Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2013 Issue 2
A New (m+1,n) Rational Secret Sharing Scheme
ZHAO Yong-sheng
..............page:108-111,118
Design and Implementation of Yellow River Delta Vulnerability Assessment System
LI Lian-wei;LIU Zhan;SONG Dong-mei;LI Dong-xu;HU Li-min
..............page:265-269
Performance Analysis of Dezert-Smarandache Theory Combination Rule
LI Hong-fei;TIAN Kang-sheng;JIN Hong-bin
..............page:288-292,298
An Efficient Certificateless Blind Signature Scheme
HUANG Ru-fen;NONG Qiang;HUANG Zhen-jie
..............page:130-136
Quality of Experience Assessment Model and KQI Weight Calculation Method
JIN YU;LI Xiao-lin;LI Xue-song
..............page:311-316
A Quick Code Table Lookup Algorithm Based on CAVLC Decoding
HUANG Ming-zheng;WANG Jian-hua;HAN Yi-shi;SUN Yun-long
..............page:23-26,33
Adaptive Local Search Algorithm for Solving CARPSD Problem
WANG Li-bin;LIN Dan
..............page:211-215
Optimized Scheduling Strategy for Data Block in P2P Streaming Media
HUANG Guo-wei;CHEN Zhi
..............page:90-93,98
An Asymmetric Key Management Scheme for Mobile Ad hoc Network
WU Jun;SHI Run-hua;ZHONG Hong
..............page:103-107
Pulse Width Modulation Signal Generator Based on FPGA
HAO Jian-wei
..............page:260-264,269
Seamless Image Stitching Method Based on ASIFT
YANG Xiao-hui;WANG Min
..............page:241-244,249
FPGA Interconnect Resource Timing Library Based on Cumulative Frequency Statistic
MENG Xiang-zhi;YANG Meng;LAI Jin-mei
..............page:254-259
Study on Algebraic Structure of Z*(φ)(n) in RSA Algorithm
PEI Dong-lin;HU Jian-jun;LI Xu
..............page:145-149
Chinese Keyword Extraction Algorithm Based on Competitive Learning Network
SHEN Xue-li;CHENG Yu-wei
..............page:207-210,215
Video Fingerprinting Algorithm Based on Kurtosis Image
NIE Xiu-shan;DONG Fei;SUN Jian-de
..............page:141-144
Outliers Detection in Data Stream Based on Wavelet Density Estimation
LIU Yao-zong;ZHANG Hong;MENG Jin;HAN Fa-wang
..............page:178-181
Joint Optimization of Circular Array Pattern Based on Modified Genetic Algorithm
HUANG Zhong-rui;NIU Zhao-yang;LIU Chun-sheng
..............page:182-186
IITFN Multi-attribute Decision Making Model Based on Maximizing Deviation
FU Ya-nan;MAO Jun-jun;XU Dan-qing
..............page:202-206
A Video Watermarking Method Based on Moving Objects
SUN Hui;SHI Yan-jiao;WANG Jian-zhong;LV Ling;KONG Jun
..............page:155-159,163
Research on Rule Extraction Method in Inconsistent Decision System
ZHU Guo-long;LI Long-shu
..............page:46-49
Projection Matrix Algorithm Based on Two-dimensional Index
CHEN Hong-lei;HE Jian-feng;LIU Jun-qing
..............page:229-232
Security Analysis of Proxy Blind Signature and Multi-proxy Blind Signature
HU Xiao-ming;YANG Yin-chun;WANG Jian;LIU Yan
..............page:160-163
An Equipment Support Task Scheduling Method Based on Ant Colony Optimization
DENG Xiang-yang;ZHANG Li-min;HUANG Xiao-dong
..............page:283-287
A High-reliable RFID Grouping Tag Proof Protocol
ZUO Kai-zhong;PAN Tao;GUO Liang-min;LUO Yong-long
..............page:150-154
Universally Composable Secure Commitment Protocol Based on Tamper-proof Hardware Model
ZHANG Yu;YIN Jian-qiang;HU Jie
..............page:125-129
Traffic Sign Detection Based on Visual Attention Mechanism
LIU Fang;ZOU Qi
..............page:192-196
Multi-objective Tradeoff Optimization with Risk Consideration in Large-scale Engineering Projects
MA Chao;ZHANG Song;LI Yu-dong;CHEN Hua-ping
..............page:270-273,278
A Fast Method of Curved Surface Reconstruction Based on Point Cloud Data
LIANG Qun-xian;XU Hong-li
..............page:237-240
Video Copy Detection Based on Shot Duration and Texture Information
YU Fang;CUI Shao-bin;GAO Zhen-yan
..............page:304-310
Three-dimensional Otsu Moving Vehicle Detection Method Based on Decomposition
ZHANG Jian;SHEN Chun-yu;LU Jin
..............page:172-177
Automated Search Method for Statistical Test Probability Distribution Generation
ZHOU Xiao-ying;GAO Jian-hua
..............page:274-278
A Novel Automated FPGA Interconnect Test Algorithm
SUN Lei;ZHU Chun;LIANG Chuan-zeng;WANG Jian;LAI Jin-mei
..............page:250-253
Research on Privacy Preserving Algorithm for Outsourcing Association Rule Mining
WANG Qian;LIU Hong;YANG Chuan-dong
..............page:34-40
An RBAC Model Based on Trust Degree in Open Environment
DENG Wen-yang;ZHOU Zhou-yi;LIN Si-ming;LIU Jin-gang
..............page:112-118
Adaptive Image Retrieval Combined with LBP and Brushlet
YANG Xiao-hui;YAO Xue-yan
..............page:233-236
Surface Defect Automatic Detection Algorithm Based on Principal Component Analysis
GUO Yong-cai;DENG Xi-feng;GAO Chao
..............page:216-219,224
A Real-time Adaptive Bitstream Switching Algorithm for HTTP Streaming
ZHANG Hui-shuai;WANG Jin-lin;ZHU Xiao-yong;SUN Peng
..............page:1-5
A Sphere Detection Algorithm with Low Complexity for MIMO
LI Shi-ping;MIAO Cheng-qiang;LIU Li-jing
..............page:81-84,89
Improved Electromagnetism-like Mechanism Algorithm for Resource-constrained Project Scheduling Problem
LI Yu-dong;ZHANG Song;MA Chao;CHEN Hua-ping
..............page:317-321
Resource Allocation Algorithm for Cognitive Radio Based on QoS Requirements
ZHAO Zhi-jin;LAI Hai-chao;SHANG Jun-na
..............page:85-89
Scholar Recommendation System Based on Academic Relationship of Thesis Co-authors
DENG Shao-wei;LUO Ze;LI Shu-ren;YAN Bao-ping
..............page:12-17
An Information Hiding Algorithm Based on Pitch Prediction
LIU Cheng-hao;BAI Sen;HUANG Yong-feng;YANG Yi;LI Song-bin
..............page:137-140
Research and Parallel Implementation of High Effective RSA Algorithm
TANG Xiao-lin
..............page:164-167,171
Research on Ultra-short Wave Wireless Network Planning Method
CHENG Quan;LIAO Ming-xue;HU Xiao-hui;HE Xiao-xin
..............page:61-66
Multi-feature Bandwidth Adaptive Mean Shift Target Tracking Algorithm
DING Ye-bing;ZHAO Feng;HAO Shi-hai
..............page:197-201,206
Communication Situation Estimating Method Based on HMM
FENG Tao;HUANG Kai-zhi;XU Tian-shun
..............page:6-11,17
Ranging Algorithm Based on Anchor Nodes and Gauss Function
WAN Guo-feng
..............page:73-76
Probabilistic Skyline Query in Subspaces over Data Streams Based on Grid Index
YANG Yan-yan;ZHAO Lei;YANG Ji-wen
..............page:50-54
An Efficient Prevention Model Against SIP Flooding Attack
LI Hong-bin;LIN Hu;LV Xin;YANG Xue-hua
..............page:119-124
Interactive Image Segmentation Based on Multi-level Cooperative Propagation
ZHANG Ke-wei;SHEN Qun-tai
..............page:225-228
Study of Web Application Monitoring System Based on Business Process
ZHAO Fang;LI Lan-ying
..............page:41-45
Multi-core Thread Schedule Strategy Based on Thread Pipeline
JI Yuan-yuan;ZHANG Tao;WANG Hai-peng
..............page:279-282,287
Vectorization Study for Cyclic Reduction Algorithm Based on Godson 3B
WU Xi;HUANG Zhang-jin;GU Nai-jie
..............page:293-298
Terrain Classification Based on Visible Light and Infrared Data Fusion
GU Ying-jie;JIN Zhong
..............page:187-191
Maximum Power Point Tracking Control Based on Improved Variable Step Size INC Method
HUANG Qin;ZHAO Jing;LIN Rui;SHI Guo-fei;YUAN Yu-long
..............page:245-249
Chinese Sentence Similarity Algorithm Based on Dynamic Programming
FENG Kai;WANG Xiao-hua;CHEN Zhi-qun
..............page:220-224