ming;ZHANG Xue-yan;ZHAO Ming
..............page:1728-1730
Research on interface provided by Alcatel for integrated network management
CHEN Yuan;LIU Feng;YANG Fang-nan
..............page:1726-1727,1730
Dynamical algorithm for multi-hop bluetooth scatternet formation
DONG Xin-li;GUO Zhong-wen;GUO Qiang;REN Lan
..............page:1722-1725
Network transportation message acquisition system based on Internet
NAN Jin-rui;WANG Jun;MA Hui-jie
..............page:1718-1721,1796
SSL protocol realization for expand of ECC
L(U) Jun-wen;SONG Tao;SI Tian-ge;DAI Yi-qi
..............page:1715-1717,1725