Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2011 Issue 9
Botnet detection model based on sequential analysis
FAN Yi-yan;WU Guo-rui;CHEN Jian-li;TANG Bo
..............page:2950-2952,2988
Enhanced TCP-Veno algorithm based on packet loss statistic
HU Yu;CHEN Yuan-yan
..............page:2980-2983
Design and implementation of Linux task manager based on page fault
ZHANG Chang-chang;LIN Man-shan;SONG Wei;SONG Li-hua
..............page:3059-3063,3157
High-level control structure recovery based on structure semantics tree
LIU Xu-ying;YIN Qing;JIANG Lie-hui;LIU Jian-lin
..............page:3182-3186
Separation approach for concerns in real-time system based on AOP
BAO Chen;WANG Qian-song
..............page:3082-3086
Design and implementation of tree structure data I/O control
LI Jun-fei;CHEN Hao;ZHAO Wei-dong
..............page:3054-3058
Web remote real-time monitoring and control system based on Ajax and SVG
WU Can-pei;HU Shun-hao;WANG Hai-hang;SHEN Xian-hai
..............page:3004-3007,3013
Self-adaptive differential evolution algorithm based on dimensionality group cross
TUO Shou-heng;ZHOU Tao
..............page:3174-3177,3181
Simulation of MAC protocol in near space communication network based on mobile terminals
TONG Ya-guang;CUI Su-wen;LIANG Jun;ZHU Zi-hang
..............page:2971-2975
Efficient boundary detection algorithm of wireless sensor networks
CHEN Cheng-tao;SUN Yan
..............page:2984-2988
Design and implementation of embedded gateway based on SoC
DU Chao;CHEN Ji-min
..............page:2989-2992,3058
Design and implementation of real-time transaction manager in embedded database
HUANG Chao;QI Xuan;GENG Hong-yue;HUANG Guo
..............page:3008-3013
Load balancing research based on AB role theory
LI Gong-li;LI Xin-yuan
..............page:3073-3076
Implementation of irregular networks\' mathematical model
LIU Hui
..............page:2997-2999,3114
Study of cable coupling leakage of computer system
LI Wei;ZHANG Guo-quan;FANG Kun
..............page:2943-2945,2965
Research of client-side technology of GIS service based on web explorer
LI Bo-fei;LI Xin;LI Yan-ming
..............page:3031-3035
Automatic construction of domain ontology based on ontology translation
LU Wen-xing;CHEN Li;ZHU Hong-bo;WANG Ya-qiang;HAN Guo-hui;YU Zhong-hua
..............page:3203-3207,3230
Implementation of analysis and storage scheme for Vcard dynamic data field
XIE Guo-kun;HUO Ai-qing;TANG Nan
..............page:3231-3234
Objects location and tracking system based on Google Earth and GPS
CHEN Xiu-zhi;CHEN Yan-qiao;SU Yong-xian
..............page:3014-3018
Algorithm of trust feedback collection in WSN based on gamma distribution
YANG Dong-wei;XIE Fu-ding;ZHANG Yong
..............page:2966-2970,2975
Dynamic window-based adaptive median filter algorithm
SHI Jun-yan;LIU Shu-dan
..............page:3115-3118
Research on network management service design technology
CUI Hong-liang;XIAO Gang
..............page:3027-3030
Analysis and improvement of ID3 decision tree algorithm
WANG Xiao-wei;JIANG Yu-ming
..............page:3069-3072,3076
Development of device driver modules based on Windows platform
FENG Ke-ping
..............page:3235-3239
Mercer-kernel based mixed C-means fuzzy clustering algorithm with optimized kernel parameters
JIANG Nan;WANG Shi-tong;HE Yang-cheng
..............page:3148,3150-3152
Novel DWT-based zero-watermarking for image with fake verification inhibited
ZHAO Xing-yang;SUN Ji-yin
..............page:2953-2956,2960
Congestion control algorithm for TCP throughput enhancement
XU Gong-wen;LI Xue-dong;ZHANG Zhi-jun;XU Li-na
..............page:2993-2996
Goal driven measurement model for CMMI-DEV
HU Gui-zhang;MA Zi-tang
..............page:3064-3068,3081
Visualization and analysis of geological information of military affairs
YIN Hong;SUN Xiao-bo;XU Ji-heng;WU Hai-ping;YANG Yong-liang
..............page:3123-3127,3147
Attribute sets power set method of rough formal concept extracting
WANG Dan;HUANG Ying-hui;LI Guan-yu
..............page:3162-3165
Unsupervised Uyghur word segmentation method based on affix corpus
XUE Hua-jian;DONG Xing-hua;WANG Lei;TURGHUN · Osman;JIANG Tong-hai
..............page:3191-3194
Research on one-class classification algorithm based on artificial immune system
CHEN Yue-bing;FENG Chao;ZHANG Quan;TANG Chao-jing
..............page:3144-3147
Research of soft tissue haptic rendering based on spherical harmonic representation
FANG Yan-hong;WU Bin;YANG Zheng-yi
..............page:3091-3094
Application of SVM multi-classifier on license plate character recognition
WANG Wei;MA Yong-qiang;PENG Qiang
..............page:3166-3169
Design and implementation of backstage management system of file backup system based on MVC architecture
BIAN Xia;ZHAO Kui;HU Xiao-qin;ZHAO Hui
..............page:3195-3198,3212
Design of UAV ground station\' s serial communication module based on DCOM
XU Song;SUN Xiu-xia;DONG Wen-han;LI Xiang-qing;LI Da-dong
..............page:3213-3217,3234
Calibration method of geometric distortion for multi-projector displays
KOU Yong;LIU Zhi-fang
..............page:3187-3190
Research on network experiment system based on virtual instrument technology
QUAN Xiao-li;ZHOU Nan-quan;YU Yong-hui
..............page:3227-3230
Research of microceramic substrate detection system based on machine vision
REN Shao-bin;LI Yuan-zong
..............page:3240-3243
Design of new automatic optical inspection system of HID PCB
XIONG Guang-jie;MA Shu-yuan;WU Si-yuan;NIE Xue-jun;TANG Xiao-hua
..............page:3218-3221
Study on strategic management cockpit of university based on BSC
LI Liang;MI Zhi-wei;XIANG Xin
..............page:3022-3026,3030
Research on remotely interactive and visualizational system for high-performance computing data
XU Long;WU Dian-liang;CHENG Huan-chong;FAN Xiu-min
..............page:3222-3226
Method of closed-eye detection in iris images
LIU Xiao-min;LI Pei-hua;GUO Ji-ping
..............page:3110-3114
Color image encryption algorithm based on chaotic map
ZHENG Ji-ming;GAO Wen-zheng
..............page:2934-2937
Moving object detection algorithm with Gauss modeling based on FPGA
HUA Chun;XIAO Tie-jun
..............page:3000-3003
Dynamic authorization-supported mechanism for grid
XIONG Hou-ren;ZHANG Bin
..............page:2913-2916
Completion model of incomplete information system based on multiple-partitions
KANG Xiang-ping;LI De-yu;LI Rui-ping
..............page:3131-3134
Design of heuristic identification system for file transfer based on network data stream
TANG Zhang-guo;ZHONG Ming-quan;LI Huan-zhou;ZHANG Jian
..............page:2929-2933,2949
Improved collaborative filtering recommendation algorithm
WU Yue-ping;ZHENG Jian-guo
..............page:3019-3021,3098
Design and implementation of electronic document security management system based on CPK
YANG Zhi-yong;LING Jie;HUANG Wan-min
..............page:2925-2928
Monitoring system of short message based on data steam clustering
QI Ke;XIE Dong-qing
..............page:3199-3202
Fast ECC scalar multiplication algorithm based on random-window-width for E-commerce security
WANG Xi-ping;TAN Wen-xue;PAN Mei-sen
..............page:2957-2960
Research of multi-direction decomposition tree
CHEN Lei;SUN Si-ming;DONG Bi-dan
..............page:3041-3044
Test and analysis of WehnTrust\' s intrusion prevention performance
REN Gao-ming;QIAO Xiang-dong;YANG Tong;BAI Jun-liang
..............page:2921-2924
Palmprint image positioning and segmentation methods based on auto finding points
XU Shuang;SUO Ji-dong;ZHAO Ji-yin
..............page:3102-3105
Study of OSPF based on trusted computing
LI Zhao-bin;HAN Ting;CHI Ya-ping;FANG Yong
..............page:2946-2949
Optimization algorithm for large scale scene models based on texture atlas
SONG Ge;YANG Hong-yu
..............page:3119-3122
Research on locality preserving projections based on center field
ZHANG Jian-ming;LIU Jun-ning;DU Dan
..............page:3128-3130,3139
Service level remote disaster recovery system
L(U) Ruo-nan;ZHAO Kui;CHEN Peng;ZHONG Hui-hui
..............page:2917-2920,3040
Analysis on principle of software reliability accelerated testing methods
FENG Er-qiang;LIU Chang;ZHENG Jun
..............page:3087-3090,3094
CFCIB: Control-flow checking based on inserted blocks
LU Zhuang-wei;ZHANG Xian-ming;LIU Li-xiang;ZHAO Jun-suo
..............page:3045-3049
Improved algorithm of adopting feature correlation difference to optimize distance
ZHOU Jing;LIU Jin-sheng
..............page:3178-3181
Application of color mutual information on cell image segmentation
JIANG Xian-gang;LIANG Qing;SHEN Tao
..............page:3099-3101,3152
Research and implementation of PP problem of FMM algorithm on GPU
LI Zheng-jie;XU Wei-min;CHAI Ya-hui;ZHENG Yan-heng
..............page:3050-3053,3169
Generation method of collaborative leaming task based on leamers\' personality characteristics
SHEN Li-min;LIU Jian;YOU Dian-long;LI Ya
..............page:3135-3139
Individuation privacy preservation based on lossy join
ZHANG Zhi-xiang;JIN Hua;ZHU Yu-quan;CHEN Geng
..............page:2938-2942,3018
Application of fuzzy synthetic decision on comprehensive quality evaluation of postgraduate
JIANG De-long;YIN Shu-ping;SHI Li;LUO Song-tao
..............page:3208-3212
Improved AOMDV routing protocol based on energy-balanced strategy
HU Ping;ZHANG Jin-zhong
..............page:2976-2979
Application on H.264 motion estimation algorithm in video of angiography
WANGYan-nian;PAN Jing-si;XIN Dong
..............page:3095-3098
Algorithm study of snake-like robot\' s gaits based on morphology
JIANG Xiang-jun;WEI Wu
..............page:3140-3143
Shuffled frog leaping algorithm with memory function
DAI Yong-qiang;WANG Lian-guo
..............page:3170-3173,3202
Balanced probabilistic model and its application on feature matching
AI Chun-lu;CHEN Ying
..............page:3106-3109