Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2007 Issue 13
Design of host intrusion detection system based on Linux system call
WU Yan-bo;LIN Zhong
..............page:3078-3081
ECC-based key agreement and mutual authentication scheme
HONG Li;DU Yao-zong
..............page:3076-3077,3118
6-DOF parallel robot parallel control algorithm and optimization algorithm
ZHANG Zhao-yin
..............page:3182-3183,3282
New genetic algorithm for equality constrained optimization problem
LIU Wei;CAI Qian-feng;WANG Zhen-you
..............page:3184-3185,3194
Research of infomation interchange system by using trust negotiation technology
SHAO Wei-jun;JIN Lun;XIE Jun-yuan
..............page:3082-3084,3208
Research of correlation engine technology based on security operation center
WEI Qian;XIA Qing-guo
..............page:3085-3087
Algorithmic research on generating adaptive detectors
ZHANG Hong;CAI Huan-fu;GAO Ping-an
..............page:3088-3089,3096
Design and implementation of bandwidth measurement method based on linear regression
ZHANG Miao;KOU Xiao-rui
..............page:3103-3105,3114
SSM simulation research and implementation based on NS-2
CHENG Pu;CHEN Yue;HUANG Ping-chuan
..............page:3111-3114
Realization of MPICH-2 based on Myrinet
YANG Kai-ji;XU Feng-yan;MA Yun-sheng
..............page:3115-3118
Error control research of screen data transmission in live-cast network teaching system
HUANG Jing;TANG Jiu-fei;LI peng
..............page:3119-3122
Research of key technologies in MPLS VPN
CHEN Xue-fei;HUANG He;LI Peng
..............page:3138-3140,3150
Technology of texture feature extraction based on wavelet
LIU Jun-mei
..............page:3141-3144
COM modularization approaches in image analysis of DNA microarray software
AO Tian-zhen;MA Wen-li;LIANG Bin;ZHENG Wen-ling
..............page:3145-3147
Half wave rectification inversion of auditory model for speech reconstruction
LI Shi-chao;WANG Yong-qi;JI Li-xin;MA Gui-hang
..............page:3148-3150
Design and implementation of quadrilateral subdivision based on Euler operations
ZHENG Li-yin;ZHOU Xiao-tian;YU Ping;ZHANG Xiao-wei
..............page:3151-3153,3156
Multisource image segmentation based on dempster-shafer evidence theory
SONG Zhi-gang;GUO Lin
..............page:3154-3156
Application of edge detection in evaluation of C-scan image
LIU Yan;ZHANG Zhi-yu
..............page:3157-3159
Marching cubes algorithm based on space correlation using VTK
GU Yao-lin;YUAN Jiang-chen
..............page:3160-3162
Streaming switcher model by managed I/O completion port
YAO Wu-xing;LI Qiang
..............page:3163-3165,3226
Application of wavelet transform in rice figure edge detection
ZHANG Cong;ZHANG Hui
..............page:3166-3167
Transplant of embedded Linux based on ML403 development board
WU Yu-fan;LI Ren-fa;LI Zong-bo
..............page:3168-3171
Design of radar pulse generator based on CPLD
WANG Chong;ZHAI Zheng-jun;YANG Tian-de;DING Nan
..............page:3172-3174,3181
NAND FLASH XIP memory system based on cache mechanism
HAO Ji-sheng;ZHANG Xi-huang
..............page:3175-3177,封3
Implementation of remote monitor for power system with embedded web server
BAO Ke-jin;WU Jian-yong
..............page:3178-3181
Particle swarm optimization algorithm for adaptive IIR digital filters design
LU Ke-zhong;WU Pu;WANG Ru-chuan
..............page:3186-3188
Studying of data distribution based on BCV and VPD
SONG Xing-bin;YANG Cong-fa
..............page:3270-3272,3276
Application of In Touch configuration software in computer monitoring and control system
GAO Su-ping;YIN Li-juan;XU Qin
..............page:3273-3276
Study on teaching-domain knowledge model based on ontology
YUAN Xin-di;QIU Tao-rong;XU Xin-ai
..............page:3277-3279
Study of bank customer credit rating system based on J2EE
WANG Wei;LUO Si-wei
..............page:3280-3282
MIS design and implementation of high polytechnic academy
LI Bin
..............page:3283-封3
Solving knapsack problem based on discrete particle swarm optimization
LIU Jian-qin;HE Yi-chao;GU Qian-qian
..............page:3189-3191,3204
Application researching about trouble diagnosis based on rough sets's new preprocessing algorithm
CAO Ying;MIAO Zhi-gang;ZHAO Xiu-ming
..............page:3195-3197,3279
Research on IPSec inter-policy analysis technology
HUANG Jun;HAN Ling-li
..............page:3090-3092
On-demand branching multicast routing method based on MPLS
LI Tao-shen;CHEN Song-qiao;LI Rui-yan;CHEN Yan;LI Hai-xia
..............page:3093-3096
Network control system of mobile robot based on MVC
ZHANG Qiu-yu;CHI Ning;LIU Ye
..............page:3097-3099,3110
Expression of scientific document object in tagged PDF
LIU Ping;LIAO Zhao-cun;YU Jun-qing
..............page:3198-3200
XML-Glue application framework based on CAR component technology
HE Jia;CHEN Rong
..............page:3201-3204
Research and design of grid workflow describe language
ZHANG Xue-jian;SHAO Wei-min;ZHU Feng
..............page:3205-3208
Survey of workflow transaction
HAO Li-bo;LI Jian-hua;XIA Ming-wei
..............page:3209-3212
Improved N-gram model based on ontology for web page classification
LIU Jin-hong;LU Yu-liang
..............page:3213-3215,3219
Design for PHS smart base station based on switched beam and its realization
REN Wei-jun;HE Yu-yao;CHEN Hua-qiang
..............page:3123-3125
Research on P2P based system for educational resource library sharing
WANG Wen-hong;WANG Feng-rui;PAN Quan-ke
..............page:3130-3132,3237
Research on personalized mechanism in search engine system
ZHANG Ying-chao;DUAN Xue-ying
..............page:3133-3135
New E-voting protocol without authority
ZHANG Xiao-ping;ZHONG Cheng
..............page:3136-3137,3159
Research and implementation of romote ansering system based on J2EE
YU La-sheng;YE Nan
..............page:3216-3219
Security design and realization of integrated computer system of highway network planning based on VPN
LONG Peng-fei;LIU Qing-jun;SHI Chang-qiong
..............page:3220-3222
Research on development approaches of virtual campus walkthrough based on GIS and VIRTOOLS technologies
LI Chang-guo;ZHANG Xiao-lin;TAN Liang;ZHOU Xia;WU Tian-feng;YANG Chun
..............page:3223-3226
Framework of campus data grid environment
HE Xin-feng;LOU Jian;CAI Hong-yun;SONG Xin
..............page:3227-3229
Research of dynamic cooperation model based on multi-Agent
ZHANG Xiao-bo;HE Xiao-min;ZHANG Gang
..............page:3230-3233
Environment member of HLA in underwater weapons simulation system
YAN Ke-wei;MA Ai-min;MAO Ming
..............page:3234-3237
Study on medicine selling decision support system in multiple shops
LIN Qing;LIAO Ding-an;WU Min;WANG Fei;WANG Min
..............page:3238-3241
Dattery charger of UPS based on UC3909
TIAN Li-ming;WANG Lian-jun;SONG Ling-zhi
..............page:3242-3244,3257
Design and implementation of integrated query system for road information based on web
LI Wen-quan;CHEN Wen-chao;CHEN Ning;LI Feng
..............page:3245-3247,3269
Design and implementation of monitor module based on PAS-300M DCS platform
CHEN Hui-ping;FAN Rong-rong
..............page:3248-3250,3253
XForms automated recalculation based on dynamic topological sorting
DONG Dong;GUO Rui-qiang;GAO Feng
..............page:3251-3253
Realization of language debugger based on reusable components
DU Gen-yuan;LIU Yan
..............page:3258-3261
Hyperbolic Bézier curves with shape parameters
XIE Jin;ZHANG Xia;WANG Pan-yi
..............page:3262-3264
Homomorphism key agreement based on ECC
XIANG Guang-li;ZHU Ping;ZHANG Jun-hong;MA Jie
..............page:3074-3075,3241
Research of secure system based on science computing
YIN Chun-yong;LI Jian-shi;SUN Ru-xia
..............page:3070-3073,3081
Survey on intrusion detection in mobile Ad Hoc networks
HUAN Juan;JU Shi-guang
..............page:3066-3069,3222
Overview of syntax analysis method and its application
WANG Yi-bin;CHEN Wen-li;CHEN Yi-ren
..............page:3063-3065
Application of improved Apriori algorithm with SQL
GU Qing-feng;SONG Shun-lin
..............page:3060-3062,3233
Selection strategy of materialized views in data warehouse
LIN Xiao-jing;XUE Yong-sheng
..............page:3056-3059
Research on software usage statistical testing method
L(U) Min-hui;XIONG Wei
..............page:3046-3050
Multi-separation techniques of sticker DNA model and its applications
MA Ji-lan;YANG Yu-xing;SUN Cheng-yi
..............page:3039-3041,3065
Ex-ante evaluation method of information system based on fuzzy linguistic information
DAI Min;ZHANG Xuan;CHEN Yun-xiang
..............page:3036-3038
Mining association rules on concept lattice using domain ontology
LIANG Kai-qiang;LU Ju-kang
..............page:3033-3035,3229
Active method of deciding spatial distribution of sorts
XUE Xin;HE Guo-ping
..............page:3031-3032,3050
Study of tailored RUP model for small projects
LU Yong-zhong;RAO Jing-xiang
..............page:3027-3030,3055
Multiple attribute decision making approach to attacking order of battlefields targets
QU Zai-bin;LI Quan-long;XU Xiao-fei
..............page:3025-3026,3122