Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer and Digital Engineering
1672-9722
2008 Issue 5
A Case Study of Deploying J2EE Project on Redhat Linux
Gao Liwen;Huang Huajun
..............page:189-192
A Game on Demand Algorithm Based on Internet
Zhao Changmin;Liu Jinyi
..............page:193-195,202
City Tunnel Traffic Flow Analysis Based on Data Mining
Zhong Luo;Meng Bibo;Yuan Jingling;Zhou Ti
..............page:196-198
Study and Design of the Algorithms of University Course Automatic Arranging
Li Zhijuan;Wang Guan
..............page:199-202
Study on a Military Talent Selection Model and Its Implementation
Wang Wei;Yang Jing
..............page:86-89
Research on Semantic Extended Model of Information Filtering System
Li Nianwei;Wang Baopeng;Wang Houxiang
..............page:74-77
Analysis of Management of Spatial Data
He Quanbing
..............page:70-73,96
Research on Data Distribution Service's Architecture
Lu Chuanfu;Cai Zhiming;Xia Xuezhi
..............page:67-69,82
Graded RBAC Model and Its Applications on the MIS of Multi-Campus University
Xue Shengjun;Yan Changlong
..............page:64-66
Application of Data Mining to Strategic Management
Zhao Quan;Yang Liping;Kuai Zhiren
..............page:59-63
Deign of PDA Based on Intel PXA270 Processor
Xiong Yu;Zhou Jun
..............page:181-184
Research of Digital Watermarking Algorithm Base on Space Encoding
Li Jingfu;Zhu Xianwen
..............page:104-106,113
Implement of Output Data Stream Log
Wang Gang
..............page:90-92,103
Design and Realization of Information System Based on the Communication Agent
Zhao Weiwu;Zhou Hanzhong
..............page:93-96
Design and Implementation of Authorization Management System Based on RBAC
Rao Wenbi;Chen Dandan;Wang Chuang
..............page:100-103
Performance Analysis of Blocking Combinatorial Networks
Ye Bo;Feng Yonghua;Yang Zhuang
..............page:55-58
Research on the Algorithm for 0/1 Knapsack Problem
Li Beidou
..............page:23-26
Joining between Adjacent Rational Bezier Surfaces
Yan Lanlan;Wu Guogen
..............page:19-22,41
Introduction of Research on Multi-Objective Evolutionary Algorithms
Qi Weixi;Li Bin
..............page:16-18,26
Numerical Computation and Checkout of Torpedo Body`s Drag Coefficient and Lift Coefficient
Gao Kongjun;Sun Jiong;Li Xiongfei
..............page:11-15
Research on Algorithms of QoS on Terabit Switcher
Yang Ying;Wang Xueshun
..............page:46-50
Research on the Application of USB Connection MIL-STD-1553B Switch
Gao Fei;Chu Xiaojun
..............page:172-173
Depth-traversing of XML Document Based on ASP.NET
Yu Fang;Hu Shanquan;Xiao Weidong
..............page:170-171,188
Research of Video Shot Detection Technology in CBVR
Sun Ning;Sun Jinguang;Sun Yu
..............page:164-166
Based on the Data Warehouse Dimensional Modeling Optimization
Liu Jun;Peng Lu
..............page:160-163
Research on PDF Information Extraction Technology Based on XSLT
Song Yanjuan;Li Jinming;Chen Zhenbiao
..............page:156-159
Design of the Intellectual Management of Parking Lot Based on RFID
Liu Bo;Song Qingheng;Hu Sanqing
..............page:153-155
NOx Estimation Based on High Temperature Low Oxygen Flame
Liu Mingjun;Dong Zengshou;Zhang Fengchun;Wang Yun
..............page:147-149
Configuration Software on Underground Channel Supervisory System Application
Zhong Luo;Wang Wei;Yuan Jingling
..............page:145-146,184
Influence of Noise on the Image and the Magic Squares Scrambling
Zhang Zhen;An Jianwei;Zhang Peng
..............page:139-141
Image Segmentation Coding Algorithm Based on Multi-threshold
Lei Hui
..............page:137-138,155
3D Reconstruction of CT Image Based on the ay-Casting Method of VTK
Mei Kangping;Zhang Hongmin;Li Xiaofeng
..............page:135-136,144
Eyelid Location in the Iris Area
Shi Yongtao
..............page:132-134
Research on Electronic Commerce Security and Techniques
Zhang Xuzhen;Zhou Jianling;Wei Jinxin
..............page:121-124,134
Analysis of Client's Authentication in HTTPS
Deng Xiaojun;Shen Hao
..............page:118-120
A Detection Algorithm Based on Artificial Immune Network(ai-Net)
Wang jun;Ran Chunyu
..............page:114-117
Implementation of Firewall Dual System with Load-Balance
Chen Xu;Xiao He
..............page:110-113
Research and Design for Secure Transmission of Data Based on Encrypt Algorithms
Zhang Xiaoqiang;Wang Feng;Gao Kaiming
..............page:107-109
Analysis of Fuzzy Synthetical Judgement Lost Efficacy
Zhou Lirong
..............page:42-45
Study of Data Transfer between C+ + and FORTRAN Language in Engineering Software
Qiu Yongyun;Qiu Xiangwu;Zhao Zhian
..............page:38-41
A Object-Oriented Rule Language for Business Analysts
Lv Liangshuang;Cai Huan
..............page:33-37
Genetic Algorithm Based on Blending Population After Every Given Generations
Yang Xingchun;Li Jin
..............page:30-32,63
Research on Classification Algorithms in Distributed Data Mining
Zeng Huihong;Bin Ning
..............page:27-29,37
Algorithm Research of Vein Recognition Based on Characteristic Point
Chao Yuzhong;Guo Qingping;Lian Xiaoli
..............page:1-3