Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2009 Issue 1
An Improved Watermarking Algorithm for Digital Images Based on DCT and SVD
LIU Jun-jing;JIANG Hua
..............page:38-40,141
An Algorithm of Generating Unstructured Tetrahedrons from 3D Discrete Points
KONG Juan-hua;ZHENG Jiang-bin
..............page:35-37
Research and Development of the Data-Driven Facial Animation Synthesis Techniques
SUN Yan-peng;FU Rong;SUN Hai-lun
..............page:48-49,84
A Cache Bounding Box Approach to Speed up Image Projection Transformation in Embedded Systems
XIONG Zhi-hui;WANG Wei;MA Li;BAO Wei-dong;XU Wei;ZHANG Mao-jun
..............page:50-52,70
A Novel MRF Prior Model Based on Large-Scale Image Knowledge
ZHAN Jie;CHEN Yang;CHEN Wu-fan
..............page:53-57
Design and Implementation of the Interface Software Based on the 1553B Bus
MIN Xiao-hua;CHEN Shao-wei;ZHANG Tao
..............page:130-133
Implementation and Performance Evaluation of Stream Register Files
CHEN Hai-yan;QI Shu-bo;YI Xiao-fei;DENG Rang-yu;LI Chun-jiang
..............page:125-129
Design and Implementation of the Asynchronous Sub-Word Parallel MAC Unit
WANG You-rui;WANG Lei;SHI Wei;DAI Kui;WANG Zhi-ying
..............page:121-124
Design and Implementation of a High-Reliability 8051 Microprocessor
LAI Xin;DAI Kui;LIU Fang;WANG Zhi-ying
..............page:117-120
Analyzing and Optimizing Embedded Multi-Core Programs with On-Chip Trace
HU Xiao;WANG Yao-hua;CHEN Shu-ming
..............page:113-116
Research on the Self-Organization Construction Method of the Topic Overlay P2P Network
TANG Da-quan;TANG Jiu-yang;LIU Jian;XIAO Wei-dong
..............page:31-34,129
Research on an Entropy-Based Information Security Analysis Method
ZHU Yao-kai;WANG Zhi-ying;REN Jiang-chun;MA Jun
..............page:28-30
Research on IPv6 Multihoming
HUANG Jin-feng;WANG Hui;SUN Zhigang
..............page:20-24
A Positive and Passive Hybrid Scheduling Network Clustering System
JIN Shi-yao;QIAN Ying-jin;ZHANG Wen-song;WANG Xiao-chuan
..............page:17-19,57
Research on the Model of Detection and Defence Based on DDoS Attacks
TIAN Xiao-peng;WU Jia-wei;CHEN Xiao-quan
..............page:14-16,43
Design and Implementation of a Surface Defect Detection System for Steel Sheets
WANG Zhicheng;WU Zhuang-zhi;FENG Lu;TANG Fagen
..............page:61-65
A Precise Matching Algorithm for the Panaramic Image of Criminal Scenes
HE Hong-zhou;XIAO Li
..............page:66-70
Optimizing the Service Composition Execution Paths Based on a Gradual Constraint Violation Deleting Scheme
REN Kai-jun;LI Jin-yang;SONG Jun-qiang;XIAO Nong
..............page:74-80,98
Design and Implementation of a MOD Analysis Algorithm in the SUIF2 Compiler Infrastructure
MA Xiao-dong;XU Hou-feng;WANG Ji
..............page:81-84
A Study of the Real-Time MAS Architecture and the Modeling Method in Dynamic Environments
DONG Rong-he;LI Xiao-an;DUAN Jun-hua
..............page:90-92
A Study of the Bluetooth Scatternet in Robot Soccer Communications
NIU Ji-lai;WANG Hai-xia
..............page:93-94,106
The Automated Negotiation Mechanism and Generic Framework Based on Multi-Agent Systems
WANG Bin;LI Yan;SHENG Jin-fang;GUI Wei-hua;CHEN Song-qiao
..............page:95-98
Research and Design of a Workflow Model Based on the Agent Technology
LONG Peng-fei;ZHENG Kai;LIN Yong
..............page:99-100,112
The Security Transition Mechanism of Intelligent Agents in Distributed Networks
LI Ai-ning;ZHAO Ze-mao
..............page:101-102,137
Design of a Configurable Parallel CRC Module for IP Reuse
WANG Jiang;ZHANG Sheng-bing;YUAN Xiao-lin
..............page:103-106
Implementation and Optimization of the 80-Bit Floating-Point Arithmetic
YANG Can-qun;YANG Xue-jun;YI Hui-zhan;LI Chun-jiang
..............page:154-158
A New Algorithm for Mining Closed Frequent Itemsets Based on ESEquivPS
BAI Cheng-sen;MA Zhi-xin;XU Yu-sheng
..............page:151-153,158
The Proximal Support Vector Machine Based on the Primary and Secondary Prototypal Hyperplanes
MA Bo;WANG Zheng-qun;HOU Yan-ping;SHEN Jie
..............page:148-150
The Use of Punctuations in Chinese Syntactic Parsing Techniques
ZHANG Xiao-yan;SHAO Gang;SHI Yue-fei
..............page:145-147
A Study of the PWM Control Technology for Multiphase DC-DC Circuits
SONG Fei;HU Shi-ping;YAO Xin-an
..............page:142-144,147
Design and Study of a Struts-Framework-Based Multiple File Upload Component
OUYANG Qian;JIANG Ze-jun;WANG Li-fang
..............page:11-13
A Conference Key Distribution Protocol in Mobile Communication Systems
GE Feng;DUAN Ben-qin;JIN Wei-xin
..............page:9-10,47
SIRH:A Computer Network Virus Propagation Model
XU Lan-fang;XI Ai-min;FAN Xiao-feng
..............page:4-6,30
ELSS: A Replacement Policy to Save Bank Transition Energy for Data Cache
ZHOU Hong-wei;SUN Yan;ZHANG Min-xuan
..............page:107-112