Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2012 Issue 10
Marketing management system based on customer credit evaluation model
HOU Kun;CHEN Yi;GONG Li-wei
..............page:3979-3983
Target platform identification method based on prior knowledge
GAO Jian-ming;GONG Liang-liang
..............page:3843-3847
Road extraction from high-resolution SAR image using new algorithm
SU Yang;SHEN Ting;GAO Peng;WU Bing-jie
..............page:3898-3902
Information management technology of operational situation picture based on data model
CHENG Xiang-li;QIU Jian-wei
..............page:4033-4037
Intelligent matching algorithm of concept maps to support personalized learning
SUN Zhu-ting;GU Qian-yi
..............page:3954-3958
Research and realization of technology of storing encryption identification in file header
WANG Xu;ZHU Zhen;MIAO Qi-guang
..............page:3746-3750
Accurate transmission of longitude based on CPR algorithm
QI Wan-long;LIN Yun-song;PENG Liang-fu
..............page:4015-4021
Zero-steganographic model for digital carrier images sharing
ZHANG Peng-cheng;CHEN Gou-xi;ZHANG Meng;WU Yu-liang
..............page:3792-3796
Research on remote sensing regular processing system based on tri-level parallel implementation
ZHANG Shu-fan;YU Tao;LI Jia-guo;GUO Hong;SHANG Zhi-chao;YANG Qing-qing
..............page:3828-3832
Optimization strategy in generation of path condition
YU Ya-nan;ZHOU Xi
..............page:3995-3998,4003
On subscription persistence of pub/sub service in cloud
YANG Yu-wei;ZHANG Biao;FANG Wen-jing;JIN Bei-hong
..............page:3661-3666
Research and building of BSP in embedded system
ZHOU Jie;GUO Zhong-ru
..............page:3812-3816
Layered-based CSM
HAO Yu;LI Yi
..............page:3882-3886
Data clustering algorithm based on improved immune algorithm
HU Wei;X(U) Fu-yuan
..............page:3940-3944
Cross layer power allocation optimization method based on CoMP down link in LTE-A Sysyem
ZHU Guo-hui;LI Jia-wei;ZHAO Ji-hong
..............page:3702-3707
Load balancing and admission control algorithms in the real-time virtualization environment
ZHAO Qing-ling;GU Zong-hua;ZHANG Jin-chao;LI Hong
..............page:3862-3869
Analysis and precaution on SQL injection of J2EE application
HUANG Feng;WU Hua-rui
..............page:3767-3771
Multi-dimensional context-aware model and its implementation
YAN Huan-jie;X(U) Ming-hai;GU Hai
..............page:3682-3686
Intrusion detection system based on R-SVM
GONG Shang-fu;ZHAO Chun-lan;SHE Xiang-yang
..............page:3777-3782
Research on analysis and simulation of BeiDou Ⅱ navigation system constellation
X(U) Jian-li;WANG Jun-feng;DONG Wei
..............page:3913-3917
Improved algorithm of particle filtering
YU Xi;ZHANG Tian-qi;BAI Juan;WEI Shi-peng
..............page:4009-4014
Real-time object tracking method based on corner detection
FENG Zeng-guang;ZHANG Jiong;NING Ji-feng;YAN Yong-feng
..............page:3892-3897
Fusion method of wireless network status based on FARIMA model
DUAN Mo-yi
..............page:3743-3745,3756
Evaluation method for invulnerability of link-weighted communication network
MA Run-nian;WEN Gang;X(U) Ji-fu
..............page:3762-3766
Access control model based on attribute and role
ZHANG Bin;ZHANG Yu
..............page:3807-3811
Method for MEMS-INS/GPS integrated attitude determination based on single antenna
ZHAI Hai-ting;CONG Li;QIN Hong-lei;LI Feng
..............page:3999-4003
New flame region orientation method based on CMYK color property
JIANG Xian-gang;LIANG Qing;QIU Yun-li
..............page:3903-3907
Research on encryption of electronic health record
HUANG Wu-jian;SHUAI Ren-jun
..............page:3833-3837
Variable structure control based on nonlinear exponential reaching law
WANG Dong-lai;L(U) Qiang;WANG Ke-ke
..............page:4038-4041
Document recommendation model based on cognitive difficulty measurement
X(U) Xiao-feng;X(U) Wei-min
..............page:3990-3994
TCP protocol improvement scheme based on cognitive radio network
X(U) Chang-biao;WANG Jing-hua;XIAN Yong-ju;ZHANG Lei
..............page:3667-3672,3691
Modified function projective synchronization of chaotic system with uncertainties
FANG Jie;HU Zhi-hong;JIANG Chang-sheng
..............page:3927-3930
Chinese new word identification algorithm based on context-aware
LI Dun;TU Wei;SHI Lei;TAO Yong-cai
..............page:4022-4027
Design and implementation of virtual data exchange sub-platform
JIANG Gong-he;WU You-xin;LI Qing-hua;GONG Lei
..............page:4028-4032
Research on strategy of DRM content packaging and distribution
RONG Xian-hai;LIU Qing-tang;PENG Yan-ni;WANG Shu-juan;ZHU Xi-fang
..............page:3783-3787
Two-dimension functions fitting based on grey feature weighted support vector machine
RAO Gang;LIU Qiong-sun;GAO Jun-jian
..............page:3975-3978,3983
3D human skeleton kinematics sequences based on conformal geometric algebra
DU Juan;HAO Kuang-rong;HUANG Xin;DING Yong-sheng;HE Ruo-kan
..............page:3887-3891
Improved particle swarm optimization and experimentation
ZHANG Wen-cheng;ZHOU Sui-hua;WU Zhi-dong;X(U) Mei
..............page:3945-3949
Cryptanalysis and improvement of some partially blind signature schemes
HU Xiao-ming;WANG Jian;YANG Yin-chun
..............page:3757-3761,3766
Design on management architecture of high-speed railway broadband communication networks
X(U) Jing;ZHENG Gang;ZHU Deng-ke;MA Heng-tai
..............page:3678-3681
Design of acoustic responder based on DSP and MSP430
CHEN Jun;WAN Hong-jie;WANG Xue-wei
..............page:3817-3820,3886
Cloud resource selection mechanism based on SLA mapping of dual market
TAO Jie;WU Xiao-hong
..............page:3729-3733
Multi-Quadric algorithm for solving frequency assignment problem
YANG Hua-bin;LIN Zhong
..............page:3853-3857
Virtual simulation technology for displaying vehicle ride comfort
LI Hong-bo;XUE Liang;WU Yu;ZHANG Yin-qi
..............page:3918-3922
PN code acquisition based on apFFT
WANG Song;GE Hai-bo
..............page:3708-3714
3D road modeling based on tiled terrain using hybrid structures
XIAO Wen-hua;WANG Wei;ZHANG Mao-jun
..............page:3908-3912,3969
Research for SuperParent algorithm based on sorted information
HAN Meng;WANG Zhi-hai
..............page:3935-3939,3944
Research on mixed circuit fault diagnoses based on GA-SVM
QIN Qing-qiang;ZHANG Xiao-an;LI Ai-hua
..............page:3984-3989
Design and implementation of comprehensive secure gateway
DENG Jian-guang;YUAN Hua-qiang;ZHANG Jian;PAN Xiao-heng
..............page:3788-3791,3796
Hop timing synchronization in chaos frequency hopping systems
WAN You-hong;SHI Ya-ping
..............page:3725-3728,3733
MAP blind equalization algorithm based on probability and adaptive
GENG Tian-yu;SHU Qin;YING Da-li;ZHENG Ying-ying
..............page:3720-3724
Design and implementation of expandable logical expression evaluation
XIONG Feng-guang;KUANG Li-qun;HAN Yan
..............page:3858-3861,3958
Application and implementation of content management system based on template
ZHAO Ya-nan;DONG Jing
..............page:3848-3852,3857
Study of numerical simulation method of spacesuit thermal vacuum test
WANG Liu-jie;HUANG Wei-fen;XU Shui-hong;ZHOU Yong-kang
..............page:3931-3934,3974
New data model for cloud data management
LI Mao;JIA Hong;LI Yan-ming;ZHU Mei-zheng
..............page:3870-3876
Extended attribute-based access control model
MU Ling-ling;ZHANG Shao-song
..............page:3797-3800,3806
DoS attack situation assessment method based on resource consumption
LIU Yu-hua;ZHANG Hong-qi;YANG Ying-jie
..............page:3772-3776
Improved symbolization time series method
XIE Fu-ding;LI Ying;SUN Yan;ZHANG Yong
..............page:3950-3953
Improved chord algorithm based on physical topology
DENG Ya-ping;Du Huan
..............page:3734-3738
Research on network worm simulation method based on host node reduction
WANG Xiao-feng;GUAN Lu
..............page:3687-3691
Discovery services based on DHT for internet of things
LI Zhan-bo;ZHANG Xiao-long
..............page:3838-3842
Weed seeds registration based on sparse and low-rank decomposition
ZHANG Ming;ZHU Jun-ping;CAI Cheng
..............page:3959-3963
Node-belongingness dynamic estimate community detect strategy in opportunistic networks
WU Da-peng;XIANG Xiao-hua;WANG Ru-yan;JIN Ji-wei
..............page:3673-3677,3738
Design and implementation of simulation platform for CAN network management based on OSEK
QIN Gui-he;YE Chen-si;CHEN Yun-han;ZHAO Yao
..............page:3923-3926,4021
Design and implementation of trusted execution environment under domestic independent platform
JING Jun;HAO Fu-zhen;X(U) Dong-hua
..............page:3801-3806
Research of intelligent test paper generation based on improved genetic algorithm
XIAO Li-qing;X(U) Xiao-ju
..............page:3970-3974
POWERLINK field bus controller research and realization based on FPGA
HU Shu-li;WANG Qing-li
..............page:3821-3827