Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2013 Issue 4
Multi-objective Optimization for Fuzzy Vehicle Routing Problem with Hard Time Windows
WANG Lian-feng;SONG Jian-she;CAO Ji-ping;YE Qing
..............page:9-13,17
PPM Iterative Soft Demodulation Algorithm in Free-space Optical Communication
ZHANG Ding-chen;ZHOU Xiao-lin;DU Jian-hong
..............page:1-4
Fast Recognition of Veneer Defect Image Based on Improved Contour Model
WANG A-chuan;CAO Lin;CAO Jun
..............page:22-26,35
Probabilistic Threshold top-k Query Algorithm Based on x-tuple
HUANG Dong-mei;SHU Bo;WANG Jian;XIONG Zhong-min
..............page:44-47
An Adaptive Power Control and Scheduling Algorithm in WSN
ZHANG Zhen;SHI Zhi-dong;SHAN Lian-hai;ZHOU Jie;FANG Wei-dong
..............page:18-21,31
Mandarin-English Mixed Text to Speech Based on HCSIPA
SO Yong-jin;CAI Lian-hong
..............page:14-17
Distributed Cache Strategy in Cloud Storage Based on Solid State Disk
LI Dong-yang;LIU Peng;DING Ke;TIAN Lang-jun
..............page:32-35
Laser Plane Calibration Method Based on Precise Movement
QIAN Li-dan;YANG Jun-wei
..............page:318-321
A Parallel Algorithm of H.264/AVC Video Encoding
XIA Ling;SHU Tao
..............page:314-317
tou gao xu zhi
..............page:封4
A Management Model of Distributed Unstructured Data Replica
LIN Fei;ZHANG Wan-jun;SUN Yong
..............page:36-38,43
Low Bit-rate Image Compression Algorithm Based on Down-sampling in Wavelet Domain
LI Qing-zhong;GU Na-na;LIU Xiao-li
..............page:272-275,279
An Improved Projection Segmentation Method of Print Uyghur
WAN Jin-e;YUAN Bao-she;LI Xiao;GU Zhao;Mirsali
..............page:263-266,271
MapReduce-based Ant Colony Optimization Algorithm for Multi-dimensional Knapsack Problem
WANG Hui-ying;NI Zhi-wei;WU Hao
..............page:248-253
Image Fuzzy Degree Assessment Method Based on Sparse Representation
ZHANG Tao;LIANG De-qun;WANG Xin-nian
..............page:267-271
Touched String Segmentation Algorithm Based on Markov Random Field
YANG Qing-hai;LU Bo;YAN Zi-ye;HUANG Shen-bin;WANG Hai-jie
..............page:258-262
Real-time Local Path Planning for Mobile Robot Based on Kinect
YU Zhen-zhong;ZHENG Wei-cou;LIU Xin;HUI Jing
..............page:243-247
An Improved Quantum Genetic Algorithm of Quantum Revolving Gate
ZHANG Xiao-feng;SUI Gui-fang;ZHENG Ran;LI Zhi-nong;YANG Guo-wei
..............page:234-238
Image Denoising Based on Direction Transformation and Directionlets
JIN Hai-yan;LI Shuai;HEI Xin-hong
..............page:254-257,262
Adaptive Multi-feature Combination Object Tracking Based on Blocking
ZHOU Fang-yan;TANG Jian;HE Jin-song
..............page:239-242
Filter Feature Selection Algorithm Based on Coalitional Game
LI Zhi-guang;FU Feng;SUN Xin;LI Cai-hong
..............page:230-233
Support Vector Machine Prediction Based on Improved Artificial Fish Swarm Algorithm
TIAN Hai-lei;LI Hong-ru;XU Bao-hua
..............page:222-225
H.264 Computation Resource Allocation in Multiple Priority Region of Interest
CHEN Xiao-lei;ZHANG Ai-hua;CHEN Li-li;LIN Dong-mei;YANG Xin-zhu
..............page:283-286
Tibetan Text Dependency Syntactic Analysis Based on Discriminant
Hua-que-cai-rang;ZHAO Hai-xing
..............page:300-304
Design of Storage Optimization Based on FPGA Linear Equations System
PENG Yu;ZHONG Xue-jie;WANG Shao-jun
..............page:287-290,295
Multi-state Binary Search Anti-collision Algorithm Based on Counting Mechanism
XUE Jian-bin;WANG Wen-hua;ZHANG Ting;SUN Rui
..............page:309-313
Study of Path-cycle Subgraph and Cycle Packing in Uniform Exchange Problem
WANG Gang;LUO Zhi-gang
..............page:305-308
List Intersection Algorithm on Multi-core CPU/GPU Platform
WANG Huai-chao;ZHAO Lei
..............page:296-299,304
Communication Model Optimization of Distributed Data Acquisition System
ZHANG Sheng;DONG Rong-sheng;LENG Wen-hao;WU Yan-hua
..............page:276-279
Fast Integer Pixel Search Algorithm of Multi-level Cross Diamond
ZENG Jie-xian;ZHENG Da-fang;FU Xiang
..............page:291-295
Reliability Simulation of Common Cause Failure Based on Goal Orient Methodology
CHEN Chen;JIA Cheng-bin;YANG Jian-jun
..............page:280-282,286
Research on Multi-interface Multi-channel Simulation Model Extension Based on NS-2
FU Qi;CHEN Zhi-gang;JIANG Yun-xia
..............page:113-117
Content Extraction Signature Scheme Based on DLP
CAO Su-zhen;WANG Cai-fen
..............page:132-136
Topology Control Method for Task-oriented Wireless Sensor Network
CHEN Zheng-bao;CHEN Wang-hu
..............page:118-122
Double Energy Efficient Optimization Design for LR-WPAN Mesh Network
ZHA Zhao-xiang;ZHANG Jin-yi;LIU Jie;FAN Tian-xiang
..............page:123-127
Research on Optimal Equalization Technology in Underwater Acoustic System
ZHAO Dan-feng;LIAO Xi;QIAN Jin-xi
..............page:105-108
Trust Transfer of Cross-domains Mobile Node in Internet of Things
MA Man-fu;NI Wei
..............page:100-104,108
Probabilistic Routing Algorithm Based on Ant Colony Algorithm in DTN
SONG Xin;WANG Bing-ting;HU Yong;WANG Gui-zhu
..............page:90-93,99
MAC Protocol Supporting Video Transmission in UAV Network
YANG Hai-dong;JING Bo;LI Jian-hai
..............page:94-99
Improved Algorithm Based on CACC for Discretization of Continuous Data
LIU Xiao-long;JIANG Hong;WU Dan
..............page:48-51
Multi-radar Data Fusion Method Based on Distributed BLUE
FU Ying;SUN Yong-jian;TANG Zi-yue
..............page:52-57
Study of XACML Policy Based on Description Logic
CHEN Xu-ri;XU Wei-min
..............page:71-74
Driver Monitoring of Micro-kernel OS
LIU Chao-ming;QIAN Zhen-jiang;HUANG Hao
..............page:62-65
Particle Filter Based Nodes Localization Algorithm for Mobile Sensor Networks
YANG Shu-hui;LI Lian;JIANG Wen-tao;ZHANG Kai-yi
..............page:85-89
Workflow Access Control Model and Dynamic User Assignment Policy
YUN Ya-li;HAN Hai-xiao;LI Ya-ping
..............page:75-77,81
Application of Two Levels Linked Lists in Switch Controller Chip Descriptor Management
REN Min-hua;LIU Yu;LUO Yun-bao;ZHAO Yong-jian;ZHANG Ji
..............page:82-84,89
Service Component Identification Method Based on Activity Correlation
WU Lei;WEI Zhen;YUE Feng;QIU Shu-wei
..............page:66-70
Maximal Frequent Itemset Mining Based on Parent-child Equivalency Pruning Strategy
ZHANG Zhi-gang;HUANG Liu-sheng;JIN Zong-an;XIANG Li-ping
..............page:219-221,225
Near Infrared Ray and Visible Light Image Fusion Algorithm Based on Score
PAN Lei;YIN Yi-long;LI Xu-zhou
..............page:226-229,233
Occluded Vehicle Segmentation Method Based on Corner Feature
CHEN Shu;LIU Bing-han
..............page:210-213,218
A New Intelligent Recognition Method of Zombie Fan
FANG Ming;FANG Yi
..............page:190-193,198
Mining Method of Microblog Opinion Leader Based on User Relationship and Attribute
YIN Yan-teng;LI Xue-ming;CAI Meng-song
..............page:184-189
Online Planning Algorithm Based on Posterior Belief Clustering
WU Bo;WU Min
..............page:214-218
Abbreviation Expansion Interpretation Recognition Based on Semi-supervised CRF
CHEN Ji-meng;LIU Jie;HUANG Ya-lou;LIU Tian-bi;LIU Cai-hua
..............page:203-209
L1-PCA Algorithm Based on Trace Norm
LIU Li-min;FAN Xiao-ping;LIAO Zhi-fang
..............page:199-202,209
Access Control Model for EPCIS Based on XACML
LI Jing-feng;LI Yun-peng
..............page:180-183,189
Forward Secure Designated Verifier Proxy Signature Scheme
CUI Tao;LIU Pei-yu;WANG Zhen;LI Feng-yin
..............page:177-179
Design of Randomized Proxy Blind Signcryption Scheme Without Paring Computing
QIN Hai-sheng;ZHANG Lei;FENG Yan-qiang;WU Wen-jun;HE Chuan-bo
..............page:169-172
Trust Prediction Model for Service-oriented Computing
WU Ming-feng;ZHANG Yong-sheng;WU Lei;LI Yuan-yuan;ZHANG Jin-xi
..............page:140-145
Research on Multinomial Relativity of No Sequences
WANG Hui;WEI Shi-min;LIU Nan-nan
..............page:137-139
Network Security Risk Assessment Model and Method Based on Situation Awareness
QI Yong;WANG Yan;LI Qian-mu
..............page:158-164
Overview on Image Steganalysis Technology
ZHANG Jun;XIONG Feng;ZHANG Dan
..............page:165-168,172
Database Encryption System Based on ECDH and Rijndael
LI Guan-peng;TIAN Zhen-chuan;ZHU Gui-liang
..............page:173-176,179
Security Analysis on a Group Signature Scheme
HUANG Bin;SHI Liang;DENG Xiao-hong
..............page:151-153