Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2008 Issue 13
Research and application of reticulate clustering algorithm based on auto-structure
LI Cui;LU Lin-tao;BAI Xiao-dong
..............page:3448-3450,3453
Generating decision rules based on rough set and information gain
LUO Ding;QIU Tao-rong;YOU Min
..............page:3441-3443
Directed tree algorithm based on TAN classifiers
WANG Xue-ling;WANG Zhi-hai;WANG Jian-lin
..............page:3451-3453
Research on service-oriented architecture graphical modeling
SHEN Mei-e;WANG Tie-feng;LIU Jing-zhi;ZHANG Tao;YING Shi
..............page:3454-3457,3484
Design and implementation of Tsinghua stream system
QIN Yuan-kun;PENG Le;XUE Yi-bo
..............page:3458-3461
Research on new simple fast realtime R wave detection algorithm
XU Ting-song;ZHANG Yue;YANG Bo
..............page:3462-3464,3521
Research and realization of performance testing tool of web application
HUANG Feng;WU Hua-rui;ZHU Hua-ji;ZHONG Xi;YANG Bao-zhu
..............page:3465-3467,3512
Design and implementation of remote evaluation system based on MVC design pattern
LIU Chun-hua;WANG Zhong-min
..............page:3468-3470,3545
Semantic web document query based on semantic retrieval ontology
GAO Xiang;ZHAO Feng-yu
..............page:3471-3473
Design and implementation of SVG rendering engine
WANG Ke-cheng;DU Xiao-rong;WU Zheng-wei
..............page:3474-3477
Construction and implementation of on-line lesson plan based on ontology
WANG Xiao-dong;LI Chang-long
..............page:3488-3490,3493
Design on integrated information platform of intelligent traffic system
LIN Qing;ZHANG Yong-xin;WU Min
..............page:3491-3493
Spectral analysis system of multichannel discrete single based on Visual C++
LIU Juan;DUAN Quan;LIU Zhen-feng
..............page:3494-3495,3498
Research on getting contours of vehicles based on principle of contour
LIU Xin;SHI Rui;WANG Di
..............page:3496-3498
Analysis and modeling of road traffic information
YUAN Fang;SONG Xing
..............page:3499-3500,3504
Research and application of archives management system based on Struts framework
FU Guang-bao;SHAO Ding-hong;LI Lan-you
..............page:3501-3504
Robust watermarking technique based on genetic algorithm
LIANG Wei-ying;LIU Jian-ming;SUI Ming-sen
..............page:3505-3507
Design and practice of multimedia devices information managed system based on web
WANG Chun-mei;CHEN Jian-yun;ZHAO Yue-hua
..............page:3508-3509,3525
Application of image processing in online measuring system about powder size statistics
XIN Deng-ke;ZHANG Yu-jie;SU Zhi-guo
..............page:3510-3512
Research on workflow knowledge management system based on ontology
WU Ling;ZHOU Ying-hua
..............page:3516-3521
Design and realization of ontology based on meta search engine
WANG Yan-fen;YANG Dong-dong;WANG Qiong
..............page:3522-3525
Fuzzy automatic classification for Chinese test question
LIN Hui-jun;PENG Hong
..............page:3526-3528,3548
Study and design of test-cosmetic system based on ASP. NET
HU Wen-bin;ZHANG Wen-juan;ZANG Cheng-guang;LI Cun-hua
..............page:3529-3531,3535
Research on integration of heterogeneous data resource in semantic grid
PENG Yue-ying;MIAO Li;OU Qi-zhong
..............page:3532-3535
Valid method of filtering image mixed noise
LI Hui-na;PING Yuan
..............page:3536-3537,3541
Method on statistical test for static data from computer simulation
ZHANG Chang-nian;LIU Xiao-gang
..............page:3538-3541
Research on standard for exchange of product model data
JIANG Meng;LU Hui-qiang
..............page:3542-3545
Development of EC system based on J2EE for used books
LIU Feng-hua;WANG Ying
..............page:3546-3548
Study of medical image interactive 3-D measurement based on VTK
YUAN Gao;YE Feng;YANG Ling;XIE Ming-yuan
..............page:3549-3550,封3
Study on modified RBF neural networks based on immune clustering
XIE Zheng-gui;WEI Yu-ke;ZHONG Shao-dan
..............page:3439-3440,3443
Prediction of inconsistent air qualification systems based on rough entropy
YOU Min;QIU Tao-rong;LUO Ding
..............page:3435-3438
Improved attribute reduction algorithm based on rough set theory
LE Yan-li;LU Han-rong;GAO Ting
..............page:3432-3434
Image threshold segmentation with Ostu based on quantum-behaved particle swarm algorithm
FENG Bin;WANG Zhang;SUN Jun
..............page:3429-3431,3434
Efficient method for computing core based on improved discernibility matrix
ZHANG Zhen-lin;HUANG Ming
..............page:3425-3428
Double bee population evolutionary genetic algorithm
LU Xue-yan;ZHOU Yong-quan
..............page:3422-3424,3428
Clustering analysis based on K-means of immune genetic algorithm
WANG Yan-hua;YANG Jian-xiong;XU Jia-ning
..............page:3419-3421
Study on neural network method of fire image detection
XU Xiao-jun;ZHENG Jian;GUO Shang-fen
..............page:3416-3418
Application of improving orthogonal-based genetic algorithm in function optimization
CHEN Li-guo;CAI Zhi-hua
..............page:3413-3415,3418
Study on robot landmark recognition based on region growing
YANG Jia;HUANG Yu-qing;CHEN Xiao-ning
..............page:3410-3412,3438
Co-evolutionary scheduling and allocation based on genetic algorithm
CHENG Zhi-bing;WU Yue;YANG Hong-bin
..............page:3407-3409
Research on marine environment monitor system based on wireless sensor network
WANG Ji;ZHOU Wen-jing;SHEN Yu-li
..............page:3334-3337
Research on serial data collection system for burst communications
WANG Ming-hui;LI Zan;SI Jiang-bo;HAN Huan-ju;CAI Jue-ping
..............page:3330-3333
Novel particle swarm optimization with heuristic mutation
ZHONG Wen-liang;WANG Hui-sen;ZHANG Jun;TU Jian-de
..............page:3402-3406
Improved clustering for spectral grouping based on Nystrom method
CHEN Ying-liang;WANG Shi-tong;QIAN Rong
..............page:3399-3401,3406
Face detection using skin color and location relation
LIN Qing;LUO Min
..............page:3396-3398
Improved algorithms for raster to vector and specific applications
JIAO Ming-yong;SU Hong-gen
..............page:3394-3395,3398
Research on model of multiple decision trees fusion (MDTF)
FU Yue;MA Guo-fu;XU Ji-wei;LI Guang-xia
..............page:3391-3393
Spectral clustering investigated and implemented in Weka
LI Chun-gui;WANG Meng
..............page:3384-3386,3421
Research on information of software defeats
HAN Wei-gang;ZHOU Hong-jian;ZHAO Lu-feng
..............page:3381-3383,3447
Efficient algorithm for mining association rules
GUO Jian-mei;SONG Shun-lin;XIAO Ren-cai
..............page:3378-3380
Fast method to getting high order polynomials
HE De-biao;CHEN Jian-hua;WANG Yu
..............page:3375-3377
Digital signature algorithm based on chaotic system
JIANG Nan;YANG De-li;BAO Ming-yu
..............page:3372-3374,3461
Reconstruction technology of attack sequence against security protocols
ZHANG Chao;HAN Ji-hong;WANG Ya-di;ZHU Yu-na
..............page:3368-3371
Research on URL ordering method based on layer semantic
ZENG Yi-cong;YANG Guan-zhong;ZHOU Zhi-guang;ZENG Qiang-cong
..............page:3365-3367,3371
Application of domain-driven design in SPP system
WANG Peng;LIU Yuan;LENG Wen-hao
..............page:3362-3364
Feature selection of deep web based on Tabu
TAN Chun-liang;GAN Dan;CHEN Li-na;JIANG Yun-cheng
..............page:3358-3361,3473
Research and implementation of network security audit system
JIANG Hua;CAI Rui-ying
..............page:3355-3357
Research on examining and approving system based on multi-Agent
LI Zong-ming;HU Dai-ping;DOU Hui-ming
..............page:3351-3354
Data scheduling algorithm used in P2P live media streaming
ZHOU Zhi-yong;ZHANG Guo-qing;ZHANG Guo-qiang
..............page:3348-3350,3354
Development of graphic operation terminal for heat pump controller based on ARM7
ZHOU Xi-ping;JIANG Zhou-shu;HUANG Guo-hui
..............page:3342-3344,3347
Design on Bootloader based on upon Intel PXA27X processors
CHEN Zhao-yang;HUANG Zhi-qi;LIU Chang-wei
..............page:3328-3329,3377
Development of throttle by wire system based on SAE J1939
WANG Kai;WANG Hong;XU Ai-dong;SHI Gang
..............page:3324-3327,3390
Design of control software for PCI-based digital receiver
TANG Lin;YAN Hai-hua;CAI De-rong;HUANG Meng
..............page:3319-3323
Research and implementation of trusted embedded terminal TPM interface
LIU Hai-lei;WANG Zhen-yu;MA Ming-jin;LIU Xin-jie
..............page:3316-3318,3477
ID-based key pre-distribution scheme for wireless sensor networks
FU Zheng-fang
..............page:3313-3315
Analysis and modeling of ROHC protocol
LI Qun;WANG Chun-xiao
..............page:3309-3312
Defects and improvement of domain name resolution in NAT-PT
CHENG Zhi-nian;WANG Zhen-xing;LU Hai-zhou;GENG Nan-nan
..............page:3296-3297,3302
Study of earthquake grid monitoring system based on OGSA
LONG Hao;DI Rui-hua;WANG Li
..............page:3293-3295,3333
Research on technology of long-distance education based on continuous-media streams
WANG Wei-hua;WANG Wei-fu
..............page:3306-3308,3315
Design and implementation of remote host monitoring system based on SNMP
HE Peng;QIU Jian-lin;GU Xiang
..............page:3303-3305,3312
Study on simulation for DCF algorithm and its adaptive contention window modified algorithm
FAN Jing;XIE Jian-bin;WANG Wan-sheng;ZHUANG Hong-lin
..............page:3298-3302
Web implementation of campus-network performance measurement system based on TWAMP
WU Xin-feng;XU Xiao-dong
..............page:3289-3292
Research on semantic models of security property for information flow
GU Qian-jun
..............page:3286-3288,3292
Research on access control on strengthened technology of operation system security
MO Yi-jun;LI Wei-hua;WANG Gao-zu
..............page:3283-3285
Research on security strategy based on firewall of campus networks VoIP
DU Xiu-juan;JIN Zhi-gang;HUANG Ke-jun;LIU Yan-xia
..............page:3280-3282
WebMail monitor and audit based on regular expression
ZHANG Cheng;HAO Dong-bai;LONG Hai;HUANG Hao
..............page:3277-3279,3282
Task-role-based access control model with expanded user set
ZHANG Qiu-yu;WU Pei-li
..............page:3274-3276,3285
Steganography in ToS based on QoS security mechanism
ZHANG Han-ling;LI Jun-feng
..............page:3271-3273