Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2006 Issue 24
Visitor* design pattern in software refactoring and application
YIN Ding-yuan;GAO Jian-hua
..............page:4817-4820
Analysis and design of intrusion detection system based on mobile agent and honeypot
WANG Hai-jie;LU Han-rong;HU Ya-hui
..............page:4786-4788
Apply GA in input-queued switch
LU Ping;GE Xiao-wei;GUO Xiang-yang
..............page:4784-4785,4788
Constructing of local network based on softswitch technology
LI Hong;FENG Qing-sheng;SHAO Ying-chun
..............page:4781-4783
Method of real-time system modeling through UML extension
LI Shuang-qing;CAO Yin-long
..............page:4778-4780,4783
Line vectorize algorithm based on trend preferential tracking direction
LIU Zhi-juan;GAO You-xing
..............page:4775-4777
Designand implementation of network video server based on AT2042
ZHANG Jing;ZHOU De-xin;HAO Fu-zhen;ZENG Hong-lei
..............page:4797-4800,4809
Design and implementing of SMS module in web-based application
ZHAO Jin-dong;YU Pei
..............page:4801-4802,4805
Personalized recommend system based on peer to peer network
ZHONG Rui-qiong;LUO Wei-qi
..............page:4806-4809
Missing data imputation: Information gain based on approach
ZHANG Hong-xia
..............page:4810-4812
Simulation of N-Dof robot
SONG Zeng-lai;CHEN Zhen-hua
..............page:4813-4816
Degraded image restoration using neural network based on improved simulated annealing
PAN Mei-sen;XIAO Zheng-hong
..............page:4684-4686,4698
Research of computer network information insurance system model
SUN Le-chang;XIA Yang
..............page:4713-4717
Security research of secret sharing schemes based on Hash function
YAN Hui-juan;LIN Guo-shun
..............page:4718-4719,4723
Research of C3I system software architecture based on message bus
FAN Xi-quan;HE Ming-li;KUANG Jing-ming
..............page:4720-4723
Application of decision tree in banking promissory shops analyize
FENG Jian-wen;LIN Xuan;CHEN Qi-mai
..............page:4724-4728
Study on scrambling capability based on image encryption
WANG Yi-ran;ZHU Wei-jun;ZHAN Xin-sheng
..............page:4729-4731,4738
Real number coding evolutionary algorithm to TSP
LI Yue-qiao;LI Cheng-jun
..............page:4753-4754,4758
Free form 3D curve sketching and intelligent oversketching algorithm
HAN Li;TANG Di
..............page:4755-4758
Appling SOA to distributed scientific research information system
CHEN Dan;YUAN Jie
..............page:4759-4761,4766
High performance parallel crawler
JIANG Zong-li;ZHAO Qin;XIAO Hua;WANG Rui
..............page:4762-4766
P-Grid: Efficient self-organizing P2P system
ZHANG Hong-jun
..............page:4767-4769
Human identification using one lead ECG
CHEN Tian-ding;LANG Yan-feng
..............page:4770-4774
Design and implementation of end to end 3G network emulation system
WU Shu-ying;XU Jin-sen;YE Rui;CHEN Wei-dong
..............page:4680-4683
Particle swarm optimization with self-adaptive stochastic inertia weight
YAN Li-ping;ZENG Jian-chao
..............page:4677-4679,4706
Document model and configurable document generator for ERP model documentation
ZHAN De-chen;WANG Zhong-jie;XU Xiao-fei;LI Jin
..............page:4615-4618
Research on communication optimization of overset-grid CFD parallel computing
LIU Xin;LU Lin-sheng
..............page:4611-4614
Clustering technique based on fuzzy set in personal customer of commercial bank
PENG Yun;NIE Cheng-qi
..............page:4674-4676
New channel access protocol for Ad Hoc network
WANG Hong-peng;DAI Bo;YANG Xiao-zong
..............page:4656-4659
Development of graphical user interface based on embedded operation system and Motif
GUO Bao-feng;CAI Ying;HU Pei-da;FAN Hai-rong
..............page:4653-4655
Approach to implementing exception handling mechanism
YAN Da-shun;JIANG Shu-juan;XI Jing-ke
..............page:4650-4652,4742
Research of hospital automatic medicine allocation and transportation system
LIN Xiao-cha;SHEN Mei-e;WANG Tie-feng;YING Shi
..............page:4648-4649
Modeling method of massive terrain based on elevation entropy
ZHANG Hong;LU Yi
..............page:4644-4647
Digital image watermarking in fractional Fourier transformation domain
HE Quan;TIAN Rui-qing;WANG Yan-min
..............page:4642-4643,4647
High speed simulation based on source code parsing forembedded software
ZHANG Yu;GE Ning;FENG Chong-xi
..............page:4732-4735
Research and implementation of I-office mail service based on campus network
Zhang Hai-tao;LUO Nian-long;FU Xiao-long;SHEN Xi-chen
..............page:4736-4738
1553B simulation system based on VxWorks
LIU Feng;AN Jun-she
..............page:4739-4742
Design and implementation of JMS based on multiple storages
LIANG Ying-hong;WANG Zhi-yan;LIU Jia
..............page:4743-4745
Way of text classification based on Bayes
LUO Hai-fei;WU Gang;YANG Jin-sheng
..............page:4746-4748
Analysis and comparison of dependability of P2P networks
GUO Yu-tan;XU Tao
..............page:4749-4752
Research and application of bioinformatics domain software architecture
CAI Chuan-zheng;ZHANG Jia-jun;WANG Yi-fei
..............page:4638-4641
Application of SRTP for embedded remote surveillance system
HOU Jun-hua;HU Jin-yan;SU Bo-shi;CHEN Feng
..............page:4670-4673
Application study for 2DPCA in face recognition
HE Guo-hui;GAN Jun-ying
..............page:4667-4669,4673
Formalization of mining association rules based on relational database
ZHANG Bo;ZHANG Hong
..............page:4663-4666
Wireless router design based on ARM9
LI Yun-fei
..............page:4687-4689,4703
Research on learning services of super distributed learning object
GAN Cheng-zhi;LI Jing
..............page:4690-4694
Implementation and research of a reusable policy server framework
JIA Jing-dong;ZHANG Wen-qing;WENG Jing-nong
..............page:4695-4698
Research on network architecture and communication protocol for net-VEs
SHANG Huiping;ZHANG Lina
..............page:4699-4703
Study on mining association rules from XML data
XU Yong;CHENG Liang-yu;LI Meng
..............page:4704-4706
Research on security extensions based on Java 2 security architecture
TIAN Yu-hong;WANG Ze-bing;FENG Yan
..............page:4707-4709
Research on computer network topology discovery technology
YANG Guo-zheng;LU Yu-liang;XIA Yang
..............page:4710-4712,4752
Ticket-based model design and formal implementation of security policy coordination
DENG Lei;HU Zheng-guo;HAN Zhi-yong;MA Man-fu
..............page:4635-4637
Research on applying RAID in iSCSI environment
SUN Yu-xia;CHEN Huo-yan
..............page:4632-4634
Research and implementation on university information resources search
HU Jun;LI Xing
..............page:4629-4631,4634
Particle swarm optimization-based assessment model for atmospheric quality
HAN Xu-ming;WANG Hong-zhi;WANG Li-min
..............page:4626-4628
Inner mechanism and criterion of portlet
WANG Qin-xin;HU Jian-hua;DING Jia-man
..............page:4622-4625
Design and implement of web page supervision and recovery system on Linux
BAI Jian-kun;ZHANG Yu-qing
..............page:4619-4621