Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2008 Issue 10
Design and implementation of simulating air pollutant dispersion based on GIS
ZHAO Wei;ZOU Zheng-rong;LI Jian-wen
..............page:2655-2657,2661
Research on boundary elements of ship model identification techniques
SHAN Wei-jun;LI Feng;PU Hai;LENG Wen-hao
..............page:2652-2654
Software architecture based on web service and agent
WAN Fang;SHEN Jian-jing;HAN Ding
..............page:2650-2651,2711
Simulation and model research for network-tank operation system
DING Shi-yong;CHANG Tian-qing;FENG Xue-qiang;SHI Hai-bin
..............page:2643-2646
Design and implementation of ship combat command system testing platform
FANG Can-xin;ZHAO Zheng-hai;SI Zhong-yi
..............page:2640-2642
Vibratory analysis and design for rugged computers boards
XU Li-ying
..............page:2635-2639
Application and research of genetic tabu algorithm in scheduling of backup
DAI Qing;ZHAO Yan-ling;LIU Xue-song
..............page:2632-2634
Research on document clustering algorithm of k-means based on aiNet
CHEN Xi;XU Jia-ning;YANG Jian-xiong
..............page:2629-2631
Research on interactivities of rules with intuitionistic fuzzy rough reasoning
KONG Wei-wei;LEI Ying-jie
..............page:2626-2628
Efficient path-finding algorithm of virtual vehicle in large-scale scene
YUAN Jiang-bo;MU Pan-liang;SHI Le;LI Hui
..............page:2622-2625
Concept drift on SVM incremental learning and its disposals
BAI Dong-ying;WANG Xiao-dan;ZHANG Hong-da;QUAN Wen
..............page:2619-2621
Genetic neural networks realroots isolation algorithm based on interval optimization
LI Yan-fang;HE Deng-xu;LIU Xiang-hu
..............page:2616-2618,2621
Point-set clustering based on geometry-figure
NING Li;LIN Yi
..............page:2613-2615
Chaos quantum-behaved particle swarm optimization algorithm
LIN Xing;FENG Bin;SUN Jun
..............page:2610-2612
Construction approach of enterprise diagnosis ontology
WANG Bo;SHEN Wen-xuan;JIA Ji-wei;GUO Jie
..............page:2554-2557
Research on modes of application-integration
ZHANG Feng;DONG Bi-dan
..............page:2558-2560,2563
Design of intelligent ecommerce system based on JADE
BAO Rong
..............page:2561-2563
Ranking strategy of keyword search over relational databases
WANG Jia-yi;YANG Lu-ming;XIE Dong;ZHANG Hua-bing
..............page:2566-2569
Parallel UNION by divide-point locating algorithm
YAN Qi-hua
..............page:2570-2572
Research on high performance database application model based on stored procedure
WANG Wei-fu;HUANG Hai-yu;CHEN Juan;ZENG Yang-hong
..............page:2573-2575
Improved-GT-operator-based cooperative coevolutionary approach to function optimization
ZHANG Ping;ZHANG Liang;LI Tao;LI Zhen-hua
..............page:2578-2580
New automated approach for structural test data generation
MA Jian-hong;XIN Zheng-hua;WANG Lei;XU Min
..............page:2581-2586
Survey on recognition and filtering of network video content
PENG Le;XUE Yi-bo;WANG Chun-lu
..............page:2587-2590,2634
Speech endpoint detection algorithm based on singularity
WU Yue-qian;DU Ming-hui
..............page:2591-2594
Research and implementation of streaming service over 3G network
BAO Ke-jin;LIN Qi-jun
..............page:2595-2597,2615
Effective algorithm of text extraction in natural scenes
HE Xing-heng;HU De-ting
..............page:2598-2599,2603
Skin detection based on support vector machines
XU Cong-dong;LUO Jia-rong;XIAO Bing-jia;SHU Shuang-bao
..............page:2600-2603
Design and simulation of PCR temperature fuzzy PID control
BI Xue-qin;NI Yuan;WANG Li-juan
..............page:2604-2606
Design and implementation of database destroy system
CHEN En;LIU Xiao-jie;TI Tao;LU Zheng-tian;HU Xiao-qin;DONG Cheng-xi
..............page:2499-2501
Application of immune algorithm to generate fuzzy-detector in intrusion detection
PEI Zhen-kui;SONG Jian-wei;HAN Jin-feng;LI Hua
..............page:2496-2498
Analysis of challenge-response protocol under different cryptography
CHEN Xian;CHEN Li-qiong;KUO Yong-hong
..............page:2493-2495
Preprocessor plug-in based on BP neural network under snort system
FU De-sheng;GAO Jian;LIU Ya-ting
..............page:2490-2492
Research and implementation of access-rights control in web systems
LIU Jin-xiao;MA Su-xia;QI Lin-hai
..............page:2550-2553
Study on distributed privacy-preserving business intelligence based on industry chain data
WANG Jin-long;XU Cong-fu;GENG Xue-yu
..............page:2547-2549,2553
Design and implementation of CA system based on elliptic curve
ZHAO Wen-hua;ZHANG Jian-lin;HU Zhan-liang;GEN Xiong
..............page:2545-2546,2594
Research and implementation of small town E-government system based on architecture of web
ZHANG Lei;WU Hua-rui;ZHAO Chun-jiang
..............page:2538-2540,2544
Research and implementation of enterprises application development technology based on lightweight architecture
ZHANG Jian-fu;WU Zhi-jun;FENG Ping-fa;YU Ding-wen
..............page:2534-2537,2557
Design of fire alarm system based on ARM and image-detection
L(U)Li-xin;DING De-rui;YANG Ke-yu;Xu Jing-ting
..............page:2530-2533
Design and realization of embedded speech recognition annunciator
SHEN Yin-yue
..............page:2526-2529
Implementation of RTOS μC/OS-Ⅱbased on SamsungS3C2410A
SHI Li;CAI Guo-feng;HUANG Jun-jie;YAO Li-na
..............page:2523-2525
Research and design of embedded web server
WANG Huai-de;GUO Wen-chuan
..............page:2520-2522
Design of 12C bus driver under embedded Linux system
HE Ya-jun;DENG Fei-qi
..............page:2517-2519,2522
Application of TigerSHARC DSP in sonar signal processing
WANG Qian;WANG Ying-min;ZHU Guo-lei;TAO Lin-wei
..............page:2514-2516
System-level specification language SpecC
LIU Yin;YANG Hong-bin;WU Yue
..............page:2510-2513
Distributed intrusion detection framework
FENG Ling;YU Qun
..............page:2507-2509,2513
Adaptive imagine encryption based on multidimensional Chaotic system
HU Rong;LONG Peng-fei;XIA Ye
..............page:2505-2506,2516
Design and implementation of Windows logon system based on Usbkey
SHI Xiang-wei;LI Zheng;ZHANG Shao-wu
..............page:2483-2485
Analysis and study of DoS attacks on SIP-based VoIP network
SONG Xiu-hong;XIAO Zong-shui;WEI Ben-jian
..............page:2479-2482
Research on locating of DDoS attackers based on adaptive parket marking
LIU Yuan;ZHU Xiao-jian;CHEN Yan
..............page:2477-2478,2482
Study on power analysis and related countermeasures
LIU Peng;WEI Lian-feng
..............page:2474-2476
Recovery method for main memory database systems based on shadow paging
HUANG Lin;LU Jing;LIN Zhong
..............page:2470-2473
Redundant autonomous software component based trusted computing mechanism
XIA Yu-bin;YU Ling;LUO Wan-hua
..............page:2467-2469,2473
Research on mobile agents-based QoS multicast routing
WANG Xin;JIANG Hua
..............page:2464-2466,2529
Research and simulation of DYMO routing protocol based on NS2
MIAO Quan-xing;LU Chen;DUAN Qiong-bo
..............page:2460-2463
Research of QoS reference matrix in service-oriented computing
LI Yong-jun;WAN Mei-yun;LI Jian-hua
..............page:2454-2456,2476
Real time information transfer method based on HTTP
JIANG Yi;WANG Zhao-qing;CAO Li
..............page:2451-2453,2606
Design of mobile agent-base middleware for communication of military tactical Ad hoc network
WU Zhi-tie;YAO Shi-jun;CHEN Zhen-zhong
..............page:2448-2450
Research on considering non-functional factors web services discovery algorithm
LI Ji-gang;WEN Li-ming;LU Ju-kang
..............page:2444-2447
Conformance testing of ICMPv6 based on TTCN
YAN Jian-en;XU Hai-yan
..............page:2441-2443
Stochastic simulation of network traffic based on wavelet packet analysis
LIU Yuan;MA Ru-hui
..............page:2439-2440,2443
NAT traversal solution based on host identity protocol
WANG Ji-zeng;GUO Ge;ZHANG Yan-long
..............page:2435-2438
Implementation of multicast protocols for high performance router
CAO Ji-jun;SU Jin-shu
..............page:2431-2434,2438
Design and realization of platform about computer lab management
JIA Guo-fang
..............page:2695-2697,2701
Analysis of QAR data based on data warehouse
HUAN Xiu-xia;WANG Hong
..............page:2685-2688
Research on knowledge discovery based on knowledgebase
XU Li-ping;ZHANG Jun-qing;JIANG Li-qun;ZHAO Liang
..............page:2689-2691,2694
Answering system of intellectualized curriculum based on Q/A and document
YE Zhong-jie;CHEN Qing-zhang
..............page:2692-2694
Method study on fractional fourier computer-generated holograms
CAO Yu-ru;WEI Sui
..............page:2698-2701
Class of quasi-cubic parametric curves based on trigonometric functions
LI Jun-cheng;SONG Lai-zhong
..............page:2702-2704
Study and analysis on underlying mechanism of virtual function in C++
HE Li;WU Li-xian
..............page:2705-2707
Multi-point and multi-level real-time backup method for database table
WANG Yu-wen;LIU Xiao-jie;LI Tao;LU Zheng-tian;LUO Zu-mai;ZHANG Ding
..............page:2665-2667,2670
Detection of feature points based on multi-scale space
XIA Yi-min;HUANG Wen-qing;WU Zheng
..............page:2668-2670
Design and optimization of embedded file system in embedded USB-HOST device
XU Dong-liang
..............page:2671-2673,2677
Embedding strategy analysis and calculation of digital watermarking
ZHANG Xiang-hua;WEI Peng-cheng
..............page:2674-2677
Cell-phone of P2K platform burglarproof tracing function realization
LI Shu-guang;LUO Lin;LI Wen-lin
..............page:2678-2680