Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2012 Issue 5
Improvement of SPIN Routing Protocol in Wireless Sensor Network
SHEN Ming-yu;ZHENG Li-kun
..............page:86-88
Wv-SVM Gas Load Forecast Based on Particle Swarm Optimization
LAI Zhao-lin;XU Xiao-zhong
..............page:196-198,201
Research on Autonomous Flying-trace Plan on UAV
YANG Xue;WANG Duan-min;ZHA Xiang
..............page:192-195
Data Management Approach for Large-scale Mobile Terminal
XU Ai-jun;ZHANG Yue
..............page:59-61,66
Multi-core Distributed Operating System Based on NoC
HU Xin-an;FU Fang-fa;SUN Jun;YU Ming-yan
..............page:259-261
Improved Judgment Algorithm of Point In-out Polygon
LI Nan;XIAO Ke-yan
..............page:30-34
MANET Route Sharing Strategy Based on P2P
LUO Qiao;CHEN Jing;GUO Yi-chen;HUANG Cong-hui
..............page:83-85
Design and Implementation of Storage System Evaluation Platform Based on SCSI
WEN Dong-xin;GAO Qing-e;ZHANG Zhan;QIAN Jun;CHEN Yu-long;ZHANG Zhong-zhao
..............page:47-49,55
Implementation of Executable Code Test Tools Based on Path Coverage Instrumentation
WANG Yi;JIANG Tong-hai;DONG Jun;ZHOU Xi
..............page:35-37,40
Reputation Scheme for Delay Tolerant Network
ZHANG Xi;WANG Xiao-fei;LIU An-na;ZHANG Quan;TANG Chao-jing
..............page:136-138
Research on Network Multiple Hard Disk Duplicator for Electronic Forensics
YAO Wei;SHA Jing;YANG Tao
..............page:262-265
Active Contour Model Combined with Region Gradient
ZHAO De;HE Chuan-jiang;CHEN Qiang
..............page:211-212,215
Automatic Generation Method of Word Report Based on Dynamic Web Page
LIU Peng;QIN Wei;ZHOU Yong-hui;GUO Yi-qi
..............page:279-280,284
Design and Implementation of Target Tracking System Based on FPGA
ZHU Jian-wu;LI Rong;LING Yun
..............page:243-246
Quantitative Assessment on Influence of Expo 2010 on Shanghai Culture Industry
JIA Yue;LIANG Chu;YAO Ying-yan;CAO Chen
..............page:73-75
Terrain Data Compress and Multi-resolution Processing in Route Planning
WU Jian;YANG Xing-tin;DAI Ji-yang;ZHOU Ji-qiang
..............page:9-13
Image Quality Assessment Method for Frequency and Direction Sensitive SSIM
MA Li-hong;GONG Zi-ping
..............page:19-24
Intrusion Detection Method Based on LEGClust Algorithm
ZHOU Qing-lei;ZHANG Chao-yang;ZHAO Yi-lin
..............page:133-135
Vehicle Type Recognition Algorithm Based on Error Ellipse
WAN Wen-li;HU Jia-pei;LIU Xue-jun
..............page:183-185,188
Semantic Similarity Calculation Method Based on Concept Feature
TANG Ya-yuan;XU De-zhi;LAI Ya
..............page:170-172,175
Certificateless Designated Verifier Signature Scheme in Standard Model
XU Jin-fang;GAO De-zhi;LIU Shu-dong
..............page:108-110
Research on Trusted Attestation Method in IaaS Environment
XIN Si-yuan;ZHAO Yong;LIN Li;WANG Xiao-hai
..............page:117-119
AOMDV Route Repair Strategy in Ad Hoc Network
DANG Xiao-chaoa;NIU Gang;LI Xiao-yan
..............page:102-104,110
Propagation Model of Botnet Based on Scale-free Network
OUYANG Chen-xing;TAN Liang;ZHU Gui-qiong
..............page:126-128,132
SVM Feature and Parameter Optimization Based on Chaotic Genetic Algorithm
DU Zhan-long;TAN Ye-shuang;GAN Tong
..............page:163-166
Data Stream Clustering Algorithm Based on Density and Fractal Dimension
JIN Jian-ye;NI Zhi-wei;WANG Sha
..............page:38-40
Research on Vehicle Schedule Problem of Two-layer Mterial Distribution Center
GENG Xue;DUAN Hui-chuan
..............page:285-287,290
3D Reconstruction and Error Compensation Based on Virtual Height Projection Line
CHEN Hua-hua;JIANG Bao-lin;HE Zhi-wei;ZHANG Dong-ping
..............page:273-275
Obtaining Approach of Expected Collaborative Paths Among Software Entities
CHANG Jian-sheng;WANG Dan;ZHAO Wen-bing
..............page:76-78,88
tou gao xu zhi
..............page:封2
Design on High-speed Hardware Scheduler of Foundation Fieldbus
YANG Zhi-jia;WANG Hong;SONG Yan
..............page:230-232,246
Internetware Trust Evaluation Method Based on Fuzzy Theory
JING Shi-zhong;DONG Cai-lin;YU Ying;LI Jia-wei
..............page:64-66
Analysis and Detection of Network Traffic Anomaly Based on Decision Tree
LI Qiang;YAN Cheng-hua;ZHU Yao
..............page:92-95
Association Rules Mining Algorithm Based on Temporal Constraint
ZHANG Ling-jie;XU Wei-xiang
..............page:50-52
Image Denoising Based on HMT Model of Quaternion Wavelet Transform
YIN Ming;LIU Wei
..............page:213-215
Radioresistance Placement Algorithm for FPGA Based on SRAM Structure
YANG Wen-long;CHEN Li;WANG Ling-li;WANG Ying
..............page:236-239
Medical Image Region Fusion Algorithm Based on Multi-resolution
YAN Yan-hua;SONG Yu-qing;CHEN Jian-mei;LIU Zhe;ZHU Feng
..............page:216-217,220
Improved Tunnel-routing Method for Honeyd
ZENG Jiao-long;HU Rong-gui;HUANG Hai-jun
..............page:145-148
Application of Balanced Ternary in Elliptic Curve Scalar Multiplication
DENG Wei-yong;MIAO Xiang-hua
..............page:152-154
Security Proof for Rhee Protocol
DENG Qiang-dong;WANG Li-bin
..............page:155-157
Pedestrian Detection Method Based on Edge Symmetry and HOG
YAO Xue-qin;LI Xiao-hua;ZHOU Ji-liu
..............page:179-182
Semi-fragile Watermark Algorithm of Color Image Based on Slant Transform
BAO Rui;ZHANG Tian-qi;TAN Fang-qing;WANG Yu-e
..............page:122-125
Research of Mobile Node Deployment in WSN Based on Improved Frog Leaping Algorithm
LONG Teng;SUN Hui;ZHAO Jia
..............page:96-98,116
Random Deployment Strategy of Wireless Sensor Network Node
LI Meng;DING Dai-rong;GUO Ting-li
..............page:99-101
Applicationof Text Similarity Computing in Subjective Question Assessment
CHENG Chuan-peng;QI Hui
..............page:288-290
Research on Upper Bound of Algebraic Thickness for Boolean Functions with Small Hamming Weight
ZHOU Yu;ZHANG Wen-zheng;ZHU Shi-xiong
..............page:120-121,125
Research on Exception Monitoring Model for Linux System
XUE Bing;HE Yi
..............page:139-141
Improved Routing Protocol Based on Clustering in WSN
HAN Wan-qiang;LIU Yun
..............page:105-107,113
Image 3D Reconstruction Method Based on Silhouette Outline
CAO Yu;CHEN Xiu-hong
..............page:224-226,229
Survivability Evaluation on Autonomic Intrusion Tolerant System
WU Qing-tao;LIU Bin;ZHENG Rui-juan;LI Guan-feng
..............page:114-116
Improved False Data Filtering Method
ZHU Qing;GUO Sai-qiu
..............page:158-160
Data Encryption Transmission Strategy for Space Communication
HE Li-hong
..............page:149-151,157
Audio Visual Emotion Recognition Based on Triple Stream DBN Model
LV Lan-lan;JIANG Dong-mei;WANG Feng-na;Hichem Sahli;Werner Verhelst
..............page:161-162,166
Improved Particle Filtering Algorithm for Target Tracking
ZHANG Jian-an;ZHAO Xiu-bin;LI Si-jia
..............page:176-178,182
Wavelet Analysis Method of Signal in αStable Distribution
GAO Yu-bao;CHEN Ding
..............page:186-188
Information Hiding System Based on News RSS Document
QI Yin-cheng;SUN Zhuo;XIE Lin-yan
..............page:129-132
Foreground Target Detection Based on Gaussian Mixture Model and Codebook Algorithm
YE Yong;GUAN Ye-peng;LI Jing-jing
..............page:1-4
Adaptive Differential Evolution Algorithm and Its Application in Parameter Estimation
WANG Hai-lun;YU Shi-ming;ZHENG Xiu-lian
..............page:202-204,207
Load Balancing Algorithm for Middleware Database Cluster
ZHANG Shu-ben;XU Chen-feng;XI Hong-sheng
..............page:41-43,46
Resource Load Balancing Method for Energy-consumption Reducing in Cloud Environment
HU Zhi-gang;OUYANG Cheng;YAN Chao-kun
..............page:53-55
Shilling Attack Detection Model for Recommender System Based on Memory Principle
HUANG Guang-qiu;LIU Jia-fei
..............page:25-29
Generalized Rough Set Models Under Similar Symmetric Relations
MA Zhou-ming;LI Jin-jin
..............page:70-72,82
Remote Sensing Image Denoising Based on NSCT Threshold Shrinkage Approach
LI Dian-jun;JIA Zhen-hong;QIN Xi-zhong;YANG Jie;HU Ying-jie;DU Chao-ben
..............page:227-229
Study of Data Stream Classification Algorithm with On-demand Ensemble
QIAN Lin;QIN Liang-xi
..............page:62-63,69
Automatic Burning Method for WSN Testbed
WANG Yan-zheng;LI Rui-xiang;SHI Wei-bin;LE Yan-fen;YUAN Ming-hui;SU Sheng-jun
..............page:266-268
Application of Internet of Things Technology in Equipment All Life Cycle Management
ZHONG Qing;QUE Hua-kun;CHEN Rui-min;XIAO Yong;DANG San-lei
..............page:247-250,254
Web Extraction Method Based on DOM Tree and Domain Ontology
GUO Jian-bing;CUI Zhi-ming;CHEN Ming;ZHAO Peng-peng
..............page:56-58
Human Motion Posture Simulation Based on Inertial Motion Capture
ZHAO Zheng-xu;DAI Huan;ZHAO Wen-bin;YUAN Jie
..............page:5-8
Shadow Removal Algorithm for Moving Pedestrian Based on Weak Thresholds Segmentation
LI Ke-wei;YANG Xiao-min;HE Xiao-hai;ZHANG Sheng-jun
..............page:173-175
Nitrogen Fertilizer Fertilization Recommendation System of Wheat Based on G IS Wireless Service
CHE Ming-liang;NIE Yi-min;LI Qiang;WANG Wen-xia;ZHANG Yu-rong;MU Jiao
..............page:255-258
Design of Logistics Distribution Network for Fast Fashion Product
LIU Si-jing;ZHANG Jin;LI Guo-qi
..............page:269-272,275
SoC Implementation of Astronomical Image Difference Algorithm
ZHANG Qiang;WEI Ji-zeng
..............page:240-242
Multi-class Classification Method Based on SVM Probability Output and Evidence Theory
QUAN Wen;WANG Xiao-dan;WANG Jian;ZHANG Yu-xi
..............page:167-169
Multi-spectral Image Fusion Method Based on Improved WBCT
PENG Chao;LIU Bin
..............page:221-223
Intelligent Detection of X-ray Image Based on Adaptive GMM
HAN Jin-song
..............page:205-207
Design and Implementation of Blending Learning Supporting System
YAN Ju-wei;ZHOU Hui-juan;YAN Kun-peng
..............page:276-278
Unsupervised Image Matting Approach Based on Saliency
WANG Yu-xin;REN Zhi-sen;JIA Qi;GUO He
..............page:218-220
Access Control Algorithm for Multi-services in OFDMA System
BI Jiao;ZHANG Zu-fan;JIANG Hong-jun
..............page:89-91
Improved Two-stage Virtual Network Mapping Algorithm
XU Peng;LI Yong;JIN De-peng;SU Li;ZENG Lie-guang
..............page:79-82
Time Series Prediction Method Based on Process Neural Networks
LIU Zhi-gang;DU Juan;XU Shao-hua;LI Pan-chi
..............page:199-201
Network Fault Alarm Correlation Analysis Based on Association Rule
LI Jin-feng;WANG Huai-bin
..............page:44-46
Design of Floating-point Vector Coprocessor Based on FPGA
HAN Zheng-fei;LI Jin-song;PAN Hong-bing;LI Li;SHA Jin;HE Shu-zhuan
..............page:251-254
Rotating Machinery Fault Diagnosis Method Based on SVM
LIU Yong-bin;HE Qing-bo;ZHANG Ping;KONG Fan-rang
..............page:233-235