Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Digital Engineering
1672-9722
2006 Issue 2
Implementation of UDP Protocol in Embedded System
Tian Xiali;Wang Jijun;Xue Shengjun
..............page:104-105,138
Use of DataGrid in ASP.NET
Zhang Nengli;Li Xin
..............page:106-108
Building Secure Web Services with .NET Remoting
Li Chaorong;Li Hailong;Zhang Ying
..............page:109-111,128
Architecture of J2ME Platform and Application Development
Ouyang Quan;Xu Xiangyang
..............page:112-114
An Application of Cluster Server Technology for Jabber System
Zhang Wei;Sheng Yizhi
..............page:115-117
Design and Realization of UML Modeling for Campus Cable Internet User Management
Wang Lidong;Zhu Xiaoyu;Wang Guangyang;Yuan Zhixiang;Wu Qilin;Tang Shougao
..............page:118-120
Use VB6.0 to Program Multimode Serial Communication Program
Hou Zhijun;Gao Yuanyuan;Sha Nan
..............page:100-103
Application of Model Checking in Software Testing
Zhang Ningning;Liu Mengren
..............page:93-96
An Implementation Technique of HCI Style Switching at Runtime
Liu Hua;Huang Longshui;Cao Wanhua
..............page:90-92,96
A Research on Chaotic Encryption of Digital Watermarking Algorith m of Image
Long Wei;Wen Yuanyuan;Gao Zheng
..............page:84-86
Communication of the Embedded Systematic Network
Huang Weihua
..............page:74,78
Research of CRM and the Application in CRM with Data Mining
Guan Xin;Li Yijie
..............page:67-69
Study on the Security of E-government Network
Zhao Yuesong;Zhang Xuan
..............page:57-59,63
Research of WS-N Based Publish and Subscribe Message Mode
Lu Chuanfu;Qian Xinghua
..............page:52-56
Creating and Analysis of Depth-map in Parallel Two-eyes-visual System
Li Haijun;Pan Xiaolu;Li Yimin;Wu Gang;Luo Minggang
..............page:50-51,56
A Method of Improvement for Real-Time Fault-Detection Mechanism in PVM
Zhang Guoping;Xia Xuezhi;Tu Kui;Wan Wenfu
..............page:1-4,11
Self-Similarity Nature Influence on Network Technology
Tan Xiaoling;Mei Chenggang;Liu Lan
..............page:5-7,38
Honeypot System to Detect the Unknown Network Attack
Xiao Rong;Zeng Shaojie;Yang Wenwei
..............page:12-14,23
An Ant Colony Algorithm Based New Algorithm for TSP
Lin Haibo;Yan Xuefeng;Qian Feng
..............page:15-16,43
Image Dynamic Updating and Displaying System Based on XML-SVG
Huang Haosheng;Li Yan;Qiu Ruifeng
..............page:17-20
Enumerating Characteristics of BB Graph
Wang Zhenyu
..............page:21-23
Optimization of the Decision Tree Algorithm about of Interest Degree about Customers
Wang Rui;Zhong Shouming;Yang Jinghao
..............page:24-25,35
A New Communication Encryption Algorithm Based on Chaos
Wang Chengjun;Zhang Fang
..............page:26-29
Research on CRC's Calculating Method
Yang Meijuan;Yin Dechun
..............page:30-31,69
Research of Static Scheduling Algorithm Based on Task Duplication
Liang Hongtao;Yuan Youguang;Fang Ming
..............page:32-35
Compressor Fault Diagnosis Based on Rough Set
Cao Zhuohuang;Xu Nanshan
..............page:36-38
Spatial Data Integration Services for Grid GIS
Deng Shijun;Wu Chenhan;Meng Lingkui;Xu Lin
..............page:39-43
Video Transmission Technology Based on H.264
Li Haopeng;Sheng Yizhi
..............page:44-46
Design and Implementation of Descrambler in Conditional Access System
Hu Xidong;Luo Tao
..............page:121-124
Design of Minimized Internet Based Controller
He Yuanqi;Chu Xiong
..............page:129-131
Study and Design of Web-Based Virtual Labs
Li Xiao;Dong Yunyao
..............page:132-134