Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2011 Issue 7
Intelligent Review Method for Circuit Board
ZANG Ming-xiang;WANG Tian-tian;HUANG Zhan-wu
..............page:265-267
Design and Implementation of Genetic Algorithm Pipelining Based on FPGA
ZHOU Ying-bo;KUANG Ji-shun;YANG Peng
..............page:268-270,281
WVD Cross-term Suppressing Method Based on Empirical Mode Decomposition
CAI Yan-ping;LI Ai-hua;LI Ren-bing;LI Xi-lai;BAI Xiang-feng
..............page:271-273
Research on Computational Complexity of Reverse Network 1-median Problem
WU Long-shu;CAO Fei-long
..............page:274-275,278
Resource-optimized H.264 FRExt Decoding
LU Ji-yuan;HOU Fang;HUANG Cheng-hui
..............page:276-278
Visual Fatigue State Recognition Based on ECG Pulse Feature
ZHANG Ai-hua;ZHAO Zhi-yue;YANG Hua
..............page:279-281
Optimization of Balance Allocate Algorithm in Online Charging System
LU Peng-fei;LI Jun
..............page:282-284
Environmental Sound Classification Based on Manifold Learning and SVM
LI Yong;LI Ying;YU Qing-qing
..............page:288-290
P2P E-Commerce Trust Model Based on Transaction Success Rate
TANG Wei;ZHENG Xiao-lin
..............page:285-287
Multi-level Optimization of G.729A Speech Compression Algorithm
LI Juan-juan;YU Yi-biao;RUI Xian-yi
..............page:291-292,封3
tou gao xu zhi
..............page:封2
Geospatial Named Entities Recognition Using Combination of CRF and Rules
JU Jiupeng;ZHANG Wei-wei;NING Jian-jun;ZHOU Guo-dong
..............page:210-212,215
Multi-user Detection Based on Genetic Algorithm Optimization Neural Network
WANG Hong-bin;ZHANG Li-yi
..............page:207-209
Quick Match of Unmanned Aerial Vehicles Image Based on SIFT Algorithm
HE Xiao-ying;YUE Jian-wei;ZHANG Xu-ran
..............page:216-218,230
Automatic Recognition of Uyghur Emotional Words
YU Long;TIAN Sheng-wei;FENG Guan-jun
..............page:213-215
Intelligent Chinese Input Method Based on Android
LIU Feng;WANG Ye-han;TANG Bu-zhou;WANG Xiao-long;WANG Xuan
..............page:225-227
Improved Face Recognition Algorithm of Modular 2DPCA
ZHANG Yan;WU Yu-qiang
..............page:228-230
Match Algorithms Survey of Computing Advertising
GUO Qing-tao;ZHENG Tao
..............page:222-224,233
Sub-trajectory Clustering Algorithm Based on Speed Restriction
HAN Chen-shou;XIA Shi-xiong;ZHANG Lei;ZHU Chang-cheng
..............page:219-221,236
Semantic Similarity Computing Method Based on Wikipedia
SHENG Zhi-chao;TAO Xiao-peng
..............page:193-195
Tracking Algorithm Based on Multiple Color Fusion and Projection Features
HAN Yan-bin;LI Jin-ping
..............page:190-192
Estimation of User Interest Degree Based on Neural Network
LIU Jian;SUN Peng;NI Hong
..............page:187-189,192
Moving Objects Extraction Method in Complex Traffic Scene
DING Mang;PENG Li-hui;ZHANG Xu;LIU Qiang;YAO Dan-ya
..............page:184-186
Research on Agent Planning Based on Predicate/Transition Net
ZHONG Shan;CHANG Jin-yi;CHEN Qiu-ya;ZHU Dan-xiang
..............page:204-206,209
Dynamic Adaptive Clone Selection Algorithm Based on Sphere Crossover
ZHU Hao-dong;LI Hong-chan
..............page:201-203
Evolutionary Algorithm on Solving Complex Pareto Set Problems
ZENG Ying-lan;ZHENG Jin-hua;WU Jun;LUO Biao
..............page:199-200,203
Mass Customization Supply Chain Schedule Based on Multiple Ant Colony Algorithm
ZHANG Peng;LIN Jie;LIU Si-wei
..............page:196-198
Restoration Algorithm of Degraded Image Based on Raindrop Degradation Model
LI Chang-cheng;LUO Yu-pin;Gyomei Tei
..............page:253-254,267
Digital Camouflage Texture Feature Extraction Based on Dominant Colors and Co-occurrence Matrix
LU Jun;LI Yang;ZHAO Kang-lian;DU Si-dan
..............page:246-248
Design of Improved Multi-path Radix-24 FFT Processor
WANG Wen-yi;WANG Lin-kai;ZHOU Jin-yuan;ZHOU Xiao-fang
..............page:262-264
Design of High Speed and Large Capacity Storage Module Based on Flash Memory
WANG Li-feng;HU Shan-qing;LIU Feng;LONG Teng
..............page:255-257,261
Research on Genetic Algorithm Accelerator and On-chip Evolution
BU Hai-xiang;YANG Hua-qiu;DUAN Xin;CHEN Li-guang;LAI Jin-mei;BAO Li-chun
..............page:258-261
Adaptive Image Compression Based on Bandelets Domain
ZHU Mei;LI Zhang-wei
..............page:241-242,252
Improved Segmentation and Counting Algorithm for Rat Sperm Image
REN Ya-heng;WEN Pei-zhi;HUANG Wen-ming;WU Xiao-jun;SHI Jun-tiao
..............page:243-245,248
Quantum Evolutionary Algorithm for Solving Postal Route Problem
ZHAO Jun-sheng
..............page:234-236
Grayscale Compression Based on Image Gradient in Medical Image Registration
ZHOU Zhi-yong;ZHANG Tao
..............page:237-240
Improved FAST TCP Preferences Selection Scheme
CHEN Xiao-long;ZHANG Yun;TIAN Yi-qiang;LIU Zhi
..............page:94-96
Study of Mobile Communication Channel Model on Nearby Space
OUYANG Xiang-jing;CHEN Shu-xin;BAO Rong-wei;ZHANG De-chun
..............page:97-99
Energy-balancing Routing Algorithm Based on LEACH Protocol
ZHANG Hao;LI La-yuan
..............page:91-93,111
Study of Optimal Allocation for Wireless Sensor Network Interferencing to Radar
TANG Meng-na;XIONG Wei-li;XU Bao-guo;WANG Yue
..............page:81-83,86
CICQ Scheduling Algorithm Based on Cross-point Buffer State
REN Tao;LAN Ju-long;HU Hong-chao
..............page:78-80
Design and Implementation of Operation Support System for IDC Website
ZHAO Guo-feng;LU Yu-qi;XU Chuan
..............page:87-90
Study of Non-Linear Adaptive Congestion Control Algorithm
FAN Xun-li;ZHENG Feng;Lin GUAN
..............page:84-86
Improved Cluster-head Election Algorithm Based on LEACH Protocol
LIAO Ming-hua;ZHANG Hua;WANG Dong
..............page:112-114
Hybrid Search Method in Unstructured P2P Networks
WANG Shuang;YU Ji-guo
..............page:109-111
Improved Cluster-Tree Routing Algorithm in ZigBee
XIE Chuan
..............page:115-117
New TETRA Trunked Queue Management Method
YOU Xiao-qian;YU Hou-qiang
..............page:106-108
Improved Scheme of MIPv6 Fast Handover Based on Multi-tunnel
LV Ying-ying;MU Ling-ling;LI Xiang-li
..............page:100-102
Assistant Cluster Head Clustering Algorithm Based on LEACH Protocol
LONG Ji-zhe;CHEN Yuan-tao;DENG Dong-mei;LI Bin;LI Fang
..............page:103-105
Instruction Analysis for Crypto Chip Based on Power Consumption Leakage
WU Heng-xu;CHEN Kai-yan;DENG Gao-ming;ZOU Cheng
..............page:130-132,135
Design and Analysis of New Authorization Scheme in SaaS Mode
HAN Qiu-jun;DING Yue-wei
..............page:133-135
Study on Trust Model in Collaborative Decision Support System
PENG Tao;DOU Wan-feng;Qu Yong-hua
..............page:136-138
Steganalysis Algorithm Evaluation Based on Entropy and Grey Relevance Degree
ZHANG Qiu-yu;ZHANG Yan;YUAN Zhan-ting
..............page:148-150,162
Model Checking Analysis of Optimistic Contract Signing Protocol
ZHOU Li-qing;YANG Jin-ji
..............page:142-144,147
Cryptanalysis and Modification of Two Aggregate Signature Schemes
ZHANG Yu-lei;WANG Cai-fen
..............page:145-147
Privacy Protection in Outsourced Database Based on Fragmentation and Encryption
YU Yong-hong;BAI Wen-yang
..............page:139-141,159
High-performance LQF_DRR Scheduling Algorithm of CICQ
TANG Quan;GAO Zhi-jiang
..............page:118-120
Energy Management Strategy for WSN Based on Z-Stack
LI Jun;HUANG Lan;WANG Zhong-yi
..............page:121-124
Improved ID-based Threshold Proxy Re-signature Scheme
ZHU Yue-zhen
..............page:125-126,129
Full Disk Encryption Scheme Based on Generation of Dynamic Group Key by Password Lock
ZHAO Fu-xiang;PANG Liao-jun;WANG Yu-min
..............page:127-129
Publicly Verifiable Secret Sharing Scheme on Access Structure
ZHANG Jian-zhong;LI Rui
..............page:173-174,180
Botnet Detection Scheme Based on Clustering Technology
LV Xin-rong;LU Shi-wei
..............page:166-167,170
NPC Cooperative Motion Strategy Fit for Online Games
BI Jing
..............page:181-183,186
Research on Particle Filter Algorithm Based on Multi-feature Fusion
CHEN Shan-jing;YANG Hua;ZENG Kai;DU Shi-ming
..............page:178-180
Guess and Decision Attack for Stream Cipher K2 Algorithm
LIU Shu-kai;GUAN Jie;CHANG Ya-qin
..............page:168-170
ID-based Threshold Proxy Signature Scheme
ZHANG Jian-zhong;XUE Rong-hong
..............page:171-172,177
Provably Secure ID-based Identification Scheme with Privilege
LIU Xue-yan
..............page:151-153,156
New P2P Botnet with High Robustness
XIE Jing;TAN Liang
..............page:154-156
New ID-based Proxy Signature Scheme
WANG Yong-bing;ZHANG Xue-liang;QIU Bin
..............page:157-159
Research on HEDSA Data Aggregation of Wireless Sensor Network
GUI Yi-hong
..............page:160-162
Research of Free-riding and Malicious Attacks on BitTorrent Network
LI Xiao-yi;LI Zhi-jun;JIANG Shou-xu
..............page:163-165
Maximal Frequent Itemsets Mining Based on Iceberg Concept Lattice
XUE An-rong;WANG Fu-qiang;LI Ming
..............page:35-37
Execution Method for Promoting State-space Search Efficiency
LIU Wen-ting;GAO Jian-hua
..............page:41-43
Application of Full Function Point in SOA System Size Estimation
ZHANG Xiao-min;REN Ai-hua
..............page:38-40
Research on Size Estimation Model for Software Function Test and Its Application
SONG Wei;SHEN Jian-xiong;YANG Gen-xing;CAI Li-zhi
..............page:47-49
Attribute Reduction Based on Granular Fineness in Uncertainty Information System
ZHAO Xiao-bing;E Xu;LI Ke;LI Yan-hong;WANG Quan-tie
..............page:50-52,55
Fault-tolerance of QoS Parameters in Grid Schedule
PU Ying;MA Man-fu;NIU Zeng-xuan
..............page:44-46,49
Simulation Method of Satellite-to-ground Single-photon Communication Based on Monte Carlo
CUI Ming-lu;WANG Zhi-qiang;LIU Wei
..............page:68-71,96
Domestic Network Condition Survey for P2P Deployabilities
WANG Yu-xi;XIE Wei-kai
..............page:75-77
Load-balance Routing Protocol for Wireless Mesh Network
GUO Xiao-lei;YANG Shou-bao;HE Wei-qing
..............page:72-74,102
Trust Audit of Grid Resources
NIU Zeng-xuan;MA Man-fu;PU Ying
..............page:65-67
Attribute Reduction Algorithm on Rough Set and Information Entropy and Its Application
WU Shang-zhi;GOU Ping-zhang
..............page:56-58,61
Comprehensive Page Ranking Algorithm Based on User Roles
LONG Wen-ming;PENG Dun-lu;JIANG Xing-long
..............page:53-55
Research on Condensed Quotient Cover Cube Tcchnology
CHEN Fu-qiang;XI Jian-qing
..............page:59-61
Bayesian Network Structural Learning Algorithm Based on Mutual Information
WANGYue;TAN Shu-qiu;LIU Ya-hui
..............page:62-64
Improved Model Checking Technology for Program Temporal Safety Properties
ZHANG Zhi;ZHANG Lin;ZENG Qing
..............page:28-30
Adaptive Model Design of Agro-meteorological Applications Software
WEI Jian-guo;ZHUANG Li-wei;ZHANG Xiao-yu;WANG Jian-lin;ZHONG Hai-yun
..............page:31-34,37
New Term Expansion Method Based on Domain Ontology
CHEN Yu;ZHU Jian-feng;WU Yi-jian;ZHAO Wen-yun
..............page:24-27,43
Applications Research of Network Coding in Wireless Relay Networks
LI Wei;FAN Ping-yi
..............page:15-17
Community Detection Method Based on Local Information
REN Yong-gong;SUN Yu-qi;LV Zhen
..............page:12-14,23
Asynchronous Track Fusion Algorithm for Maneuvering Target Tracking
GUO Yun-hua;YANG Wei;SHI De-qian
..............page:21-23
Revision of HCM Delay Model Based on Bayesian Inference
ZHANG Hui-ling;SUN Jian;SHAO Hai-peng
..............page:18-20
Application of Improved Associative Classification Algorithm in Informatization Evaluation
MA Bo;YANG Ya-ting;ZHOU Xi;HU Bin-hua
..............page:7-9,17
Face Recognition Method Based on Two-Dimensional Locality Preserving Projections
GUO Zhi-qiang;YANG Jie;JIAO Hui-fang
..............page:4-6
Modularization Method for Cut Sequence Set Analysis of Dynamic Fault Tree
LIU Dong;XING Wei-yan;ZHAO Zhong-wen;WANG Zhi-an
..............page:10-11,20
Research of Wireless Link Statistical Characteristics in Opportunistic Network
LIU Qi-lie;ZHU Meng-wei;HUANG Wei;TANG Li-jun;LI Yun;PANG Ying-jun
..............page:1-3