Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2012 Issue 21
Image Annotation Combining Feedback Log and Mixture Probabilistic Model
HUANG Yong-hui;SHANG Zhao-wei;ZHANG Ming-xin
..............page:202-205
Evolution Analysis and Modeling Method of Internet Public Opinions Based on EMD
ZHOU Yao-ming;WANG Bo;ZHANG Hui-cheng
..............page:5-9
A Multi-level Security Model for Local Area Network
WANG Hao;CHEN Ze-mao;CHEN Shuang-shuang
..............page:141-144
Constrained Optimization Algorithm for Image Restoration Based on Combined Dictionaries
XIAO Su;HAN Guo-qiang;XIAO Jian-yu
..............page:206-209,213
Steganalysis Method of Wavelet Coefficient Statistical Feature Quantity
WU Xue-yin;WU Jin;LIU Jin;WU Jian-guo
..............page:138-140,144
Research on Elastic Structure Program Under Cloud Computing Environment
LU Jian-hua;WANG Min-chao;WU Xing
..............page:49-52
Comparison on Semantic Relation Extraction Based on Approximation Random Test
PENG Cheng;QIAN Long-hua;ZHAO Zhi-wei;ZHOU Guo-dong
..............page:197-201
Gateway Placement Algorithm for Load Balancing in Wireless Mesh Network
LIU Chun-xiao;CHANG Gui-ran;JIA Jie;SUN Li-na
..............page:107-109,113
Novel I Frames Rate Control Algorithm Based on H.264
SU Ling-hua;GUO Ying;YANG Jie
..............page:279-282
A Missing Data Imputation Method Based on Neighbor Rules
WANG Feng-mei;HU Li-xia
..............page:53-55,62
Efficient and Reliable Multicast Routing Protocol Based on Greedy Strategy
CHENG Wen-fei;TAN Xiao-bin;XU Peng
..............page:97-99,106
Electronic Nose Background Interference Elimination Algorithm of Independent Component Analysis with Reference Vector
TIAN Feng-chun;YAN Jia;HE Qing-hua;SHEN Yue;FENG Jing-wei;JIA Peng-fei;XU Shan
..............page:26-29
Improvement and Simulation of WRED Algorithm Based on Smart Distribution Network Business
YU XING-yong;CHANG Jun;YU Jiang
..............page:110-113
BP Neural Network Learning Algorithm Based on Particle Swarm Optimization
WANG Ai-ping;JIANG Li
..............page:193-196
Registration of Point Clouds Data Based on Genetic Algorithm
ZHANG Xiao-juan;LI Zhong-ke;WANG Xian-ze;LV Pei-jun;WANG Yong
..............page:214-217
Distributed Routing Algorithm Based on Tree Label System in WSN
HOU Gui-sheng;WU Xiao-bei
..............page:74-77
Research and Implementation of ETC Application Based on DSRC Protocol
LIU Zong-zhen;LU Yuan-yuan;CHEN Qiu-he
..............page:241-244
An OFDM Sub-carrier Number Estimation Method Based on KS Distance
LI Guo-han;WANG Ke-ren;JIN Hu
..............page:100-102
An Efficient Packet Classification Method Based on TCAM
YANG Di
..............page:283-285,289
Optimization Method for Attack Graph Based on Vulnerability Exploit Correlation
LI Qing-peng;ZHENG Lian-qing;ZHANG Chuan-rong;YANG Tong
..............page:129-132
Collaborative Filtering Recommendation Algorithm Based on Neighbor Rating Imputation
LENG Ya-jun;LIANG Chang-yong;LU Qing;LU Wen-xing
..............page:56-58,66
Evidence Combination Method Based on Evidence Support Consistency Classification
SHUAI Fei;LI Jun-quan;WAN Wei
..............page:123-125
A Novel EKF-SLAM Algorithm Against Outlier Disturbance
LV Tai-zhi
..............page:1-4
Research on Satellite CICQ Switch System Scheduling Algorithm
YAO Ye;JIANG Yu-jie;LIANG Xu-wen
..............page:22-25,29
Target Tracking Technology of Fire Control Radar Based on Adaptive Pulse Interval
LI Cheng-yu;YANG Xiao-long;HAN Zhuang-zhi;LI Zhi-qiang;HE Qiang
..............page:276-278,282
Interactive Genetic Algorithm Based on Semi-supervised SVM
LIU Ming-fei;LIU Xi-yu
..............page:182-184,188
An Image Denosing Algorithm Based on Noise Detection
GUO Cheng-xiang;GAO Hua-ling;YANG Jian-zhong;LI Hong-heng
..............page:218-220
Information Security Evaluation Based on Aggregation of Variable Weight Evidences
JIAO Bo;LI Hui;HUANG Cheng-dong;LI Wei
..............page:126-128,132
Joint Timing and Phase Estimation Algorithm for CPM Signals
LIU Xiao-ming;LIAO Cong;WANG Meng-rou
..............page:103-106
NoC Multicore Architecture for WLAN Security Domain
WANG Shuai;HAN Jun;LI Yang;ZENG Xiao-yang
..............page:245-248
Research on Namenode Single Point of Fault Solution
DENG Peng;LI Mei-yi;HE Cheng
..............page:40-44
Procedures and Platform Construction of Device Interoperability Test for SRIO
QIN Ming;LEI Gang;YAN Hai-feng
..............page:257-260
Lossless Data Hiding for JPEG Image Based on Forecast Entropy
WANG Wei-wei;TONG Xue-feng;XUAN Guo-rong;SHI Yun-qing
..............page:210-213
Design and Realization of Communication Middleware for Distributed Real-time System
JIANG Jian-chun;LIU Tao
..............page:249-252,256
Maximal Frequent Itemsets Mining Method over Data Stream
LI Hai-feng;ZHANG Ning
..............page:45-48
An Infrared Object Tracking Algorithm of Multi-feature Fusion
BIAN Zhi-guo;YAO Yuan-yuan
..............page:189-192,196
Improved OFDM Timing and Frequency Synchronization Algorithm Based on PN Sequence
WANG Zhen-chao;SUN Bo;WANG Fang
..............page:89-92
Parallel Optimal Algorithm Based on Reconfigurable Processor
LIU Shi-zhu;YIN Shou-yi;YIN Chong-yong;LIU Lei-bo;WEI Shao-jun
..............page:286-289
A Scheduling Algorithm for Solving Communication Conflict in Satellite Network
YANG Li;WU Zhi-tao;WANG Yan-chun
..............page:59-62
Rapid P2P Traffic Identification Method Based on Node Link Degree
XING Ling;ZHENG Wei-wei;MA Wei-dong
..............page:119-122
Iterative Interference Mitigation for OFDM Mobile Receiving
CAO Jia-lin;CHEN Xu-bin;CHEN Yun;ZENG Xiao-yang
..............page:70-73
Design and Simulation of Sudden Failure Evolution Model on Aircraft
HAN Zhi-zhong;WANG Zhong-sheng;JIANG Hong-kai
..............page:14-16,21
Research on Air-defense Early-warning Detection Efficiency Evaluation Based on Communication Support
ZHOU Zhe-shuai;FU Cong-yi;WANG Xu-ying;WANG Kai
..............page:93-96
Software Cost Estimation Method Based on Weighted Partial Least Squares Regression
LIU Hai-tao;WEI Ru-xiang;JIANG Guo-ping
..............page:36-39
Implementation of Ad Hoc Network Routing Protocol Based on Ant Colony Optimization
REN Jing-an;TU Ya-qing
..............page:114-118,122
Research on Robustness of Weighted Scale-free Network Against Cascading Failures
DING Lin;ZHANG Si-ying;LU Jiang-chun
..............page:261-263,267
Auditory Feature Extraction Based on Gammatone Filter Bank
HU Feng-song;CAO Xiao-yu
..............page:168-170,174
Exception Data Handling Algorithm Based on Savant Middleware
CHEN Hua-shan;WANG Yi;LIU Xian-cheng;ZHOU Juan
..............page:30-32
Reliable Transmission Protocol for Wireless Sensor Network Based on Bitmap Index
ZHOU Ren-yan;LIU Lei-bo;YIN Shou-yi;WEI Shao-jun
..............page:63-66
Fingerprint Retrieval Method of Multi-feature Fusion Based on AdaBoost
WANG Fu-li;OUYANG Jian-quan
..............page:272-275
An Improved Particle Swarm Optimization Algorithm with Wavelet Mutation
GAO Dong-hui;DONG Ping-ping;TIAN Yu-bo;ZHOU Hao-tian
..............page:145-147
An Optimization Method of TLB Architecture
HE Jun;ZHANG Xiao-dong;GUO Yong
..............page:253-256
Heuristic Algorithm for Minimum Connected r-hop k-dominating Set
ZHAO Xue-feng
..............page:67-69,73
Speech Sparse Decomposition Algorithm Based on Immune Matching Pursuit
ZHOU Yan;LIU Tao;SHANG Li
..............page:161-163,167
Research on Fuzzy ND Obstacle Avoidance Method of Unmanned Surface Vessel
WANG Min-jie;ZHANG Ru-bo
..............page:164-167
Image Reconstruction Based on Improved POCS Algorithm
LIU Chang-yun;NI Lin
..............page:226-228,240
Variable Neighborhood Search Algorithm for Solving UCARPP Problem
JIN Qian-qian;LIN Dan
..............page:290-293
Design and Implementation of Mobile WiMAX Network Test System
ZHONG Yuan;FANG Wei-wei;YANG Fang-nan;LIANG Xiang-min;HUANG Shi
..............page:78-80,85
tou gao xu zhi
..............page:封2
Design and Implementation of Flex-based String Chart Drawing System
ZHANG Wen-dong;HUANG Chao;PAN Yun-yan
..............page:237-240
Speaker Recognition Parameter Selection Method Based on SVM
XU Chen;CAO Hui;ZHAO Xiao
..............page:175-177
A Method of Performance Pre-evaluation Based on DT-MSN
HE Lin;LIN Feng;ZHOU Ji-liu
..............page:81-85
Research on Eye Tracking Based on Blinking Correction Kalman Filter
ZHANG Lin-lin;JIANG Min;TANG Xiao-wei
..............page:157-160
Specification Method of Uncertainty Time Series
WU Hong-hua;LIU Guo-hua
..............page:33-35
Content Extraction of Uighur Web Based on Content Correlativity
WANG Rui;ZHOU Xi;LI Xiao
..............page:153-156,160
Adaptive Threshold Edge Detection Based on Bactrial Foraging Optimization Algorithm
LI Jie;PENG Yue-ying;YUAN Chang-an;WANG Ren-min;LIANG Jun-chao
..............page:178-181
Performance Analysis of MIMO Relay Systems over Nakagami-m Fading
ZHANG Pan-suo;LI Guang-ping;LIU Dong-feng
..............page:86-88
Compression Algorithm for Computer Desktop Image Based on Color Clusering
LU Yu-hai;SHEN Yan-fei;WANG Chun-jie;ZHU Zhen-min
..............page:221-225,236
An Algorithm of Automatic Mesh Generation Based on Logical Grid
LIU Xi-kang;ZHANG Jian-hai;YIN Rong-gang;YANG Qiong
..............page:268-271
A Novel Millimeter Wave Image Denoising Method
SU Pin-gang;SHANG Li;CHEN Jie;YAN Ting-qin
..............page:229-231,244
A Burst Signal Detection Algorithm Based on Goodness of Fit Test
WANG Hui;WANG Bin
..............page:264-267
Disordered Fusion Mechanism of Heterologic Code Word Information and Its Application
ZHOU Ke;DAI Yong;FAN Liang
..............page:133-137
Application of CTM in Functional Verification of IC Design
FENG Xiao;XU Jin-fu;DAI Zi-bin;LI Wei
..............page:232-236