Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2009 Issue 10
Survey on routing protocol for wireless mesh networks
WANG Qin-qi;HE Xin-gui;XU Ming
..............page:2341-2345,2349
Real-time performance analysis for multi-host PROFIBUS-DP communication protocol
SUN Dong-hui;WEI Xue-jie;ZHAO Xiu-fen;QI Ji-tao
..............page:2368-2370,2374
On algorithm of inferring internet AS relationships
HAN Li-ning;HUANG Shu-guang;XIA Yang;YANG Guo-zheng
..............page:2360-2362,2367
New algorithm for solving network maximum flow problem
WANG Zhi-qiang;SUN Xiao-jun
..............page:2357-2359
Ad Hoc grid task scheduling algorithm based on trust demand
WANG Tong;JIA Zhi-ping
..............page:2354-2356,2397
Use trust based link analysis algorithm to degrade web spam
DING Yue-wei;WANG Hu-lin
..............page:2350-2353
Design and implementation of security multicast system
WANG Zhong-shang
..............page:2346-2349
Control strategy of walking stability of humanoid robot up and down stairs
XIAO Le;YIN Chen-bo;ZHENG Dong-hua
..............page:2453-2456
Algorithm to compute core based on new binary discernibility matrix
YANG Chuan-jian;GE Hao;LIN Qi-bin
..............page:2450-2452,2456
Noise detection of iris segmentation
LUO Zhong-liang;LIN Tu-sheng;JIA Ying-biao;LIU Xiao-liang
..............page:2447-2449
Key techniques of multi-core processor and its development trends
HUANG Guo-rui;ZHANG Ping;WEI Guang-bo
..............page:2414-2418
Design and realization of remote interactive system of ternary optical computer
ZHANG Zhao-yun;JIN Yi;YAN Jun-yong;PENG Jun-jie
..............page:2411-2413,2418
Two revised coin-based anonymous fingerprinting schemes
LIU Xin;XU Qiu-liang;QIN Ran
..............page:2407-2410
Research on IDS based on clustering and immunity genetic
LIU Xue-cheng;LI Yun
..............page:2404-2406
Anomaly detection approach based on Kalman filtering and correlation coefficient
XIAO Zheng-hong;JIANG Yan
..............page:2401-2403
Cryptanalysis of two certificateless proxy signature schemes
LI Xia;YANG Ai-min;YANG Chang-hai
..............page:2398-2400
Improved algorithm in triangulation with first boundary and second variance
YANG Yong;GU Yao-lin
..............page:2467-2470,2485
Improved algorithm of CollectCast model in active nodes selection
YANG Wei-wen
..............page:2482-2485
Numerical simulation for static body pressure distribution of sitting posture
LIU Gang;LU Ying;SHEN Ying
..............page:2486-2488,2492
Research about model and simulation of firm evolution based on Agent
SHAO Yan-hua;LI Jian-shi;TIAN Feng;CHEN Tian-jian;WANG Jin-rong
..............page:2489-2492
Modeling of hair based on particle system
CAO Yan-fang;JIANG Yu-ming
..............page:2493-2495
Design and implementation of learning tool on theme-based synchronous interaction
YU Shu-xian;WANG Mei-ling;ZHAO Chen
..............page:2500-2502,2506
Based on Lotus Notes enterprise office automation system
YANG Geng;LI Xiao-juan
..............page:2503-2506
Test system about PC motherboard power based on USB 2.0 interface
JIA Fei;DONG Hao-bin
..............page:2507-2509
Quick defect detection based on structure character of woven fabric image and wavelet transform
HAN Lei;LI Zhong;JIN Yao;LIU Jun
..............page:2510-2512
Two methods for hand-drawn shape recognition
TU Hong-lei
..............page:2513-2515,2520
Improved algorithm on proportional bandwidth allocation in streaming servers
LI Yang;WANG Zhen-hai
..............page:2475-2476,2479
Algorithm of line detecting based on binary image——frog jumping
LI Liang;CHEN Jian-xun
..............page:2477-2479
Method for eyeglasses removal in face images
ZHANG Zhi-gang;JIANG Li;SUN Da-ming
..............page:2480-2481,2589
Study on digital watermark embedding algorithm based on optical theory
MIAO Yong-mei;ZHU Jun-ping;WANG Xiao-xia
..............page:2527-2528,2532
Research on combination feature selection method based on data fusion
TAN Jia-ning;ZHU Yu-quan;CHEN Geng;ZHAI Guo
..............page:2529-2532
Research and implementation of dynamic task scheduling based on workflow
ZHANG Li-jun;MA Jun;YANG Tao;WANG Lin
..............page:2533-2537,2540
Design and implementation of automatically generating questionnaire based on XML
YAO Qidi;YU Chong-chong;LIU Jie
..............page:2538-2540
Reseach of defense SYN flood attack strategy in Linux
ZHAO Guang-li;JIANG Yang
..............page:2394-2397
Study on image scrambling effect based on mean square signal-to-noise rate of difference image
TIAN Xiao-ping;WU Cheng-mao;TAN Tie-niu
..............page:2390-2393
Image encryption algorithm based on conservative chaotic systems
ZHANG Qing-hua;ZHANG Han
..............page:2387-2389,2393
Analysis and verif TCP connection management protocol based on model checking
HUANG Gu;MIAO Li;ZHANG Da-fang;ZHOU Zhi-yuan
..............page:2381-2386
Multi-secret sharing scheme for general access structures based on RSA cryptosystem
ZHANG Lai-shun;ZHOU Hong-wei;YUAN Jin-hui
..............page:2379-2380,2386
Research of scheduling algorithms for virtual grid service flow
WANG Xing-zhu;ZENG Qing-huai
..............page:2371-2374
Design of intelligent management platform for cluster server system
WANG Qiang;CHEN Min
..............page:2516-2520
ASP. NET structure research and implementation of power monitoring information system
QIANG Le;BAO Ke-jin;SHEN Tu-hao
..............page:2524-2526
Research on applying continuous integration for application development
DAI Jian-guo;ZHAO Qing-zhan;GUO Li;QIN Huai-bin
..............page:2573-2576
Design and implementation of self-application system for passport
ZHOU Wen-hui;GU Xiao-qin;CHEN Wen-bin
..............page:2577-2579
Expert system on out of season laying in Guangdong geese management based on CLIPS
SUN Ai-dong;ZHU Mei-jie;LIN Xu-dong;QIU Shao-jun;LIN Xiao-dong
..............page:2580-2582
Updating computing for XML document based on extended Dewey coding
QIN Zun-yue;TANG Yong;XU Hong-zhi
..............page:2583-2585,2589
Algorithm of paricle swarm optimization based on rank
PAN Zhangming;WANG Zhan-gang;WANG Ze
..............page:2444-2446
Method of iris recognition on nonlinear dimension reduction
LIU Ai-lin;ZHANG Tian-qiao
..............page:2442-2443,2446
New clustering algorithm based on Wu-Huberman method and greedy algorithm
XIE Fuding;ZHANG Lei;JI Min;HUANG Dan
..............page:2439-2441
Improved Apriori algorithm based on matrix
WANG Feng;LI Yong-hua;WU Guo-qing
..............page:2435-2438
Using a branch and bound method to solve realistic TSP
CHEN Tao;ZHANG Si-fa
..............page:2431-2434
Futures prices forecasting based on PSO neural network
WANG Hai-Jun;BAI Mei;JIA Zhao-li;QIN Li-ping
..............page:2428-2430,2434
Study on intelligent song recommendation based on fuzzy clustering
LIU Hao-miao;XU Cong-fu;HE Jun
..............page:2423-2427
Model for data processing of gene chip based on MPI
BAI Ya-lan;YUAN Dao-hua
..............page:2419-2422,2427
Research on application of integrating Tomcat with IIS or Apache
LIU Shang-wang;HE Dong-jian;YAN Yan
..............page:2541-2543,2546
Research on video monitoring system for Qinghai-Tibet railway
HE Tao;PEN Enen;FAN Duo-wang
..............page:2544-2546
Study and implementation of small message system based on multilevel structures
WANG Wei;LI Jian-rong;LUO Si-wei
..............page:2547-2550
Design and implementation of CDN customer service system based on J2EE
SUN Wei-nian;ZHU Pei-dong;SHI Huai-zhou
..............page:2551-2553,2557
Design of student model in intelligent learning system
HE Guo-qiang;LIU Li-zhen;DU Chao
..............page:2554-2557
Research of surface fitting based structured light measure-spot extracting method
ZHU Kui;YU Qing-cang;SU Bin
..............page:2561-2563
Real-time simulation of soft-object dynamic deformation
XIA Kai-jian;WANG Shi-tong
..............page:2564-2565,2569
Zero-watermark algorithm based on Fourier-Millin transforming
YU Deng-feng;LI Xue-bin
..............page:2566-2569
Research and implementation of Kazakh OpenType font technology
YUAN Bao-she;YUAN Xiao-qin
..............page:2570-2572,2576
Research and design of dynamic run-time database of atmosphere
WANG Li-xin;XIAO Xin-feng
..............page:2586-2589
Application of Java web based on SSH and AJAX
CHEN Xiang-qian;DI Wen-hui;SUN Dong
..............page:2590-2592,2596
Design and implementation of solar agricultural byproduct intelligent drying system
CHEN Jian-ping;ZHANG Hui-zhang;OUYANG Si-jie;CHEN Xiao
..............page:2593-2596
Prototype design of effective adaptive file system
XIE Gui-yuan;WEI Wen-guo
..............page:2597-2598,封三1