Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 13
Algorithm of Spatial Select Query in GIS Based on the Improved Quadtree --with the Case of ESRI SHAPE File
dong peng ; yang chong jun ; zuo xiao ping ; gao ji liang
..............page:58-61
ServerScope :A New System for Performance Evaluation Is Proposed
jiao li mei ; sun ning zuo ; zuo xing jun
..............page:55-57
A Network Intrusion Pattern Abstract Algorithm and Its Application
ling jun ; cao yang ; yin jian hua ; xu guo xiong ; huang tian xi
..............page:51-54,57
Research on Optimizing Method for Image Vectorization
xie ming hong
..............page:48-50
Use Data Smoothness to Suppress the Doppler Error of Radio Altitude Meter
chen zuo peng ; zhang bao wen
..............page:46-47,67
Modification and Optimization of Slice Profile Data on STL Model
zhao ji bin ; liu wei jun ; wang yue chao
..............page:43-45
Research and Design for Spectral Image Capture System Based on USB2.0 Bus
chen jian xin ; xue yong zuo ; liu yin nian ; wang yue ming
..............page:151-152,189
Minterm-Encoding Based Algorithms :the Design and Realization of the Mimizer for Combinational Logic Circuits
wang bo ; guan zhi jin ; liu wei fu ; gu zuo ; qiu jian lin
..............page:153-155,199
Design and Implementation of Data Communications in a Particular CAD System
zheng wen bin ; sun shou qian ; pan yun he
..............page:156-159
Design of a Portable Popular Multifunctional Development System for 8051 Single-chip Microprocessor Family
shao jian long ; he chun ; lu cheng ; yang jia lin ; jin jian hui ; fang quan zhong
..............page:160-162
The Design and Implementation of a Dynamic and Flexible Workfiow Platform
chen yong ; wang zuo ; lu zuo
..............page:163-165,171
A Simple and Effective Algorithm for Prohibiting Rejection in Remote Recruit System
he zuo ; ye ke jiang ; xing dong shan ; yuan ye ; xia hua
..............page:166-167,178
Research on Component-based Distributed Constraint Management System
zuo chong jun ; wang run xiao ; yao zuo ; tan shao min ; luo zhi qing
..............page:148-150
Four Analogies:How to Produce High Quality, Easy Maintained Use Case Model
liu jin ; zhang yue qiang ; hu qi ping
..............page:145-147,175
Methods of Data Flow Analysis
li hui xian ; liu jian
..............page:142-144
A Workflow Model for OA System
yu le ; lv qiang
..............page:138-141,150
The Study on Some Problems of Support Vector Classifier
zhu yong sheng ; zhang you yun
..............page:36-38
Neural Network-based Model of Evaluating Enterprise Credit
xu zhi biao ; wei gang
..............page:62-63,67
Research on Mixed ITAE and H∞ PID Robust Control of the Flexible Manipulator
cui ling li ; xiao zhi quan
..............page:64-67
Policy-based Network Security Model and Formal Description
dan rong sheng ; wang ming zheng ; li jian hua
..............page:68-71
A New Method to Extract Structure from Chinese Addresses Using Data Mining Technology
li bao lin ; wang xiu feng ; lan zuo ; duan fei
..............page:72-74,87
State-of-the-Art of Software Testing Methodology and a Prospect
xu jing ; chen hong gang ; wang qing ren
..............page:75-78
DPMAS :A Multi-agent Design Methodology
zhao zhi ; yang zhi wen ; shi zhong zhi
..............page:79-82,144
A New Method for Iris Recognition
lin jin long ; shi qing yun
..............page:83-84,137
Clustering Based on Possibility Theory
chen yuan pu ; yin jian wei ; dong jin xiang
..............page:85-87
Study on the Classification Methods of the Hyperspectral Image Based on the Continuum Removed
bai ji wei ; zhao yong chao ; zhang bing ; tong qing zuo ; zheng lan fen
..............page:88-90,128
Unified Modeling Strategy and Implementing Method for Manufacturing Process Resource
ge peng ; yin guo fu ; gao wei
..............page:91-93,97
An Introduction and Survey of Application of Genetic Programming
zhang zong hua ; zhao lin ; zhang wei
..............page:94-97
Control Rules Generating Method Based on Rough Sets
zhang zuo ;julia johnson; wu bin ; liu zhi gui
..............page:98-100
Research on a DCT Image Watermarking Algorithm
yang wen quan ; lu yang
..............page:101-102,105
The Image Classifying Based on Rough Set Theory
dong guang jun ; fan yong hong ; luo zuo
..............page:103-105
Research of Distributed MSP Algorithm Based on GA
jin ke yin ; jiang wei jin
..............page:106-108
Design and Realization of an Adaptive Shot Detection System
xie zuo xiang ; zuo xi dao ; wu ling da ; lao song yang ; wang chen
..............page:32-35
Methods for Assessing and Strategies for Evolving of Legacy Systems
zhang you sheng
..............page:29-31,35
A Study of Complex Adaptive System Based on the Game Theory
li zhen long
..............page:25-28
A Novel Particle Swarm Optimization Algorithm
wang sui hua ; feng nai qin ; li ai guo
..............page:109-110,134
Knowledge Reduction Based on Tolerance Rough Sets Theory
zou xian xia ; du wei ; wei chang hua
..............page:111-113
A Method Applied for Precise Segmentation of the Characters in the ID Card
zhang zhen ; huang shan ; li zuo zuo ; yan guo li
..............page:114-116,128
A New Image Segmentation Method Based on Morphologic Feature
hu ai ming ; zhou xiao kuan
..............page:122-124,134
The Data Reduction's Method Based on a Prior Probability
zhang huai zhong
..............page:125-126
Designing One Kind (1,t,n) of Threshold Group Signature Scheme
wang zhi wei ; shen qing hao
..............page:127-128
Data Quality Managements in Data Warehouse
fang you lin ; yang dong qing ; tang shi wei ; zhang wei hua ; yu li bo ; fu qiang
..............page:1-4
Role-based Cluster Application System
zhu lu hua ; shi jun ; fei zuo ; you jin yuan
..............page:132-134
A Kind of Fast Reconstruction Algorithm for Discrete Sampling Image
liu li xiang ; xie jian ying ; wang ming zhong
..............page:135-137
Analysis of Proxy Web Cache Performance
gu li hong ; wu shao gang
..............page:168-171
The Implementation of iSCSI Protocol and the Analysis of It's Performance
shao hua ; xie chang sheng ; han de zhi
..............page:172-175
Modification for BB84 Quantum Cryptographic Protocol with Noise
ren cheng bo ; xu qiu liang ; ren guo zhen
..............page:176-178
A Computer Match Agency Based on Internet
hu hua ; song he qing
..............page:179-180,193
The Performance Analysis of Fibre Channel and iSCSI Protocols for Storage Area Network
wei feng ; zhou jing li ; lin zhi ; yu sheng sheng
..............page:181-183,186
Design for CAD/CAM System of Turret Type CNC Punch Press
liao xiao ping ; wang lie ; wang xiang ; wu mu xia ; zhou yan ming ; liang hong
..............page:221-223,226
Operation-oriented Interaction of Surgery Simulation
su yong song ; xu zhong xin ; li hao zi
..............page:224-226
The Combination and Application of CRM and DM in Campus Information System
ren cheng ye ; luo wei qi
..............page:230-232
Research of Autonomous Movement of CMM
liu xiao liang ; ma shu yuan ; wu ping dong ; liang zhen shi
..............page:22-24
Transversal Theoretic Model with Its Algorithm in DNA Computing
li shu chao ; xu jin ; liu guang wu ; li wei de
..............page:19-21,28
Analysis of Failure Model for the Mobile Agent
cheng xin ; yang xiao zong
..............page:16-18
The Designing Browser Model of ElastOS
zhu jian min ; chen zuo ; ni guang nan
..............page:13-15
The Study of Monte Carlo Simulation for Maneuvering Targets Modeling
dang jian wu ; wang rui ling ; huang jian guo
..............page:9-12
Method Research on the Surface Creation of 3D Complex Solid Object
pan zuo ; chen xue gong ; xue sheng ; wei xiao ya
..............page:7-8,24
A New Approach for Image Thinning Based on PCNN
gu xiao dong ; cheng cheng qi ; yu dao heng
..............page:5-6,28
A Scalability & Security Network Model Based on Agents
zhou tao qing ; tong xiao nian
..............page:184-186
Research and Implementation of EDI Based on XML
wang zi qiang ; feng bo qin
..............page:187-189
An Agent Communication Model Based on Schemata
lv zuo ; gu jun zhong
..............page:190-193
The Application and Research of Network Attached Storage
li shi chang ; yang hao lan ; li shi ya ; tao yang
..............page:194-196
Design and Implementation of Documents Retrieval System Based on Berkeley DB
sun zhe ; zhang ming ; tang shi wei
..............page:200-203,220
An Algorithm of Mining Default Rules with Multiple Supports
yang ping ; yang ming ; sun zhi hui
..............page:204-205,211
The Research of Image Retrieval Methods Based on Spatial Relationships
wang li ping ; qiu fei yue
..............page:206-207,220
Mining All-weighted Association Rules from Vector Space Model
tan yi hong ; lin ya ping
..............page:208-211
An Applied Incremental Updating Algorithm for Mining Association Rules
xue jin ; chen yuan bin
..............page:212-213,217
An Application of Map Data with Maplnfo Format in Embedded Navigation System
li jie ; fu meng yin ; deng zhi hong
..............page:214-217
A Fast Algorithm of the Window Transformation for DICOM Medical Images
zhang you sai ; chen fu min
..............page:218-220