Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 21
Time Series Frequent Sub-pattern Mining Based on Pattern Representation
Zhan Yanyan;Chen Xiaoyun;Xu Rongcong
..............page:139-142,161
An Algorithm of Constructing Star Model Based on Key Attribute Index HASH Function
Yi Ping;Tang Zeying;Cao Xianbin
..............page:143-145
Research and Implementation of Extracting Topical Information from Web Page
Liu Yanmin;Liu Biao;Feng Huamin;Song Guosen;Fang Yong
..............page:146-148
The Design and Realization of Attribute Incremental Reduction Algorithms on Information System
Xia Fuchun;Miao Duoqian;Li Daoguo
..............page:149-152
A Trust Model Used in P2P Electronic Commerce
Xu Qiaozhi;Liu Dongsheng
..............page:134-138
Cell Network Management System Based on Web Service
Jiang Heqing;Shou Guochu;Jin Hao
..............page:131-133
A Line Drawing Matching Algorithm Based on Improved NRLCC Code
Huang Huachuan;Zeng Jiexian;Zhang Guimei
..............page:35-37,42
Ant Colony Chaos Optimization Algorithm
Xiu Chunbo;Zhang Yuhe
..............page:43-44,98
An Effective Inversion Method for Normal Basis in GF(2m) Using Basis Conversion
Zheng Jiaqing;Liu Jiqiang;Zhao Yong
..............page:45-47
A Study of Data-flow Analysis Framework Based on Lattice
Liu Xiaofeng;Wu Yajuan;Li Mingdong;Zeng Xianhua
..............page:48-51
A New Encoding Algorithm Based on OBDD
Fan Ce
..............page:52-54
Improving Spectral Entropy Algorithm for Endpoint Detection in Short Time Domain
Hou Zhouguo;Qian Shengyou;Yao Chang
..............page:55-56
Logic Inference in Bayesian Network Based on Conditional Event Algebra
Xu Ajin;Yan Yong;Liu Weiyi
..............page:57-60
The Construction of Quasi-cyclic LDPC Codes and its Simulation Performance
Zhong Jingdong;Liang Zhao
..............page:61-63
Building Proof-Carrying Security Programs Based on Coq
Guo Li;Chen Yiyun;Li Long;Li Zhaopeng
..............page:64-67,73
The Realization and Performance Analysis of a Light-weight Embedded Data Middleware
Zhou Xingfeng;Chen Tianzhou;Dai Hongjun
..............page:68-70,94
Realization of Instruction Dispatch for DSP Based on VelociTI Architecture
Hu Zhengwei;Han Yueqiu;Che He;Zhang Xiaoming
..............page:71-73
Design of Reconfigurable Computing System Based on FPGA
Wu Dongdong;Yang Xiaojun;Liu Xinchun;Jiang Xianyang
..............page:74-77
The Research of Component Library Management Framework Based on XML
Yao Quanzhu;Li Xianling;Meng Li
..............page:78-80,133
Application and Realization of the Technology of Procedure Recovery in IA64 Binary Translation
Fu Wen;Wei Bo;Zhang Tianlei;Zhao Rongcai
..............page:81-83,89
Design and Implementation of Embedded Mobile Agent
Peng Lingyun;Long Xiang;Gao Xiaopeng;Chen Wei;Tong Chao
..............page:84-86,126
Research on Configurable Data Processing Engine OptimoDE Technology
Zhou Yimin;Wei Hongxing
..............page:87-89
Cryptanalysis of a Secret Sharing Protocol for Member Expansion
Jin Yongming;Xu Qiuliang
..............page:90-91
A Study of TCP Congestion Algorithm Based on Traffic Forecasting
Xue Jiansheng;Wang Guangxing
..............page:92-94
Design and Implementation of Ad Hoc Networks Using Directional Antennas
Wang Shan;Zhang Xudong;Wei Jibo;Wang Jianxin
..............page:99-102,110
Public Verifiable Signcryption Schemes with Forward Secrecy
Zhang Chuanrong;Zhang Tong;Xiao Guozhen
..............page:103-105
The Conversion between Petri Net Incidence Matrix and Petri Net Markup Language
Wu Zhenhuan;Wang Pengwei
..............page:32-34,47
Bandwidth Utilization Factor and Fairness Policy Analysis of RPR
Chen Mingsong;Zhou Shengyuan;Ao Faliang
..............page:111-113,130
Multipath Routing Algorithm for a Kind of Video Coding in Ad Hoc Networks
Liu Juan;Lin Yaping;Yi Yeqing;Lu Xinguo;Wu Qiaomin
..............page:114-117
On the Model Checking of Wireless Authentication Protocols
Liu Xia;Gu Tianlong;Chang Liang;Guo Yunchuan
..............page:118-120
An Adaptive Dynamic Load Balancing Algorithm
Wang Yue;Cai Wandong;Duan Qi
..............page:121-123
A Role-page Model Based Access Control Method for Web Applications
Ni Wancheng;Liu Lianchen;Liu Wei
..............page:124-126
Trust and Reputation Evaluation Model in Web Services
Su Jindian;Guo Heqing;Liu Miao
..............page:127-130
Design of Biometrics Authentication on PKI in Secure-OSCAR
Bai Zhaohui;Chu Ciping
..............page:153-155,168
Pitfalls in the Upsurge and Feast of Machine Translation
Zhang Keliang
..............page:1-5
Mining User Access Patterns Based on Web Logs
Wang Xin;Ma Wanqing;Pan Wenlin
..............page:156-158
The Research of the Feature Selection Method Based on Rough Set
Chen Sirui;Zhang Yong;Yang Zhiyong
..............page:159-161
Study on Kolmogorov Entropy Based on Chaotic Time Series
Wang Pingli;Song Bin;Wang Ling
..............page:162-164
Similarity Measure between Vague Sets and Its Applications
Feng Lin;Luo Fen;Liu Zhaopeng;Huang Zhiwei
..............page:165-168
Incremental Updating Algorithm Based on Matrix for Mining Association Rules
Niu Xiaofei;Liu Hao;Niu Xuedong;Liu Xiuting
..............page:169-171,206
Evolutionary Algorithm Design of On-line Handwriting Signature Verification
Zheng Jianbin;Guo Zhen;Huang Zhangcan;Zhu Guangxi
..............page:28-31
An Anomaly Detection Method Based on Clustering and Principal Component Analysis
Wang Yang;Huang Tianshu;Du Guangyu
..............page:21-24
Video-Shot-Edge Detection Technology:A Survey
Liu Wenping;Li Yebai;Zhang Changnian
..............page:17-20,24
Conditional Random Fields Based POS Tagging
Jiang Wei;Guan Yi;Wang Xiaolong
..............page:13-16,42
A New AQM Algorithm Based on Time-delay Robust Analysis Technology
Xu Sheng;Xu Bugong;Wu Sai;Xiang Shaohua;Peng Dazhou
..............page:6-8,27
Study on Association Rule Algorithms Based on Vector Inner Product
Liu Yi'an;Liu Qiang;Zou Xiaohua;Wang Shitong
..............page:172-174,182
A Rough Set Based Nearest Neighbor Algorithm for Imprecise Matching between Query and Rules
Hu Junhua;Chen Xiaohong;Liu Yongmei
..............page:175-177
Application of Support Vector Machine in the Data Fitting of Drill Well Engineering
Chen Hua;Fan Yiren;Deng Shaogui
..............page:178-179,213
Optimization for Resource Allocation and Leveling Based on Genetic Algorithms
Liu Weijun;Yuan Jianbo
..............page:180-182
Application of DCOM to Equipment Remote Monitoring and Fault Diagnosis System
Wu Liwei;Chen Jin;Sun Weixiang
..............page:183-185,193
Optimization Control of PID Based on DNA-GA
Wu Tiebin;Liu Zurun;Wang Junnian;Li Wen
..............page:186-188,193
Survey on the Stochastic Optimal Control of Networked Control Systems
Wu Jin;Deng Feiqi;Yang Haidong
..............page:189-193
Face Detection Based on Two-Dimensional Principal Component Analysis and Support Vector Machine
Zhang Xiaoyu;Pu Jiexin;Huang Xinhan
..............page:194-196,199
A Fast Algorithm Based on Grids for Mobile Robot Path Planning
Zhou Guoxu;Tang Xilin
..............page:197-199
The Research of the Data VV&C for the Equipment War Gaming Based on the HLA
Wang Liguo;Xue Qing;Meng Xianquan
..............page:200-202,232
Partner Selection of Agile Supply Chain Based on Immune Genetic Algorithm
Zhang Rui;Xia Na;Zhang Guofu;Chen Jun
..............page:203-206
Vehicle Classification Based on Support Vector Machine
Ge Wei;Zhu Guangxi;Xu Haixiang;Xie Lei;Tao Ping'an
..............page:210-213
Non-regressor-based Adaptive Control of Mobile Manipulators
Wu Yuxiang;Hu Yueming
..............page:217-219
The Research and Realization of Manufacturing Resources Integration Platform Based on XML
Cao Wenjuan;He Weiping;Fang Yadong;Chen Jinliang
..............page:220-223
Application of Survival Analysis in Internet Products' Customer
Lao Congsheng;Li Xiu;Tuo Jianyong
..............page:224-225,232
Hole Detection Based on 2D Maximum Entropy Threshold Segmentation
Guo Lie;Wang Rongben;Jin Lisheng;Yu Tianhong;Gu Baiyuan
..............page:226-228
Study of High-Precision Mensurement of Elevator Guide Based on Image Processing
Ji Haizhong;Jin Huiliang;Liu Chengliang
..............page:229-232