Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 14
A Mesh Simplification Method Based on Octree in Virtual Reality
Yu Wenyong;Li Yajun;Chen Youping;Zhou Zude
..............page:34-36,78
Roos-extension of Default Logic
Fu Li
..............page:30-33
Constructing and Performance Analysis of a Beowulf Parallel Computing System Based on MPICH
Zhu Yongzhi;Zhao Yan;Wei Ronghui
..............page:132-133,136
Risk Analysis of Knowledge System Based on ISM
Liu Wei;Liu Lu
..............page:134-136
Simplified Signal Detecting Algorithms of MIMO-OFDM Systems Based on QR Factorization
He Zhongtang;Zhang Lijun;Chen Zili;Ji Guoqing
..............page:137-140
Wireless Network Wide Interval Frequency Hopping and Research of its Performance
Qu Yugui;Wu Mingli;Sun Tingbo;Zhao Baohua
..............page:141-142
Design and Implementation of a Cluster System Based on Linux
Zhang Fan;Yuan Daohua;Ye Zhen;Liu Jiao;Wang Ping
..............page:127-131
Study on Backoff Algorithms for Wireless Medium Access Control
Li Ning;Jing Li;Chen Qiang
..............page:124-126,145
The Design and Implementation of an Iterative Snapshot System
Liu Zhenjun;Xu Lu;Feng Shuo;Yin Yang
..............page:11-15
Modeling the MPEG-4 Video Traces Using Multi-fractal Wavelet Model
Lin Qingjia;Chen Di;Liu Yuncai
..............page:16-21
DPQS :An Effective Queue Scheduling Mechanism for Mobile Ad Hoc Networks
Huo Ying;Chen Zhigang
..............page:22-25
Research on Workflow Modeling Through Extending UML Activity Diagram
Fu Lingli;Zhao Wen;Wang Lifu;Nie Chengqi
..............page:41-44
A Background Reconstruction Algorithm Based on C-means Clustering for Video Surveillance
Zhang Yunchu;Liang Zize;Li En;Tan Min
..............page:45-47
A Method of Ellipse Target Recognition for SAR Image
Lin Hongjin;Luo Daisheng;Luo Feng;Xia Xin
..............page:48-49,88
A New Grading Sorting Arithmetic Based on the HASH Transform
Bi Xiuli;Wang Xuan;Xiao Bin;Yuan Yimin
..............page:50-51
Quantum Search Algorithm System and Its Applications
Sun Li;Xu Wenbo
..............page:55-57,75
A Novel Hash Function Algorithm Based on the Neural Network
Wei Yuxuan;Wei Pengcheng
..............page:72-75
A Color Image Segmentation Method by Fusion of Clustering and Region Growing
Li Qingzhong;Shi Wei;Chu Dongsheng
..............page:76-78
Fast WSOLA Algorithm Based on Hybrid Domain Processing
Yao Yong;Liu Zhijing
..............page:79-81
The Formalization of a Model of Software Encryption
Zhu Xinbing;Li Qingbao;Bai Yan;Zeng Guangyu
..............page:82-85
Some Results on Fined Covering Fuzzy Generalized Rough Sets
Qiu Weigen;Luo Zhongliang
..............page:86-88
The Design and Implementation of a XML Schema Directed Multimedia Retrieval System
Zhang Yunfeng;Yu Jinfu;Li Ning
..............page:109-113,131
Model-driven Design and Performance Optimization in Embedded System
Luan Jing;Gu Junzhong
..............page:114-117
Real-time Simulation of Fountain Based on Hardware-Accelerated and Particle System
Fang Jianwen;Yu Jinhui;Ma Wenlong
..............page:118-120,172
PKI System Model Based on 3-tiered Net Framework by XKMS
Chen Li;Zhang Haojun;Zhu Yuefei
..............page:121-123
Nonself Feature Extracting Algorithm Based on Rules Reorganization
Wang Fengxian;Liu Zhenpeng;Pan Hongtao
..............page:146-148
The Design and Application of Fuzzy Neural Controller Based on HGA
Chang Jiang;Jing Zhanrong;Gao Tian
..............page:222-224
Design and Implementation of TETRA Dispatcher Encryption System
Li Ling;Li Xueli;Lin Zhong;Wu Qingfang
..............page:149-151
The Conception and Theory of Extension Data Mining
Huang Jincai;Chen Wenwei
..............page:7-8,25
The Control of Subway Train Based on Formation Technology
Lu Fei;Song Mumin;Tian Guohui;Li Xiaolei
..............page:4-6,15
Facial Feature Modeling Based on the Active Shape Model
Chen Ke;Du Limin
..............page:1-3,33
Design and Implementation of the Adaptive Intrusion Detection Framework Based on Data Mining
Liu Yongjian;Xu Xin;Wang Zhenghua;Xue Changxin
..............page:152-154
Communication Technical Research of High-performance Network Based on VxWorks OS
Liu Liqiang;Dai Yuntao;Jia Guifen;Wan Yang
..............page:155-157,161
A Congestion-aware Cross-layer Routing Scheme of Ad Hoc Networks with Multi-rate Mechanism
Yang Guangsong;Xiao Mingbo;Chen Huihuang;Yao Yan
..............page:158-161
Design and Implementation of a Network RAID Based on iSCSI
Liu Weiping;Cai Wandong
..............page:162-164,168
A Anomaly-based Intrusion Detection System in Mobile Wireless Networks
Liu Lijun;Li Zhuowei
..............page:165-168
Closed Sequential Pattern Mining Algorithm Based on Positional Data
Zhang Cuixiao;Sha Jin;Hu Yingxin;Jia Yufeng
..............page:173-175,179
Chinese Names Recognition Technique in HENU Automatic Chinese Segmenting System
Wu Lin;Zheng Fengbin;Qiao Baojun;Tang Saili
..............page:180-182,232
Optimization Method of Adaptive Filtering Utility Target
Fu Jianwen;Yang Zhihao;Lin Hongfei
..............page:183-186
A Region Decomposition Genetic Algorithm Based on Orthogonal Design
Song Chaohong;Luo Qiang;Wang Cheng
..............page:58-59
Difference Images Change Detection Based on Two Dimension Fuzzy Entropy
Zhong Jiaqiang;Wang Runsheng
..............page:60-62,81
The Simulated Annealing Algorithm for Multi-modal Function Problem
Tao Qingyun;Quan Huiyun
..............page:63-64,91
A Compression Domain Video Watermarking Algorithm Based on CIF-to-QCIF Transformation
Cao Hua;Zhou Jingli;Yu Shengsheng;Hu Yuping
..............page:65-68,94
A Fast Approach to Compute the Intersections of Abitrary Curve Which Contains Circular
Li Chunlei;Liu Zhoufeng;Xu Xiangyong
..............page:69-71,85
Aggregate Algorithms of Compound Sliding Window over Data Streams
Zhong Yingli;Li Jinbao;Wang Weiping;Ai Chunyu
..............page:187-191
DFT Based Robust Digital Watermarking Algorithm for 3D Mesh Model
Liu Wang;Sun Shenghe
..............page:192-196,207
A Method to Optimize User Model Based on Dynamic Genetic Algorithm
Li Baolin;Lan Yun;Zhang Yiying
..............page:200-203
A Optimal Left-to-right Signed Recording Technique
Hou Baohua;Ye Zhen;Fan Hongsheng
..............page:89-91
A Contour-Based Method of Feature Extraction and Shape Recognition
Zhou Zhengjie;Wang Runsheng
..............page:92-94
Edge Detection Design with Hierarchic Genetic Algorithms
Wang Jianfeng;Wu Qingbiao
..............page:95-96,151
Design of the Architecture of an Event-Triggered Remote Virtual Laboratory System
Wang Weiping;Liu Dan;Wang Jianxin;Chen Jian'er
..............page:97-101
The Key Algorithms in SOC Hardware-Software Partition System
He Xiangzhu;Chen Junbo;Chen Yaguang;Li Dongna
..............page:105-108
Security Architecture Design of Videoconferencing System
Xu Yanyan;Xu Zhengquan;Ren Yanzhen
..............page:208-211
Freeway Incident Detection Based on Support Vector Machines
Liang Xinrong;Liu Zhiyong;Sun Deshan;Mao Zongyuan
..............page:212-213,218
Sham Battle Information Extraction System Based on Internet
Li Yuejin;Zhao Jing;Lin Hongfei
..............page:214-218
Using a multidimensional Data Model to Build a Prospecting Data Mart of Oil and Gas
Li Rirong;Wu Conglong;Shao Yuxiang
..............page:229-232