Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2015 Issue 11
SLA mechanism in wireless Mesh network
ZHAO Yao-pei;YANG Yang;College of Computer and Communication Engineering;University of Science and Technology Beijing;Department of Scientific Research;Shandong Management University;
..............page:2881-2885+2897
Bandwidth load balancing algorithm in RAMCloud
LIU Jian-kuang;YU Jiong;YING Chang-tian;LU Liang;School of Information Science and Engineering;Xinjiang University;School of Software;Xinjiang University;
..............page:2886-2891
Distributed and adaptive access mechanism supporting multiple-priority levels of throughput
SHI Chun;HE Shu-qian;DENG Zheng-jie;ZHANG Jie;School of Information Science and Technology;Hainan Normal University;Department of Information Technology;Qiongtai Teachers College;
..............page:2892-2897
Collaborative data transmission in roadside-to-vehicle in VANETs
YU Chun-ling;YU Wen-gang;ZHU Yu-quan;Department of Information Engineering;Jiangsu Food and Pharmaceutical Science College;School of Computer Science and Telecommunications Engineering;Jiangsu University;
..............page:2898-2901+2914
Telephone traffic forecasting based on grey neural network with improved particle swarm optimization algorithm
YU Xiu-ting;QIN Xi-zhong;JIA Zhen-hong;FU Yun-jin;CAO Chuan-ling;CHANG Chun;School of Information Science and Engineering;Xinjiang University;China Mobile Group Design Institute Limited Company;Subsidiary Company of China Mobile in Xinjiang;
..............page:2902-2905+2947
Spectrum allocation algorithm based on bidding model
LIU Jue-fu;YANG Jiang;ZHU Bing-hu;HU Jing;School of Information Engineering;East China Jiaotong University;
..............page:2906-2909+2930
Sensor data transmission reliability scheme design based on Ethernet
LU Wei;MENG Chuo;SUN Yi-ze;ZHU He-lei;LI Pei-xing;College of Mechanical Engineering;Donghua University;
..............page:2910-2914
Survey on protocol reverse engineering based on network data
LIU Yuan;ZHANG Chun-rui;MENG Fan-zhi;LI Tong;YUE Yang;Institute of Computer Application;China Academy of Engineering Physics;
..............page:2915-2920
Method of topology dividing used in large-scale network
GUO Yan-lai;CUI Yi-min;TANG Hong;LI Jin;National Key Laboratory of Science and Technology on Information System Security;Beijing Institute of System Engineering;
..............page:2921-2925
Reduced-complexity sequence detection algorithm for Multi-h CPM
ZHANG Ru;ZHONG Sheng;XIE Nan;YANG Chun;Institute of Electronic Engineering;China Academy of Engineering Physics;
..............page:2926-2930
Data path optimization method based on component for security protocols
LI Ling;DU Xue-hui;BAO Yi-bao;XIAO Wei;The Fourth College;Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;Information Engineering University;
..............page:2931-2937+2994
Quantum key distribution protocol based on retransmission mechanism
WANG Yu-qi;SHE Kun;School of Computer Science and Engineering;University of Electronic Science and Technology of China;School of Computer;Minnan Normal University;
..............page:2938-2942+3009
Policy retrieval method based on prefix sign operation in ABAC model
ZOU Jia-shun;ZHANG Yong-sheng;School of Information Science and Engineering;Shandong Normal University;Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology;Shandong Normal University;
..............page:2943-2947
Efficient adaptive verifiable secret sharing with steganography and tamper resistance scheme
LI Rui-lin;CEHN Gou-xi;WU Xue-qin;School of Computer and Control Engineering;North University of China;
..............page:2948-2952
Real-time situation awareness of network security threats
WU Chao-xiong;WANG Xiao-cheng;WANG Hong-yan;SHI Bo;Institute 706;Second Academy of China Aerospace Science and Industry Corporation;
..............page:2953-2957
SPI Flash controller for security boot
WU Xue-tao;DAI Zi-bin;ZHANG Li-chao;School of Cryptography Engineering;Information Engineering University;
..............page:2958-2962
Design and implementation of intelligent bionic eye video monitoring system
JIANG Dong-guo;LENG Bin;HE Qing;GUAN Guan;WANG Wen-tao;DING Lei;HU Huan;Guangzhou Institute of Advanced Technology;Chinese Academy of Science;Faculty of Computer;Guangdong University of Technology;
..............page:2963-2967
Multi-protocol UHF RFID reader design
LI Zhi-shan;SUN Jia;ZHANG Dan;Institute 706;Second Academy of China Aerospace Science and Industry Corporation;
..............page:2968-2973
Airport detection method based on global and local features
ZHANG Yong-mei;GU Lin;LI Qiang;Institute of Information Engineering;North China University of Technology;
..............page:2974-2978
Design and implementation of fast file backup software
HU Ping-ping;WANG Jing-jie;College of Automation;Beijing Information Science and Technology University;
..............page:2979-2984
Precise exception guarantee technology of co-design emulation
ZHUANG Kuan;JIANG Lie-hui;LI Yi-min;WANG Fei-long;State Key Laboratory of Mathematical Engineering and Advanced Computing;Political Department of Chengdu Military Region;
..............page:2985-2989
Clustering algorithm based on cloud computing platform
MENG Hai-dong;REN Jing-pei;School of Information Engineering;Inner Mongolia University of Science and Technology;
..............page:2990-2994
Self-adaptive differential evolution algorithm based on constructing distribution and mapping models
ZHOU Mei-ling;ZHANG Sheng-min;LI Zheng;School of Software;Kaifeng University;School of Computer and Information Engineering;Henan University;
..............page:2995-2999+3018
Dynamic integration algorithm of multiple classifiers based on improved AdaBoost
JIANG Ji-chun;MA Dan;College of Computer Science and Technology;Guizhou University;
..............page:3000-3004
UML-based modeling technology of hard real-time workflow
XU Luo;SHI Jing;FAN Zhi-qiang;HAO Bo;North China Institute of Computing Technology;Institute of China Electronics System Engineering Company;
..............page:3005-3009
Fingerprint-based algorithm of indoor localization based on singularity detection and affinity propagation clustering
JIANG Ya-hu;Department of Computers;Guangdong Songshan Vocational College;
..............page:3010-3013
Semi-automatic detection and segmentation of neck lymph nodes in CT image
WEI Jun;HE Ling;CHE Kun;MEN Yi;HUANG Hua;ZHANG Jin;ZHANG Qiong-min;School of Electrical Engineering and Information;Sichuan University;Head and Neck Tumor Surgery;Hospital of Stomatology;Sichuan University;
..............page:3014-3018
Forest fire recognition algorithm based on sea computing
WANG Quan;ZHAO Juan-juan;College of Computer Science and Technology;Taiyuan University of Technology;
..............page:3019-3024
Image super-resolution reconstruction via PCA sub-dictionaries learning
SHOU Zhao-yu;WU Guang-xiang;ZHANG Tong;School of Information and Communication;Guilin University of Electronic Technology;School of Mechanical and Electrical Engineering;Guilin University of Electronic Technology;
..............page:3025-3029
Fuzzy level set segmentation method for cardiac CT image sequence
LI Zhen-hua;MEI Xue;GUO Xiao-yan;HUANG Jia-shuang;College of Automation and Electrical Engineering;Nanjing Tech University;
..............page:3030-3034+3045
Non-local image denoising method based on weighted RPCA
YANG Guo-liang;WANG Yan-fang;FENG Yi-qin;LU Hai-rong;School of Electrical Engineering and Automation;Jiangxi University of Science and Technology;
..............page:3035-3040
Seismic image enhancement algorithm based on Gabor filter bank
LIU Tian-shi;YANG Xue;LI Xiang-juan;School of Computer Science;Xi’an Shiyou University;
..............page:3041-3045
Dimmed edge detection for medical image using accumulated variations
LIN Qing-hua;DU Min;GAO Yue-ming;College of Electrical Engineering and Automation;Fuzhou University;School of Mechanical and Electrical Engineering;Putian University;Fujian Key Lab of Medical Instrument and Pharmaceutical Technology;Fuzhou University;
..............page:3046-3050+3068
Smoothing filter for color image based on Karhunen-Loeve transform and recursive least-square
SHI Chong-sheng;AN Hui-hui;TANG Quan-wu;ZHANG Zhong-wang;China Telecom Limited Company Ningxia Branch;China Life Insurance Limited Company Ningxia Branch;School of Physics and Electrical Information;Ningxia University;
..............page:3051-3055+3075
Crack extraction algorithm combining texture feature and saliency
QU Zhong;ZHOU Hai-kuan;College of Computer Science and Technology;Chongqing University of Posts and Telecommunications;School of Software Engineering;Chongqing University of Posts and Telecommunications;
..............page:3056-3059+3081
Motion estimation algorithm based on motion classification and multi-pattern
PAN Zhuo-jin;ZHANG Jun-xiang;LUO Zhen;YANG Hua;School of Computer Science;Shenyang Aerospace University;
..............page:3060-3063+3101
3Dreconstruction method of city buildings based on MVS point cloud
OU Yuan-han;LIU Jin;LAO Dong-ying;School of Computer;Electronic and Information;Guangxi University;Nanning Youwu Technology Limited Company;
..............page:3064-3068
Mixed reasoning on RDF data sets from multiple fields
XUE Xiao-li;DUAN Yue-xing;College of Computer Science and Technology;Taiyuan University of Technology;
..............page:3069-3075
Multi-objective trajectory planning based on SUMTNSGA-II
YANG Yun;ZHOU Cheng;WANG Wei;PENG Bo-yu;Air and Missile Defense College;Air force Engineering University;State Key Laboratory for Manufacturing System Engineering;Xi’an Jiaotong University;
..............page:3076-3081
K value of k-means algorithm based on granular computing and its application
BIAN Cai-feng;QIU Jian-lin;CHEN Yan-yun;LU Peng-cheng;CHEN Lu-lu;School of Electronic Information;Nantong University;School of Computer Science and Technology;Nantong University;Engineering Training Center;Nantong University;
..............page:3082-3086
Application of prior knowledge in deep learning
XUAN Dong-mei;WANG Ju-yun;YU Hua;ZHAO Jia;College of Engineering and Information Technology;University of Chinese Academy of Sciences;College of Science;Communication University of China;
..............page:3087-3091
Multi-objective differential algorithm based on neural network to realize distribution evaluation
LI Yan-wei;ZHENG Wei-yong;College of Computer;Henan Institute of Engineering;
..............page:3092-3096+3127
Rail surface defect detection based on improved chain-code algorithm
CHEN Hua-wei;WU Lu-shen;YUAN Xiao-cui;School of Mechanical and Electronic Engineering;Nanchang University;
..............page:3097-3101
Artificial bee colony algorithm based on action of chaotic chemotaxis
SUN Chen-ao;ZANG Pei-quan;WU Bin;GU Xiao-feng;ZHOU Chang-xi;Key Laboratory of Advanced Process Control for Light Industry of Ministry of Education;Department of Electronic Engineering;Jiangnan University;
..............page:3102-3105
Predicting urban PM2.5 concentration in China using support vector regression
XIE Yong-hua;ZHANG Ming-min;YANG Le;ZHANG Heng-de;School of Computer and Software;Nanjing University of Information Science and Technology;Jiangsu Engineering Center of Network Monitoring;Nanjing University of Information Science and Technology;National Meteorological Center of China Meteorological Administration;
..............page:3106-3111
Genetic algorithm for distribution network location choice model with limit line constraints
ZHANG Guan-xiang;LIU Yuan-yuan;CHEN Guang-wen;CAI Wen-xue;ZHONG Hui-ling;School of Economics and Commerce;South China University of Technology;
..............page:3112-3116+3133
Artificial bee colony algorithm with random search strategy
WANG Zhi-gang;SHANG Xu-dong;School of Mathematics;Nanjing Normal University Taizhou College;
..............page:3117-3122
Automatic control systems in top-coal caving based on acoustic wave
SONG Qing-jun;XIAO Xing-ming;ZHANG Tian-shun;WANG Jian-li;School of Mechanical and Electrical Engineering;China University of Mining and Technology;Department of Mechanical and Electrical Engineering;School of Taian;Shandong University of Science and Technology;Zhengzhou Coal Industry Limited Company;
..............page:3123-3127
Research on Micro-blog short text similarity and its application in Micro-blog topic detection
HUANG Xian-ying;CHEN Hong-yang;LIU Ying-tao;College of Computer Science and Engineering;Chongqing University of Technology;
..............page:3128-3133
Design and implementation of data management system based on self-definition scripts
QU Jing-yi;CHEN Zhong-yu;WU Ren-biao;Tianjin Key Laboratory for Advanced Signal Processing;Civil Aviation University of China;
..............page:3134-3139
Multiuser modulation classification method based on multi-order cyclic cumulants
LIANG Hai-bo;LIU Yu-ting;LUO Shi-xiang;ZHANG He;School of Electrical and Information Engineering;Southwest Petroleum University;Chinese Petroleum Group Logging Limited Company;
..............page:3140-3144
Dynamic strategy for storage space allocation in container terminal based on genetic algorithm
SHENG Yang;LIANG Cheng-ji;DING Yi;Logistics Research Center;Shanghai Maritime University;
..............page:3145-3150
Design and implementation of fluid office document query language
LIU Xu-hong;SHI Yun-mei;HOU Xia;LI Ning;School of Computer;Beijing Information Science and Technology University;Beijing Key Laboratory of Internet Culture and Digital Dissemination Research;Beijing Information Science and Technology University;
..............page:3151-3156
Three-chain routing algorithm based on wireless streetlights and its protocol design
SHI Xin-feng;WANG Yi-huai;GU Hui-guang;Computer Science and Technology School;Soochow University;
..............page:3157-3161
ccdm2016 zheng wen tong zhi
..............page:3162