Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2013 Issue 7
Formal analysis and verification of LR(k) based on Z
ZHANG Yang;DUAN Fu
..............page:2403-2407
E-GSA algorithm for learning Bayesian network with missing data
YANG Chun-de;ZHANG Yang
..............page:2408-2412
Research on computing method of operational need in risk-based access control
XIE Wen-chong;YANG Ying-jie;WANG Yong-wei;DAI Xiang-dong
..............page:2281-2285
Research on course timetabling problem based on improved honey-bee mating optimization algorithm
DONG Yong-feng;LIANG Li-ye;ZHANG Su-qi;GU Jun-hua
..............page:2431-2435
Semantic similarity and document feature bit-string for efficient K-nearest neighbor
LIN Qi-feng;MENG Zu-qiang;CHEN Qiu-lian;CHEN Zhi-min
..............page:2417-2421,2469
Design of trusted authentication-enabled mobile IPSec VPN system
WANG Jian;LIANG Ling-fei;YU Wei-hua
..............page:2342-2347,2352
Pedestrian detection based on cascade AdaBoost-SVM
JIANG Ai-lian;YANG Xing-tong
..............page:2547-2550,2565
Study on moderate resolution remote sensing image classification method
LI Shi-wei;YANG Jason
..............page:2498-2502
Multi-objective optimization based on particle swarm optimization algorithm in cloud computing
GUO Li-zheng;GENG Yong-jun;JIANG Chang-yuan;WANG Jun-hao;ZHANG Na;ZHAO Shu-guang
..............page:2358-2362
Zigbee mesh network routing selection algorithm based on communication cost
LI Xin-chun;YANG Hong;LI Yuan-cheng
..............page:2353-2357
Design of flexible production report system based on Silverlight
LI Guang;WANG Jian-lin;ZHAO Li-qiang;YU Tao
..............page:2595-2598,2608
Research on learning states based on facial features
ZHANG Jian-li;DUAN Fu
..............page:2460-2464
Query processing algorithm for continuous uncertain XML data
ZHANG Xiao-lin;HUO Wei;LIU Li-xin;CUI Guang-yue
..............page:2426-2430
Fuzzy C means clustering algorithm based on space distance of nearest pixels
WANG Jun-ling;ZHOU Jian-lin;BAO Fang;WANG Shi-tong
..............page:2476-2482
Design and verification of RS based NAND flash controller
ZHANG Wen-jing;YAO Zhi-hui
..............page:2590-2594
Timeslots ALOHA anti-collision algorithm based on queuing theory
SHU Yuan-zhong;TIAN Lei;ZHANG Li;ZHU Xuan-hua;SONG Li-kang
..............page:2632-2636
Visual attention model based on Bayesian inference using multiple cues
ZHU Chen-yang;HUO Hong;FANG Tao
..............page:2470-2475
Segmentation of object boundary based on variational level set method
FU Zeng-liang;QIN Yong-ming;ZHANG Jiang;ZHANG Shang-bin
..............page:2512-2516
Hierarchical risk assessment method for network security based on real-time warning
LIANG Li;YANG Jun-gang;ZHU Guang-liang;ZHANG Qian
..............page:2315-2323
Collaborative intrusion detection method based on kernel representation
ZHAN Shan-hua;ZHANG Wei;TENG Shao-hua
..............page:2310-2314
Parametric design of wing structure using API in CATIA
QU Nan;HAN Qing;ZHONG Xiao-ping
..............page:2580-2584
Method for activity anomaly monitoring based on context temporal modeling
LIU Xiao-gang;LU Tao
..............page:2623-2626,2641
Prototype verification of RFID reader based on virtual radio technology
SHU Yuan-zhong;OUYANG Yu-mei;LI Ming-qi;LU Xiao-fan
..............page:2348-2352
Comparison and analysis of SAR location based on computer models
CHEN Ming;ZHANG Bo;SHAN Zi-li;WANG Xing-feng
..............page:2599-2603
Simulation of automatic overtaking control algorithm for intelligent vehicle on highway
WU Fu-wei;QIN Jia-he;REN Chao-wei;NIU Zeng-liang;ZHANG Jun-lei
..............page:2542-2546
Sentence similarity computing method based on segmented semantic comparison
LIU Yun-tong;LIANG Yan-jun
..............page:2637-2641
Adaptive generalized projective synchronization of hyperchaotic and its circuit simulation
ZHANG Xiao-hong;ZHOU Yong-fei
..............page:2522-2527
Pattern sequences and performance analysis based on pattern matching frequency hopping system
LI Su-yang;QUAN Hou-de;CUI Pei-zhang
..............page:2367-2371
Adaptive stereo matching based on large window
YUAN Fei;FAN Yong;LIU Chang;REN Xin-yu;ZHANG Jin-feng
..............page:2441-2444,2497
Quantitative association rules mining based on quantitative correlated pattern
SHEN Xi-ting;GONG Cai-hong
..............page:2422-2425
Simulation study of recommendation system for university library based on big data
ZHANG Yao;CHEN Wei-bin;FU Shun-kai
..............page:2533-2541
Design and development of desktop search engine fileFinder
LIU Yan;YANG Qi-long;CAI Yan-dong
..............page:2627-2631
Defence system of P2P botnet based on domain
ZHANG Si-jie;SU Yang
..............page:2291-2295
Servo system speed control research based on expert PID controllor
HU Wen-bao;GUO Rui-feng;WANG Zhi-cheng
..............page:2372-2376
Research on two level character segmentation algorithm of degraded license plate
QU Zhong;LI Meng-lu;CHANG Qing-li;WANG Yong-kun
..............page:2465-2469
Algorithm of sparse channel estimation based on compressive sensing
CHEN Yan;WANG Biao
..............page:2338-2341
Design of authentication system based on combined symmetric key
FENG Fu-wei;DU Li-ping;LI Ying;ZHAO Gui-fen;GUO Jian-wei
..............page:2296-2300
Based on multi-thread and multi-factor weighted keyword extraction algorithm
LIN Man-shan;HAN Xue-jiao;SONG Wei
..............page:2398-2402,2407
Modified ROF model and its split Bregman algorithm
LI Meng-fei;LI Hong-wei
..............page:2455-2459
Global multi-model modeling based on local difference quotient information amending
ZHANG Jun-na;MAO Wen-tao;MU Xiao-xia;FAN Hai-ju
..............page:2551-2555,2574
Design of environment and security monitoring system for switching stations of power transmission and distribution
ZHOU Xi;HE Zhen-yu;SHAN Ming-lei;ZHU Chang-ping;HAN Qing-bang
..............page:2609-2613,2618
Fuzzy classification method based on estimation of distribution algorithm
HUO Wei-gang;GAO Xiao-xia
..............page:2413-2416
Palletizing robot off-line programming simulation system based on QT and OPENGL
WANG Sheng;MIN Hua-song;CHEN You-dong
..............page:2507-2511
Genetic algorithm based on polygon segmentation AUV global path planning
LI Jian-wen;LI Sha-sha
..............page:2556-2560
Design and realization of communication system between Android phone and internal PC
PENG Feng-ling;TUO Xian-guo;WANG Hong-hui;PU Jian-hua
..............page:2333-2337
Research on event information extraction based on preposition's usages
ZAN Hong-ying;ZHANG Teng-fei;LIN Ai-ying
..............page:2570-2574
Anonymous identity based public key encryption with keyword search
LI Shuang;YUAN Ding
..............page:2286-2290,2305
Synthesis of emotional speech based on prosody parameters
HE Ling;HUANG Hua;LIU Xiao-heng
..............page:2566-2569,2584
Real-time blob tracking based on CUDA acceleration
JIN Sheng-tao;MENG Zhao-hui
..............page:2445-2449
Blind separation of image source based on adaptive sparse dictionary learning
LIU Jie;LONG Xiao-li;LONG Dan
..............page:2483-2486,2491
Multi-view video coding of WMSN based on distributed compressed sensing
LUO Hui;QI Mei-li;LIU Jie-li;CHU Hong-liang;WANG Shi-chang
..............page:2492-2497
Watermark algorithm based on DCT domain edge detection
ZHAO Xiao-hua;ZHANG Gui-cang
..............page:2306-2309
Design on calibration device for ground test equipment of a flight parameter system
LU Hui;LU Zi-wang;DU Zhi-jun
..............page:2575-2579
Simulation of lane change control algorithm for intelligent vehicle
WANG Chang;QIN Jia-he;GUO Ming-hua;SUN Qin-ying;ZHANG Wen-xia
..............page:2528-2532
Study on service template based on component
WANG Qi;ZENG Guang-ping;YANG Qing-sheng
..............page:2392-2397
Real-time sandstorm simulation based on soft particle
XU Sen;XIANG Yu
..............page:2503-2506
Network traffic monitored control system based on SharpPcap framework
LIU Ye;TIAN Kun-wei;LIU Lin-feng
..............page:2328-2332
User recommendation in social tagging based on random walk algorithm
WANG Hai-lei;YU Xue-ning
..............page:2388-2391
Cluster division based data aggregation scheme for wireless sensor networks
GUO Jiang-hong;ZHANG Hai-feng;LIU Zhi-hong
..............page:2363-2366,2371
Design and simulation of identity-based TLS protocol in space network
ZHANG Yu-fei;SU Jin-hai;ZHANG Chuan-fu
..............page:2517-2521
Higher intelligibility subspace speech-enhancement algorithm
LIU Peng;MA Jian-fen
..............page:2619-2622
Research progress on random access technology for multimedia services
YANG Liu;HAO Li
..............page:2324-2327,2383
Optimization of WMA software decoder's energy consumption based-on ARM platform
JIANG Hu;LI Wei-tong;CAI Nian
..............page:2384-2387,2482