Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2002 Issue 16
The Research of Remote Experiment Based on Internet
kang rong xue ; jia hai bo ; zhang you yun
..............page:168-170
IP Multicast Desktop Conference in TAPI 3.0
gui ning ; chen song qiao ; huang dong jun
..............page:165-167
The Research and Development of Integrated MIS Based on Large Circulation Business
jiang zhe yuan ; hu guo hong
..............page:162-164
A Solution to a King of Nonlinear Integer Programming Problem with Computer
wan guo cheng ; tian xiang ; ren zhen
..............page:80-82
Research on Continuous Speech Recognition Based on Artificial Neural Computer
zhou xu dong ; zhao he ming ; gu xiao dong
..............page:83-85
Automated Biometric Personal Identification and Verification--BioID
li xiong jun ; su ting zuo
..............page:86-89
The Studying of Decision Support System Based on Rough Set
xu zuo ; xu fu yuan
..............page:90-92
Management and Control Structure in Multi-experts System
yang zhan min ; zhang li qun
..............page:93-94,217
Face Recognition System Based on Multilayer Neural Networks for Motion Invariant Pattern Recognition
yuan you wei ; jin ke yin ; zhan han hui
..............page:95-96,249
How to Realize Parameters Transfer between Windows in PowerBuilder
zhao xue feng ; zhang jin long ; cai shu qin
..............page:148-149,200
Research of Waveform Generator and High Speed Frequency Spectrum Analysis System Based on AWS
cheng xie feng ; zhang shao bai ; feng zhi quan ; li jin ping
..............page:154-156
An Automatic Recognition System of Notes Record
yang ying ; yang lei
..............page:157-158
Researches on Performance Evaluation of Biometric Authentication Systems
zhu jian xin ; yang xiao hu ; ye rong hua
..............page:66-68,85
Mining Optimal Linguistic Valued Association Rules
lu jian jiang ; zhang wen xian
..............page:38-39,42
The Feature Extraction of Text Category and Text Fuzzy Matching Based on Concept
luo san ding ; lu wen yan ; wang hao ; jia wei jia
..............page:97-99,104
Implementing Access Control on CORBA with RBAC
li pei wu
..............page:100-101,112
The Implementation of PowerPoint Documents Automatically Marking Function for Computer Operating Test
zhan guo hua ; yao zheng wei ; zhang liang
..............page:102-104
Construct a Assembly System with XML,Java and Workflow Techniques
jiang jian min
..............page:105-106,109
Chinese Intelligence Telephone Number-input Technology and Its Applications
luo ren ; xu xiao ge ; guo xi bo ; guo sheng fang
..............page:107-109
Discusses on General Analysis and Design of Information System
li yan hong ; di wei ; chi zhong xian
..............page:171-173
A Simulation System Based on VR for a Carrier Crane
zhang jie ; zou ji gang ; zhang rui ; li wen xiu
..............page:174-175,178
Design and Implementation of Smart Card Operating System with Dual Interface
hao xiang yu ; xiong zuo ; gong sheng rong
..............page:176-178
Study and Implementation of Reservoir Model Visualization
niu wen jie ; zhu da pei ; chen qi ming
..............page:179-181,222
The Computer System of Conk out Detecting on Mainframe of Continuous Casting
hao pei feng ; zhang li ; liu hui lin ; wu jian ming
..............page:182-183,203
Research on the Application of Object-oriented Technology in CIMS
zeng zuo fang ; si zuo ; zou yi ren
..............page:110-112
A Method for Forming Stress Images
yang ji xin ; chen ding fang
..............page:113-114
A Face and Fingerprint Integrated Recognition System
yu dong liang ; su guang da
..............page:115-117,144
The Research and Development of Embedded TCP/IP Protocol
li ming ; kang jing qiu ; jia zhi ping
..............page:118-121,135
The Technology of Wormhole Routing in Network's System
zuo zhong ; yuan wei ; xu wen zhi
..............page:122-123,131
Paralysis Control Policy of TCP
chen yu lin ; liu wei guo ; liang jian wu
..............page:124-126
A New Technology of the E_commerce Security--XML-PKI
tang zhi hong ; long yi hong ; chen you ping ; zhou zu de
..............page:132-135
A Solution of Extended Storage Area Network Based on Fibre Channel
han ping ping ; wang dong ; qian song rong
..............page:77-79
An Algorithms For Parameters of an Image Irregular Boundary Circle
zhang hong min ; he jian ying
..............page:75-76,243
Research on the Approach of Real Time Visual Inspection of PCB Defective Image
liu shang jun ; cheng xian ping
..............page:71-74
User Authentication System Based on User's Typing Style
qu wei guang ; song ru shun
..............page:69-70,92
Intelligent Information Agent with Ontology on Semantic Web
li wei hua
..............page:136-138,156
Subgroup Technology of Internet E-mail
he dong ; li tao shen
..............page:139-140,212
A Scheme of Using Dictionary Method to Compress Data in Data-Warehouse
zhang leng ; hong yan ; zuo chun
..............page:141-142,231
Research on the Data Clustering Techniques
zhang rong
..............page:145-147
A Routing Protocol Utilizing on-Demand Routing Strategy for MPRN
yuan da ; song zuo tao
..............page:36-37,48
Task-based Adaptive Distributed Computing Technology Researh
wang ji zuo ; zhou xing she
..............page:33-35
Study on Logistics Information System Based-on Reactive Agent
gao lin zuo ; li long zuo
..............page:27-29
Research on Asymmetric Watermark
zou zuo xiang ; li jin tao ; peng cong
..............page:7-10,54
Research on Several Typical Switch Fabrics Used in IP Router Design
cheng sheng ; zhu xin ning ; zhang chun hong ; ding zuo
..............page:4-6
Current Status and Prospect of Spatio-Temporal Data Mining in the Mobile World
chen jie ; tang shi wei ; yang dong qing ; wang teng zuo
..............page:1-3
Disposal of Information with Uncertain Borderline --Fuzzy Sets and Vague Sets
xu jiu cheng ; an qiu sheng ; wang guo zuo ; shen jun yi
..............page:24-26,82
The Running Monitoring and Realization on WfMS of Software Development
shi yu liang ; yang shao jun ; wang hai yang
..............page:254-256
IPv4 to IPv6 Transition Mechanisms
sun hong bing ; shi jing lin ; zhong sheng
..............page:20-23,35
A Scheme of Mixed Public-key Cryptosystem Based on Elliptic Curve
han yi liang ; yang xiao yuan
..............page:61-62,74
Variable Structure Control Based on Block Control Principle
hu yun an ; guo xiao jun ; dai shao wu
..............page:58-60
Soft Sensing Method of Kappa Number During Batch Cooking Process Based on Qualitative Knowledge and Linear PLS
li xiang yang ; zhu xue feng ; huang dao ping ; liu huan bin
..............page:55-57
A Symmetric Block Encryption Scheme Based on Chaotic Series of Neural Networks
liu nian sheng ; guo dong hui ; wu bo zuo ;gerard parr
..............page:49-54
Study of Improved Mobile IP Protocols
tang hong ; wu zhong fu ; nie neng ; zhao jun ; xiong si min
..............page:43-45,48
Conformity of Moving Images Sequence
wang guo feng ; liu bao fu ; zhang ke ; li yan jun
..............page:18-19,42
Design and Implementation of Agent Based Application System Security
li hai gang ; wu qi di
..............page:15-17
Analysis and Comparison on Windows' Video Driver
chen jun ; hu rui min
..............page:11-14
Application of Finite Element Method in Parallel Product Design
li shao bo ; xie qing sheng ; zhang hai sheng
..............page:247-249
Data Manipulation and Query Optimization in SCDDWS
gao ai qiang ; li qing zhong ; yang shao jun ; hong xiao guang
..............page:250-253
Verilog Compile Techniques in Support of Parallel Simulation
li zuo ; li si kun ; guo yang ; liu gong jie
..............page:184-187
The Translation from C Language into VHDL of SOC System
zhao jian zhou ; zhu ming ; bian ji nian ; xue hong xi
..............page:188-190
DFT Techniques in a General-purposed CPU Chip
li hua wei ; li xiao wei ; yin zhi gang ; lv tao ; he rong zuo
..............page:191-194
A Distributed Object Middleware System:StarBus
wu quan yuan ; jia yan ; zhou bin
..............page:195-197
Solid Modeling of CAD Standard Parts Database Based on Network Technical
liu yong hong ; ren gong chang ; zhang you yun
..............page:198-200
An Algorithm for Planar Subdivision Traversal Based on Visibility of Edges
pan rong jiang ; meng xiang xu
..............page:201-203
Extended Internal Model for High-level Behavior Description
zhu ming ; bian ji nian ; xue hong xi
..............page:204-206
A Pre-conditioned Method in the 3-D Parasitic Capacitance Extraction with the Direct Boundary Element Method
wei hong chuan ; wang guang hui ; wang ze yi
..............page:207-209
Signature Technology of Digital Engineering Drawing
zhao ya wei ; zhang hai sheng
..............page:210-212
A New Hidden-Line Algorithm of Intelligent Solid Geometry CAI
ma ting huai ; zeng zhen bing ; li shao bo ; zhang hai sheng
..............page:213-214,243
An Implementation of the SoC On-Chip-Emulator and Interface Used JTAG Architecture
wang yong sheng ; ye yi zheng ; xiao li yi ; wu jing ting
..............page:240-243
A New Method of Terrain Mathing of Vehicles in Virtual Environment
pan xiao hui ; wang lin xu ; li si kun
..............page:215-217
The Research of Design for Test Technology of Embedded Microprocessor
gao shu jing ; shen sheng yu ; li si kun ; pan zhen kuan
..............page:218-222
An Environment of Hardware/Software Codesign for Embedded System
wang shi hao ; yan ying jian ; wu qing ping
..............page:223-225
A New Method for Drawing Contour Lines
diao lu hong ; zhang cai ming
..............page:226-228
The Research and Design of Human-Computer Interface Based on CSCW
wei wei ; tang yong ; ding guo fang ; shen jian fang
..............page:229-231
The Research and Implementation of a Product Parametric Model Based on the Extended Directed Graph
xu yan ning ; meng xiang xu ; yang cheng lei
..............page:232-236
The Application of Inspeck 3D-DF in Digital Museum Project
rong guo dong ; meng xiang xu
..............page:237-239,253