Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2010 Issue 7
PLDA: AS-level Internet Topology Generating Algorithm
zhu zhi bo ; gao fei
..............page:115-118
Concept and Formalization Description of Code Error Pattern
hu zuo ; liu bin ; wang zuo chen
..............page:47-49
Ontology Formalization and Its Test Based on Property Granular Quotient Space
wang xiao dong ; sun bin ; liu jin ying ; zhao ai ling
..............page:50-51,54
Data Stream Mining Based on Time and Space Partitioning
yuan zheng wu ; yuan song biao
..............page:61-62,65
Dynamic TXOP Allocation Method in WLAN
chen chen ; gao xin bo ; zhang su bing ; fan ke feng
..............page:11-13
Archival Storage System Architecture
liu zhong ; li kai
..............page:27-29
Task Construction for Embedded Real-time Software
wu hai yan ; zuo li
..............page:39-41
Research on Hair Feature Extraction Method in Gender Classification
xie jin rong ; bo jia jun
..............page:179-181,184
Crowd Object Segmentation Method Based on Posture Model
deng ying na ; zhu hong ; liu zuo ; qian hui fang
..............page:195-197
Bi-cubic Interpolation Algorithm Based on Contourlet Transformation
xu tong yang ; fang yong
..............page:20-22,26
Strongly-secure and Efficient Authenticated Key Exchange Protocol
bian shi zhu ; wang jian dong ; ren yong jun ; fang li ming ; xia jin yue
..............page:136-138,141
Text Information Hiding Algorithm Based on Chinese Characters Coding in Words Platform
zhang hong li ; liu dan ; wen xue qian ; he xin yu
..............page:150-152
Improved Genetic Algorithm and Its Application in Solving MVCP
li guo cheng ; wu tao ; zhou ben da
..............page:187-189
Face Recognition Based on Orthogonal Locality Preserving Projection and Informative Vector Machine
liu jian wei ; xu xiang ; luo xiong zuo
..............page:200-202
Quick Synchronization Method for Strip-based Wireless Sensor Networks
sun de yun ; shen jie ; jiang hua ; zheng chun lei ; li bao qing
..............page:1-3
Tumor Extraction Method of MRI Cerebral Image Based on Graph Cuts
jiang shi zhong ; yi fa ling ; tang lang ping ; tu yong qiu
..............page:217-219
Research on Nerval Activity Classification and Decoding Based on Informative Vector Machine
xu xiang ; liu jian wei ; luo xiong zuo
..............page:198-199,202
Maximal Margin Ellipsoid-shaped Multi-class Classification Algorithm
li yong xin ; xue zhen xia
..............page:185-186,189
Combined Recognition System for Handwritten Pinyin
zhu meng ; liu chang song ; chen yu tian ; zou yan ming
..............page:170-172
Role-Based Delegation Model with Temporarily-Spatially Constraint
xiang hua ping ; fu zhi hui ; shi hong qin
..............page:162-164
Automatic Web News Extraction with Semantic Features
shi yang ; zhang qi ; huang zuo zuo
..............page:173-175,178
Research on Fast AES Algorithm Based on Small-scale FPGA
leng wen ; cao jin cai ; wang an guo
..............page:159-161
Hybrid P2P Model Based on Chord Protocol
zeng xiao yun
..............page:112-114,118
Node-disjoint Multipath Routing Algorithm in MANET
su fan jun ; chen xian guang ; zuo chun xue
..............page:4-6
Technical Service Management Model for Farmers Based on Decision Tree
liu zhong qiang ; zhao chun jiang ; wang kai yi ; yu gang ; zhang fang tian
..............page:58-60
Improved Weighted Association Rules Mining Method
li cheng jun ; yang tian qi
..............page:55-57
Production Planning Strategy Under Networked Manufacturing Environment
guo shi wei ; he zuo ; zhan de chen
..............page:288-290
Dual Method for Small Displacement Optic Flow Computation
yu jing jing ; pan zhen kuan ; wei wei bo
..............page:260-261,264
Research on Class Preprocessor for Real-time Java Platform
su chao yun ; chai zhi lei ; tu shi liang
..............page:246-248,251
Image Interpolation Algorithm Identification Based on Incremental Wiener Filtering
wang chao ; gao zhen ; wang zuo
..............page:224-226
GPS Location Data Reducing Based on Turning Point Judgment Method
xu jin ; tian sheng li
..............page:268-269,272
Design of Classifier Based on Weighted Quantum Particle Swarm
li zuo ; li wei juan ; li ming
..............page:203-204,207
Identification of Obfuscated Data After call Instruction in Disassembly Process
yue feng ; pang jian min ; zhao rong cai ; bai li li
..............page:144-146
Research and Implementation of Network Attack and Defence Training Simulation System
xu jian jun ; dan zuo ; chou guang zuo ; zhou li
..............page:129-131,135
Multi-resource Data Access Based on Grid
tian ming yan ; zhang shui ping ; liu lu ping
..............page:84-86
Text Clustering Method Based on BBS Hot Topics Discovery
tang guo ; chen hong gang
..............page:79-81
Object Relation Mapping Architecture Based on C++
lei wen ping ; han jie ; dong xin ; wang li ya
..............page:71-72,75
WBIALS Architecture Modeling Based on RUP
xiong bang zhong ; tan wen an
..............page:63-65
Data Response Optimization of Ajax
tan li ; yang zong yuan ; xie zuo kui
..............page:52-54
Web Services Annotation Based on CIDOC CRM
wang yu zuo ; li hong yu
..............page:45-46,49
Web Services Rapid Composition Framework Based on BPEL
cui fu dong ; qiao yan you ; chang yuan fei
..............page:262-264
Application of 3σ-Rule and μ-Threshold Method in Heart Sound Signal De-noising
guo xing ming ; ke ming ; xiao shou zhong
..............page:279-281
Min Max-time Flow Problem in Capacitated Dynamic Networks
pang bo ; xie zheng ; chen zhi ; zhang jun
..............page:252-254
Spatial Prediction Algorithm Based on Motion Estimation in H.264
lu wen tao ; fan bin wen
..............page:236-238
High Complexity Optimization for DSmT Mixing Rule
chen kai ; yang jun an ; chen zuo
..............page:76-78,81
Self-adaptive Image Scaling Algorithm Based on Sobel Operator
jiang zuo ; chen geng sheng ; yang fan ; zhao wen qing ; yin wen bo
..............page:214-216
3DOGHM Detection Algorithm Based on Level Set Segmentation
liu qing ; wang tong qing ; li hong you
..............page:230-232
TrueType Fonts Drive in Embedded System
chen wen wen ; zuo hong sheng
..............page:257-259
SC-FDE System Based on Turbo Channels Encoding
liu shun lan ; liu xiao yun ; liu zuo zuo
..............page:270-272
Expert Profile Construction Method
wang shu feng ; hu zhi xi
..............page:255-256,259
Trust Model Based on Cloud Theory in Pervasive Environment
wang xin sheng ; wen xue qian ; liu dan ; wang wei jie
..............page:282-284
Quantitative Attribute Fuzzy Partition Based on CHC Genetic Model
huo wei gang ; shao xiu li
..............page:168-169,172
Energy Efficient Distributed Cluster Heads Selection Algorithm of Wireless Sensor Networks
hu jun ; wang lei ; xu shu hua ; chen li
..............page:105-107
3D Non-local Mean Noise Reduction Algorithm Based on Partitioning Processing
liu jing ; lu li zhong ; zuo zuo ; chen jian
..............page:220-223
Reserch on Perceptron Learning Algorithm
liu jian wei ; shen fang lin ; luo xiong zuo
..............page:190-192
Predictability Analysis of Aggressive Execution Model Based on Hyperblock
zhao can ming ; an hong ; ren yong qing ; cong ming
..............page:249-251
Design of Real-time Data Acquisition Software in Software Defined Radio
zhang zhi min ; ou jian ping ; huang fu kan
..............page:33-35
Emergency Decision-making Based on Constraint Satisfaction Problems
dong cun xiang ; wang wen jun ; yang peng
..............page:276-278
Stability Analysis of Subpixel Edge Location Algorithm
tian yuan ; tan qing chang ; zhang hai bo ; shi zhi biao ; huang sheng quan
..............page:211-213
Memory-related Vulnerabilities Localization Technology Based on Dynamic Tainting
fang chen ; mao bing ; xie li
..............page:139-141
Face Recognition Based on Independent Component Analysis and Core Vector Machines
peng zhong ya ; cheng guo jian
..............page:193-194
Improved Small Diamond Search Algorithm Based on Detection of All-Zero
dan bao tang ; wang yu sheng ; shen ting zhi ; lv jian min
..............page:233-235,238
Form Filling Strategy Based on Entrance Query in Deep Web
ma jian hua ; li sai hong ; xu lan lan
..............page:66-67,70
Rating-Supervised-based Reputation Mechanism in Virtual Computing Environment
gui chun mei ; zuo qiang ; tang yang bin ; wang huai min ; wu quan yuan
..............page:7-10,13
Check Algorithm for Optimal Egress Point of iBGP Route
xu zuo ; wu jing ; gao yuan
..............page:17-19
Dynamic Translation Method for Relational Data in XML Integration
feng jing e ; li jian hui
..............page:30-32
Routing Optimization of Wireless Sensor Network Based on Hello Mechanism
liu jian ; li fang min
..............page:99-101
SDPA Attack on Exponent of Modulo Exponentiation in Real Environment
zhou li sha ; chen yun ; wu zhen ; chen jun ; du zhi bo
..............page:156-158
tou gao xu zhi
..............page:封2
Proxy Ring Signature Scheme Based on Identity and Multilinear Mapping
zhou xiao yan ; du wei zhang
..............page:165-167
Design and Implementation of NAC Model Based on 802.1x
lu zhi pei ; yao guo xiang ; luo wei qi
..............page:147-149
Energy Efficient Improved Routing Strategy for ZigBee Network
zhang qing ; liu shu mei ; chai qiao lin
..............page:108-111,118
Feature Extraction of Typical Abnormal Sounds in Public Places
zuo shao wen ; gong wei guo
..............page:208-210
Design and Implementation of Multimedia Network Classroom Monitoring System
wang ming fu ; qi zhi wen
..............page:291-封3
MAC Algorithm with QoS Guarantee in Wireless Mesh Networks
xu jia ; zhu cui tao
..............page:90-92
Study on Content-based Video Copy Detection
liu hong ; wen chao zuo ; wang zuo
..............page:227-229
Attack Analysis and Improvement of Password Authentication Protocol
ke fang fang ; tang xi lin ; zhang qi heng
..............page:142-143,146
Weaknesses Analysis and Improvement of Three Secret Sharing Schemes
zhang jian zhong ; qu juan
..............page:126-128
Critical Chain Management for Software Project Schedule
yang li ; li nan
..............page:42-44
Visualization Simulation of Typical Elements in Near-earth Space Scene
liu li na ; wang peng ; qin da guo
..............page:285-287
Video Segment Retrieval Method Based on Video Fingerprint
li ze zhou ; ou yang jian quan ; zhang min ; liu zuo
..............page:239-241
Application of Wasp Colony Algorithm in Job-scheduling of Equipment Repair
wang hao ; tang zai jiang ; fan rui
..............page:242-245
Balanced Energy Consumption Route Protocol Based on Polymorphic Ant Colony Algorithm for WSN
chang zuo ; liu cai xing ; lin hui qiang ; fang neng pei
..............page:87-89,92
Particle Swarm Optimization Algorithm for Two Sub-swarms Exchange Based on Different Behaviors
sun hui ; wu lie yang ; bai ming ming ; li min
..............page:176-178
Attribute Based Access Control Method Oriented to Hierarchical Resource
chen kai ; lang bo
..............page:132-135
Research on Resource Monitoring Mechanism in Educational Resource Grid Environment
zhu shao feng ; liu fang ai ; li wen ; yang dao jie
..............page:273-275,278
Improvement of Particle Swarm Optimization Algorithm
ren xiao bo ; yang zhong xiu
..............page:205-207
Secure Routing Scheme Design Based on Trust Evaluation
yang cheng yun ; zhang ming qing ; tang jun
..............page:122-125,128
Hybrid-services Resource Schedule Algorithm Based on Wireless Networks
zhong hong bo ; chen zhi gang ; qi hua mei
..............page:102-104
Routing Algorithm Based on Self-organizing Clustering and Self-determination Clustering Leader
li zhao kui ; shi xiang bin ; wang yan
..............page:93-95,98
Formal Analysis Method of Security Protocol
wang zuo ; yuan chao wei
..............page:82-83,86
Application of PrefixSpan* Algorithm in Malware Detection
wang li na ; tan xiao bin ; pan jian feng ; zuo hong sheng
..............page:119-121
Ontology Mapping Approach Based on Property Structure
zhang jing zuo ; fang li ying ; zuo jian zhuo ; wang pu
..............page:68-70
Research on Fault Diagnosis Performance and Average Node Degree in WSN
ji sai ; yuan shen fang ; li han guang
..............page:14-16