Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2010 Issue 4
Feature Extraction Algorithm for 3D Model Based on Elevation
sun ting ; geng guo hua ; zhou ming quan
..............page:10-11,16
Design and Implementation of USB Monitoring Technique Based on HID
lu zhi gang ; liu jian hua ; liu bao xu ; xu zuo sheng
..............page:1-3
Secure Video Watermark Algorithm in Broadcast Monitoring
liu li ; peng dai yuan
..............page:7-9
Optimal Method of Instrumentation Technique in Flight-control Software Test
guo jun hong ; li yue fei ; bai cheng gang ; cai kai yuan
..............page:20-21,24
Research on OPC Cross Platform Data Access Based on FDT
jin qi bing ; wang yan yan ; long ping
..............page:265-266,270
Design of Clinical Pathway Based on Process Mining
ruan ying ; su qiang ; li fei fei ; zhang guo tong ; liu da qing ; dai hong fang ; zhang yin zuo
..............page:271-272,275
Research on 3D Modeling of Fruits Based on Opengl
wang jing bo ; lu ling
..............page:279-280
Study on Protection Method for Dynamic Shared Library
xu yan xiang ; huang zuo ; hu yong qiang
..............page:118-120,124
New Detection Algorithm of Double Compression in JPEG Image
han xiao dong ; ping xi jian ; zhang tao
..............page:140-143
AQM Algorithm with Stability Margin Independent on Network Feature Parameters
wang hao ; yan wei ; huang ming he ; guo bin
..............page:12-16
Model of Chinese Words Segmentation and Part-of-Word Tagging
liu yao feng ; wang zhi liang ; wang chuan jing
..............page:17-19
Design and Implementation of MVC Framework Based on Spring
zhang yu ; wang ying hui ; zhang xiang nan
..............page:59-62
Database Full-text Retrieval System Based on Hibernate Search
yang qi ; lin zhen can ; huang fan ; zuo jian qing
..............page:74-76
Class Description Rule Mining Based on Object Cube Structure
zhao qin zuo ; yang hai chao
..............page:71-73
Data Transmission of WebGIS Based on Multithread and Buffer Pool
wang jiang peng ; li xian guo
..............page:79-81
Fuzzy Segmentation Based on Multiscale Linking Model for Brain MRI
pei hong li ; yu zuo ; deng zhen sheng
..............page:174-176,179
Mathematical Modeling in Composing Test Paper Based on Reasoning and Its Application
liu bei bei ; xiao ming ; ma xiao min
..............page:195-197
Improved Fractal Image Coding Algorithm Based on Two-norm Match
xu qing ; liu hong ; wu xiao yan
..............page:205-206,209
Palmprint Verification System Based on Mobile Device
zhang jian xin ; ou zong zuo ; liu dian zuo
..............page:164-165,168
Parameter Selection in Particle Swarm Optimization Based on z-Plane Analysis
zhang zuo ; li hua ; he hong ; wang hua kui
..............page:155-157
Improved Index Mechanism for Moving Object
yang xu ; yu jian qiao ; ren ting yan
..............page:50-52,55
Application of Artificial Fish School Algorithm in Parameters Optimization of FPN
yang jin song ; ling pei liang
..............page:169-170,173
Linear Complexity of Sextic Whiteman Generalized Cyclotomic Sequences
li shu qing ; zuo tong jiang
..............page:150-151,154
Efficient Frequent Item Set Mining Algorithm Based on Prefix Tree
cai ke zha xi ; huang jing lian
..............page:42-44
Image Shape Feature Extraction Method Based on Corner Point Detection
wei dong xing ; chen xiao yun ; xu rong cong
..............page:220-222
Image Retrieval Based on Moment Features in Contourlet Transform Domain
zhang xiao jing ; wang
..............page:213-214,217
Digital Literature Image Compression Based on Sparsity and Synchronization
shi li ; wang duan ; wang zhi zhong
..............page:207-209
Optimal Configurations of Supply Chain Products Based on Data Mining
chu dian hui ; zheng hong zhen
..............page:276-278
Improvement and Realization of Task Schedule Algorithm Based on OSEK
mao cheng yong ; gao hui min
..............page:233-235
Reliability Simulation Model for Multi-mode Phased Mission Systems Based on Spare Parts Scheme
liu feng ; yao lu ; zhong xiao jun
..............page:253-255,258
Bootloader Design for TMS320C672x DSP
zhong jun ; lv pan zuo ; wang huan ; zuo chang an
..............page:267-270
Dynamic Particle Swarm Optimization Algorithm
yu xue jing ; ma xiao zuo ; xia bin
..............page:193-194,197
Research on Interface Logical Model Based on Interface Template
zhao yue hua ; wu an ; xue juan
..............page:244-246
Design of Main Control Software in High Precision Earthquake Acquisition System
zhou jie ; song ke zhu ; cao ping ; cheng yi min
..............page:229-232
Audio Spread Spectrum Steganalysis Algorithm Based on Wavelet Transform
you shou jie ; bai sen ; wang shu guang ; zhang le fei
..............page:131-133,137
Incremental Non-negative Matrix Factorization Algorithm
guo li ; zhang shou zhi ; wang wei ; shi bo le
..............page:66-68
3D Shape Retrieval Algorithm Based on Point Description Image
shen guang ping ; wu hai shan
..............page:286-288
Research on Blind Identification for OFDM Signal
zhang chi ; wu zuo
..............page:262-264
New GVF Model Based on Non-linear Diffusion
wang yu ; zhang jian wei ; chen yun jie ; zhan tian ming ; ruan jing
..............page:215-217
NCL Circuits Processing Model Targeted at Block Cipher
cui ya lei ; dai zi bin
..............page:128-130
Ajax-based J2EE Security Application Framework
xu chuan pei ; zhang min ; zhang zuo
..............page:110-111
Project Risk Management Based on Software Process and Its Tool
chen kai lv ; shen bei jun ; zhang yan hong
..............page:69-70,73
Modified Algorithm of CAIM
li hui ; zuo de qin ; zhang ying chun
..............page:77-78,81
Research on Quantitative Evaluation of Network Storage System Survivability
wang ji lu ; zhang yi ; yu zhen wei ; zhang ying
..............page:33-35,38
Batch Interpolation Method of Spatial Data Based on AE
yang yu ; guan qun ; hu kai heng ; li hong lei
..............page:56-58
Adaptive Switch Weighted Mean Filtering for Salt and Pepper Noise Removal
chen chu xia ; ding yong ; liu zuo li
..............page:210-212
3D Scene Reconstruction Method for Building
hou yun ; yi wei dong
..............page:273-275
Image Denoising Method for Nonsubsampled Contourlet Based on Multi-threshold
yang xiao hui ; jiao li cheng ; niu hong juan ; wang zhong zuo
..............page:200-201,204
Color Image Segmentation Based on S-CIELAB Space
li guang ; wang chao ying ; hou zhi qiang
..............page:198-199
Improved Ontology-based Web Information Extraction
liu jia gang ; chen shan ; huang ying
..............page:39-41,44
Construction of POADES Knowledge Base
tu ping zuo ; yin wen sheng ; xu fan ; zhang heng xi
..............page:28-29
Hardware-software Co-design Framework Based on Process-level Programming Model
liu tao ; li ren fa ; chen yu ; liu yan ; fu bin
..............page:259-261,264
Degradation Image Restoration Algorithm Based on L-R Nonlinear Iteration
chen yun long ; wang ping ; wang peng
..............page:202-204
Particle Swarm Optimization Algorithm Based on Tent Chaotic Sequence
tian dong ping
..............page:180-182,186
Attribute Access Control Model for Web Services with Negotiation Mechanism
fu he gang ; wang jian
..............page:144-146
Anonymous Proxy Blind Aggregate Signature Scheme Based on Bilinear Pairing
mao wei xia ; li zhi hui ; liu zuo
..............page:138-139,143
NaXi\'Pictographs Primitives Input Method
guo hai ; zhao jing ying
..............page:289-290,封3
Hardware and Software Co-design Based on Multi-Agent System
chen zuo ; wang zun tong ; ling yi
..............page:256-258
Knowledge Reduction Based on Distinguishable Relation
chen zuo ying ; qiu zhan zhi
..............page:53-55
Hierarchical Smooth Handoff Scheme for Heterogeneous Wireless Mesh Network
xie li hua ; yang shou bao ; hu yun ; zuo da ; he wei qing
..............page:82-84
Dynamic Multilayer Grouping Trust Model for P2P Networks
wang lei ; zhu yan qin ; luo xi zhao
..............page:125-127,130
Research on Nash Equilibrium of Node Cooperation in Wireless Ad Hoc Network
xu xu liang ; dong rong sheng ; liu liang long
..............page:107-109
tou gao xu zhi
..............page:封2
Blind Source Separation Method Based on Negative Entropy and Intelligent Optimization Algorithm
yue ke qiang ; zhao zhi jin ; shen lei
..............page:250-252
Optimal Implementation of OpenVG Algorithms on Synchronous Data Triggered Architecture
ma sheng ; dai kui ; huang li bo ; wang zhi ying
..............page:236-238
Transplantation and Application of Linux in Wireless Sensor Imote2
cui wei ; shi dian xi ; ding bo ; rao xiang
..............page:291-292,封3
Dynamic Multi-routing Algorithm Based on Chord
chen zuo tao ; wu hai zhen
..............page:97-98,102
Multi-document Summarization Method Based on Topic-concepts Extract
song xuan chen ; liu gui quan
..............page:190-192
Expert System Design for Disturbance Evaluation Based on GIS
zhang lin ying ; jiang yan rong
..............page:177-179
Spatio-temporal Query Method of Moving Object Based on Buddy~*-Hash
liu ; hao zhong xiao
..............page:47-49
Efficiency Enhanced Service Discovery Protocol for Ad hoc Network
xu jing dong ; wang zhi gang
..............page:88-90
Segment-by-Segment Based Load Balancing Routing Protocol in MANETs
xia zuo wei ; wang guo jun ; xie yong ming
..............page:93-96
Query Authentication Method Based on Merkle Hash Tree in Outsourced Database
yuan duo bao ; wang xiao ming
..............page:115-117
VQ Image Compression Algorithm Based on Huffman Coding
deng hong gui ; guo zuo wei ; li zhi jian
..............page:218-219,222
Web Map Service Aggregation Model Based on Agent
wang qiang ; wang jia yao ; guo jian zhong
..............page:281-282
Mutual Authentication Key Agreement Scheme Based on WAP
zheng xuan ; lu jian zhu ; fu jie
..............page:112-114
Multilevel Security Policy Model Combined with User Permission
lu xiao liang ; yu bin
..............page:134-137
Research of Common Sense Reasoning in Elder-care System
zhang gui ying ; zhou xing she ; ni hong bo ; zhou shan dan ; miao qiang
..............page:171-173
Computer Network Performance Evaluation Based on Neural Network
liang zuo ; huang yu qing ; zhang xiao qin
..............page:105-106
Simple and Efficient Switch Fabric Based on Multiple Output Ports
zheng de ren ; yi peng ; wang bin qiang ; li hui
..............page:85-87
CPK-based Transmission Protocol
wan wei ; wang jin dong ; zhang heng wei
..............page:147-149
Authorization Constraint Method in Workflow Management Systems Based on RBAC
dan xu mei ; yu hui qun
..............page:152-154
Hardware Implementation and Capability Analysis of Particle Swarm Optimization Algorithm
cai rui ; xu wen bo ; chai zhi lei ; wang bin ; liu fan
..............page:166-168
Research on On-chip Memory System of Multi-core Processor
huang an wen ; gao jun ; zhang min xuan
..............page:4-6
Analysis of Mass Spectral Data Based on ACO-SVM
zhang rong ; feng bin
..............page:158-160
Fuzzy Queries Based on EPTV in Relational Databases
chen yi fei ; ye xiao ling ; zhang ying chao
..............page:25-27
Skew Index Algorithm for Multi-disk Broadcast
ma xiao qin ; yu jian qiao
..............page:63-65,68
Complex Product Design Process Based on Knowledge
sun chen yan ; jing shi kai ; liu hai bin ; chang hao li
..............page:283-285,288
Chinese Semantic Role Labeling Based on Dependency Trees
an qiang qiang ; zhang lei
..............page:161-163
Application of JMF Message Communication in Printing System
luo ru bai ; zhou shi sheng ; wang zuo jun ; gao xiao jing
..............page:223-225,232
Component Implementation Technology of Wire-frame Simulation Based on VTK
wang xiao yu ; chen ji hong ; tang xiao zuo
..............page:226-228,232
Driver Design of PCI-RapidIO Bridge Based on Vxworks
huang zhen zhong ; chai xiao li ; li xiang ; luo yi
..............page:239-240,243
Data Mail Delivery QoS Model in Distributed System
gong yue ; song zuo zuo ; wang yu zhuo ; liu jian jun ; zhang gang gang ; ma xiao hai
..............page:103-104,106
MMOG AOI Multicast Advanced Algorithm Based on P2P
wang yan ; li zhao kui ; shi xiang bin
..............page:247-249
Attack Model Based on MVPN
huang guang qiu ; zhao a ni
..............page:121-124
Message Ferrying Routing Protocol Based on Minimum Dominating Set Clustering
wu bai jun ; lin feng ; zhou ji liu
..............page:99-102
Protein Secondary Structure Prediction Based on Cascade Neural Networks
wang yan chun ; he dong jian ; wang shou zhi
..............page:22-24