Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 11
Improved and Fast Algorithm for Intra-prediction Mode Decision in H.264
Tian Chuan;Wang Yongsheng
..............page:13-15
Applications of Trees in Special Signatures
Wei Baodian
..............page:16-20,182
A Formal Method of Security Protocol Design
Li Li;Zhang Huanguo;Wang Zhangyi
..............page:21-23,156
Image Segmentation Based on Clustering and Rough Tolerant Relation
Zhang Dongbo;Wang Yaonan
..............page:24-26,229
Research on Rule Discernibility Matrix Based on Rough Set Theory
Li Jia;Wang Jiayang
..............page:27-31,34
Key Technology Research for Speech Recognition
Xi Xiaojing;Lin Kunhui;Zhou Changle;Cai Jun
..............page:66-69,115
A Novel Face Detection Method Based on Skin Model
Liu Jie;Zhang Hanling
..............page:70-72,134
A Neural Networks Algorithm for Robot Path Planning in Unknown Environment
Ni Bin;Chen Xiong;Lu Gongyu
..............page:73-76,109
Classification of Natural Textures Based on Concepts
Meng Xiangzeng;Liu Mingxia
..............page:77-79
An Improved Algorithm for De-noising in Wavelet Transform Domain
Fu Wei;Xu Shanchuan
..............page:80-81,84
Efficient Euclidean Division for Some Classes of Divisors
Zhu Huilin;Deng Guotai;Zhang Silan;Xia Jingbo;Yu Rongwei
..............page:82-84
Smith-Waterman Algorithm Based on SSE2
Dai Zhenghua;Zhang Qingdan;Xu Lin;Tan Guangming;Feng Shengzhong
..............page:85-87
Using the Modified Genetic Algorithm to Determine the Knots of B-Spline Curves
Mu Guowang;Zang Ting;Zhao Gang
..............page:88-90,115
Research on Manual Repair Methods of STL File Errors
Liu Fen;Zhou Huamin;Li Dequn
..............page:91-93,127
Multi-Criteria Synthetic Evaluation of Software Security
Wang Weijing;Wang Shuming;Chen Zhen;Shen Chun;Peng Xiuzeng
..............page:94-96,224
Prototype Method in Embedded Real-time Software-oriented Requirements
Li Yonghua;Wu Guoqing
..............page:97-99,118
The Expression Recognition Method of SVM Based on FLD Extracting Feature
Tang Jinghai;Zhang Youwei
..............page:10-12
Design and Implementation of a JMX-Based Remote Job Management System
Wu Liguo;Wang Qing;Ma Bo
..............page:119-123,168
Research and Performance Analysis of FAST TCP Protocol
Wen Hong;Xiang Desheng;Deng Xiaoke;Zhu Peidong;Tang Yuhua
..............page:124-127
Research of Distributed Intrusion Monitoring System Based on Multi-Agent
Wang Jing;Zhuang Yi;Wang Lixi
..............page:128-131
An Artificial Immunity Algorithm of the QoS Multicast Routing Problem
Sun Yongfei;Gao Suixiang;Zhang Baicheng;Wang Yingchang;Wang Wei
..............page:132-134
The Implementation of Trojan Horse Server Program's Self-Spread by Internet Worm
Zhou Tao;Dai Guanzhong;Mu Dejun
..............page:135-137,221
A Novel Blind Multiuser Detection for MC-CDMA Systems without Cyclic Prefix
Zhao Fayong;Feng Guangzeng
..............page:138-140
Co-design of the Implementation of Elliptic Curve Point Multiplication
Dong Xiuze;Gao Xianwei;Liu Shu;Sun Jianshu
..............page:100-102,208
Pretreatment of Failure Data Based on Clustering Algorithm
Ma Sasa;Chen Zili;Zhao Shouwei
..............page:106-109
An Investigation on Instant Messaging Worm Based on Complex Network Theory
Shi Mingjiang;Li Xiang;Wang Xiaofan
..............page:110-115
A Secure Architecture Design Scheme of Wireless Sensor Node
Qiu Huimin;Shi Xinru;Yang Yixian;Jia Fan
..............page:116-118
Research on Text Hierarchical Classification System
Gao Bo;Zhao Zheng
..............page:176-178
Forecasting Merchandise Demands with Grey Model and its Application in the 3rd Part Logistics
Yang Fengyu;Zhao Yanwei;Dong Hongzhao;Gao Zhiming;Chen Zhenzhou
..............page:218-221
A New Kind of Petri Net Reasoning Algorithm and its Application to Anemia Diagnosis
Tan Xu;Tan Hong;Chen Yingwu
..............page:222-224
Micro-flow System and its Application on DNA Computing
Shi Xiaolong;Yin Zhixiang
..............page:183-185
Application of Acoustic Model Based on BS.1387 in Audio Coder
Hu Xiaopeng;Li Xun;He Guiming;Zhou Xiaoping
..............page:6-9
Quantum Fourier Network Improvements Based on the Elementary Gates
Jiang Min;Zhang Zengke
..............page:4-5,143
Investigations on Variants of Weighted Automata
Liu Guangwu;Shi Xiaolong;Xu Jin
..............page:1-3,189
Fast Elastic Image Registration Method Based on B-Splines
Peng Xiaoming;Chen Wufan;Ma Qian
..............page:186-189
Effective Algorithm for Primitive Roots Generation
Xia Jingbo;Zhang Silan;Chen Jianhua
..............page:32-34
Design of an Algorithm for Point-in-closed Region Test
Ou Xinliang;Chen Songqiao;Fang Kui
..............page:35-37
A Logic Circuits Design Algorithm Based on Immune Principles
Zhang Yiguo;Luo Wenjian;Wang Xufa
..............page:38-40,62
Quantile-based Handwritten Chinese Characters Recognition Approach
Ren Junling;Guo Jun;Wang Chengquan
..............page:45-47
An Approach of System Model Design Based on UML Real-time Extends
Zhou Zhiping;Xia Juan;Wang Yongzhi;Lin Jiajun
..............page:48-51
The Application of Complexity in SEMG Pattern Recognition
Cui Jianguo;Li Zhonghai;Zhang Daqian;Wang Xu;Han Zhiren;Qv Xuejun
..............page:195-197,217
A Precise Examination Method on Bills' Width
Zhao Tinglei;Wan Liping;Gao Chunming
..............page:198-200,221
Risk Control and Expenses Cost of Information Systems
Wang Zhenxue;Zhou Anmin;Dai Zongkun
..............page:141-143
Research on Chord Lookup Algorithm for Peer-to-Peer Network
Zhang Zhen;Wang Xiaoming
..............page:147-152
A Fast Association Rules Mining Algorithm for Network Intrusion Detection
Ding Hong;Zhao Guanjun
..............page:153-156
Framework of Service Quality Monitoring Based on SLA and Web Services
Su Aihua;Zhang Guoqing
..............page:157-160,172
The Game Analysis and Revising on a Fair Document Exchange Protocol
Li Yunfeng;He Dake
..............page:161-165,208
Digital Watermarking for Database Based on Effective Digit
Peng Peifu;Lin Yaping;Zhang Guifang;Hu Bin
..............page:166-168
Association Rules Mining Strategy Based on Reduced Data Set
Peng Yun;Nie Chengqi;Yu Songsen
..............page:169-172
An XML Storage Scheme Based on XML Schema
Hao Chunhui;Zou Jing
..............page:173-175,204
A New Method of Fuzzy Reasoning Based Computer-Aided SDG-HAZOP
Liu Yue;Zhang Beike;Wu Chongguang
..............page:201-204
The Real-time Arithmetic and Realization of Encoding and Decoding of DGPS's RTCM Data
Li Liang;Zhang Xiaochao;Zhao Huaping
..............page:209-211
The Application of Access Control in Wireless Network Classroom Assuring QoS
Meng Zhaopeng;Li Juanjuan;Zhang Lianfang;Gong Lanjie
..............page:212-214
A Modular Neural Networks Control Method Based on Hybrid Modeling
Du Qingdong;Liu Jie;Zhao Hai
..............page:215-217
Research and Application of Production Planning System for Pharmacy Enterprise
Liu Zhiwen;Chen Wenge;Huang Jianfeng
..............page:230-232
An Improvement on the Motion Estimation Algorithm: UMHexagonS
Yang Yuhong;Xu Xuan;Ji Xiaoyong
..............page:52-54,65
A High-speed Algorithm for Three-prime RSA
Xu Jin
..............page:57-58
The On-line Realization of the Double-Gauss Way in Speech Recognition
Liu Fangjun;Liu Bo;Wang Renhua
..............page:59-62
New Rules Generating Online in Fuzzy Systems of Incomplete Rule Base
Tang Ganyi;Deng Huiwen;Zhang Xun
..............page:63-65