Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2007 Issue 24
Design and realization of integrated mobile secure connection system
DU Xue-hui;CHEN Xing-yuan;CAO Li-feng;WANG Ya-di
..............page:5854-5857
Structural comparing algorithm based on trusted base points
WEI Qiang;JIN Ran;WANG Qing-xian
..............page:5850-5853
Design and implementation of full text search engine based on Lucene
WANG Li-yun;WANG Hua;CHEN Gang;YAO Nai-ming
..............page:5959-5961
Improved searching algorithm for unstructured peer-to-peer network
DAI Jian-yong;CAI Yong
..............page:5962-5964
Witness reputation based on loyalty
CHEN Hai-bao;LI Li-xin
..............page:5965-5968
Design of information integration platform in enterprise based on web service
XU Shu-hua;JIANG Wen
..............page:5969-5972
Viewpoint controlling and application in virtual walkthrough based on three dimensional geometric transformations of OpenGL
WANG Gong-ming;GUO Xin-yu;ZHAO Chun-jiang;WANG Ji-hua
..............page:5973-5976
Design and implementation of gigabit wire-speed firewall SOFTWall8000
SHI Cong-cong;CAI Sheng-wen;XIE Jun-yuan
..............page:5858-5862
Research of anti-virus engine and automatic extraction of computer virus signatures
JIN Qing;WU Guo-xin;LI Dan
..............page:5863-5866
Simulation comparision of IKEv1 and IKEv2 based on Linux
GAO Xiang;MA Hong-tu
..............page:5867-5869
Mandatory access control model merging with role mechanism
CHEN Si-qing;WANG Jia-yao;LI Bo;XIA Peng-wan
..............page:5870-5873
Design and implementation of mandatory access control database middleware
QI Ke;TANG Lian-zhang
..............page:5874-5876,5918
Research of device authentication mechanism in EPA
GAN Kai-feng;WANG Ping;WANG Hao-wen
..............page:5877-5879,5902
Video buffer control strategy in IPTV end-system design and realization
ZHONG Lin-hua;JIANG He;ZHENG Zhong
..............page:5880-5882,5886
Research and implementation of 802. 1x authentication technology on ACR
QIN Liu;LAN Ju-long;WEI Yan;ZHI Ying-jian
..............page:5883-5886
New TCP congestion control mechanism
RU Xin-yu;LIU Yuan
..............page:5887-5889,5892
Study of web log mining based on data warehousing
XI Jing-ke;ZHANG Chen;XIE Hong-xia
..............page:5890-5892
Study and design of energy consumption routing protocol for wireless sensor network
WANG Lei;LU Jian-jun;HE Xin-hua
..............page:5893-5895
Study of bi-cepstrum blind equalizer
WU Xiao-li;HUANG Hua
..............page:5896-5898,5914
NOR flash disk simulation method by sector mapping
ZHU Hai-dong;WANG Xin-she
..............page:5899-5902
Design of web measuring and controlling system based on embedded internet gateway
HUANG Wei;YANG Zhi
..............page:5903-5905,5908
Research of behavior trust evaluation based on fuzzy theory
GENG Yan-jun;ZHANG Hong-qi;ZHOU Jing
..............page:5906-5908
Based on improved genetic algorithm for TSP
HUANG Yong-jun;WU You-xin;LIU Hua-bin
..............page:5909-5911
Application of ant colony algorithm in web services composition problem
WANG Chuang-wei;QIAN Xue-zhong
..............page:5912-5914
Grey prediction based dynamic failure detection service for distributed systems
TIAN Dong;MAO Tai-ping;WU Chang-ze
..............page:5915-5918
Evaluating performance of multiple Bayes classifier based on AUC method
QIN Feng;LUO Hui;CHENG Ze-kai;REN Shi-liu;CHEN Li
..............page:5919-5920,5972
PSO spatial clustering with obstacles constraints
LI Xiao-qing;JIAO Su-min;ZHANG Xue-ping;ZHU Shu-qin;DU Zhen-fang
..............page:5924-5927
Arithmetic predictive control on neural network
LI Ai-mei;ZHAO Ming-sheng
..............page:5931-5934
Largest Lyapunov exponent of short-term electric load forecasting model simulation
LI Lan-you;DU Jie;SHAO Ding-hong;LU Jin-gui
..............page:5935-5936,5939
Problem domain-oriented representation method of conceptual model
LIU Yun-jie;GONG Chuan-xin;LIU Tie-lin
..............page:5937-5939
Simulation of intersection model based on CA
HUANG Yue
..............page:5940-5941,5958
Security authentication mechanism based on RBAC for OBS
ZHOU Gong-ye;YI Jia;CHEN Jin-cai
..............page:5847-5849
Research of intrusion prevention system
WU Hai-yan;JIANG Dong-xing;CHENG Zhi-rui;GAO Guo-zhu
..............page:5844-5846,5866
New arithmetic for verification of supposition palindrome number 196
KONG Ling-de;LIU Jie
..............page:5841-5843,5853
Application of Apriori algorithm in government ontology construction
ZHU Li-jun;ZHAO Xin-li;SUN Qin-shan
..............page:5942-5944,5968
Design of workflow system in supply chain grid
CHEN Zhi-sheng;HUANG Li-ping
..............page:5949-5950,5954
Research of electronic sealing platform and it's security based on network
XU Sheng-wei;GE Yue-tao;FANG Yong;XIE Si-jiang
..............page:5951-5954
Research on intelligent meta search engine ACISE based on agents collaboration
DUAN Xue-ying;ZHANG Ying-chao
..............page:5955-5958
Research on retrieving algorithm for component based on leaf node containment matching model
WANG Ying;LIN Xue-feng;DAI Hui
..............page:5977-5979,5982
Interaction design and evaluation for input mode of blind mobile phone
WANG Lin-lin;FANG Zhi-gang;XU Jie
..............page:5980-5982
Digital watermarking algorithm based on Chinese PDF documents
ZHANG Qiu-yu;YU Dong-mei;GUAN Wei
..............page:5983-5984,5987
Towards domain ontology-based semantic annotation research
SHI Nian-yun;YANG Chen
..............page:5985-5987
Design of rotation surface with given Gauss curvature function
SONG Lai-zhong;LI Jun-cheng;PENG Gang
..............page:5988-5990,5993
Mechanism design of optimal option based on credit risk control
ZHANG Xiao-chuan;LI Jia-jun
..............page:5991-5993
Wandering scheme and its implementation in virtual imaging space based on augmented reality
GAO Chao;NIE Ru;LIU Shi-lei;SHUI Kun-kun;DU Xiao-mei
..............page:5994-5996,5999
System of coal revenue tax based on GPRS and RF IC card
ZHANG Hou-wu;YAO Kai-xue
..............page:5997-5999
Study on data exchange method of CSCD based on XML
HUANG Guo-yan;GUO Hui
..............page:6000-6002,6047
Dynamic and real-time method of virtual-reality based on texture mapping
LIN Yi;HOU Hong-wei
..............page:6003-6005
Research on technology of XML data management based on RDBMS
LI Li;YANG Chun;WU Wei
..............page:6008-6011
Research on ontology building methods based on reverse engineering
ZHANG Lian-chao;HUANG Zhi-qiu;SHEN Guo-hua;ZHOU Hang
..............page:6012-6015,6019
New blind digital image watermark algorithm based on fractal compression in wavelet transformation domain
YANG Su-min;ZHANG Zheng-bao;WANG Jia-zhen;KOU Ying-zhan
..............page:6016-6019
Research on distributed interactive simulation based on B/S mode
SHI Jian-qiang
..............page:6020-6022,6025
Automatic detection and modeling of intersections in 3D roads model based on GIS
WANG Wei-feng;TANG Xiao-an;XIE Yao-hua
..............page:6023-6025
Study of geometric transformations on hexagonal grid
ZOU Li-li;TANG Di
..............page:6026-6028,6032
TV recording system based on. NET platform
CHEN Gang;WANG Hua;XU Min;JIA Jian-jing
..............page:6029-6032
Total solution to role-based privilege management
LIU Peng-yuan;LI Tong
..............page:6033-6035,6038
Improved L-system plant modeling method
ZHU Qing-sheng;YE Fei
..............page:6042-6044
Design and realization of system for response analysis to impact of floating raft based on MSC. Patran
GUAN Fang-jing;TIAN Zhi-feng;LI Feng;LENG Wen-hao
..............page:6045-6047
Integrating SOAP/XML with CORBA based on DII
MI Hong;ZHENG Ying
..............page:6048-6050
Mining association rules with lower bound constraints
GONG Yu
..............page:5838-5840
Decomposition method for software reliability analysis
ZHU Lian-zhang;LI Yan-chen
..............page:5835-5837,5840
QoS-requirement-driven service configuration framework
LU Hong-jin;HU Jian-jun;ZHANG Wen-bo
..............page:5825-5829,5834