Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2013 Issue 6
A class of 3rd-order polynomial smooth support vector machines
FENG Neng-shan;XIONG Jin-zhi
..............page:156-161
Edge detection algorithm based on the smallest fuzzy divergence within a class
TANG Xing-yan;CUI Wei-hua
..............page:129-133
Technique of key-frame extraction and motion editing based on wavelet transform
LIANG Jia-hong;LI Ke;LI Meng;HU Ying-long
..............page:123-128
Saliency detection based on global structure similarity metrics
LU Kai;XIONG Zhen-hai;LI Chong-fei;LI gen
..............page:113-117
Aircraft target recognition method based on discriminant locality preserving projections algorithm
ZHANG Shan-wen;ZHANG Yun-long;SHANG Yi-jun
..............page:118-122
A novel change detection method of harbor ship target based on template
SUI Yin-ling;ZOU Huan-xin;LEI Lin;LI Zhi-yong
..............page:134-141
Research on modeling and morphing firework and other scenery images based on variant IFS fractal
ZHUANG Yi-xin;XIONG Yue-shan;TAN Ke;PAN Xin-hua
..............page:142-147
Sub-map matching algorithm based on signature vector and landmark localization
YAO Zhi-feng;YE Xiu-fen;DAI Xue-feng
..............page:148-151
Research on tolerance constraint based assembly method in virtual assembly
WEI Wei;GUO Chen;DUAN Xiao-dong
..............page:162-173
Application of HyperMesh meshing technology in modeling complex arch dam
WANG Dong-xu;WU Liang;HUANG Shang
..............page:186-190
Integrated feature location in object-oriented program
SHU Shao-xian;XU Xiao-ping;RONG Ni;GUO Min
..............page:101-106
Study and application of incremental learning Bayesian network guided by node order confidence
JIA Song-hao;YANG Cai;ZHANG Hai-yu
..............page:96-100
Security analysis of two traitor tracing schemes
WANG Qing-long;XU Li
..............page:78-81
Research on secure payment in online banking
ZHANG Li-na;YAN Wen-bin
..............page:72-77
Spectrum sensing algorithm based on frequency domain Lempel-Ziv complexity analysis
LUO Meng-yu;CHEN Zhi-gang;KUANG Zhu-fang
..............page:52-56
xin xi dong tai
..............page:46,71
Research on related tasks scheduling in mobile grid
JU Hong-jun;DU Li-juan
..............page:57-64
Exploring SVM-based intrusion detection through information entropy theory
ZHU Wen-jie;WANG Qiang;ZAI Xian-jun
..............page:47-51
Modeling continuous data protection
WU Jiang-jiang;CHENG Yong;ZHU Yao-kai;WANG Zhi-ying;REN Jiang-chun
..............page:7-14
Research on framework for distributed software runtime monitoring
LIU Dong-hong;ZOU Peng
..............page:24-29
Research of P2P service discovery algorithm based on QoS
GAO Xiao-yan
..............page:42-46
A novel cache replacement algorithm for iSCSI storage
ZHAO Jian-ming;YAO Nian-min;HAN Yong;CAI Shao-bin
..............page:15-23
Remotely sensed image directory system based on the segmentation of part-whole ontology
CUI Ji-feng;DU Hong-yue;ZAHNG Yong;XING Chun-xiao;XUE Ben-xin
..............page:1-6
An optimization method for XML query data service in cloud environment
WEI Yong-shan;ZHANG Feng;CHEN Xin;HAN Yan-bo;SUN Zhong-lin
..............page:30-36