Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2003 Issue 32
The Design of Simulative Program OOP Adopted Based on Finite Element for the Separation Process of Chromatography
xu ling ; bian ji dong ; cai yu jie ; peng qi jun
..............page:124-126
An Efficient Implementation of Elliptic Curve Cryptosystems over GF(p) on MCS51 Microcomputer
kuang bai jie ; zhu yue fei ; zhao tao ; wang chun ying
..............page:127-129,134
An Internal Model Principle Using Single Chip Computer
zhang yi guo ; wu jia ju ; ren ji lin
..............page:135-136,160
An Automatic Categorization Method Designing for Query Result in Digital Library
he yue shun ; du ping ; ding qiu lin
..............page:133-134
Implementation of Inter-operation between EJB and CORBA
zhao yin hua ; hou di ; qi yong
..............page:148-150
Study and Implementation of Generic Agent Auto-generation System
cao li hong ; yang zheng qiu ; meng luo ming
..............page:151-153,184
Study of the Communication Service Interface on XML
chen hong ; xia yin zuo ; kang jian chu
..............page:154-156
A New Fast String Matching Algorithm for Intrusion Detection
song hua ; dai yi qi
..............page:48-51,89
Compared with Typical Programming Models in UNITY
xiao mei hua ; xue jin yun ; hua zhi zhang
..............page:52-54,104
Acquirement of Anchor Word Candidate Set Based on Statistical Approach
ren fei liang ; lv xue qiang ; wu hong lin ; yao tian shun
..............page:55-57,80
Properties of Rough Groups
tao xian hua ; hao zhi feng
..............page:58-59,115
Modeling and Enactment of Workflow Specification Based on XML and ECA Rules
yang dong ; wang ying lin ; zhang shen sheng
..............page:62-65,110
Realization of the Reduction Methods of Petri Net in the System
yang xue ; jiang chang jun
..............page:66-68
The General Method and Applications in the Multi-access System of Computer Simulation
ling yong fa ; gao fei ; yin shi tang
..............page:69-72
A Uniform 3D_LUT Method Based on Neugebauer Model
xue yang ; zeng ping
..............page:76-77,107
Research on Collision Detection in Jack-based VE
zeng li wei ; lv chuan
..............page:78-80
A Solution of Creating Cluster Parallel Computing Environment
luo sheng xian ; zou zuo
..............page:81-83
A Method Based on Genetic Algorithms to Minimize Faults Set
zhang tao ; jiang fan ; wang yuan
..............page:84-86
Representation for Polygons with Implicit Function
wu jian ; wang xiao chun ; jiang hong ; zheng kang ping ; li run fang
..............page:87-89
A Practicable Method for Fairing B-spline Curves
zheng kang ping ; jiang hong ; wu jian ; wang xiao chun
..............page:92-94
Numbering System Transformation
wang lei ; wang xi lei ; wang jian
..............page:95-97,100
Color Grading Method Using Histogram Clustering
zhou ya an ; zhong ke hong ; zhou cheng ping
..............page:98-100
The 3D Space Curve Matching Based on Invariant Feature Quality
lin zeng gang ; zhou ming quan
..............page:105-107
Application of Intelligent Object-based Knowledge Processing Method in Expert System
yu tong min ; liu tie shan
..............page:108-110
Adaptive Fuzzy RBF Networks Learning for Autonomous Multi-robots
zhang wen zhi ; li zhi jun ; lv tian sheng ; luo qing
..............page:111-115
Study on Agent Operations and System Evolution
zhang you sheng
..............page:30-32
A Temporal Modal for Intrusion Signatures
ou yang ming guang ; wang wei nong ; zhang yong
..............page:27-29
General 16 Bit CPU Design and Implementation
zhang kai ; tang zhi zhong
..............page:116-117,181
The Design and Implementation of a Generic X11 Clipboard Manager
guo peng ; wang lei ; wang xu
..............page:121-123
The Mobile Computing and the Future Education
liang xin yuan
..............page:33-35,86
Analysis of Socksv5 Server's Running Modes
zhou yuan shao ; yang wu jie ; chen xing shu ; han zhen
..............page:137-139
Video Transmission over IP DiffeServ Networks
zhu xiao song ; chen min ; yu ying lin
..............page:140-143,208
Analysis of Necessary and Sufficient Conditions of Load-Balancing for Parallel Packet Switch
li yin hai ; dong yu guo ; guo yun fei
..............page:144-147,221
PKI Policy and its Realization in PKI Systems
huang dai man ; wang wen dong ; liu xiang wu
..............page:157-160
Analysis of Signature Based Network Intrusion Detection
chang ; tian jie ; li heng hua ; yang zuo
..............page:161-163,166
The Design and Implementation of Embedded Ethernet Communication Based on PIC16F877
zhang fan ; ou yang hong lin ; yu ying tian ; tong diao sheng
..............page:164-166
Linux System Call Hijacking:Technical Principles, Application and Detection
shi jin qiao ; fang bin xing ; hu ming zeng ; li bin
..............page:167-170
A Survey of the Approaches of Intrusion Detection System Evaluation
wang yang ; gong jian
..............page:171-173
The Data Warehouse for Ministry of Finance
huang rong ; dang qi min ; chen bao shu
..............page:190-193
Rough Set-based Weighted Decision Algorithm for Database Information Mining
gong jian min ; wang guo sheng ; xiao zuo lei
..............page:198-200
An Internet-Based Manufacturing Resources Information Gathering System
gu xue min ; sun shu dong
..............page:201-203
Research on Hybrid Petri Nets Modeling of Oil Refining Production Schedule
wang bo xing ; yao jian chu ; xiao ren bin
..............page:204-205,215
Selection and Application of Software Architecture
zhang you sheng
..............page:206-208
An Approach of TV Program Recommendation for Multiple Viewers
zuo zhi wen ; gu jian hua ; zhang yong ; zhou xing she
..............page:24-26
An Automatic Mesh Generation System of KMAS
hou wen bin ; yang guang ; hu ping ; wang su wen
..............page:22-23,26
A Dynamic Conception Approach to Mining Classification Rules with Continuous Attributes
zhang wei gang ; pan quan ; zhang hong cai
..............page:18-21
Acquiring Color Features Directly in MPEG Compressed Video
zheng peng ; zhou dong ru
..............page:15-17
Analysis of the Performance of ARQ Schemes
ren yan ying ; zhang wen jun ; wang bin
..............page:13-14,72
An Efficient Data Structure Suitable for the Meshing Environment
zhao jian jun ; wang qi fu
..............page:1-3,6
Firewall Technology Based on IP Multicast
he ya yun ; fu guang xuan
..............page:174-176
Improved Solution for OSPF Flooding Algorithm on Redundant Multi-links
ma jun feng ; jiang yan jun ; ma yue
..............page:177-178,193
Dynamic Access Control Mechanism for Firewalls
zheng wei bin ; zhang de yun ; li sheng lei
..............page:182-184
Color Image Retrieval Using Both Color and Texture Features in Object Regions
liu ning zhong ; yang jing yu
..............page:187-189,203
A Stochastic Method to Modify the Selectivities of the First Reaction in Kumar Model
hu yi feng ; li zuo ming ; xu yong zuo ; he xi ou
..............page:10-12,21
New Models and Principles on Computer-Oriented Innovative and Creative Design of Products( Ⅰ )
yang guo wei ; wang xian mei ; tu xu yan
..............page:7-9,47
Research and Application of Neural Network Model Based on Information Fusion
su yu ; zhao hai ; wang gang ; wei shou zhi ; su wei ji ; zhang xiao dan
..............page:4-6
Practice of Turf Information and Decision Support Based on PHP+MySQL+Apache
fang yu dong ; zhang zhi guo ; ren yong gong
..............page:213-215
A Study and Realization on Automatic Match System in E-Commerce Platform Based on J2EE Frame
zhang long ; liu lian chen ; zhang lin ; wu cheng
..............page:216-218,228
Study of Process Optimization and its Application on Business Flow Management Systems
wang zuo ; yao shu zhen ; lin guang yan
..............page:222-225
Design and Implementation of Remote Supervision System Based on Public Telephone Network
zhang gang ; zhou zu de ; zheng ding fu ; chen you ping
..............page:226-228