Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2006 Issue 4
Soap-based remote monitor research
YU Hang;LIU Feng;JIN Tai-ge
..............page:664-666
Approximation algorithm of evidence theory
YANG Hai-feng;HOU Chao-zhen
..............page:667-669
Obtaining nets of PCB based on area filling algorithm
SONG Bin;ZHENG Jian-sheng;DAI Yong-hong
..............page:672-675
Middleware for distributed parallel data mining
BAN Hua;WU Geng-feng;WU Shao-chun
..............page:661-663
Optimized method of network simulator in simulation large-scale network
DONG Yun-yao;XUAN Le-fei
..............page:658-660,666
Processing SOM with U-matrix
MA Guang-zhi;YANG Chun
..............page:654-655
Feedback-based enhanced scheme for transport control in Ad Hoc networks
LI Ning-ning;ZHENG Ming-chun;LI Hong
..............page:651-653
Design and implementation of multi-agent network management model based on RDF
WANG Chun-lan;DING Ying;WANG Zhi-xiao
..............page:648-650
Model of MDM based on web services and mobile agent
LI Ying;SHAO Wei-min
..............page:644-647
Dynamic hub-and-spoke VPN system based on IPSec
JIANG Wen;SHI Lie
..............page:640-643
Tolerance neural net fault diagnosis system based on rough set
CAO Yun-feng;WANG Yao-cai;WANG Jun-wei
..............page:637-639,675
Constructing efficient IP packet transmit methodology for network security devices
DU Jiao;LIU Chao-ping;LI Guo-hui
..............page:633-636
Multi-agent based vendor selection negotiation model
CAO Cong-mei;GAN Ren-chu;WU Ju-hua;SUN De-fu;LIU Ke-cheng
..............page:629-632
Effective thinning method to fingerprint image
LI Xu-zhou;YU Fei
..............page:626-628,647
Design and implement of embedded secure web gateway
ZHAO Yue-hua;DU Yun-hai
..............page:565-567
Using procedural texture sculpt of technic to simulate nature object
GUO Si-wen
..............page:717-718,封三
Application on solving classified problem of vector by enhanced fisher analysis
ZHOU Jin;PAN Yu-qi;ZHANG Ping
..............page:719-封三
Embedded GUI system based on component technique
CHEN Yan-fei;ZHAO Yue-song;CHEN Rong
..............page:561-564
Design and research of device driver based on embedded uClinux system
RAO Xiao-bing;ZHU Rong;LI Peng-chong
..............page:558-560
Design of statistics in E-government architecture of one-station service
WANG Zhen-yu;QI De-yu
..............page:568-570,577
Research and implementation of agent-based intelligent file distribution framework
XIANG Zheng-tao;CHEN Yu-feng;PAN Zheng-qing;CHEN Li
..............page:571-574
Study of architecture and security mechanism for J2ME
LIAO Yong-gang;YU Dong-mei;ZHANG Qiu-yu
..............page:575-577
Channel extended and broadcast channel in estelle
WANG Ji-zeng;MIAO Zhi-feng;JIANG Chun-yan;SUN Hao
..............page:578-580,592
Theoretical analysis and application research on multi-parent genetic algorithm
LI Ping;WU Jia-ying;ZHENG Jin-hua;HU Ning-jing
..............page:581-583
Research on unified control plane under peer model
ZHOU Nai-fu;ZHU Na;SUN Hai-jin
..............page:584-586
Recognition technique and its realization for image on web
SUN Jie;ZHANG Yi-mo;LIU Tie-gen
..............page:587-589
Application of data mining to analysis of university students' grades
DING Zhi-bin;YUAN Fang;DONG He-wei
..............page:590-592
Overview of domain analysis methods
LIN Zheng-kui;YANG De-li
..............page:593-596
Research on information integration in electromechanical control system
SHI Li-ping;LUO Hui;JIA Kun;CHEN Li-bing
..............page:597-599,617
Research on iSCSI-based storage area network
XU Xian-bin;ZHOU Ming-hao
..............page:600-601,611
Analysis of current zero-copy technology in network storage
YANG Xiao-hu;YU Jian-xin
..............page:602-604
Study on credit assessment system of enterprise based on improved BP neural network
HE Jian-guo;JIANG Guo-yin;TIAN Bo
..............page:605-607,621
Research on safe communication mechanism of distributed IDS
CAI Wei-hong;LIU Zhen
..............page:608-611
Runtime kernel patching technology in Linux and its security analysis
YIN Xiao-wu;WANG Qing-xian
..............page:612-613,636
Design of multi-tires audio classifier based on web service
LI Chao;XIONG Zhang;HE Jing;XUE Ling
..............page:614-617
Optimization of AVS software decoder
DONG Bin;JIANG Yu-ming
..............page:618-621
Super-resolution based on pattern classifying and image fusion
WANG Xin-nian;LIANG De-qun
..............page:622-625
High speed modular multiplication unit for RSA operation
ZHANG Wen-xiang;SU Bin
..............page:676-678,681
Inductive learning algorithms and representations for text categorization
ZHENG Dong-fei;SHI Bing
..............page:679-681
Dynamic initial algorithm of fuzzy k-modes algorithm
ZHANG Wei;ZHOU Ting;CHEN Yun;ZOU Han-bin
..............page:682-683,707
Mechanism of resource discovery based on mobile agent in grid
SUN Jian-xin
..............page:684-687
Griddaen data grid system design and essential technology realization
LIU Song;WU Chan-le
..............page:688-691,703
Edocument exchange SOA solution project
ZHANG Jian-fei;JIN Lian-fu;CHEN Ping
..............page:692-694,703
Research on general design scheme of mobile OA platform
LU Jian-jiang
..............page:695-697
Analysis and design of freeway data management centre in Shenzhen
YAN Jiang-feng;TANG Xiao-meng;MAO En-rong
..............page:698-700
Protocol auto-adapted communication technology
ZHAO Heng-yong;LU Hong-wu
..............page:701-703
Architectural SCM model
ZHANG Xiao-hua;ZENG Yi;TU Zheng-guang
..............page:704-707
Design and implement of electronic map system based on XML
LIU Bo;YUAN Fang
..............page:708-710
Design and research of value-added service-MMS
ZHU Shao-min;FENG You-hua;LIU Guang-chang
..............page:711-713,封三
Application in CAI development bilingual read on basis of SAPI
CHEN Su-yan;LIU You-sheng
..............page:714-716
Rescheduling algorithm in OBS networks
LU Hui-yun;HUANG Sheng;XU Chang-biao;LONG Ke-ping;LI Bin-zhi
..............page:554-557
Research and implementation of enterprise directory service component
WU Shao-hong;HAN Lin;ZUO Chun
..............page:550-553,564
Scalable security system for embedded system based on EFL middleware
WANG Xiao-fei;YANG Qing-song
..............page:546-549