Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2015 Issue 3
Research on uncertain CEP for CPS
CAO Ke-ning;,LI Ren-fa;,ZHANG Xiao-ming;,ZHANG Xin-long;
..............page:415-421
A parallel algorithm for mining high utility itemsets
SONG Wei;,JI Hong-lei;,LI Jin-hong;
..............page:422-428
Survey of adiabatic quantum optimization algorithms
ZHANG Ying-yu;,FU Zhang-hua;
..............page:429-433
Study on frailty evaluation and delay service for elders based on cloud platform
WANG Jie;,YU Yan-shuo;,LIN Chung-chih;
..............page:434-439
Strategy and algorithms for replica update in tree networks
WANG Xu;,WU Ji-gang;,HOU Rui;
..............page:440-445
Combinational method for fault diagnosis in analog circuits based on Volterra series
WANG Xu-jing;,CHEN Chang-xing;,REN Xiao-yue;
..............page:446-451
Design of a TYPE-Ⅰ M-LVDS receiver IC based on TIA/EIA-899 standard
LI Zhi;,CHEN Di-ping;,ZHAO Jian-zhong;,Cao Cheng-cheng;
..............page:452-456
Survey on automatic network layouts based on force-directed model
SHUI Chao;,CHENG Tao;,LI Hui;,CHENG Guo-sheng;
..............page:457-465
Automated search of iterative differential mode with feistel-SP structure
LI Yan-jun;,FANG Bo;,MAO Ming;
..............page:466-470
Research on the impact of OFDM symbol characteristics on DCF performance
FANG Fei;,MAO Yu-ming;
..............page:471-478
Anti-jamming attack communication by adaptive rateless codes in wireless networks
L(U) Shao-he;,LIAO Lin-bing;,LI Wen;,ZHANG Yi-wei;,WANG Xiao-dong;,ZHOU Xing-ming;
..............page:479-485
Application research of monotonic index space in information system risk evaluation
WANG Na;,ZHANG Jian;,WANG Jin-dong;,ZHANG Heng-wei;
..............page:486-491
Mobile IP registration protocol based on tripartite key agreement
JIA Zong-pu;,TIAN Xiao;,LI He;
..............page:492-497
Trust-based management for dynamic spectrum access in cognitive wireless networks
CHEN Hong-liang;,LIU Li-ping;,ZHAO Ming;,CHEN Zhi-gang;
..............page:498-502
Arc tolerance of the maximum flow and its algorithm
LIU Yang-yang;,XIE Zheng;,CHEN Zhi;
..............page:503-507
Mobile phone user authentication scheme based on embedded accelerometer
MIAO Min-min;,ZHOU Zhi-ping;,WANG Jie-feng;
..............page:508-513
Cyclic codes from sequences with the period pm
ZHAN Hai-xia;,YUE Qin;
..............page:514-516
A dynamical access control model based on fluent calculus theory
YANG Ai-qin;,CHENG Xian-yi;
..............page:517-523
Meet-in-the-middle attacks on E2
GUAN Xiang;,WEI Yue-chuan;,YANG Xiao-yuan;
..............page:524-528
A NHPP model for the open availability system based on Bayes estimation
CAO Wei-dong;,NIE Xiao-ying;,BAI Liang;
..............page:529-533
An integrated prediction model using multi-stage gray model and support vector machine
ZHOU Hua-ping;,LI Jing-zhao;
..............page:539-546
Stratification and checking algorithm of (η,α)-bisimilarity
ZHANG Jin-jin;,ZHANG Yan;,ZHU Zhao-hui;
..............page:547-552
Anti-collision algorithm for UHF RFID systems based on blind separation and framed-slot
ZHANG Xiao-hong;,MU Yu-chao;
..............page:559-565
Image segmentation based on graph cuts and nonlinear statistical shape prior
XIN Yue-lan;,ZHANG Xiao-hua;,WANG Xi-li;
..............page:566-575
Multi-view autostereoscopic 3D display system based on multi-projector
LIU Yong-chun;,GONG Hua-jun;,SHEN Chun-lin;,GENG Zheng;,ZHANG Zhao-xing;
..............page:576-581
An image matching algorithm combining SIFT and its corresponding scale LTP features
CHEN Li-fang;,LIU Yi-ming;,LIU Yuan;
..............page:582-588
Image denoising based on information geometry
HUA Xiao-qiang;,WANG Ping;,GAO Ying-hui;,JI Ke-feng;
..............page:589-593
An auto-restorable semi-fragile watermarking algorithm for color image
TAN Chun-jiao;,ZHU En;
..............page:594-598
Garment deformation based on local constraints
ZHANG Ping;,HOU Jin;,L(U) Jia-jia;
..............page:599-604
An improved watershed segmentation algorithm for bridge image
LI Qiang-qiang;,LI Wei;
..............page:605-610
Phase unwrapping for InSAR based on stochastic parallel gradient descent algorithm
YANG Xin-feng;,SONG Chang-bin;,LIU Ke-cheng;
..............page:611-615
Reliability assessment of electrical connectors based on performance degradation analysis
WANG Hao-wei;,XU Ting-xue;,ZHAO Jian-zhong;
..............page:616-620