Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 35
Degree reduction of ball control point Bézier surfaces
SHI Mao;YE Zheng-lin;KANG Bao-sheng
..............page:11-13,25
Face feature extraction based on normalization of pseudo-Zernike moment
YANG Di;SUN Jin-guang;HE Wei;LIU Yang
..............page:163-165
Image fuzzy clustering analysis based on FCM and genetic algorithms
LOU Yin-xia;CHENG Ming;WEN Gao-jin;QUAN Hui-yun
..............page:173-176,195
Research of collaborative filtering recommendation based on user trust model
CAI Hao;JIA Yu-bo;HUANG Cheng-wei
..............page:148-151
Research of image matching method in sea ice observation
WANG Yu-xin;LIU Yan-fei;GUO He;LIU Tian-yang;YANG Yuan-sheng
..............page:245-248
Quadric reconstruction and classification based on boundary
ZHAO Jun;XIAO Bing
..............page:199-201,234
Image fusion based on region contrast in nonsubsampled Contourlet transferm domain
WANG Le-shan;LI Hua-feng;A Zhu-La-qie
..............page:185-187,208
Blind modulation recognition of quadrature communication signals on baseband
LIU Fang;PENG Yu-hua;ZHANG Shun-li;XU Jian-hua;ZHANG Chao
..............page:139-141,147
Camera self-calibration method based on traditional calibration method
WANG Jing-tao;HOU Zhen-jie
..............page:205-208
Optimization rate control method for wireless sensor networks
XIAO Ping-ping;TIAN Yan-tao
..............page:7-10,29
Fault surface gerneration based on motion estimation
ZHAO Liang;ZHAO Chun-xia;ZHANG Er-hua
..............page:242-244,248
Application of hyperbolic functions in gray image wavelet threshold denoising method
WANG Zuo-cheng;LIU Xiao-dong;XUE Li-xia
..............page:177-179
Kalman filter based on LPV model for nonlinear system
HU Wei-hong;LI Shu-qing;LIU Yi-nan;HU Bo
..............page:145-147
Common network management framework study and design of wireless sensor network
WANG Jin-yi;YAN Bao-ping
..............page:1-6,32
Improvement on Bordat algorithm for constructing concept lattice
CHEN Qing-yan
..............page:33-35,38
New realtime clustering algorithm about Web user session
GUO Zhao-lin;ZHOU Jun
..............page:142-144
Quick feature reduction algorithm based on improved frequent pattern tree
HUANG Li-yu;XU Zhang-yan;QIAN Wen-bin;YANG Bing-ru
..............page:152-155,191
TPM-based authenticated key agreement protocol in trusted computing
WANG Hai-yan;WU Zhen-qiang;CHONG Hui-fang;JIANG Li
..............page:115-118
Multi-covering algorithm for covering hot spots completely
FU Hai-tao;CHAI Qiao-lin;LI Tao
..............page:69-71,89
Incentive mechanisms for P2P network based on repeated game
LIU Hao;QING Tong;ZHANG Lian-ming
..............page:75-77
Vague cluster analysis based on vague smilar and max-t△transitivity
CHEN Jun-ming;LI Hong-xia
..............page:159-162
Matrix projection algorithm for text classification
ZHONG Jiang;SUN Qi-gan;LI Jing
..............page:129-132,165
Application of template regionalization SSDA method in microvascular positioning
WANG Xue-song;ZHOU Ming-quan;LI Peng;XIE Li-zhi
..............page:22-25
Several construction methods of local divergence measure on fuzzy sets
ZHANG Xu-hui;XIN Xiao-long
..............page:30-32
SUMO-based ontology for knowledge management in chinese freeway network
GUO Jun-jie;YAN Mao-de
..............page:14-17
Improved algorithm of active learning support vector machine based on probability
FAN Ji-wei;LI Chao-feng;WU Xiao-jun
..............page:188-191
Evaluation method for network invulnerability based on edge weight
CHENG Ke-qin;LI Shi-wei;ZHOU Jian
..............page:95-96,100
Texture Image feature extraction model based on weighted Contourlet domain Hidden Markov Tree
SHAN Wen-sheng;WANG Ling-hua;YANG Jia-hong
..............page:196-198,234
Application-layer multicast scheme based on layered and clustering
ZHANG Yun;YU Ji-guo;KEN Qing-jie
..............page:78-82
Apple grading detection based on fusion of shape and color features
LI Xian-feng;ZHU Wei-xing;HUA Xiao-peng;KONG Ling-dong
..............page:202-204,234
Face recognition based on gradient information
YAO Lu;DENG Kun;XU Yong
..............page:170-172
Fuzzy image quality measurement for blocking artifacts images
ME Kan;HAN Guo-qiang
..............page:212-214
Genetic algorithm for task allocation In Wireless Sensor Network
YE Jing;CHEN Guo-long;WU Yun-bing;ZHU Dan-hong
..............page:119-122,128
Design and implementation of special ETL pattern
XIE Ting-ting;LI Wei-hua
..............page:133-135,162
Hybrid three sub-swarms particle swarm optimizer for min-max-min problem
WEI Peng;CAO De-xin
..............page:219-221,230
Research of result conformity algorithm based on topic meta-search
LIU Jian;TANG Xiao-chun;JIN Feng
..............page:156-158,218
D/TMR design of dynamic part reconfigurable system based on FPGA
LIU Fei-wen;YAO Rui
..............page:55-57
Research on dynamic interactive symbolization in FlashGIS
ZHANG Jin-qu;ZHU Yun-qiang;WANG Juan-le;SONG Jia;SUN Jiu-lin
..............page:61-64
Level two sub sampling algorithm of mining large data sets
WANG Yu-rong;QIAN Xue-zhong
..............page:126-128
Image edge enhancing method based on anisotropic diffusion model
TANG Li-ming
..............page:209-211,241
Adaptive particle swarm optimization algorithm of nonlinear inertia weight
XU Gang;YANG Yu-qun;HUANG Xian-jiu
..............page:49-51
Ear biometrics using local binary pattern and filter fusion
FENG Jun;MU Zhi-chun;MAO Wan-dui
..............page:192-195
Security communications algorithm in P2P-SIP network
WANG Qing-lei;ZHANG Xi-huang;GAO Bing-zhen
..............page:109-111,118
Proxy-blind signature with message recovery
HE Jin-ni;XIN Xiao-long
..............page:112-114
Scalar multiplication algorithm against SPA and DPA attacks in ECC
TONG Lian;QIAN Jiang
..............page:72-74
Novel multi-population particle swarm optimizer
WANG Hui
..............page:45-48,51
FPB-LKH:A multicast key management scheme improved on LKH
FAN Shu-ping;JIANG Ling-sheng;YAO Nian-min;MA Bao-ying
..............page:104-108
Building detection in remote sensing image based on double level set function
WANG Lin-juan;WANG Xi-li;JIANG Hui;WANG Guo-fang
..............page:166-169
Application of neighborhood preserving for dimension reduction in anomaly detection
JIA Wei-feng;LIU Ling-xia;ZHANG Feng-li
..............page:101-103
Packaged WDM driver programming design of high-speed data transmission system
LI Yong-zhe;HE Zi-shu;JIA Ke-xin;CHENG Ting
..............page:58-60,114
Agent persuasion mechanism based on its matching degree of case
WU Jing-hua;ZHANG Xin-gang;MENG Hai-liang
..............page:235-237,248
Energy-efficient reduced collision MAC for wireless sensor networks
MIAO Yi;FENG Hao-ran
..............page:97-100
Improved algorithm on loop detection in network schedule graph
FANG Xia;PAN Mei-sen;XI Jin-ju
..............page:222-224,227
Analysis of multi-user detection technology based on genetic algorithms
LIAO Yong-zhong;YAO Chang
..............page:83-85,138
Research on port supply chain system dynamics simulation model
LI Jian-feng;CHEN Yan;ZHAI Jun;LIU Shu-yong
..............page:18-21
Improving CNM algorithm to detect community structures of weighted network
HAN Hua;WANG Juan;WANG Hui
..............page:86-89
Design and performance analysis of VANET prototype system
ZHANG Wen-jie;ZHANG Guo-qing;MU De-jun;HONG Liang
..............page:26-29
Optimization algorithm of PSO-BPNN based on extended T-S fuzzy model
WU Ke;LI Wei-hua
..............page:238-241
Design of 1553B bus interface based on BU-61580
ZHOU Yuan-lin;WU Zhong;CHOU Wu-sheng
..............page:65-68
Solving Knapsack problem based on binary shuffled frog-leaping algorithm
ZHAO Yang;SHAN Juan
..............page:39-41,44