Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 27
Research of Collision Detection between Objects in Java 3D
GUO Jing-feng;YAN Li-hua;WANG Jian-chao
..............page:23-25,161
Research on Rounding Methods for High-Speed Floating-Point Multipliers
LIU Hong-jin;ZHANG Tie-jun;HOU Chao-huan
..............page:20-22,95
A New Path Choice of the Mobile Query
LIU Guo-qiang;LIU Wei-guo;HE Xiao-dong
..............page:134-136,149
The High Efficiency Implementation of Prime Field ECC on Smart Card
LIU Chun;ZHANG Feng-yuan;ZHANG Qi-shan
..............page:137-139
A Dynamic Forensics Model Based on Intrusion Detection System
LIN Guo-yuan;HUANG Hao
..............page:140-143
Applying Fuzzy ART to Network Unsupervised Anomaly Detection
GAO Xiang;YU feng;WANG Min
..............page:144-146
The Path Planning Research for Mobile Robot Based on the Artificial Potential Field
HUANG Bing-qiang;CAO Guang-yi
..............page:26-28
A Novel Image Encryption Algorithm Based on Chaotic Sort
LI Li;ZHU Cong-xu;CHEN Zhi-gang
..............page:29-30,56
Directional Snake Based on Dynamic Programming
HUANG Hui;GUAN Lv-tai;GONG Yong-yi;HU Gui-wu;PENG Hong
..............page:31-32,52
Improvement of Error Resilience for SPIHT Algorithm
WANG Yi;TANG Ping;XU Yan
..............page:33-35,139
A Multi-objective Genetic Algorithm with Controllable Performance
KUANG Da;ZHENG Jin-hua
..............page:36-39,99
A Robust Watermark Algorithm Based on Chaotic Sequence in LWT Domain
WU Yi-jie;YANG Xiao-yuan;WEI Li-xian;TANG Yu-hua
..............page:40-42
Multi-Class Steganalysis Based on Pattern Recognition
HUANG Cong;XUAN Guo-rong;GAO Jian-jiong;SHI Yun-qing
..............page:43-45
Research on the Fractal Watermarking Method in DCT Domain
LI Chun-xia;YANG Shu-guo;DONG Ji-xue;ZHANG Yu-qin
..............page:46-49,83
A New Method of Computing Software MTBF Based on Unascertained Mathematics
ZHANG Yong-qiang;SUN Sheng-juan
..............page:50-52
An Adaptive Fuzzy Support Vector Machine Algorithm
SHAO Zhuang-feng;YANG Xiao-wei;WU Guang-chao
..............page:53-56
Chirp Typed Blind Watermarking Algorithm Based on Fractional Fourier Transform
ZHANG Feng;MU Xiao-min;YANG Shou-yi;QI Lin
..............page:57-61
Study of a Robust MRF-MAP Image Segmentation Framework
HOU Yi-min;GUO Lei
..............page:62-64,68
Merging Results Based on Distributed Image Retrieval
JIA Chao;SUN Yan-yan;CHEN Fei
..............page:65-68
The Study of Extracting Ability of Discriminant Features for M2DPCA
CHEN Fu-bing;WEI Xiang-he;YAN Yun-yang;YANG Jing-yu
..............page:69-72,75
A Spatial Feature for Content-based Image Retrieval
ZENG Xi;LIU Yi
..............page:73-75
Design of Automated Conformance Testing System for BGP Protocol Based on TCL
ZHAO Bao-hua;GAO Cun-hao
..............page:80-83
A Model Based Web Page Automatic Generating System:PAGS
LI Fan;LI Meng;LI Jing
..............page:84-88
Approach of Statically Detecting C++ Exception Safety
ZHANG Yan-chun;LIU Jian
..............page:89-92
Research on Object-Oriented Software Complexity Metrics Based on Inheritance Graph
LUN Li-jun;DING Xue-mei;LI Ying-mei;ZHANG Yi
..............page:93-95
Development of Snapshot System of Traffic Violation Based on ARM9
XIONG Rui;ZHOU Chun-jie;LIU Yang
..............page:96-99
Communication Model for Grid Based on Clusters
CHEN Qing-kui;NA Li-chun
..............page:103-105,120
Programming Model and Solution Algorithms for One Source-One Sink Routing Problem in Sensor Network
WU Hong-hong;YANG Wen-guo;ZHAO Tong
..............page:109-111,117
Analysis and Countermeasure of Coalition Resistance for a Class of Group Signature Schemes
SHI Rong-hua;ZHOU Yu;XU Lei
..............page:112-113,146
Design of a VPN Gateway System Based on a Network Processor IXP425
WANG Ming-yan;LI Ming
..............page:114-117
Design of a Novel FFT Processor for DVB-T System
ZHOU Jia-chong;CHEN Yong-en
..............page:16-19
Component Integration Network Architecture Targeted to Military Grid
ZHANG Chao-kun;SUN Fu-chun;GUO Lin-hong;JIANG Pei-lei
..............page:118-120
Scaling Behavior of Packet Loss with Self-similar Traffic Input
YU Lei;ZHANG Dong-yan;ZHANG Hong-li
..............page:121-124,143
Analysis to Accountability of Optimistic Fair Exchange Protocols
XING Yu-hong;BU Fan-jin
..............page:125-128
Study of a Media Access Method with Determinable Waiting Time
CAO Chun-sheng;ZHANG Wei-dong;LIANG Qing
..............page:3-5
Performance Evaluation between Non-parallel Communication and Parallel Communication
PAN Ke;TANG Zhi-zhong;DU Zhi-hui
..............page:129-133
Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme
WANG Tian-yin;CAI Xiao-qiu;ZHANG Jian-zhong
..............page:147-149
A PSO-based Fuzzy Clustering Algorithm
FENG Zheng;YAN Min;ZHANG Zhi-feng
..............page:150-151,165
Weight Acquisition of Fuzzy Production Rules Based on Minimum Entropy Principle
XI Ya-hui;AN Su-fang;YANG Feng
..............page:152-154
A Multi-class Classification Algorithm Based on the Proximal Support Vector Machine
WEI Zhong-sheng;MA Shou-feng
..............page:158-161
Extracting Schema from Semistructured Data
MENG De-long;YE Fei-yue;LI Xu-hua
..............page:162-165
Research on Using Unlabeled Data to Improve the Performance of SVM Classifier
ZHU Yu;NIE Feng-guang;GUO Li
..............page:166-167,170
The Interestingness Measure and its Application in Learning Guidance System
QU Shou-ning;XU De-jun;WU Tong;WANG Qin
..............page:168-170
The Study and Implementation of Remote Diagnosis Based on Mobile Agent Technology
LI Yun-fei;JIANG Xiao-feng
..............page:178-180,218
Ear Recognition Based on PIDC and Binary Tree SVM Classification
ZHANG Wei-wei;XIA Li-min;OUYANG Jun-lin
..............page:181-183,193
A New Feature Extraction Method of Cold Steel Strip Typical Surface Defects
WANG Cheng-ming;YAN Yun-hui;LI Jun;JIAO Zhi-gang
..............page:184-186,190
Facial Expression Recognition Using Embedded HMM
CHEN Qian-qian;ZHAO Jie-yu
..............page:187-190
Application Research of a New Symbolic Approximation Method-SAX in Time Series Mining
LIU Yi;BAO De-pei;YANG Ze-hong;ZHAO Yan-nan;JIA Pei-fa;WANG Jia-qin
..............page:191-193
A Measurement Approach of Leaf Area Based on Digital Image Processing
ZUO Xin;HAN Bin;CHENG Jia-lin
..............page:194-196,221
Remote Sensing Image Compression Based on Support Vector Machines
ZHANG Li-ping;LI Yuan-cheng
..............page:200-202
Application of LCT in Solar Magnetic Field Observation
LIN Jia-ben;DENG Yuan-yong;HU Ke-liang
..............page:203-205
Dynamic Workflow Model in OA System
SUN Yi;WANG Ya-di;HAN Ji-hong;XU Jian
..............page:206-207,211
GIS-Based Parameterized Computer Aided-designing Flight Procedure System
LI Yi;ZHENG Guo-qin
..............page:212-215
Transmission Time-Delay Study for Telerobotics Based on Network
RUI Su-bo;ZENG Qing-jun
..............page:216-218
Multisource Image Fusion for Face Recognition Based on Decision Level
QIU Ya-dan;JING Zhong-liang;CHEN Xue-rong;XIAO Gang
..............page:219-221
Computer Aided Loading System Based on Java3D Technology
LIU Zhi;XU Wei;TAO Shao-guo
..............page:222-225
Service-Oriented Workflow Technology
LIU Xiao-lin;ZHENG You-cai
..............page:226-228
Making and Playback of Video File in a Lidar Simulation
YUE Yu-fang;ZHANG Yu-shuang;TAO Ying-xue
..............page:229-232
Supply Chain Coordination under E-Commerce:A Literature Review
HE Yong;YANG De-li;HUANG Chao;WU Qing-lie
..............page:12-15
A Survey on Theory and Application of Network Calculus
ZHANG Lian-ming;CHEN Zhi-gang;HUANG Guo-sheng
..............page:8-11,173
The Design of Cyclical Redundancy Check Arithmetic Based on Parallel Data Input
YIN Zhen-yu;ZHAO Hai;SUN Pei-gang;LIN Kai;LUO Ding-ding
..............page:1-2,5