Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2012 Issue 6
Blurred Direction Identification Based on Texture Filtering and Direction Derivation
FAN Hai-ju;ZHANG Yu-shan;FENG Nai-qin
..............page:175-177
Electronic Image Stabilization Algorithm Based on Gradient Projection Method
QI Yun-guang;AN Gang;GONG Zheng-bo
..............page:230-232,235
Anti-assessment Method for Expert Based on Data Preprocessing
XU Hong-feng;LONG Jun;ZHANG Hao
..............page:75-77
Design and Implementation of Real-time Operating System Based on OSEK/VDX
LUO Xiao-min;TU Shi-liang;TANG Zhi-qiang;LING Yu;HUA Ming
..............page:247-249,252
Twig Pattern Query Algorithm for XML Data Stream
BAI Shan;TAO Shi-qun
..............page:69-71
Boundary Extraction of Active Contour Based on Tensor Voting
WEN Pei-zhi;HUANG Jin-fang;NING Ru-hua;WU Xiao-jun
..............page:216-218
Research on Function Test of OSEK/VDX Operating System
MA Bao;LUO Xiao-min;TU Shi-liang;SHEN Hao;QIU Rui
..............page:262-264
Packet Scheduling Mechanism with Spreading Extent Estimation in Opportunistic Network
LV Yi;FAN Si-long;WU Da-peng;KONG Xiao-long
..............page:104-106,110
Message Management Model of Data-link System
MA Yua;WANG Hao-tong;ZHANG Bing-qiang;LI Wei-ming;WANG Yan;GUO Shao-jun
..............page:276-278,281
Research on Context-aware Supply Chain Procurement Decision Based on Rule Engine
LI Wei-ping;LIN Hui-ping;SUN Ya-hong
..............page:7-9
Dual Digital Blind Watermark Algorithm Based on Three-dimensional Mesh Model
TANG Bin;KANG Bao-sheng;WANG Guo-dong;KANG Jian-chao;ZHAO Jian-dong
..............page:119-122
Fire Smoke Detection Based on Wavelet Transform and Sparse Optical Flow Method
YAO Tai-wei;WANG Hui-qin;HU Yan
..............page:204-206
Secondary Decoding Algorithm of LT Code in Fountain Code
FENG Xin;ZHANG Yan;JIA Zhi-cheng
..............page:291-293
VoIP Behavior Analysis and Content Recovery Under Bypass Monitoring
ZHAO Han-song;WU Cheng-rong;WANG Guo-ping
..............page:145-147,150
Constructive Learning Method Based on Tri-training Algorithm
WU Tao;LI Ping;WANG Yun-qiang
..............page:13-15
Research on CoSy C Compiler Security
WANG Shao-pei;WU Jian;RUAN Yuan
..............page:43-46
Method of Program Source Code Similarity Measurement
GU Ping;ZHANG Feng;ZHOU Hai-tao
..............page:37-39
Research on Inter-VM Communication Strategy in Multi-core Virtual Machine System
HUANG Jing;WU Jun-min;LI Li-feng;JIANG Nan;ZHU Xiao-dong;ZHU Yu
..............page:285-287
Calibration Method for Parabolic Camera System
ZHANG Bei-wei;CHEN Sheng-yong;WANG Zi-wei
..............page:28-31
Channel Allocation Algorithm Based on QoS and Throughput Fair
DENG Xue-bo;WANG Xiao-qiang;CHEN Xi;MA Rui;LIAO Yong;LI Ping
..............page:89-91
Intrusion Detection Algorithm Based on Tri-training
WU Shu-yue;YU Jie;FAN Xiao-ping
..............page:158-160
Resource Allocation Strategy for Meeting Task Deadline on Cloud Platform
LIU Wen-juan;CHEN Hua-ping;HAO Shang-gang
..............page:60-62,65
Network Management Method for WSN Based on Virtual OID Computation
ZHANG Wen-bo;ZHANG Xiao-xiao;TAN Xiao-bo;FU Li-dong
..............page:83-85
Application of Multi-objective Evolutionary Algorithm in Agent Auto-negotiation
LI Ya-lin;ZENG Ying-lan;LI Mei-yi
..............page:167-171
Design of Privacy Preservation Authentication Protocol in Pervasive Environment
WANG Shuo;LUO Ying;SUN Ling;HUO Shi-wei
..............page:129-131
P2P Resource Searching Strategy Based on Social Characteristics
CHEN Zhuo;XUE Fei-teng
..............page:32-33,36
Research on Engineering Data Format Conversion Based on Voronoi Diagram
ZHAO Wen-bin;ZHAO Zheng-xu
..............page:22-24
Efficient Index Model of Moving Object Full-time State for Road Network
TAN Xiao-tian;YU Jian-qiao
..............page:53-55,59
Performance Analysis and Test of Video Hash
LIU Li;LI Xiao-ju;LI Ling-ling
..............page:236-237,240
Reliability Research and Analysis of Public Redundance System
CHEN Zheng;LI Hua-wang;CHANG Liang
..............page:269-270
P2P-based Remote Control System of Mobile Robot
WANG Duo-lin;QIN Gui-he;XU Hai-yi;CHEN Yun-han
..............page:190-192,195
Single Neuron PID Control Simulation of Aircraft Deicing Fluids Heating System
CHEN Bin;YANG Hong-zhen;WANG Li-wen
..............page:241-243
Fuzzy Clustering Partition Model of Cluster Resource
NA Li-chun
..............page:34-36
Data Encapsulation Scheme in Trusted Software Stack Based on Hybrid Encryption
YAN Jian-hong;PENG Xin-guang
..............page:123-125
Near Space Fading Channel Modeling and Its Performance Analysis
LIN Cheng;CHEN Shu-xin;SU Yi-dong
..............page:80-82
Expression Recognition Based on Contourlet Transform and Locality Preserving Projection
GAO Xian-wen;FU Wei;ZHU Peng
..............page:184-186
Semantic Extended Search Approach Based on Ontology in Knowledge Base
WAN Jing;WANG Wen-cong;YI Jun-kai
..............page:19-21,24
Performance Test Method for Shared Memory MapReduce Cloud Computing
FENG Guo-fu;WANG Ming;LI Liang;CHEN Ming
..............page:50-52
Improved JVT-H017 Code Rate Control Algorithm
DING Wen;ZHANG Hao-ping;HU Peng-sha
..............page:238-240
Underdetermined Blind Source Separation Based on K-SCA Assumption
YANG Wen;ZHANG Hong-yi;PU Jie-xin
..............page:187-189
Direct Trust Degree Evaluation Method Based on Authorization Feedback
ZHANG Bin;XIONG Hou-ren;YANG Yan
..............page:163-166
Resource Allocation Algorithm Based on QoS in OFDMA System
WANG Yu-jin;LU Xing-jia;WANG Zhi
..............page:95-97
Establishment of Security Broadband Access System
LI Jian;LIU Jun-min;WANG Xiao-ming;GAI Lei
..............page:126-128
ECDSA-based Password Authenticated Key Exchange Protocol for Three-party
WANG Guo-cai;KE Fu-song;WANG Fang
..............page:153-155
Improved Dijkstra Algorithm for Solving Optimum Path After Earthquake
LI Jing-xian;LI Xiao-run
..............page:271-272,275
Plant Growth Modeling Based on Fuzzy Neural Network
WANG Guang;QIU Yun-fei
..............page:273-275
MPPT Control Scheme for Photovoltaic System Based on Sliding Mode Control
HUANG Qin;SHI Guo-fei;LING Rui;YAN He-biao;HUANG Xiao-you
..............page:253-255,258
Metadata-driven Versatile GIS Application Integration Model
YUAN Man;LI Jin-rong;GAO Jun-tao;FAN Zhong-yu
..............page:282-284,287
Palmprint Recognition Based on Contourlet Transform and SVM
WANG Xuan;WANG Feng;LIANG He-yan
..............page:196-197,200
Topology Aggregation Algorithm Based on Polymerization Coefficient
DING Zhen-quan;DONG Kai-kun
..............page:111-112,115
B+ Address Tree Diffusion Strategy for Benign Worm
CHEN Wei;SUN Zhi-yong;XU De-wu
..............page:135-138
Evaluation on Image Color Transfer Effect Based on Analytic Hierarchy Process
LONG Xi-hua;HAN Bo;YANG Xin-jia
..............page:221-223
Optimization Design and Implementation of SM3 Algorithm Based on FPGA
WANG Xiao-yan;YANG Xian-wen
..............page:244-246
Urban Road Extraction Based on Hough Transform and Path Morphology
LIU Xiao-dan;LIU Yan
..............page:265-268
Process Analysis of Buffer Overflow Based on Dynamic Binary Platform
DONG Peng-cheng;SHU Hui;KANG Fei;WANG Qian;WEI Wei
..............page:66-68,71
Gesture Feature Extraction Combining CSS with Fourier Descriptor
LI Dan-jiao;PENG Jin-ye;FENG Xiao-yi;WANG Jun
..............page:178-180
Intra-frame Template Matching Prediction Algorithm Based on Boundary Texture Consistency
WANG Qi-jun;HU Rui-min;WANG Zhong-yuan
..............page:227-229
Facial Expression Recognition Method Based on Topological Perception Theory
WANG Xiao-feng;ZHANG Li-jun
..............page:193-195
tou gao xu zhi
..............page:封2
Radiation Source Localization System Based on Wireless Sensor Network
CHEN Chao;WANG Lei;ZHOU Chun-zhi;ZHU Hong-ying;CAO Hong-xin;YANG Yu-wang
..............page:86-88
Design and Realization of Distributed Information Security Defense System
WANG Guo-xin;ZHU Xian-hua
..............page:156-157,160
Facial Expression Recognition Based on Gabor Wavelet and Sparse Representation
ZHANG Juan;ZHAN Yong-zhao;MAO Qi-rong;ZOU Xiang
..............page:207-209,212
Research on AC Multiple Pattern Matching Algorithm
WU Xi-hong;ZENG Feng
..............page:279-281
Novel Group Authentication Key Agreement Scheme
LIU Jing-lei;HU Hong-yu;AI Ling-xian
..............page:132-134
Intrusion Detection Algorithm Based on BP Neural Network
HU Ming-xia
..............page:148-150
Case Retrieval Algorithm Based on Sliding Window
QIAO Li
..............page:201-203,206
Improvement and Security Analysis of Key Agreement Protocol on Braid Group
ZUO Li-ming;LIU Er-gen;TANG Peng-zhi;XU Bao-gen
..............page:142-144
Solution of NoSQL Distributed Storage and Extension
YAO Lin;ZHANG Yong-ku
..............page:40-42
Improved Relay Selection Strategy of Multi-user Cooperative Communication System
LIU Shun-lan;XU Guang-jian
..............page:101-103
Research on Wall-following Navigation Strategy and Algorithm for Mobile Mechanical Mouse
ZHA Feng;XIAO Shi-de;FENG Liu-zhong;GONG Yun-long
..............page:172-174
Uyghur Weather Information Service Based on WebGIS
ZHENG Jiang-hua;ADILI·Rouz
..............page:288-290
Research on Aerospace Simulation System Based on STKX and HLA
ZHANG Zhi-wei;LIU Deng-di;ZHU Jin-hui;YUAN Kun-gang;WANG He;JIANG Dao-gang
..............page:259-261
Research and Implementation of H.264 Entropy Decoder
FU Yong-qing;JIANG Ling-ling;LIU Di-ming
..............page:224-226
Digital Watermark Algorithm Based on DWT for 3D Point Cloud Model
WU Ying-bin;GENG Guo-hua;HE Yi-yue
..............page:151-152,155
Wireless Sensor Network Communication Model Based on Optimization Theory
SHANG Xing-hong;QIAN Huan-yan;GAO De-min
..............page:113-115
Method for Improving Randomness of Tent Chaotic Sequences
LIU Jin-mei;ZHANG Wei;QIU Shui-sheng
..............page:10-12
Identity Authentication and Key Distribution Protocol Based on Quantum One-way Function
GONG Chang-qing;TANG Hu;ZHANG Da-wei
..............page:161-162,166
Remote Sensing Image Correction Method Based on SA-WPSO
SU Qing-he;CHENG Hong;WANG Zhi-qiang;LU Yong-ji
..............page:210-212
Blind Signature Scheme and Its Application in Electronic Voting Protocol
SONG Cheng-yuan;ZHANG Chuan-rong;CAO Shuai
..............page:139-141,144
Novel Measurement Method for Covering Rough Set
ZHOU Zheng-guo
..............page:78-79,82
Static Code Analysis Method Based on Fault Mode and Model Check
WEI Xue-fei;WU Jian;RUAN Yuan
..............page:47-49
Improved A-W Thining Algorithm
LI Wen-jie;HE Jia-feng
..............page:219-220,223
Performance Optimization Method of Streaming Media Based on Symbian Platform
ZHU Dong-dong;HE Jia-ming;FAN Ling-hui
..............page:233-235
Airborne Multiplex Video Image Acquisition and Transmission System
JI Xiao-qiang;DAI Ming;SUN Li-na;YIN Chuan-li;CHEN Xiao-lu;WANG Zi-chen
..............page:16-18
Improved CLARANS Algorithm Based on Grid Structure
ZHANG Shu-chun;SUN Xiu-ying
..............page:56-59
Dynamic Bandwidth Allocation Algorithm Based on Fibonacci
CHEN Yuan-yuan;FENG Hui-fang
..............page:116-118,122
Improved Chord Model Based on Physical Topology
FU Yun-qing;WANG Xing-qin
..............page:98-100
Blurred Image Restoration Model Based on Zero Boundary Pixels
GONG Ping;YU Zhen-ming
..............page:213-215
Improved TCP Congestion Control Algorithm for Wireless Network
FENG Hui-fang;LIU Lei
..............page:25-27,31
Research on Energy Consumption Balance Strategy of Wireless Sensor Network
DANG Xiao-chao;LI Xiao-yan;HAO Zhan-jun
..............page:107-110