Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Digital Engineering
1672-9722
2008 Issue 3
Design of Multi-channel and Multi-parameter Virtual Instrument Based on LabVIEW
li xiao feng ; zhang hong min ; mei kang ping
..............page:148-150
A Wide Voltage Range of Preamplifier Designed for the PLL
Zhang Feng;Chen Yong
..............page:151-153
Research and Application of 2D DataMatrix Barcode in Ticketing System
wang hu ; pu hong ji ; wu zhen yu ; feng lin
..............page:154-156
Application of Software Reuse Technology in PDM System
cai jing ; huang xiao wen ; shen shun cheng
..............page:157-158
ying wen zhai yao
..............page:插1-插6
A Reflective Model of Adaptive Software Component
zhang zuo ; xiao gang ; zhang yuan ming ; gao fei ; lu jia zuo
..............page:39-41,56
Design and Implementation of the Water Pollution Emergency Linkage System
Qian Yun;Zhang Shoudong
..............page:36-38
Design and Implementation of A Large Network Game Platform Architecture
Fu Donglai;Kuang Hua
..............page:33-35
Game Script System Based on Action-set
Yang Ruibo;Yang Kejian
..............page:31-32,144
A Survey of Accelerating Direct Volume Rendering
huang zhan peng ; zhou su juan ; zhao jie
..............page:28-30,73
Vehicle Routing Problem Based on Quantum-behaved Particle Swarm Optimization
li yan fang ; jiang lei ; huang hong liang
..............page:25-27,52
Algorithm Research on linear separated SVM for Text Classification
hu yan ; xiong hao yong ; fu xiang ying
..............page:18-20
Research on Group Collaborative Discussion Environment Based on Multi-Agent
xiong cai quan ; di xing ; wang zi tao
..............page:42-45
An Improvement Memory Management Method Based on Buddy System
Zheng Xiaoxi;Zhang Hu
..............page:46-48,133
Mechanism of Backup and Recovery for Oracle Database Based on RMAN
ma he bang ; zhou jian zhong ; zhao ping
..............page:49-52
Research and Implementation of Data Storage and Visit in Isomeric Data Warehouse
zuo zuo ; li dong ; li xiao feng
..............page:57-59,89
Resarch on D-S Evidential Theory During Multi-sensor Fusion
chen rong bao ; li tian qing ; xiao ben xian ; zhang chong wei ; yang feng
..............page:124-127
Research on the Key Technologies in Manufacturing Industry Based on PDM
Zhang Zhenguo;Wu Di
..............page:119-123
Design of MicroMouse Based on Microcontroller H8/3052
lv qiang ; wang zuo zuo ; wang guo sheng
..............page:116-118,123
Research and Implementation of Unified Control and management of Lighting System Devices
cai xiao feng ; ma shi long ; wang lei
..............page:111-115
Survey of Motion Capture-driven and Motion Editing in the Motion Capture
Shen Juan;LI Jianwei
..............page:103-106,156
Performance Comparisons of Estimations for Rapidly Varied Power Spectrum
lan lai xi ; liu qin ; li jian
..............page:16-17,24
Back up Technology Based on Array and Distributed Mirror Image Service in the Highway Toll Data Centre
zhang chun sheng ; lv li ; tan guo xian ; zeng liu xiong
..............page:145-147
Storage Technology and the Application of Storage Consolidation and Virtualization
yang guang nian ; guo rong liang ; zhang guo zheng
..............page:140-144
A Test Questions Library and Online-Examine System Based on .NET
Xiao Zihong;Zhang Zuping
..............page:136-139
Fuzzy Control Technology in the Ventilation of City Road Tunnel Control
zhong zuo ; yuan jie ; gong zuo hua ; yuan jing ling
..............page:134-135,147
Study on Vehicles Monitoring & Dispatch System Based on WebGIS, GPRS and GPS
wang jing wei ; hao guang rong ; wang jin hui
..............page:131-133
Multi-agent and the Application in the Information Fusion
Wang Jun;Wang Yuanyun
..............page:128-130
Resolution of Animation Design with-no-paper Based on 3D Model
ren jing li ; xie chang min ; xu liang
..............page:98-99,150
Study on Remote Thread Injecting for Hiding Virus
Han Fang;Lun Guosen
..............page:96-97
Study on Network Packets Capturing and Filtering Technique
Huang Wei;Tang Jiayi
..............page:92-95,153
Avoiding Safe Error-Based Attack on Exponentiation
Shen Jing
..............page:90-91,130
Design and Implementation of Image Encryption Based on Chaos Maps
zhao fang zhou ; zhao huai xun ; li shuang ; liu jia zuo
..............page:87-89
Research and Design of Campus Ecard Security Scheme
wang guo wei ; wang rui ; xue yong
..............page:84-86
A Web Service Application Integration Framework Supporting Publish/Subscribe
yuan hong liang ; yin gang ; wang huai min
..............page:81-83
Application of a Based on Resource Utilization Admission Control Method in HSDPA System
liu yang ; zhao zuo bo ; xie yong bin
..............page:74-76
Research of Mobile Agent Communication Security
Song Sixin
..............page:70-73
Study of Setting up Ddigital Watershed Platform Based on WebGIS
Ji Fang;Zhang Wanchang
..............page:66-69,102
Research in Auto-generating Paper
li jian feng ; lu rong bo ; li zong shou
..............page:63-65
Application Research for Virtual Community Base on OpenGL
Xu Xiaodong
..............page:60-62
Application of Machine Learning in Face Detection
Yang Lingxiao;Wu Jianping
..............page:9-13,45
A Strategy Based on Broadcasting for Maintaining MC Cache Data Consistent
liu tao ; jiang wai wen ; hu jing zuo ; song fu qiang
..............page:6-8,38
Design and Realization of Group-based Access Control Strategy
zhong zhen yu ; yu fan ; zuo qian shi
..............page:1-2,62