Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2014 Issue 1
Program interaction on multicore: Theory and applications
DING Chen;,YUAN Liang;
..............page:1-5
Positive handling of low-criticality tasks in mixed-criticality scheduling
HUANG Li-da;,LI Long;,LI Ren-fa;,XIE Yong;
..............page:6-11
Research and implementation of memory latency measurement model based on variable stride
CHENG Hui;,L(U) Gao-feng;,LIN Qi;,MAO Xi-long;,YANG An;
..............page:12-18
Research on a QEMU-based processor fault simulation and injection method
LI Yi;,WAN Han;,XU Ping;
..............page:19-27
Research on verification techniques of high-performance ESCA coprocessor
DAI Kui;,DENG Cheng-nuo;,HUANG Wei;,WU Dan;,ZOU Xue-cheng;
..............page:28-33
The automatic generation technology for distributed simulation framework based on HLA
GAO Xiao-sheng;,LIANG Yan-gang;,TANG Guo-jin;,ZHANG Yi;
..............page:34-38
Speaker recognition method based on quantum model distance
LUO Hui;,PAN Ping;,WANG Yang;
..............page:39-43
An optimization method for virtual machine scheduling in the environment of applications hosting
DING Wei-long;,FAN Qing-tao;,JIANG Yong;,ZHAO Zhuo-feng;
..............page:44-50
System design of WSN identifier resolution
LUO Zhi-yong;,WANG Qing;,WANG Qing-qing;
..............page:51-56
Supporting mechanism for application-assisted memory management of processes group
CHEN Bao-zi;,TAN Yu-song;,WU Qing-bo;
..............page:57-62
Analysis and assessment of network security situation based on cloud model
TANG Jun;,ZHANG Yong-jun;
..............page:63-67
xin xi dong tai
..............page:67,封3
Research on USB security technology based on virtual volume
CHEN Li-ping;,CHEN Yong-fu;,WANG Qi-fu;,ZHOU Feng;
..............page:68-72
A new multi-template selection algorithm for keystroke dynamic identity authentication
HUO Jian-qiu;,LI Fu-xiang;,LIN Mu-qing;,TANG Jing;,ZHOU Fu-cai;
..............page:73-82
Application of extended D-S evidence theory in intrusion detection
CHEN Ye;,LIU Yuan;
..............page:83-87
Implementation of an improved authentication method on IC card
ANG Zheng-quan;,FU Qing-qin;,XU Ping-jiang;
..............page:94-98
Complexity evaluation method for range electromagnetic environment
FAN Xiao-teng;,FANG Ge-feng;,HE Yi-gang;,PENG Wu;
..............page:105-110
Closed circle DNA algorithm of traveling salesman problem
LIU Xi-yu;,XU Jing-lei;,ZHAO Hong-chao;
..............page:111-114
QuickSort algorithm for singly linked list
BAI Yu;,GUO Xian-e;
..............page:115-120
Book-spine recognition by robot vision based on wavelet analysis and probability Hough transform
DU Ming-fang;,FANG Jian-jun;,PANG Rui;
..............page:126-131
Expression of engineering data based on XML
HUANG Ru-jin;,LUO Nian-meng;,ZHU Lin;
..............page:132-136
Vehicle abnormal events analysis at night
CHEN Yong-qiang;,GAO Jian-hua;,GU Ming;,HAN Jun;
..............page:137-144
Uniform expression of heterogeneous assembly information
LIU Wei;,LIU Yun-hua;
..............page:145-149
Face recognition based on improved initialization method of discriminative K-SVD
FENG Xiao-yi;,XUE Ke-ting;
..............page:150-154
Review and prospects of empirical mode decomposition
FAN Hong;,MAO Yu-long;
..............page:155-162
Active rules termination determination based on enhanced conditional formula
HUANG Dong-mei;,XIONG Zhong-min;,ZHAO Meng-lu;
..............page:163-168
A sample-feature weighted possibilistic fuzzy kernel clustering algorithm
HUANG Wei-chun;,LIU Jian-lin;,XIONG Li-yan;
..............page:169-175
Aggregate query and its properties over k-anonymous data
LIU Guo-hua;,SHI Dan-ni;,WANG Bi-ying;,WANG Mei;,WANG Yu-ting;,ZHAI Hong-min;,ZHANG Jun-bao;
..............page:176-185
Signal de-noising by lifting wavelet in well test
SHUANG Kai;,WANG Yu-xi;,XU Yan-kai;
..............page:186-190