Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 18
Parallel Algorithm of Time Domain Decomposition Based on Message Passing
Li Yonggang;Ouyang Jie
..............page:32-36
An Improved Image Denoising Algorithm Based on Wavelet Bivariate Model
Hou Jianhua;Xiong Chengyi;Tian Jinwen;Liu Jian
..............page:29-31,75
Extensions to Strand-space Theory and Its Applications
Zhang Lan;He Liangsheng
..............page:136-138
Clair:a Keyword-based Search System for BitTorrent over P2P
Xiao Jianyong;Zhang Wusheng
..............page:139-142,212
Resource Monitoring Model in CGSV
Li Liangjie;Tian Jinlan;Hu Meizhi;Liu Lin
..............page:146-149,177
Shape Modification of B Spline Curves by Constrained Optimization
Tao Shuyi;Wu Qingbiao
..............page:37-39
A Particle Swarm Optimization Method for Multi-objective Optimization
Sun Xiaoqiang;Zhang Qiuming
..............page:40-42,78
A Heuristic Algorithm by Inserting Genetic Operators to Solve the Traveling Salesman Problem
Chen Jiye;Xie Wenping;Cheng Lizhi;Zhang Jun
..............page:43-46
Martingale Application in Selection of Learning Samples
Fang Hongbin;Zhao Liquan;Zhou Ying;Zhang Ling
..............page:47-49
The Authentication System's Design Based on Face and Voice with Genetic Wavelet Neural Network
Liu Yang;Cao Baofeng;Li Maosheng
..............page:50-52,98
An New Efficient Improved Randomized Algorithm for Detecting Circles
Zhang Bingquan;Wang Jianfeng;Lu Jun
..............page:53-54
A Novel Fast Searching Algorithm Based on Genetic and Template Matching
Jin Shengyi;Wang Qing
..............page:55-57
Algorithms for Efficient Simultaneous Elliptic Curve Scalar Multiplication Using Point Halving
Feng Juanjuan;Zhu Yuefei;Zhang Yajuan
..............page:58-60
Study on Multi-Sensor Stereovision Measurement System in Small Field
Ren Chenli;Zhong Sidong
..............page:65-67,119
Image Segmentation Based on Varitional Level Set Method
Wang Wenjie;Feng Jianhu
..............page:68-70
An Image Retrievel Method Based on Partition and Weighting after Tree-Structured Wavelet Transform
Cao Zhongsheng;Dong Xuefeng;Liang Junjie
..............page:71-73,163
Signal Variability Based on Linear Mixture Blind Source Separation Algorithm
Gao Ying;Yao Zhenjian;Li Zhaohui;Xie Shengli
..............page:76-78
No-Reference Image Quality Assessment Using Digital Watermarking
Yin Xiaoli;Fang Xiangzhong;Zhai Guangtao
..............page:79-81,129
Research of Affective Semantics Retrieval Based on Content
Li Haifang;Jiao Lipeng;Chen Junjie;Wang Li;He Jing
..............page:82-85
A Method of FPGA Remote System Upgrade
Wu Dongdong;Yang Xiaojun;Zhang Peiheng
..............page:86-88,98
The Simulation of Programmable Interface Chips System Based on Matlab/Simulink
Ye Jihua;Ma Lihong;Gan Dengwen
..............page:89-91
Design and Implementation of a 64-bit Floating-point Multiply-Add Fused Unit
Jin Zhanpeng;Bai Yongqiang;Shen Xubang
..............page:95-98
Research of Client for PAWS/RTS Server Based on COM
Meng Wenlong;Chen Ming
..............page:99-101
XScale Architecture Analysis and Optimization Strategy
Pan Weibin;Xu Guozhi;Zhang Yulu;Zheng Hao
..............page:102-104
A Research on Method of Integration Testing for Component-based Software Based on XML
Xing Chuanyu;Zhang Yikun;Ma Zhen
..............page:105-108
The Boot Method of Mapped SCSI Disk Based on iSCSI Network Storage Protocol
Tan Huailiang;Li Renfa;He Zaihong
..............page:109-112
Design Feature-based Method for the Generation of Conceptual Design Solution and Evaluation
Wang Xingdong;Zou Guangming;Kong Jianyi;She Lin;Hu Yujin
..............page:113-115
Research on Web Service Composition Language
Zhang Fan;Yang Wenjun;Li Juanzi;Zheng Guoqin
..............page:116-119
Design of Conformance Testing System for ISIS Protocol
Jiang Zhenhai;Zhao Baohua;Zhou Hao
..............page:120-122,129
A QoS Multicast Routing Algorithm of Ad Hoc Networks Based on Layered Structure
Chen Niansheng;Li Layuan;Ke Zongwu
..............page:123-125,138
Access Grid Based Collaborative Visualization Platform on Hybrid Grid
Zhu Xuqing;Song Guanghua;Huang Zhengge
..............page:126-129
Optimization of Associations in Dynamic Role Translations
Liao Junguo;Hong Fan;Zhu Xian;Xiao Haijun
..............page:130-132,163
A Network Risk Assessment Method Based on Multi-Stage Network Attack
Deng Xinying;Yang Geng;Yao Fangwu;Li Hui
..............page:133-135,203
A Forward-secure Digital Signature Scheme Based on Elliptic Curves
Wang Shangping;Hou Hongxia;Li Min
..............page:150-151,206
A Novel Segmentation Algorithm for Complex Images Based on Valid Gradient Information
Pan Wei;Li Jinchuan;Wang Yangsheng;Yang Hongji
..............page:11-12,64
Study of Adaptive Intrusion Detection with Data Mining
Fang Jinhe;Feng Yan;Wang Ruijie
..............page:152-154,196
Research of Protein Structure Classification Based on Data Mining
Ran Li;Zou Xianxia;Xu Longfei
..............page:155-157,170
Minimal Simple Decomposition Strategy of Pattern Tree
Deng Na;Wang Yu;Fan Shiyong;Qi Hongzhi;An Haining;Xiao Shenggang
..............page:160-163
The Method of Information Hiding Based on Multiple Compression and Encryption
Tian Lihua;Zhao Jizhong
..............page:164-166
An Email Classification Model Based on Rough Set Theory
Wang Dewen;Zhao Wenqing;Zhu Yongli
..............page:167-170
A Reduction Algorithm of Attribute Based on Rough Set Theory
Ma Guangzhi;Wu Liming
..............page:171-172,175
A Fuzzy Clustering Algorithm Based on Kernel Method
Cai Weiju;Zhang Yingchao
..............page:173-175
A New Evaluation Method for Automatic Text Summarization
Fu Jianlian;Chen Qunxiu
..............page:176-177
An Improved Algorithm for Maintaining Discovered Association Rules
Xu Wenshuan;Xin Yunwei
..............page:178-180
3D Medical Volume Data Visualization Techniques
Song Weiwei;Li Guanhua;Ou Zongying
..............page:22-26
Computer-Generated Hologram and Digital Reconstruction of Synthesized Fractional Fourier Transform
Cao Yuru;Zhang Ziyun;Shi Dong;Wei Sui
..............page:19-21,112
Software Project Risk Analysis Process Based on Bayesian Networks
Feng Nan;Li Minqiang;Kou Jisong;Fang Deying
..............page:16-18,39
Immune Multicast Routing Algorithm for Multimedia Communication
Han Jiaxin;He Huacan
..............page:13-15,85
Absolute Value Activity and Regional Similarity Based on Image Fusion
Zhang Yifan;He Mingyi
..............page:8-10,26
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machines
Luo Min;Yin Xiaoguang;Zhang Huanguo;Wang Lina
..............page:4-7,57
Analysis and Improvements of UAP Protocol
Zhang Lihua
..............page:1-3
Real-time Pellet Injection Monitoring & Operating System
Wang Houyin;Sun Yi;Zhang Peiren;Yang Yu
..............page:194-196
The Object-Oriented Analysis and Design of Avionics Testing System
Zhong Deming;Yin Yongfeng;Zeng Fuping
..............page:197-199
Virtual Reconstruction of Chinese History Architecture Based on Virtual Reality
Zhou Ning;Wang Jiaxin;Zhao Yannan;Yang Zehong
..............page:200-203
Boundary Tracing of Brain Images Based on Wavelet Transform
Wang Xin;Ning Chen;Luo Bin
..............page:204-206
A Business Agent Negotiation Model with Backtracking Mechanism
Shao Guobin;Xu Junhua;Song Jingyan
..............page:210-212
Research of Single-Type Distribution Problem
Fu Tong;Guo Qiang
..............page:215-217
A Realtime Surveillance System for Disjoint Multiple Cameras
Chen Weihong;Xiao Degui
..............page:218-220
Design and Realization for More Flexible Authentication Authorization System
Jiang Lifeng;Zhao Baohua
..............page:221-223
Customer-Oriented Catalog Segmentation Data Mining Research Based on Weighted BPF Algorithm
Ning Shiyong;Sun Yanan;Lu Mingyu;Lu Yuchang
..............page:224-226
Modeling Method of Airport Emergency Simulation Based on Hierarchial Petri Net & Scenario
Zhao Yuming;Gan Renchu;Ju Yanbing
..............page:227-228,232
Integrated Data Mining and Data Fusion Model
Wang Xuan;Gao Shesheng;Zhao Xia
..............page:181-183
Real-time Safety Monitor System in the Process of Continuous Carbonation Decomposition
Hu Zhikun;Gui Weihua;Yang Chunhua
..............page:184-187
Calculation of the Shortest Path and Three-dimensional Visualization in GIS Environment
Lin Kaihui;Tang Liyu;Chen Chongcheng
..............page:188-190,199