Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2007 Issue 15
Research of resource evaluating algorithm in school grid
LI Jiang-wei;WU Xiao;WANG Yun-lan;WANG Tao
..............page:3605-3607
Analysis and design on Java RMI with SSL
YANG Ming;MENG Fan-rong
..............page:3601-3604
Design and implementation of exchangerate information service system based on .NET
HUANG Qiao-ling;XIE Wei-bo
..............page:3705-3708
Lightweight solution for J2EE application and its implementation
SONG Bo;DU Mei;LIU Jie
..............page:3709-3712
Research of concurrency control protocol in database system based on ADO.NET
ZOU Xiao;CHEN Xiao-hua;CHEN Liang-yu
..............page:3713-3716
Bottleneck bandwidth measurement based on segmented calculating density
SHANG Yan-feng;HUANG Yu-qing;CHEN Xin
..............page:3608-3610
Study of grid resource scheduling strategy based on ant colony algorithm
WANG Tian-qing;XIE Jun;ZENG Zhou
..............page:3611-3612,3694
Overview of component-based methods to improve SoC's design efficiency
YANG Ji;ZHANG You-hui;WANG Dong-sheng
..............page:3613-3616,3802
CA-D6 timing design based on VHDL & ECS
ZHANG Hai-bing;RUAN Lin-bo;LI Bin-kang
..............page:3621-3622,3722
Image enhancement and feature matching of palm-dorsa vein
L(U) Pei-zhuo;LAI Sheng-li
..............page:3623-3625,3635
Defects image database system for underwater inspections
LIN Hong;CHEN Guo-ming;ZHANG Ai-en;TIAN Hai-qing
..............page:3626-3628
Soft tissue image sequences segmentation based on level set method
ZHENG Rui;CHEN Lei-ting;FANG Chun-lan;MIN Fan
..............page:3629-3631,3726
Algorithm of image scrambling based on steganography
LI Qi-yun;LI Jian-ping;XIAO Shu-cheng
..............page:3632-3635
New enhanced image quality interpolation algorithm based on edge detection
DANG Xiang-ying;WU Xi-sheng;ZHAO Yong
..............page:3636-3639
Research on fault diagnosis method based on PSO neural network
XU Lei;ZHANG Feng-ming;CHENG Jun
..............page:3640-3641,3674
Neural network computing model and method based on interval iterative algorithm
LIN Dao-zhu;ZHOU Yong-quan;LI Tao-shen
..............page:3642-3644
Fuzzy optimization of energy by improved genetic algorithm
WANG Hua-lan;REN Yan
..............page:3652-3655
Minimum order bankroll engross rate optimize based on QPSO
BAO Fang;PAN Yong-hui;XU Wen-bo
..............page:3656-3658
Research of intelligent mobile robot's obstacle avoidance based on ultrasonic sensor
YANG Dong-he;LIU Xi-ang
..............page:3659-3660,3748
Cooperative evolutionary particle swarm optimization algorithm with multi-populations
WANG Yuan-yuan;ZENG Jian-chao;TAN Ying
..............page:3661-3664
Self-adaptive ant colony algorithm based on classification
JIA Heng-song;MAO Li
..............page:3668-3669,3689
Emulation trace generator for Strapdown inertial navigation system based on Matlab/Simulink
TAN Hong-li;LU Xiao-qiang;HUANG Xin-sheng
..............page:3670-3671
Error analysis and compensation of radio frequency simulation target imitation system
CAI Lei;DAI Ge-lin;LU Ting-jin
..............page:3672-3674
Image-space collision detection algorithm between complex models
ZHU Lian-zhang;ZHUANG Hua
..............page:3675-3677,3681
Service composition strategy for cross-organizational business processes
JIANG Jun;FENG Zhi-yong
..............page:3678-3681
Research on retrieval technology of 3D model described in XML
WANG Guo-hua
..............page:3682-3685,3716
Improving layered architecture with design patterns
FENG Xin-yang;FAN Ying;CUI Kai;SHEN Jian-jing
..............page:3686-3689
Research on Agent-oriented fuzzy bid evaluation software model
SUN Min;WAN Lin-rui
..............page:3690-3694
Design on automatic material delivery in TV manufactory
WANG Jin-he;HE Qing-gang
..............page:3695-3697
Exception handling approach of web service based on SOAP
ZHOU Hu;JANG Shu-juan
..............page:3698-3701
Management research on grid based on WS-Notification
FEN Wen-long;LEI Jing-sheng
..............page:3702-3704,3712
Research on database security in SQL server application
GU Zhen-li;DU Gen-yuan
..............page:3717-3719
Research on IPSec inter-policy conflict discovering based on formal modeling technology
JIN Min-hua;HUANG Jun
..............page:3582-3584,3607
Secure mechanism for SSM-based applications
HUANG Ping-chuan;CHEN Yue;CHENG Pu;XIAO Gang
..............page:3580-3581,3604
Research and development of courses resource integration system based on SCORM
CAI Qun-ying;HUANG Zhen-jian
..............page:3720-3722
System design of graphic programming for robot control software
WEI Lan;LI Wen-feng;CHEN Wei-ke
..............page:3723-3726
Research and implementation of cooperative training system for aero CBT
CHEN Dong-fan;ZHOU Lin-can;LIU Fo-sheng
..............page:3727-3730
Multi-database knowledge acquisition method realized by using ontology
LU Lin-lan;LI Ming
..............page:3731-3733,3786
Research of real-time remote monitoring technique based on embedded system
LIU Zhi-jie;ZHANG Hua-zhong;SHAN Xiao-lan
..............page:3734-3736
Business process modeling based on role and rule
MAO Xue-qin;LIU Hou-quan
..............page:3752-3754,3782
Research on volume-rendering of stratum based on surface modeling
JIAN Zhi-jian;DAI Guang-ming
..............page:3755-3757,3766
Graphic file form compatibility research and realization
WANG Min;SHAO Ding-hong
..............page:3758-3760,3779
Research and implementation of traffic geographical information system based on workflow
CHEN Ning;CHEN Wen-chao;LI Wen-quan;LI Feng
..............page:3761-3763,3775
Dual-code and dual-tunnel system scheme
JING Xu;MAO Guang-can;TANG Jing-lei
..............page:3764-3766
Wrapping legacy C_Codes for Matlab applications
CHEN JIN-hui;DONG Biao;CHEN Zhong-rong
..............page:3767-3769
Application of data preprocessing in IT infrastructure monitoring
SONG Ying-pai;WANG Lin-lin;SONG Hua
..............page:3770-3772
Performance eva1uation methodology for distributed data fusion system
WANG Jun;LIU Yi-an
..............page:3773-3775
Feature extraction of SMT machine vision inspection based on genetic programming
LUO Bing;ZHANG Yun;YU Guang-zhu
..............page:3776-3779
Research on meteorological prediction with Bayesian classifier
HE Wei;KONG Meng-rong;ZHAO Hai-qing
..............page:3780-3782
Fast discrete bilinear interpolation algorithm
CHEN Liang;GAO Cheng-min
..............page:3787-3790
Design and implementation of charging gateway based on UML
TAO Zai-ping
..............page:3791-3792,封3
Software component model oriented to network processor
XIAO Hong;WU Di
..............page:3594-3597
Intelligent distributed satellite network management method
SONG Jian-feng;ZHANG Wei-ming
..............page:3590-3593
Intrusion detection system based on fuzzy comprehensive evaluation
SHEN Chao
..............page:3588-3589,3593
Distributed intrusion detection system based on peer to peer
YANG Bo;CHEN Shu-yu
..............page:3585-3587,3597
Research on penetration testing based on SQL injection
YU Jing;GAO Feng;XU Liang-hua;ZHU Lu-hua
..............page:3577-3579
Model of Trojan's covert channel based on NdisHook
SONG Zhi-gang;GUO Lin
..............page:3573-3576
Secure control of sensitive information flow in trusted computing environment
LI Xiao-yong;ZUO Xiao-dong;SHEN Chang-xiang
..............page:3569-3572
Fault-tolerance algorithm for distributed systems supporting component migrating
WANG Yong;WANG Zhong-qun;LIU Tao;WU Xiao-lan
..............page:3566-3568,3730
Using web services technology to construct open data mining system
WU Xiao-zhu;CHEN Chong-cheng
..............page:3563-3565,3620
Distributed data mining based on knowledge grid services
WEI Da-qing;YING Hong
..............page:3560-3562
Analysis and design of distributed dynamic route guidance system
FAN Yue-zhen;JIANG Fa-chao;MAO En-rong;WANG Guang-hui
..............page:3737-3739
Citrix's application and investigation in management of computer network classrooms
PAN Long;SHAO Wei-min
..............page:3740-3742,3796
Research on block scheduling algorithm for terrain walkthrough
JIANG Yu-ming;HU Man-li
..............page:3743-3745,3786
Design and implementation of personalized heating-supplier system for smart home
ZHANG Kai-long;LUO Bi-bo;WANG Kai-bo;SHENG Rui-qing;CHEN Jun-wen
..............page:3746-3748
Method of weather cases generation based on similarity rough set
JI Sai;YUAN Shen-fang;ZHOU Shu-qin;WANG Shui-ping
..............page:3749-3751
Research on ordering of cut sets of fault tree analysis
GUO Wei-wei;MA Jie-zhong;ZHAI Zheng-jun
..............page:3557-3559
Agile-kernel model for operating system
DU Yong-wen;CHEN Rong
..............page:3554-3556,3559
Research and application of gray-box testing model for object-oriented system
ZHANG Mao;ZHANG Mao-lin;YANG Hai-yan;LIU Yong-po
..............page:3551-3553,3562
Test valuation of object-oriented software
ZHU Wu;TANG Ming-duan
..............page:3548-3550
Analysis method for software process measurement based on orthogonal design
XUE Li;QIAN Hong-bing
..............page:3545-3547