Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2011 Issue 22
Map Sheet Decoration Automation Technology
YANG De-yan;ZHAO Jun-san;LI Hong-bo;LI Yong;YANG She-feng
..............page:279-280,283
Multi-objective Multi-period Emergency Logistics Model and Its Solution with Genetic Algorithm
ZHANG Jie;XU Zhi-yu;PENG Jia-zhen;XU Wei-sheng
..............page:179-181,184
Improved Enterprise Competition and Cooperation Evolutionary Game Model
YIN Hui-juan;WANG Hong-guo;SHAO Zeng-zhen;LIU Lei
..............page:264-267
Artificial Bee Colony Algorithm with Sharing Factor
WANG Hui
..............page:139-142
Sharpening Algorithm for Degraded Image Under Severe Weather Environment
HAN Xiang-hui;WANG Hao-xian;MAO Xing-peng;PAN Wei-min;LIANG Wei
..............page:207-208,214
VLSI Design of High-speed Reconfigurable Reed-Solomon Error-and-erasure Decoder
HOU Da-zhi;ZHANG Xiao-shuang;JIANG Hong-hui
..............page:215-218,221
Maximum-likelihood Identification Method for State-missing Multivariate System
ZHONG Lu-sheng;FAN Xiao-ping;YANG Hui;QU Zhi-hua;YAN Zheng;QI Ye-peng
..............page:162-163,167
Research on Networking Strategy for Digital Home Wireless Control Network
WANG Kai-yuan;HONG Hui;HEN Ming-hua
..............page:91-93,98
Efficient Human Face Recognition Algorithm
SUN Xia;WANG Zi-qiang
..............page:134-136
Mean Shift Target Tracking Algorithm Based on Multi-scale Feature Extraction
KONG Jun;TANG Xin-yi;HANG Min;GE Yun-jian
..............page:164-167
Dual Watermark Algorithm Based on Double Chaotic and Bipolar
LI Wen-lu;MA Zhao-yang;ZHANG Xue-ying
..............page:119-121,124
Improved Large Capacity Reversible Digital Watermark Embedding Algorithm
LV Lin-tao;ZHANG Xi
..............page:107-109
P2P User Evaluation Mechanism Based on Sharing Duration
HUANG Zhi-hua;ZHANG Zhen-yu;GONG Jin-hui
..............page:122-124
Design of Host Computer Software in Smart Switch Lighting Control System
MIN Li-juan;LU Han-hua;WANG Ya-shi
..............page:290-292,封3
Post-processing and Visualization for Three-dimension Imaging Sonar Image
HONG Yi-fan;SONG Kun-po;XIA Shun-ren;CONG Wei-hua
..............page:196-197
Application of DNA Computation in Product Creative Design
ZHANG Kai;LIU Xi-yu
..............page:219-221
Anonymous Veto Protocol Based on Bilinear Pairings
FU Shao-feng;LI Long-hai;JIAO Xiao-peng
..............page:105-106,109
Restoration Algorithm for Degraded Underwater Image Based on Wavelet Transform
LI Qing-zhong;LI Chang-shun;WANG Zhong-qi
..............page:202-203,206
Remote Video Transmission Control Method Based on Back Propagation
LI Yu-ling;WANG Lu
..............page:276-278
tou gao xu zhi
..............page:封2
Medical Data Mining Algorithm Based on optimal Risk and Prevention Model
ZHANG Jun-peng;HE Jian-feng;MA Lei
..............page:32-34
Design Method of Transformation Engine Between IGRS and UPnP Protocol
HU Yan-ping;YANG Wei;CHEN Yuan-fei;ZHANG Quan;ZHU Zhen-min
..............page:28-31,38
Human Motion Generation Based on FASGPLVM
QU Shi;NU Ling-da;WEI Ying-mei;YU Rong-huan;FENG Xiao-meng
..............page:255-256,260
Attack Modeling and Simulation of Cipher Algorithm in Satellite Network
WU Yang;JIAO Wen-cheng;PAN Yan-hui;WANG Tao
..............page:116-118
Incremental Laplacian Method Based on Cam Weighted Distance
WEI Li-qing;CHEN Xiu-hong
..............page:171-173
Chinese Character Recognition of License Plate Based on Wavelet Transform and Fractal Dimension
FENG Yu;LI Wen-ju;SUN Juan-hong;ZHAO Ying;SHAN Jia-wei
..............page:137-138
Sliding Mode Synchronization Control Method of Chen Chaotic System
LIU Chao;WANG Jun-nian;TANG Ting-ting
..............page:94-95,101
Research on FC-AE-1553B Network Performance with Different Topology Structure
CHEN Yong;LIN Bao-jun;ZHANG Shan-cong
..............page:79-81
Water Cycle-like Algorithm for Unconstrained Optimization Problem
WU Zhi-ding;WU Jie-kang
..............page:187-190
Path Generation Method for Swarm Animation Based on Artificial Bee Colony Algorithm
SUN Yu-ling;LIU Honga;CAO Jie
..............page:131-133
Quantitative Evaluation Method for Component Security Based on FAHP
ZHAO Jing-li;CHEN Li-chao;PAN Li-hu;ZHANG Ying-jun;XIE Bin-hong
..............page:67-69
Environment Acoustic Event Recognition Algorithm Based on Feature Analysis
LIU Bo-xia;CHEN Jian-feng
..............page:261-263,267
Application of FCBLUP Model in High-frequency Financial Data
LIU Zun-xiong;ZHOU Tian-qing;ZHENG Shu-juan
..............page:257-260
Face Recognition Method Based on 2DPCA and Compressive Sensing
CHEN Cai-ming;SONG Jia-tao;ZHANG Shi-qing
..............page:176-178
Improved Schedulability Test Algorithm Based on Rate Monotonic
XU Jian-hua;LI Yun
..............page:45-47
Global Motion Estimation Based on Feature Points Matching
WU Yan-mei;XIAO Yang-hui
..............page:148-150
Semantic Role Labeling in Chinese Language Based on Tree Kernel Function
WANG Bu-kang;WANG Hong-ling;ZHOU Guo-dong
..............page:128-130
LT Coding Scheme with UEP Characteristic
HE Xiu-hui;JIANG Min-lan
..............page:74-76
Hybrid Multicast Key Management Scheme Based on RSA
ZHANG Feng-yuan;SUN Xiao-ying
..............page:96-98
Shortest Path Query for Road Network Based on SPB Tree
DENG Ding-xiong;GUAN Ji-hong
..............page:56-58,63
Multi-dimensional Test Index System of Storage File System
WANG Hui-feng;LI Xian-guo;LI Zhan-huai;ZHANG Xiao;HE Qin-lu
..............page:59-63
Continuous Double Auction Model Based on Relaxed Reservation Strategy
HU Zhi-gang;SHEN Qiu-hui;HU Zhou-jun
..............page:53-55
Ostu Dual-threshold Image Segmentation Algorithm Based on Bacterial Chemotaxis
GUO Yong-fang;YU Ming;HUANG KAI
..............page:8-11
Research on Hierarchical Explicit Memory Access Mechanism Based on ESCA System
RAO Jin-li;WU Dan;CHEN Pan;DONG Mian;DENG Cheng-nuo;DAI Kui;ZOU Xue-cheng
..............page:24-27,34
PCA-L1 Algorithm Based on Kernel Function
LI Yong;LIANG Zhi-zhen;XIA Shi-xiong
..............page:174-175,178
Research on Sparsification Approach for Least Squares Support Vector Machine Classification
CHEN Sheng-lei;CHEN Geng;XUE Hui
..............page:145-147,150
Blind Equalization Algorithm for Variable Step-size Constant Module Medical CT Image
SUN Yun-shan;ZHANG Li-y;DUAN Ji-zhong
..............page:193-195
Mobile Botnet Based on Android System
LIU Xiao-yi;CUI Xiang;ZHENG Dong-hua;LI Shan
..............page:1-4
Irregularity Detection for Contour Structure Based on Significant Wavelet Sub-band
YU Guang-guang;MA Li;LI Qing-qi
..............page:19-23
Fast Mode Decision Algorithm for SVC Based on Texture Region Segmentation
GAO Song;CHEN Yao-wu
..............page:246-249
Audio Visual Fusion Speech Recognition Model Based on Articulatory Feature
WU Peng;JIANG Dong-mei;WANG Feng-na;Hichem SAHLI;Werner VERHELST
..............page:268-269,272
Novel Shared Cache Dynamic Partition Mechanism
NI Ya-lu;ZHOU Xiao-fang
..............page:231-233
Timetable Arrangement Scheme Based on Immune Clone Algorithm
ZHU Jian-dong;JIANG Wei-iu
..............page:273-275,278
Intelligent Register System for Web-press
LI Mei-hong;DU Ye;LU Ji-qiang
..............page:287-289
Fuzzy Decision Model for Emergency Resource Allocation and Dispatch
WEI Guo-qiang;LUO Xiao-tang
..............page:284-286,289
Image Sequence Compression Coding for Intelligent Traffic Bayonet Monitoring System
LI Zhen-hua;ZHANG Zhao-jie;XU Sheng-nan
..............page:198-201
System of User Diet Preferences Acquisition and Recommendation in Smart Space
FAN Xiang-chao;YU Zhi-wen;GENG Hui-dong;WANG Hai-peng;ZHOU Xing-she
..............page:237-239
Cryptography Analysis and Improvement on Certificateless Proxy Signature Scheme
HU Guo-zheng;HAN Lan-sheng;CUI Yong-quan;WANG Zhan-qing
..............page:112-113
Lidar-based Detection and Tracking Method of Multiple People in Complex Background
YANG Yu-zhuo;YU Zhi-jun;LIU Hai-tao;LI Jia
..............page:156-158,161
Research on Porting of Real Time Operating System Toppers to ARM 7
RONG Feng-hua;LI Ren-fa;LI Rui;HUANG Li-da
..............page:234-236
Chinese Finger Alphabet Flow Recognition System Based on Data Glove
LIU Ming-tao;LEI Yong
..............page:168-170,173
Synthesized Difference Degree Calculation Based on Attribute and Object Relation Information
GAO Xue-dong;WU Ling-yu;WU Sen;GU Shu-juan
..............page:35-38
Free Protocol for Subliminal Channel in Broadcast Multi-signature Scheme
ZHANG Xing-ai;ZHANG Ying-hui;SHI Lai-jing
..............page:102-104
Research on Modeling Method of Feature Binding in Visual Perception
LI Hai-fang;YIN Qing
..............page:151-152,155
Motion Estimation Algorithm Based on Adaptive Search Pattern
SHEN Yu;DANG Jian-wu;WANG Guo-hua
..............page:125-127
Background Extraction and Update Algorithm Based on Frame-difference
FAN Xiao-liang;YANG Jin-ji
..............page:159-161
Concept Semantic Similarity Algorithm in WordNet Based on Information Content
WANG Yan-na;ZHOU Zi-li;HE Yan
..............page:42-44
Fast Frame Field Adaptive Coding Algorithm
HAN Can;CHEN Yao-wu
..............page:252-254
Estimation of Distribution Algorithm for Solving Clustering Problem
ZHOU Ben-da;YAO Hong-liang;LI Guo-cheng
..............page:191-192,195
Survey on Time Synchronization in Wireless Sensor Network
WANG Fu-qiang;ZENG Peng;ZHANG Xiao-ling;LIANG Wei;YU Hai-bin
..............page:70-73
Dual Population Genetic Algorithm Based on Chaotic Local Search
ZHANG Xiao-wei
..............page:185-186,190
New Linear Fitting Method for Time Series
XIE Fu-ding;WANG He-nan;ZHANG Yong
..............page:250-251,254
Design and Implementation of Fault Injection Tool Based on SCSI
CHEN Yu-long;WEN Dong-xin;ZHANG Zhan;CUI Zhong-qiang;QIAN Jun;WANG Xue-jiao
..............page:222-224,227
Relevance Feedback Algorithm for Video Retrieval Based on Semi-supervised Learning
DENG Li;JIN Li-zuo;FEI Min-rui
..............page:281-283
Spectrum Allocation Strategy for Cognitive Radio User Based on OFDM
LIU Chao;SUN Yan-fei
..............page:88-90
Image Segmentation Algorithm for Spatial Constraints FCM Based on Pyramid Information
HE Yue;SHEN Xuan-jing;LONG Jian-wu;ZHANG Bo
..............page:209-210,214
Multiple Key Exchange Protocol with Strong Security
CHENG Qing-feng;WANG Xiang-yu;ZHANG Shi-wu
..............page:110-111
Information Hiding Algorithm of G.723.1 High-rate Speech Flow
YANG Jun;BAI Sen;ZHU Gui-bin;LIU Jin
..............page:114-115,118
Cluster Head Optimization Strategy for WSN Based on LEACH
CHEN Yun-feng;FAN Xing-gang;XU Bo
..............page:82-84,87
Approximate Shape Parameter Estimation of Generalized Gaussian Noise in Image
CHEN Wen;FANG Xiang-zhong
..............page:204-206
Effective Corner Point Extraction Algorithm for SAR Images
ZHOU Yan-yan;HAN Zhi-bin
..............page:182-184
Energy-efficient Clusting Algorithm for Wireless Sensor Network
ZHOU Zhi-ping;WANG Ting
..............page:85-87
Network Attack Model Based on Hierarchical Expanded Stochastic Petri Net
HUANG Guang-qiu;ZHANG Bin;WANG Chun-zi
..............page:12-18,23
LVS Method for Yield Analysis Chip
SHEN Fei;SHI Zheng;PAN Wei-wei;YAN Xiao-lang
..............page:225-227
Multiuser Test System Based on FPGA and ARM
ZHANG Wen-ting;ZHANG Shu-guang;QIAO Lu-feng;CHEN Qing-hua
..............page:211-214
Executable Architecture Framework Based on System Modeling Language
ZHANG Wei-zhong;WANG Zhi-xue;ZHAO Wen
..............page:39-41
Geometrical Analysis of Underdetermined Blind Source Separation Based on Linear Array
DONG Tian-bao;YANG Jing-shu
..............page:77-78,81
Design of Tibetan Character Property Analysis System Based on Corpora
CAI Zhi-jie;CAI Rang-zhuo-ma
..............page:270-272
Recursive Depth-first KNN Query Algorithm Based on A-tree
LIU Yan;HAO Zhong-xiao
..............page:48-50
Mesh Segmentation Algorithm Based on Volumetric Radius Function
MA Ya-qi;LI Zhong-ke;WANG Xian-ze;ZHAO Jing;ZHANG Xiao-juan
..............page:240-242
Moving Object Tracking Algorithm Based on Shape Induction
SHI Jiu-gen;WANG Xiang-shu;HAN Jiang-hong
..............page:143-144
Hybrid Collision Detection Algorithm in Maintenance Simulation
JIA Pai;HUANG Tao;WU Jing;GU Jun-feng
..............page:243-245
Porting and Implementation of Dalvik Virtual Machine on Loongson Platform
WU Shao-gang;ZOU Guo-min
..............page:228-230
Network Security Assessment Model of Coupling Empowerment
CHEN Hua-xi;GUO You-qiang;YAO Bao-feng
..............page:99-101
3D Gesture Recognition Scheme Based on Gyro Sensor
HUANG Qi-you;DAI Yong;HU Ming-qing;LIU Jun-fa;CHEN Yi-qiang
..............page:153-155