Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2008 Issue 24
Properties of pseudo MTL algebras and filters
ZHANG Hong-jie;WU Hong-bo
..............page:50-52
Min-cut optimization algorithm based on cellular automata for bisecting graph
SUN Ling-yu;LENG Ming;PENG Xuan-ge
..............page:46-49
Acquisition and separation method used in cicada acoustic signal
YI Meng;SHI Yi-kai;YUAN Xiao-qing
..............page:151-152,174
Building method on domain ontology in not growthful knowledge system
YANG Sheng-hong;JIA Yan
..............page:153-155
Blog's content filtering based on Bayes method and information fingerprint
MA Ru-lin;JIANG Hua;ZHANG Qing-xia
..............page:159-161,180
Attribute reduction algorithm for inconsistent decision tables
QIN Chuan;CHEN Hai-jun;SHI Hua-ji;LI Xing-yi
..............page:162-164
Analysis of abnormal reduction based on VPRSM in incomplete information systems
GONG An;WANG Lin;NIU Qiu-li
..............page:165-167
High reliability testing method for real-time multitasking software
QIN Zhi-dong;LUO Xin;WANG Shao-yu;XIONG Guang-ze
..............page:90-94
Design and implementation of Scilab ToolBox for FlowVR
TANG Jian;ZHAO Guang-heng;LIU Wei;CHEN Fu-en
..............page:95-97
Image watermarking algorithm based on RLE orientation
LIU Jing;LIU Gang;ZHANG Jiu-long
..............page:98-99,102
Design of self-adaptive PID controller based on genetic neural networks
GAO Zhi-an;LI Liang-guang;FAN Fan
..............page:100-102
Application of KVM in distributed resource isolation and sharing
FANG Hai-guang;CHEN Mi
..............page:103-105,142
Intrusion detection technique based on RBF network
ZHANG Kun;BI Jing
..............page:106-108,111
Practical threshold RSA digital signature scheme
YU Jing;LI Zhi-hui;ZHANG Shao-ting
..............page:109-111
Optimum algorithm of S-boxes based on master——slave parallel genetic algorithm
YIN Xin-chun;QIU Liang
..............page:112-114,117
Non-uniform node deployment in wireless sensor networks
YANG Si-qing;YUAN Hui-yong;YI Ye-qing
..............page:118-120
Application of ant colony algorithm in delay constrained anycast routing
XIAO Meng;LI Tao-shen
..............page:121-123,127
Efficient rules matching method of Snort based on active rule sets
ZHANG Ya-ling;XIE Shao-chun;TANG Lai-feng
..............page:124-127
Detecting network anomalies based on NetFlow time series
JIA Guan-xin;YANG Bo;CHEN Zhen-xiang;PENG Li-zhi
..............page:128-131,135
Image watermarking algorithm based on Trap-Door One-Way Functions
ZHANG Zhuan-cheng;ZOU Tao;TIAN Jie;ZHANG Qiu-xia
..............page:132-135
New membership revocation scheme in FI05 group signature
ZHU Jun-jie;LI Qiao-liang
..............page:136-138
Multicast Qos routing algorithm based on cooperative evolution ant colony optimization
LI Chang-bing;HU Hua;WU Jian;CAO Chang-xiu
..............page:139-142
Research on data conversion based on spatial association rule mining technique
YE Hong-mei;LI Yu-hong;WANG Cheng;LI Li-jun
..............page:143-145
Quantum multi-object search algorithm
ZHONG Pu-cha;BAO Wan-su
..............page:146-147,204
Algorithm for mining maximal frequent itemsets based on OUS
ZHANG Zhong-ping;SONG Xiao-hui;SONG Shao-ying
..............page:148-150
Research on defect detection of cord fabrics based on Gabor wavelet transform
ZHANG Wu-yi;ZHAO Qiang-song;WANG Bin
..............page:235-237
Research progress of multi-robot cooperation and coordination
ZHANG Han-dong;WU Yu-xiu;CEN Yu-wan
..............page:238-241,245
Multiple classification fault diagnosis hybrid model based on WPA-SVM
XIAN Guang-ming;ZENG Bi-qing
..............page:242-245
Research on laser Doppler blood flow signal's treatment method based on wavelet transform
WANG Huan;SHI Yi-kai;YAO Qin;YE Ya-lin
..............page:246-248
Research on compressed codebook by rotating codewords in vector quantization algorithm
WANG Dong-fang;LIAO Yu-min;YU Ning-mei
..............page:53-55,58
Novel ensemble classifiers algorithm based on kernel dataset partition
KANG Kai;ZHANG Hua-xiang;ZHAO Bin
..............page:43-45
New differential evolution algorithm
DENG Ze-xi;CAO Dun-qian;LIU Xiao-ji;LI Na
..............page:40-42,52
Backbone based extremal evolutionary optimization
GAO Yong-chao;LIU Li-mei;LI Qi-qiang;WANG Yun-zheng
..............page:36-39,49
Unscented Transformation and Unscented Kalman Filtering
CHENG Shui-ying
..............page:25-35
Dynamic particle swarm algorithm based on Tabu search
ZHANG Yu-fang;XUE Qing-song;XIONG Zhong-yang
..............page:56-58
Studies on inverse beamforming based on modified AR model
SU Shuai;SUN Chao
..............page:59-61,64
New method of estimating model parameters of modified GM(1,1)
GUO Wen-yan;REN Da-wei
..............page:62-64
New perception algorithm based on distance
WU Chang-an;WANG Xin-xia;LI Guo-liang
..............page:65-66,80
Adaptive motion vector refinement algorithm
GUO Qi-feng;WANG Qing
..............page:71-73,77
Non-linear regression forecast model based on functional networks and learning algorithm
HE Deng-xu;LI Yan-fang;LIU Xiang-hu;ZHOU Yong-quan
..............page:74-77
Application of symmetry in breaking soliton equation
LIU Yu-tang;LIU Yu-zhen
..............page:78-80
Novel multistage Particle Swarm Optimization algorithm
ZENG Chuan-hua;SHENG Yuan-xia
..............page:81-82,138
New similarity measures between Vague sets
WANG Jing
..............page:83-84,94
Design and realization of urban land price evaluation system based on ComGIS
QIN Jian-xin;TAN Zi-fang
..............page:85-89
Improved separating algorithm of overlapping cells
LU Yan-zhi;LIU Xiang-bin
..............page:172-174
Research on extracting human finger vein pattern characteristics
YU Cheng-bo;QIN Hua-feng
..............page:175-177
Hierarchical color recognition method of license pares
YANG Zhi-gang;WANG Qing
..............page:178-180
Novel iris recognition algorithm based On multichannel wavelet filter
WANG Feng-sui;FENG Gui
..............page:181-183,187
Image fusion method based on dual-tree complex wavelet transform
ZHONG Qing-xin;XIA Li-min
..............page:184-187
Eye detection based on SVM
HU Tao;WANG Jia-le
..............page:188-190
Research of speech emotion recognition based on acoustic features and ann
SHI Ying;HU Xue-gang
..............page:191-193,199
Fisherfaces based on fusion of global and local features
WANG Hui-ze;GONG Sheng-rong;LIU Chun-ping
..............page:194-196,211
Edge detection algorithm in two-dimension bar code based on mathematical morphology
XIE Jun-xi;TANG Zhao-hui;GUI Wei-hua;GONG He
..............page:197-199
Research on project management information system based on group argumentation support systems
DENG Hui;SHI Zhong-ke;JIANG Yu-zhu
..............page:200-204
Research of Petri-net based workflow meta-model
CHENG Nian-sheng;ZHANG Yi-sheng;LI De-qun
..............page:205-207,230
Improved PSO algorithm based optimal bidding strategy for generating company
TANG Jiang-hua;LUO Ke;ZHAO Zhi-xue
..............page:212-214,221
Approach for natural landmark matching and tracking used in robot navigation
LIU Jun-cheng;WANG Miao-xin
..............page:215-218
Detection of railroad FSK signal based on FWT
ZHANG Xiao-ji;ZHANG Xin
..............page:222-223,227
Research of fault diagnostic model based on probability Petri nets
ZHAO Xi-lin;ZHOU Jian-zhong;LIU Hui
..............page:224-227
Research on classification and recognition of multi-channel EEG Signal
ZHANG Hai-jun;WANG Hao-chuan
..............page:228-230
EPG decoder in DVB-T based on DirectShow
LIU Lin
..............page:231-234
Algorithm for video watermarking based on inter prediction
XU Duan-quan;ZHU Guang-xi
..............page:22-24
Bounded reaching algorithm for communicated pushdown systems
MIAO Li;ZHANG Da-fang
..............page:19-21
Novel method for Bayesian high-resolution direction finding
TIAN Li-wei;HUANG Jian-guo;HOU Yun-shan
..............page:9-11,14
RSSIOP:Received-signal-strength-indicator-based Organization Protocol for wireless sensor networks
LI Gui-dan;SUN Yu-geng;LIU Li-ping;ZHANG Ju-wei
..............page:4-8
Trust transfer method based on feedback's departure degree
SHAN Ming-hui;GONG Jia-wei;NI Hong;ZENG Xue-wen;CHEN Jun
..............page:1-3,8