Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2012 Issue 9
Analysis of Fuzzy Information Exposure Paths in Wireless Sensor Network
GAO Yue-yue;WANG Rui;WAN Wang-gen;YU Shuai
..............page:62-65,68
WSN On-demand Multipath Routing Protocol Based on Energy-aware
WU Chun-xue;LIU Yi
..............page:58-61
Research of Malicious Code Defense Technology Based on UEFI Firmware
FU Si-yuan;LIU Gong-shen;LI Jian-hua
..............page:117-120
Wireless Sensor Network Access Switching Method for Sandstorm Monitoring
GE Jun;ZHOU Lian-ying
..............page:51-54
Robot Path Planning Based on Key Chain Genetic Operation
LIANG Jin-quan;ZHOU Zhi-ping;LI Ming;WAN Guo
..............page:166-169
Strategy of Dynamic Bandwidth Allocation and Its Performance Analysis
JIN Shun-fu;LV Qian;WANG Peng;LI Xiao-liang
..............page:83-85,92
Research on Determinition Algorithm of Clustering Number in Multi-dimensional Dataset
ZHOU Hong-fang;Li Hong-yan;LIU Ying;WANG Xiao-dong
..............page:8-11
Double Space-time Transmit Diversity System Combined with Signal Space Diversity
DENG Hui-ping;WU Yu-cheng;QI Mei-juan;WU Jin-cheng
..............page:66-68
Classification Rule Reduction Method Based on Association Rule
WANG Qi;LI Xia
..............page:46-48
Public Verifiable Signcryption Scheme Without Trusted Center
ZHANG Xiao-ping;ZHONG Cheng
..............page:141-143,161
WSN Key Negotiation and Authentication Protocol Based on Bilinear Pairings
ZHAO Yue-hua;HUANG Shu-mei
..............page:121-124
Sinusoidal Projection Identity Authentication Scheme Based on Hash Function
LONG Xiao;WANG Jing-cheng;ZHAO Guang-lei;HU Ting;ZHANG Zhen-wei;HE Jun;YU Chang-jian
..............page:125-126,130
Improved Generation Method of Feasible Basis Path in Program
WANG Qing-tan;JIANG Shu-juan;ZHANG Yan-mei
..............page:40-42
Design and Implementation of Automatic Detection System for Authentication Protocol Loophole
LIN Li;GUAN De-jun;XU Jian;ZHONG Yue
..............page:134-137
Three-dimensional Weighed Centroid Localization Algorithm Based on Tetrahedral Model
WANG Shuai;YU Jin-song;LIANG Pei;TIAN Xue-wen
..............page:90-92
Optimized Algorithm of Relevance Vector Machine Based on Rapid Estimation
ZHAO Lv;SU Yi-dan;QIN Hua
..............page:205-207
Video Face Recognition Based on Feature Fusion and Manifold Enhancement
HUANG Cun-dong;LIU Ren-jin;YANG Si-chun
..............page:193-196
Workflow Security Access Model Based on Dynamic Control Mechanism
WU Qian;ZHOU Qing
..............page:151-152,173
Design of High-speed Data Transmission System for Satellite Communication
DING Yuan-ming;LI Hua-fang;LIU Chun-ling;ZHOU Hua-yu
..............page:252-254
Analysis and Simulation of EPA Schedule Algorithm Channel Utilization Rate
CAI Chen-guang;JIANG Xiu-zhu
..............page:76-78,82
Mutual Authentication Protocol Based on XOR Operation for Low-cost RFID
PAN Tao;ZUO Kai-zhong;GUO Liang-min;LUO Yong-long
..............page:278-281
Congestion Control Algorithm Based on Virtual Cluster Head
LIU Yong-shuai;WANG Xin-sheng;HU Yu-lan
..............page:93-96
Temperature Control Sensor Fault Diagnosis Method Based on Hybrid Particle Filtering
TIAN Meng-chu;CHEN Zhi-min;WEI Xiu-ming;ZHOU Qing;WANG Zhen-li
..............page:162-165
Secure Distribution Scheme Supporting Encryption and Fingerprinting Interoperation
WANG Jun-wen;CAI Juan;LI Hong-yuan;LIU Guang-jie
..............page:148-150,169
Moving Object Extraction Algorithm Based on Improved GVF
XU Jun-hong;DING Chun-feng;SU Hai-bin;WANG Ting-ling
..............page:199-201
Image Recalling Based on Multidimensional Associative Memory Neural Network
YANG Jia-wen;SUN He-ming
..............page:177-179
High Dynamic Range Composition Algorithm of Color Image in YUV Space
CHEN Jun;HU Fu-qiao
..............page:214-216,233
Stability Analysis of Networked Control System Based on Double Observers
GAO Hui-sheng;LI Xiao-rui;WANG Shan;ZHAN Jing-yu
..............page:108-110,113
Thread Mapping Model from CUDA to Heterogeneous Many-core Architecture
YU Yong;PANG Jian-min;SHAN Zheng;LIU Xiao-nan
..............page:282-284,287
GIS-oriented Data Organization and Collection of Zhujuan Resume
HU Di;LV Guo-nian;LIN Bo-gong;WEN Yong-ning
..............page:24-27
Modified Smoothing Algorithm of Triangular Mesh Model
ZHANG Ya-juan;LI Ze-an;CHENG Chen
..............page:220-222,239
Design of Long-distance Driving Test Monitoring System
TAN Zheng;XU Jian-min;REN Bao-li;ZHUO Sheng-hua
..............page:32-35
Anti-collision Algorithm for Multi-reader Based on Schedule Mode
SUN Wen-sheng;HU Ling-min
..............page:258-261
Research on Image Segmentation and Lyrics Extraction of Chinese Numbered-notation Score
ZHANG Li-yin;CHEN Gen-fang;DU Xuan;HU Hai-ou;HAO Qiong-di
..............page:217-219,236
Localized Active Contour Model Based on Color and Texture Feature
MI Xiao-li;JIA Shi-jie;LIU Wen-yi
..............page:211-213
Maximum 2D Entropy Image Segmentation Based on Artificial Bee Colony Optimization
Alim·Samat;DU Pei-jun;LIU Si-cong
..............page:223-225,243
Disk Live Migration Strategy of Virtual Machine Based on Synchronization Mechanism
XU Zhi-hong;LIU Jin-jun;ZHAO Sheng-hui
..............page:291-292,封3
Online Classification Algorithm Based on Confidence-weighted Learning
LIU Jian-wei;CHI Guang-hui;LUO Xiong-lin
..............page:180-182
Business Flow Handoff Method Based on Dual Stack Mobile IPv6
ZHANG Yang-yang;LIU Jin-gang;WANG Yu-wei;YANG Bao-xing
..............page:97-99
Warning Diagnosis of Sudden Cardiac Death Based on Approximate Entropy
TANG Li-ping;LIU Jian
..............page:202-204,207
Threshold Hybrid Proxy Multi-signature Scheme
WANG Yong-bing
..............page:131-133
Implementation of Semi-TCP Protocol over Wireless Multi-hop Network
LIU Mei;JIANG Sheng-ming;LU Yi-qin
..............page:79-82
Novel Memory Manager for Object-oriented Programs
LU Xiao-shuang;SHUAI Jian-mei;WU Qing-xiang
..............page:21-23,27
Note Segmentation Algorithm Combining Pitch and Energy in Query by Humming
WANG En-cheng;SU Teng-fang;YUAN Kai-guo;WU Chun-hua;WANG Yu-qing
..............page:4-7
Relief Food Demand Forecast Based on Rough Set and Case-based Reasoning
WU Xue-lian;SUN Bing-yu;LI Wen-bo;ZHANG Jie
..............page:158-161
Low-complexity Secure Network Coding Algorithm Based on Sparse Matrix
XU Guang-xian;FU Xiao
..............page:55-57
Security-provable Identity-based Authenticated Key Agreement Protocol
WANG Ya-fei;ZHOU Ben-dong
..............page:144-147,165
Feature Selection Algorithm Based on Graph
PAN Feng;WANG Jian-dong;GU Qi-wei;NIU Ben
..............page:197-198,201
Task Scheduling in Cloud Computing Based on Improved Immune Evolutionary Algorithm
SHEN Li-jun;LIU Li;LU Rui;CHEN Yu-ting;TIAN Ping-ping
..............page:208-210
CFAR Detector Based on Anderson-Darling Test
XU Cong-an;JIAN Tao;SUN Wei-chao;GU Xin-feng
..............page:231-233
Research on Remote-link Transmission Algorithm in Wireless Sensor Network
LIN Lu-rong;TANG Bi-yu
..............page:100-104
Compressed Sensing Image Processing Based on Improved Layered DCT
YIN Xiao-hui;ZHANG Bao-ju;WANG Wei;LEi Qing
..............page:226-227,247
Design of Virtual Instruction Set Architecture for Firmware Code Analysis
ZHAO Yuan;ZENG Guang-yu;WANG Wei;CUI Chen;GAO Hong-bo
..............page:271-274
Agent-based Mobile Web Service Integration Scheme
RU Bei;XIAO Yun-peng;ZHANG Jun-peng
..............page:49-50,54
Research of Hand Posture Recognition Method Based on Average Neighborhood Margin Maximization
YANG Yang;CHENG Nan-nan;ZHANG Meng-meng
..............page:19-20,35
Spectral Unmixing Method of Remote Sensing Images in Variable Architecture of Neural Network
LI Xi;SHI Chang-min;LI Chang;CHEN Feng-rui;TIAN Li-qiao
..............page:1-3
Research on Sudden Topic Detection Method for Microblog
QIU Yun-fei;CHENG Liang
..............page:288-290
Color Digital Image Scrambling Algorithm Based on Multi-group Chaotic Sequences
DUAN Xue-feng;GUAN Jian;DING Yong;LIU Yun-bo
..............page:114-116,120
Polynomial Expression and Completeness Analysis of 1~5 Round LBlock
PENG Chang-yong;ZHU Yue-fei;GU Chun-xiang;MI Shun-qiang
..............page:155-157,179
Syntaxic Feature Selection Based on Category Discrimination Degree and Correlation Analysis
CHEN Jian-hua;WANG Zhi-he;JIANG Yun
..............page:186-188,192
Design of Model-based User Interface Transformer
QI Xiao-dong;HUA Qing-yi;WU Hao;LI Ya-ming;GUO Cui;CHANG Xiao-jun
..............page:43-45
tou gao xu zhi
..............page:封2
Protocol Model Based on Cross-domain Authentication and Key Agreement
YAO Yao;WANG Xing-wei
..............page:12-14
Social Network Analysis Method in Twitter Community
CHEN Jia;KUANG Zhi-feng;LI Min
..............page:275-277,281
Credibility Validation of Low-altitude Wireless Channel Model Based on Monte Carlo Method
CHEN Qiang;YANG Xiao-peng;YANG Dong
..............page:69-71,75
Fatigue and Attention Detection Based on Bayesian Network
ZHANG Jian-ming;WEI Lin-feng;LIU Zhi-qiang;WANG Peng
..............page:189-192
Bayes Reliability Evaluation Model of Multistage Experimental Data Fusion
WEI Jin-fen;SONG Bao-wei;MAO Zhao-yong
..............page:265-267
Wireless Sensor Network Localization Algorithm Based on Grid Scanning
YAO Yan;YU Ji-guo;GUO Qiang
..............page:86-89,96
Tactical Path Planning for CGF Agent in Urban Combat Simulation
PENG Hui;HE Yi-hui;HANG Feng;WANG Yong
..............page:262-264,267
High Performance Signal Processing System in Wideband Phased Array Radar
WU Chang-rui;KONG Chao;JI Ying-hui;CEN Fan;CAI Hui-zhi
..............page:240-243
Design and Implementation of Thenar Palmprint Recognition System
BAI Qiu-ju;ZHOU Zhao-shan;ZHU Xi-jun
..............page:170-173
Optimization of Collision Detection Algorithm Based on Hybrid Bounding Box
JIANG Xiao-lu;LIU Yuan
..............page:285-287
Design of Multi-core SoC Based on Multi-layer AHB Architecture
LIU Ji-yao;LIU Lei-bo;YIN Shou-yi;WEI Shao-jun
..............page:237-239
Research on WebGIS Development Framework from Perspective of Client-side
WANG Tian-bao;LU Hao;ZHONG Er-shun
..............page:255-257,261
Minimal Risk and Maximal Flow Algorithm in Hazardous Materials Transportation
MAO Hua;ZHAO Xiao-na;MAO Xiao-liang
..............page:268-270,274
Improved Business Service Selection Method
LI Jing-bo;LIU Jin-gang;XING Yun-bing
..............page:36-39
Analysis and Improvement of Certificateless Signature Scheme
YANG Bo;XIAO Zi-bi;LI Shou-gui;SONG Chun-guang
..............page:15-18
Improved Feature Extraction Algorithm of Polymorphic Worms
QIN Shen;LAO Cui-jin
..............page:153-154,176
Improved Method for Generating Global View Face Texture Image
ZHENG Qing-bi;WANG Chun-xia
..............page:228-230,251
Embedded Adaptive Real-time Resource Management
YAO Wu-jian;SHI Xiao-an;ZHOU Xing-she
..............page:248-251
Implementation Method of Zero-overhead Loop in MCU
XUE Chao-fan;ZHANG Sheng-bing
..............page:244-247
Sentence Sentiment Analysis Based on Uyghur Sentiment Word
HUANG Jun;TIAN Sheng-wei;YU Long;FENG Guan-jun
..............page:183-185
k-fault-tolerant Topology Construction Algorithm in Wireless Ad Hoc Network
JIANG Hong-lu;YU Ji-guo;WANG Guang-hui
..............page:72-75
Adaptive Cooperative ARQ Based on GOP Fetching Frame and Hop Count
JIN Yong;BAI Guang-wei
..............page:105-107