Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2007 Issue 21
Design and implementation of MIS based on JSF frame
WANG Feng;JIANG Qin-rao;YU Huan-jun
..............page:5221-5224
Design and implementation of science research management system based on J2EE technology
LIU Ze-xuan;JIANG Chun-hua
..............page:5218-5220,5247
Application of clarke-wright algorithm for ERP
LI Jing;ZHONG Dian-qin
..............page:5214-5217
Research on aeroengine assembly digitalization system
ZENG Liang;CHANG Zhi-yong;MO Rong
..............page:5225-5227,5237
Integration of CORBA and web service in dynamic E-commerce
LI Zheng-wei;XIA Shi-xiong;XIA Zhan-guo;NIU Qiang
..............page:5228-5230,5233
Software schedule about electronic official seal in circulation of official document
LIU Guo-zhu;YANG Zhen-ming
..............page:5231-5233
Inventory management system based on ASP model
YE Xue-qin;JI Wei-xi
..............page:5234-5237
Study and improvement of signing schedules with elliptic curve cryptography
LI Fu-cai;ZHANG Yong-ping;SUN Ning
..............page:5241-5242,5263
PC blade performance management model based on SNMP
LIU Jia;ZHAO Ming;HAN Wen-bao
..............page:5243-5247
Research on SOA-based information system for spacecraft-testing
LI Ming-xin;MA Shi-long;XU Ke
..............page:5248-5251
Research and implementation of telecom shared information and data model based on ontology
LAN Wen;KANG Jian-chu;LI Rui
..............page:5252-5256
Personalization recommendation schema based on item hierarchy
LEI Ying;WU Jing;XIONG Zhang
..............page:5257-5260
Control system of reclaiming membrane vehicle with technology of PLC and PT
SHEN Zu-wu;XIONG Jian-jun;WANG Tian-yun;XIE Wei-wei
..............page:5261-5263
Genenal platform of equipment structure used in fault diagnostic system
JIANG Zhi-nong;YANG Lei
..............page:5264-5266,5269
Study and implementation of distributed deployment of streaming E-learning system
LI Chun-sheng;LUO Xiao-pei
..............page:5267-5269
Using SQL/XML and XQuery to publish relational data
LI Rong;LIU Hong-xing
..............page:5270-5272
Computation model and algorithm of performance evaluation based on complex information
LIU Feng-chun;ZHANG Chun-ying;LIU Yu-fang
..............page:5273-5275,5278
Study of industrial monitoring software architecture migration
PAN Wen-jun;ZHANG Wen;CAO Min
..............page:5276-5278
Design of MAN all-in-one traffic card system based on J2EE
ZHENG Gui-lin;XIA Dan;YUE Lin
..............page:5279-5281
Research of mobile Agent in network intelligence learning system
ZHANG Yue-qin
..............page:5302-5304
Diagnosis and process system of drilling accident on network
CUI Hui-ping;XU Ying-zhuo
..............page:5308-5310,5313
Virtual database management system based on XML
CHEN Mao-bian
..............page:5311-5313
Application of information security auditing technology in finance industry
HU Pin-hui;LING Jie;LU Feng
..............page:5314-5316
Hierarchy scheduling model based on resource domain
ZHANG Li-xiao
..............page:5317-5318,5321
Acquiring information from digital libraries
CHEN Fei;SUN Yan-yan;JIA Chao
..............page:5322-5326
Design of framework of dynamic alliance for die and mould enterprise based on UML
YAN Jun-biao;PAN Mei-sen;RONG Qiu-sheng
..............page:5327-封3
Design of anti-spam application architecture based on semantic grid
YUAN Zhan-ting;ZHANG Qiu-yu;LI Dan;ZHANG Bo
..............page:5206-5209,5213
Fuzzy linear programming approach based on AHP
HU Zi-yi;TAN Shui-mu
..............page:5203-5205
Speaker recognition based on support vector machine and multiscale wavelet analysis
ZHANG Zhen-ling;XU Dong-ping;JIA Yang-li
..............page:5201-5202,5224
Method for handwritten numeral string segmentation based on recognition
SONG Wan-juan;DONG Cai-lin;CHEN Zeng-zhao;HE Xiu-ling;ZHANG Jian
..............page:5198-5200,5217
Continuous function optimization based on improved quantum genetic algorithm
ZHU Xiao-rong;ZHANG Xing-hua
..............page:5195-5197,5301
IP telephone model based on peer name service's search mechanism
CHEN Yuan-tao
..............page:5128-5129,5162
Study on establishing identity federation based on SAML
WANG Hong-sheng;YUAN Jie;CAO Chun-shan;DONG Yuan-yuan
..............page:5122-5124
Application and research of SIP in Java message service system
HUANG Qiang;ZHANG Xiao-mei;WU Qian-qian;RAN Ming
..............page:5119-5121,5316
Fast Clifford Fourier transform of vector field data demonstration
LI Yan-fang;GU Yao-lin
..............page:5177-5178,5189
Research on sketching design system
FANG Gui-sheng;LI Zeng-fang;WANG Jian-jun
..............page:5174-5176,5192
Title image digital watermarking based on discrete cosine transform
WANG Shu-mei;ZHAO Wei-dong;WANG Zhi-cheng;WEN Fa-hui
..............page:5170-5173
Research and improvement of OBB collision-detection based on mass-spring model
ZHANG Lei;GU Yao-lin
..............page:5167-5169,5173
Structured multimedia authoring and selection
CHE Chun-hui
..............page:5163-5166
Application of PKI in RFID data security problems
YANG Jin-guo
..............page:5285-5288
Improvement of business activity monitoring
YANG Sen;LIU Huai-song
..............page:5289-5291
Workflow instance migration arithmetic based on Petri net model
LI Qiang;LIU Ya-jun
..............page:5086-5087,5099
Design of temporal multidimensional model
BAO Rong;WANG Yao-cai;SHAO Xiao-gen
..............page:5084-5085,5166
Data integration schema based on multi-middleware
ZHANG De-wen;XU Meng-chun;MA Hui
..............page:5081-5083,5107
Analysis and improving way of BP ANN in predicting time series data
WANG Wei;ZHANG Ying-tang
..............page:5292-5294
Network of remote control family electric appliances based on smart card and UWB
LIANG Zhi-guo;KOU Wei-dong;LI Hua-ping;FAN Kai
..............page:5295-5297,5307
Research on applying of language oriented programming
SUN Xiao-wei;YU Min-hua;YU Huan-jun
..............page:5298-5301
Network traffic prediction based on error advanced grey model
CAO Jian-hua;LIU Yuan;DAI Yue
..............page:5133-5134,5146
Real-time performance analysis of serial port network gateway based on TCP/IP protocol
SHE Xiao-li;TANG Zhen-ming
..............page:5115-5118
Research and implementation of web services discovery based on QoS
WANG An-hua;HU Guo-lin;BAN Xiao-juan;YIN Yi-xin
..............page:5112-5114
Distributed access control
AI Hong
..............page:5110-5111,5118
Mechanism of system audit based on date mining technology
HUANG Zhen;YE Shui-sheng;WU Xiao
..............page:5108-5109,5114
Threshold multi-proxy multi-signature scheme based on RSA
QI Chuan-da;LI Xi;JIN Chen-hui
..............page:5105-5107
Negative selection algorithm based on fuzzy control theory and genetic algorithm
FU Hai-dong;ZHAO Jian-feng
..............page:5193-5194,5288
Development of embedded software based on Qtopia
WU Xian
..............page:5190-5192
Design and realization of distributed tire fault diagnosis system
FANG Wei;OU Zhong-hong;YANG Chun-chang
..............page:5186-5189
Design and implementation of parallel software system based on DSP
LI Xi-wu;MAO Xian-jun
..............page:5183-5185,5240
Edge detection method of face image based on BP neural network
ZHAO Bao-zhu;JIN Yan-feng;GENG Ke-ming
..............page:5181-5182,5260
Detection of forgery using color filter array character and blur estimation
WU Wei;ZHAN Ling-chao
..............page:5179-5180,5256
Background generation based on modified K-means clustering algorithm
ZHA Cheng-dong;WANG Chang-song;GONG Xian-feng;ZHOU Jia-xin
..............page:5141-5143
Remote sensing image compression system based on multi-DSP
GE Bao-shan;LI Bo;WANG Qian;ZHANG Wen-sheng
..............page:5139-5140,5155
Application and research of SSL VPN technology in campus network
MA Shu-wen
..............page:5137-5138,5143
Network traffic prediction model of wavelet combined neural network
YAO Meng;LIU Yuan;ZHOU Gang
..............page:5135-5136,5159
Forward secure ID-based proxy signature scheme
WANG Yan;YU Jia;LI Da-xing
..............page:5103-5104,5326
Forecast algorithm for multi-step attack based on attack intention
ZHANG Song-hong;WANG Ya-di;HAN Ji-hong
..............page:5100-5102
On shift equivalence of anomalous sampling sequence
LI Bin;SONG Zhen
..............page:5097-5099
K-means algorithm based on triangle inequality
CHANG Jin-yi;HE Chun-xia
..............page:5094-5096
Application of keywords-driven script technique
SONG Qun;ZHU Yi-an;YUAN Wen-cheng
..............page:5091-5093
Design and implementation of data warehouse for CRM system
WANG Xiao-jie;ZHU Cheng-rong
..............page:5088-5090
Uncorrelated fisherpalm recognition algorithm
YAO Yong-fang;ZHAO Qing-jie;ZHANG Li-ping;JING Xiao-yuan
..............page:5156-5159
Face detection based on skin color with complex scenes
WANG Jian-guo;LI Li-guo;YANG Jing-yu
..............page:5153-5155
Design and implementation of Windows CE database access component
HUI Ya-nan;WANG Mo-wei;LENG Wen-hao
..............page:5319-5321
English and Chinese script identification of noised document image
LU Xiao-chuan;YI Bing-zhe;PING Xi-jian;CHENG Juan
..............page:5150-5152
Semi-fragile watermarking algorithm based on DCT
SHI Hui;WANG Xiang-hai
..............page:5147-5149
Region of interest image coding based on SPIHT
XU Xiang-yang;DING Tao;SONG En-min
..............page:5144-5146