Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 24
Multi-objective Optimization Immune Algorithm Based on Pareto
Zhai Yusheng;Cheng Zhihong;Chen Guangzhu;Li Liu
..............page:27-29,38
Hamilton-connectivity and Pancyclicity of Crossed Cube-connected Ring
Yu Xin;Wu Min;Wang Guojun
..............page:24-26,48
Analysis and Research of Network Processor Architecture
Li Tao;Zhang Xiaoming;Sun Zhigang
..............page:132-134
Blind Multi-User Detection for Space-time Block Code System
Li Yanping;Zhao Jumin;Wang Huakui
..............page:135-137
Survey of Remote Disaster Recovery System and its Formal Design Model
Yu Xinhua;Liu Chuanyi
..............page:30-33,104
Research of the Nude Image Filtering Based on the Content Analyzing
Liu Yihe;Liu Jiayong;Yuan Xinfeng
..............page:56-58,156
A New Texture Analysis and Synthesis Method Based on Almost Periodic Characters
Pan Lulu;Ye Zhenglin;Meng Fan
..............page:59-61
An Interactive Object Segmentation Algorithm Based on Graph
Wang Fei;Luo Dongli;Tang Jingtian;Xu Dahong;Yang Xiaoli
..............page:65-67,163
A Sub-pixel Edge Detection Algorithm Based on Cubic Spline Interpolation
Luo Rongfang;Lin Tusheng;Liu Jingen
..............page:68-70
FPGA-based DDR SDRAM Controller Implementation
Zhang Nan;Zhang Peiheng;Liu Xinchun;Jiang Xianyang
..............page:87-90,93
Research and Realization on an Intellingent Human-Computer Interaction Prototype
Feng Ruofu;Wang Rujing;Xu Wanxin
..............page:91-93
Research on Event-driven Based Product Development Process Management
Zhang Jinsong;Zhong Yifang
..............page:94-97
An Improved Frequency Domain Equalizer in the DMT System
Wang Jianzhong;Luo Xinwu;Liu Wenjiang;Rong Mengtian
..............page:98-101
Research and Design of Adaptive Security Component Based on Embedded System
Liang Feng;Gu Weinan
..............page:102-104
Study on Node Positioning Model of UWB Wireless Sensor Networks
Yu Genjian;Qian Xiaocong
..............page:122-124
A Network Attack System Based on Attack Tree
Zhou Wei;Wang Li'na;Zhang Huanguo
..............page:125-128
Self-Vulnerability Defense Technique Based on Behavior Analysis for Remote Backup Systems
Li Qiang;Zhang Yan;Li Zhoujun
..............page:129-131,134
Mesh-based Topology-aware Overlay Construction Algorithm
Di Ming;Dai Qionghai
..............page:138-140
GUA :A General User Agent Model for Grids
Tao Jiang;Yang Guangwen
..............page:141-144
Study of Convergence of SP-MEC
Zhou Xiuling;Sun Chengyi
..............page:43-45,52
A New Face Recognition Approach: Local Two-dimensional Principal Component Analysis
Liu Wenchao;Chen Yanhong;Chen Li
..............page:53-55,101
The Research of HMM Anomaly Detection Approach Based on Network
Zhu Yixin;Min Dong
..............page:145-148,151
Implementation of Algorithm to Filter out Impure Webpages Based on Fuzzy Theory
Yuan Min;Gao Shouping;Liao Jinhui
..............page:149-151
A Malware Defence Strategy for P2P File-Sharing System
Xie Chenghao;Dong Jianquan
..............page:152-156
Normalization of O-O Schema with Checking the Conflicts within the User's Interpretation
Xiong Zhongmin;Hao Zhongxiao
..............page:157-159,178
Research on Model Interoperability Based on MOF
Yang Hebiao;Gong Longhui;Zhang Zhenbo
..............page:71-74
Extension Research on Topological Sort
Wang Qiong
..............page:75-76
Design of Smoke Testing System of ARP Based on Tcl
Zhao Baohua;Liu Hongxia
..............page:77-79,83
Improved Adaptive Principal Component Extraction Algorithm Based Face Recognition
Shi Qin;Yin Baocai;Sun Yanfeng;Wang Chengzhang
..............page:20-23
Identification of Application-Level Protocols Using Characteristic
Chen Liang;Gong Jian;Xu Xuan
..............page:16-19,86
The Implementation of AES Algorithm IP Core in FPGA
Li Xuemei;Ou Haiwen;Lu Erhong;Tong Xinhai
..............page:84-86
A Novel Model for Anomaly Intrusion Detection System Based on Data Codon
Guo Chen;Liang Jiarong;Xia Jiewu
..............page:105-107
A Communication State Aware Routing Protocol for MANET
Wu Shien;Li Demin;Yang Hongmei
..............page:108-110,175
Study on Search Scheme in Dense Peer-to-Peer Networks
Yang Dongfeng;Zhuang Lei
..............page:111-114
An Improved Group Signature Scheme Based on Chinese Remainder Theorem
Hu Bin;Shi Ronghua;Lou Yue
..............page:115-116,140
Historical Record Update Based Resource Discovery Strategy in Grid Environment
Jiang Yan;Yang Shoubao;Wei Dong;Guo Leitao
..............page:117-119,124
A Optimized Scheme of the CPK Seed Matrix
Rong Kun;Li Yifa
..............page:120-121
Technical Scheme for Power Management Based on Qt/Embedded
Wang Yan;Xu Jing
..............page:187-188,191
Study on Control Technology of PEMFC Electrolyte Membrane Humidity
Wu Maosheng;Wang Jing;Yue Xijun
..............page:189-191
An Incremental Algorithm for Attribute Reduction
Bai Junqing;Liu Qiongsun
..............page:174-175
The Application of the ZigBee Technology in Coal Mine Rescue System
Zhan Haomin;Sun Changsong;Wu Shan;Li Dongyan
..............page:181-183
A Rectifying Algorithm for Nonlinear Distortion in the Visual Surveillance System
Fang Xiaoying;Liu Fuqiang
..............page:192-194,221
Study of GPS Positioning in Incomplete Condition
Sang Xuan;Li Shuguang
..............page:198-200,228
RFID Based Solution for Food Safety
Liu Yu;Zeng Junfang;Tian Limei
..............page:201-203,210
Auto Segmentation of Brain MR Image Based on Gaussian Mixture Model Diffusion
Zhang Jianwei;Chen Yunjie;Xia Deshen
..............page:207-210
The Study of Super Distributed Learning Object
Li Jing;Zhou Zhurong
..............page:211-215,225
Single Phase Portfolio Optimization Based on Particles Arithmetic
Jiang Jiabao;Xu Wenbo;Yu Min
..............page:216-218,225
An Acoustic Field Visualization System Based on Virtual Instruments
Li Jiaqing;Chen Jin;Liu Xianfeng;Xue Weifei;Chen Yantai
..............page:219-221
Distributed Dynamic Service Discovery and Negotiation Based on Jini and Mobile Agent
Wang Ruipan;Gu Ji'nan;Xiao Tianyuan
..............page:222-225
An Adaptive Data Prefetch and Cache Algorithm
Zhu Hongyu;Liu Gui;Tang Fuhua;Chen Zuoning
..............page:13-15,42
A Cross-layer Design in V-BLAST System
Zheng Peng;Liu Gan;Lu Xiaofeng
..............page:4-6,12
Research of Fast Image Reconstruction on ART Algorithm
Zhang Shunli;Zhang Dinghua;Li Shan;Zhao Xinbo
..............page:1-3,70
Eliminating Noisy and SMO Algorithm Convergence
He Jianbing;He Qing;Shi Zhongzhi
..............page:160-163
Automated Segmentation of Lung Fields from Thoracic CT
Jiang Ping;Zhang Jianzhou;Zhu Jianfeng;Zhou Lin
..............page:226-228
Multi-Issues and Parallel Genetic Negotiating Model Based on Agent
Wang Yong;Xiong Qianxing
..............page:229-232
Research on the Mapping Rules between XML Document to Relational Data Model Based on DTD
Wen Lidong;Huang Shangteng
..............page:164-166,173
The Research and Advances on Mining High Dimensional Data
Chen Huiping;Wang Yu;Wang Jiandong
..............page:170-173