Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2013 Issue 9
Chinese text steganography based on character forms
SUN Xin-mei;MENG Peng;HUANG Liu-sheng
..............page:3063-3067
Design and implementation of TW2835 driver based on Linux
YU Hai-bin;ZHANG Xue;CHEN Xing-lin
..............page:3068-3073
Blind audio tamper detection based on generalized Gaussian distribution
LIN Xiao dan
..............page:3050-3053,3062
Data grid task scheduling algorithm based on multiple QoS dimensions
LI Fei;WANG Hao;ZHANG Kun;NIU Jing-wu
..............page:3033-3037
Design and full hardware implementation of simplifed network communication protocol stack in FPGA
JIANG Hu-sheng;CHAI Zhi-lei;ZHONG Chuan-jie
..............page:3074-3077,3083
GEP based on population diversity measure by variance of individuals' fitness
SHAN Bing;NI Shi-hong;ZHA Xiang
..............page:3094-3098
Time synchronization algorithm based on Kalman-consensus filter for WSN
MO Yong;LIU Zheng-hong;ZHENG Lin;DENG Xue-qun
..............page:3013-3018,3037
Improved bilateral filter based on phase congruency principle
YAO Qiong;HUANG Hua;SU Min
..............page:3146-3150
Short-term traffic forecasting based on nonparametric regression and floating car data
QU Li;LAN Shi-yong;ZHANG Jian-wei
..............page:3298-3301,3332
Research on relation extraction of opinion mining based on Uyghur
DUAN Xiang-chao;YU Long;TIAN Sheng-wei;Turgun·Ibrahim;Askar·Hamdulla
..............page:3260-3265
Attribute reduction and ordering objects dominance-based rough set
ZHANG Hui;LI Xu-wu;ZHAI Xing-long
..............page:3241-3244
Concept and construction of K+L times conditional group signature
CHENG Xiao-gang;DU Ji-xiang
..............page:3042-3045
Liquid level control system based on hybrid Petri nets
ZHANG Hui-yan;HUANG Xuan-ping;WANG Li
..............page:3200-3204
Research of increased best-first-search diversity
LI Wei-sheng;DAI Fei
..............page:3236-3240
Fast convergence clonal selection algorithm
XIAO Jin-ke;WANG Gang;LIU Chang-yun;FU Qiang
..............page:3084-3088
Simplification algorithm for large mesh models based on quadric error metrics
LI Hong-bo;LIU Yu-sheng;WU Yu;LUO Xuan
..............page:3158-3162
Robust feature extraction algorithm
HOU Yong;ZHENG Xue-feng
..............page:3114-3118
Meteorological wireless sensor network middleware design based on C/B/S
ZHANG Wei-jiang;ZHOU Jie;DU Jing-lin
..............page:3130-3135
Research and design of SMBIOS base on UEFI
ZHU He-xin;WANG Zheng-peng
..............page:3348-3352
fMRI data classification based on SVM and its application in diagnosis of MCI
L(U) Yan-yang;XIANG Jie
..............page:3313-3317
Interval-valued fuzzy control of double inverted pendulum
XUE Zhan-ao;LI Yue-jun;CHENG Hui-ru;XUE Tian-yu
..............page:3255-3259
Research on resource leveling for offshore equipment multi-project based on immune genetic algorithm
LI Jing-hua;HU Zai-ping;L(U) Hui-chao;SUN Miao
..............page:3250-3254
Ranking approach combined with search relevance for keyword search
YANG Shu-xin;XU Hui-qin;TAN Wei
..............page:3136-3140
Utility evaluation algorithm for task allocation in multi-robot systems
LI Ping;ZHU Jun-yan;YANG Yi-min
..............page:3288-3292
Pedestrian detection algorithm using low-dimensional features
WEN Tao;LI Feng;ZHOU Shu-ren
..............page:3174-3178
Emotion modeling of arena spectator based on emotional contagion
YIN Yan-jun;TANG Wei-qing;LI Wei-qing
..............page:3205-3209
Research of array coupling resonator for sensing rock saturation
ZHANG Yong;LIU Ce;GUO Chen;JIN Zhao;LI Ting
..............page:3353-3357
Probabilistic inference model to identify C2 organizational courses of action
MA Fang-fang;GUAN Hua;YAO Pei-yang;DENG Chang-lai
..............page:3220-3225
Bridge crack detection based on wavelet and Radon transform
WEI Wu;WANG Jun-jie;CAI Zhao-xiong
..............page:3151-3157
Study on delay bound based on stochastic network calculus in wireless sensor networks
HU Bo;WANG Nao;YI Xiang-yang;WANG Gao-cai
..............page:3001-3006
Research of mobile GIS based on Android platform and its implementation
ZHANG Jun-jie;ZHANG Hai-yan;LUO Rui
..............page:3322-3326
Image matching algorithm based on covariance matrix of characteristics
WANG Huai-bao;ZHANG Jie;ZHANG Xu-guang;HAN Guang-liang;WANG Ming-jia;DONG Qi-lin
..............page:3190-3194
Modeling of network potentials danger situation estimation
ZHANG Zhi
..............page:3058-3062
Quick numerical calculation method based on dynamic link library provided by Matocm
ZHANG Zhi-bo;TONG Zhong-xiang;WANG Chao-zhe;LI Jian-xun;LI Bin
..............page:3119-3123,3129
Multiple encrypted digital watermark generation method
NIE Ting-yuan;JIA Xiao;WAN Sheng-wei;ZHOU Li-jian;SUN Jie
..............page:3054-3057,3098
Improved stereo matching algorithm based on α-expansion move
LI Hui-guang;WENG Liang-bao;JIANG Hong-lei
..............page:3179-3183
Application and research of fan in rugged computer
LI Feng-xin;ZHANG You-hui;SHEN Xiao-long;HAO Yong-liang
..............page:3307-3312,3326
Modeling method of software security requirements based on UMLsec
LI Bo;LIU Wei;WANG Fei
..............page:3124-3129
Anomaly detection method based on feature selection and support vector machine
ZHANG Zhao;ZHANG Run-lian;JIANG Xiao-ge;ZENG Bing
..............page:3046-3049,3162
Improved ZigBee network routing algorithm
XU Pei-cheng;HU Guo-rong
..............page:3019-3023
Division of lane change based on fuzzy clustering analysis
ZHAN Sheng;XU Yuan-xin;SHI Yong-quan;WANG Chang
..............page:3293-3297
Indexing and filtering metadata for content-based publish/subscribe system
LI Yong-feng;WANG Hui-lin
..............page:3089-3093,3135
Gender recognition using partial least squares
XUE Jia-chen;FENG Jun;LEI Zhen;Stan Z.Li
..............page:3226-3229,3254
WSN based on distributed compressed sensing data processing algorithms
ZHUANG Yan;SHEN Jun;ZHUANG Tian
..............page:3028-3032
Design and implementation of the BUS DRVVS
HU Hai-min;ZUO Cong-ju;WANG Hua;LI Qin
..............page:3210-3214
Design of enhanced memory protection of trusted computing architecture
JIANG Xu;JIANG Zhi-xiang
..............page:3107-3113
Data analysis method to assembly process based on ISA95
SONG Min;WANG She-wei
..............page:3343-3347
Mammogram retrieval combining visual semantic
WU Meng-lin;CHEN Qiang;SUN Quan-sen
..............page:3163-3167
Algorithm for true-3D modeling of geo-body including lenticular-body
LI Chang-ling;ZHANG Hong;ZHU Liang-feng
..............page:3103-3106
Service based collaboration optimized research for heterogeneity combat entity
HUAN Jing;ZHOU Wei-zhu;CHEN Jian;SUN Yuan
..............page:3215-3219
Research of model predictive control based on SISO and MIMO system
GAO Qiang;LI Hang
..............page:3266-3272,3278
Design and implementation of crack width detection system based on Android
CHEN Li-hua;DONG Zhi-xue
..............page:3195-3199
Study on software reliability allocation based on architecture method
FENG Er-qiang;LIU Chang;ZHENG Jun
..............page:3099-3102
Real-time GIS architecture and key technology research
TAO Liu-feng;XING Ting-yan;L(U) Jian-jun;LIN Wei-hua
..............page:3302-3306
Homomorphic reasearch of fast public-key cryptosystem based on Chinese remainder theorem
WANG Yu-xi;ZHANG Chuan-rong;ZHANG Bing-hong
..............page:3038-3041,3157
Design for VRPPD with multi-time window based on Sweep and reactive tabu
ZHU Ling-ling;CHENG Xue-yun;WEI Xiao-ning;WU Kuan-ren
..............page:3279-3283
Pedestrian detection and tracking from moving cameras
LI Chun-ming;XU Yun-feng;SHANG Yan;WU Shao-guang
..............page:3333-3337
Research product model on complex production process
JIANG Ying-wei;SHI Hai-bo;PAN Fu-cheng;LI Peng
..............page:3327-3332
Method of RTU channel synchronization based on time series
HUANG Shu;CHEN Jong-cong;MA Kai;ZHANG Xiao-yue;MU Zong-jun;FANG Wei;ZHANG Qiao-xia
..............page:3358-3360,封3
Survey on prediction models in cloud resource management schemes
ZHANG Fei-fei;WU Jie;L(U) Zhi-hui
..............page:3078-3083
Swift cloud storage environment based on I/O load balanced reading strategies
JIANG Yi;SUN Xue-tao;YANG Chuan
..............page:3024-3027
Cooperative decision-making model in command and control node based on consistent case selecting
JIA Fang-chao;YAO Pei-yang;WAN Lu-jun;MA Fang-fang
..............page:3230-3235,3240