Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2006 Issue 15
Application of decision tree classifier to analysis of gene microarray data
XIANG Jing;REN Jie
..............page:2905-2908
Application of workspace awareness in software configuration management
ZENG Xiang-yong;TANG Ming-duan
..............page:2901-2904
Research on pairwise testing
ZHU Hai-yan
..............page:2802-2804
Application study of agent technology in creating process of virtual enterprise
LI Hui-jun;WANG Zhi-yu;JIA Qin;ZHANG Yi
..............page:2805-2807
Road recognition and representation for infrared image
LU Jian-feng;ZHANG Xiao-feng;CEN Wei-di;YANG Jing-yu
..............page:2812-2815,2831
Design and implementation of network monitor system based on NDIS
YI Qing-song
..............page:2816-2817,2873
Framework design of uC/OS-Ⅱ-based embedded secure operating system
ZHAO Yue-hua;HUANG Wei-ju;CAI Gui-xian;JIANG Jun
..............page:2818-2820
Research and design of office automation software product line
CUI Zong-lin;MENG Fan-rong
..............page:2843-2845
Design and implementation of file manager supporting content management
ZHANG Cheng-nian;ZHANG Bu-zhong;L(U) Qiang
..............page:2851-2853
Realization of educational evaluation decision support system based on data warehouse
YANG Bin-bin;ZHENG Xiao-wei
..............page:2854-2856,2897
Design and implementation of java MDI class library
ZHANG Wei
..............page:2857-2861
Design of mobile agent system based on java-RMI technology
WANG Li-hong;WANG Ping-xia
..............page:2862-2865
Security solution for active network based on certificate schemes
SUN Ming-bao;SHEN Ming-yu;LIN Ya-rong
..............page:2866-2868,2886
Distinguishing text in autoCAD
LI Xiao-ying;GONG Ling-yun;GUI Lin
..............page:2869-2870
Simulation of walking of virtual human based on inverse kinematics and dynamics
HAN Xiao-ning;JIANG Yu-ming
..............page:2871-2873
Expert system model based on object-oriented techique
ZHOU Guang-ming;LI Bin;XU Lin
..............page:2877-2879
Design of dynamic time based on message frame
ZHOU Jin;WANG Zheng;CAI Hong-peng
..............page:2880-2881,2894
Implementation of cascaded triggers termination
DENG Xiao-jun
..............page:2882-2883,2908
Design of hop-by-hop authentication model for AN
YANG Hui-jun;MENG Xiang-nian;CHEN Li-wei
..............page:2887-2888,2891
Design and implementation of multi-role logon authentication based on tokencard system
LI Jian-jun;GUO Wei-qing;XU Duan-qing
..............page:2889-2891
Research of CWE and its application in E-government
YUAN Zhan-ting;ZHANG Qiu-yu;WANG Xue;YANG Yue
..............page:2892-2894
Application of intrusion tolerant technology in database system
YU Chang-hui;MENG Li-rong;XU Cheng-qiang
..............page:2895-2897
Application of J2EE in curatorial management system
AN Bao-sheng;YAN Wen-jun
..............page:2898-2900,2904
Filter and processing of data transferred from real-time human motion capture device
GAO Shen-yu;LIU Jin-gang
..............page:2715-2717,2773
Study and implementation of automated construction methodology for project process
LIU Jing-wei;WANG Qing;XIAO Jun-chao;ZHOU Jin-hui
..............page:2711-2714,2820
Research on CORBA objects' reusing in web services
LONG Hao;HUANG Ming-he
..............page:2789-2792
Research of adaptive route optimization based on HMIPV6
CHENG Hong-sheng
..............page:2785-2788
Design of pipe net modeling system used in water power characteristics analysis
LIU Jing;CHEN Zheng-ming;WANG Feng;LIU De-you
..............page:2782-2784,2788
Analysis and design of auditing system on UML
LI Li-ping;GUO Wen-yi;ZHOU Xiao-yun
..............page:2779-2781
Design and implementation of application support platform in J2EE pattern
LIU Jun-qi;CHENG Hu
..............page:2821-2823,2845
Composite intrusion detection model based on immunological principle
ZHANG Yue-jun;CHAI Qiao-lin;ZHAO Jin;LIU Yun-lu
..............page:2824-2827
Research of BPM's realization in securities domain
WANG Hai-tao
..............page:2828-2831
Syntactic analysis of machine translation
FEI Kun
..............page:2832-2834,2838
File encryption approach based on virtual disk
LI Qing-jun;GAN Meng
..............page:2835-2838
Design and implementation of VxWorks GUI
ZHAO Fu;LI Yue;LI Fang
..............page:2839-2842,2865
Objective effect evaluation of image fusion based on 2-D compact supported wavelet
XIAN Guang-ming;WANG Zhi-yan;HUANG Kun
..............page:2740-2743
Research on workflow role-based access control model
LUO Xiao-ping;ZHANG Hu-yin
..............page:2734-2736,2781
Improved particle swarm optimizers for solving SAT problem
HE Yi-chao;LIU Kun-qi
..............page:2731-2733,2758
Research and implementation for enterprise's CA system and network security strategy
LI Yong-jun;ZHOU Wen-hui
..............page:2728-2730,2870
Research on algorithms for fingerprint image preprocessing
ZHAO Jin-hui;SHOU Liang-xun;QU Wen-bin
..............page:2777-2778,2811
Research and realization of link repair key technology in AODV protocol
GUO Hong;LIN Dong;ZHANG Yuan;LIU Luo-kun
..............page:2774-2776
Research and implementation of general item bank system based on COM technique
LI Mei-man;XIA Han-zhu
..............page:2770-2773
Analysis and design of high intensity IKE protocol based on PKI authentication
DU Chun-yan;HUANG Xian;LU Jian-de
..............page:2767-2769
Design and implementation of general questionary handlesystem based on VFP 9.0
ZHANG Hong-wei;BAI Yuan-ru;XU Peng-kui
..............page:2763-2766
Restoration of opened files' state in process migration of Apache server
MAO Wen-tao;JIN Wen-biao;MOU Jun;DENG Tong
..............page:2759-2762,2827
Design of education resource network based on P2P
ZHANG Yan-jun;YAO Guo-xiang;ZHOU Yang
..............page:2756-2758
Research of pruning for association patterns based on Chi-squared analysis
XU Yong;ZHOU Sen-xin;HU Ling-yun
..............page:2753-2755
Implementation of numerical weather prediction based on UNICORE
L(U) Shao-hua;GONG Bin;LUAN Jun-feng
..............page:2750-2752,2755
Model of active rule and termination analysis in XML
WU Wei-hua;DONG Mei
..............page:2747-2749
Study and implementation of approach to automatic extraction of text topic
ZHANG Qi-wen;LI Ming
..............page:2744-2746,2766
Study on statistical data representation based on web
WU Qun-yong;WANG Qin-min
..............page:2725-2727
Role-based access control in electronic cash system
WANG Jin;JIA Zhong-tian;LI Da-xing;CHENG Zhen
..............page:2722-2724,2792
Analysis and amend wireless hand-off authentication protocols
WANG Bin;CHANG Ya-qin
..............page:2720-2721,2804
Weighting research and fast realization for algebraic reconstruction technique
WANG Hong-jun;LU Hong-nian
..............page:2718-2719,2727