Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Science
1007-130X
2015 Issue 8
An SHA-1/SHA-256/SM3 IP multiplexing circuit with small area and high performance
ZHENG Zhao-xia;,TIAN Yuan;,WEI Ran;,GAO Jun;
..............page:1417-1422
Reconfiguration approaches for fault-tolerant torus-connected processor arrays
ZHU Long-ting;,WU Ji-gang;,JIANG Gui-yuan;,WANG Chao;
..............page:1423-1429
A greedy diagnosis algorithm for PMC model
XUAN Heng-nong;,ZHANG Run-chi;,HE Tao;,LIU Ling-bo;
..............page:1430-1435
A general language for decision information requirement description on mining big data
JIN Xin;,ZONG Shi-qiang;,YAN Jing-jing;,WANG Heng;,LI You-jiang;
..............page:1436-1443
Design and implementation of a new user recommendation algorithm based on Mahout
GAO Xian-wei;,SHI Zhi-bin;
..............page:1444-1449
A bisecting K-means clustering parallel recommendation algorithm based on full binary tree
CHEN Ping-hua;,CHEN Chuan-yu;
..............page:1450-1457
Research on an APT attack-oriented detection model with association analysis
LI Jie;,LOU Fang;,JIN Yu-quan;,DONG Zhi-xin;
..............page:1458-1464
Research on location privacy protection technology based on star-graph in road network environment
HOU Shi-jiang;,LIU Guo-hua;,HOU Ying;
..............page:1465-1471
A novel method of hiding the injected modules
WU Jian;,LIU Xin;
..............page:1472-1478
A trusted connection establishment method based on enhanced RSVP-TE
LIANG Hong-quan;,WU Wei;
..............page:1479-1485
Research and design of copyright protection of digital products based on DCI
WU Jie-ming;,WANG Shuai;
..............page:1486-1491
Research on model driven safety verification for embedded system designs
LIU Xue;,HU Jun;,HUANG Zhi-qiu;,MA Jin-jing;,CHENG Zhen;,SHI Jiao-jie;
..............page:1498-1509
Research on rule editing and code generation for the high-level decision system of unmanned vehicles
LAN Yun;,LIU Wan-wei;,DONG Wei;,LIU Bin-bin;,FU Chen;,LIU Da-xue;
..............page:1510-1516
A system dependability modeling method using AADL and IMC
CHENG Yi-han;,HUANG Zhi-qiu;,KAN Shuang-long;
..............page:1517-1524
A method for solving semi-physical simulation declarative models
XIONG Tao;,DING Jian-wan;,CHEN Li-ping;
..............page:1540-1545
Non-local means denoising based on wavelet threshold
LI Jia-lang;,LI Hua-jun;,XU Qing;
..............page:1546-1550
An image matching algorithm based on binary feature descriptor
JIANG Feng;,ZHOU Li-li;,LI Cong;
..............page:1551-1557
Recognition algorithm of gastric epithelium tumor cell images based on SAM-CS and SOFM
GAN Lan;,SUN Kai-jie;,XIE Li-juan;
..............page:1558-1565
Aerator state detection based on corner optical flow and SVM algorithm
HE Jin-hui;,XUE Yue-ju;,MAO Liang;,LI Hong-sheng;,LIN Huan-kai;,ZHANG Xiao;
..............page:1566-1572
Blur image quality assessment based on DTCWT
LIU Jing;,WANG Wei;,LI Ji;,YANG Wei-wei;
..............page:1573-1578
An auto-sorting algorithm for image sequence based on Hu vector similarity
CUI Ke-bin;,YUAN Jin-sha;,LI Bao-shu;
..............page:1579-1583
Structure preserving projection algorithm based on low rank and sparse graph
YANG Guo-liang;,LUO Lu;,FENG Yi-qin;,LIANG Li-ming;
..............page:1584-1590
A patent literature term extraction method based on the boundary tag sets
DING Jie;,L(U) Xue-qiang;,LIU Ke-hui;
..............page:1591-1598
Incomplete soft discernibility matrix and its application in decision making
YANG Yong;,SONG Juan-ping;
..............page:1599-1606