Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 36
Study of Recommendation Models in E-Commerce Recommendation Systems
LIANG Wei;ZHANG Hui-ying
..............page:183-186
Warning System of Industry Economy on ARCH Model
HE Yue;CHEN Chuan;HUANG Zhi
..............page:179-182
Using Statistical Language Modeling for Information Retrieval
ZHAO Zheng-wen;KANG Yao-hong
..............page:158-161
Research of Data Dissemination with Concurrency Control in Mobile Environment
WANG Hong-peng;ZHANG Tie-jun;YANG Xiao-zong
..............page:152-154
Fast Updating Algorithm of Frequent Closed Itemsets
YANG Ping;LI Li-xiang;YANG Ming
..............page:148-151
Wrapper Maintenance Algorithm Based on Page Features for Web-data Extraction
ZHOU Shun-xian;LIN Ya-ping;WANG Lei
..............page:144-147
Untraceability of Wang-Fu Group Signature Scheme
CAO Zheng-jun
..............page:142-143
New Research Method of JSS with Work Piece Delivery Time Limitation
JI Huai-meng;LUO Ke
..............page:187-190,232
Forecasting Model of Traffic Flow Based on ARMA and Wavelet Transform
HUANG Da-rong;SONG Jun;WANG Da-cheng;CAO Jian-qiu;LI Wei
..............page:191-194,224
Algorithm for Detection of Man-made Object in Sonar Image Based on Fractal Theory
TIAN Xiao-dong;LIU Zhong
..............page:195-197,211
Application of GIS Visualization to ERP
CAI Guo-lin;LI Yong-shu;SUN Mei-ling
..............page:198-200
Research and Simulation of LANMAR Protocol in Mobile Ad Hoc Networks
QIN Ze-min;MA Dong-tang;WEI Ji-bo
..............page:139-141,186
Research on Connectivity and Coverage Problem of Wireless Sensor Networks
WANG Xue-qing;YANG Yong-tian
..............page:136-138,186
Threshold Multiple Secret Sharing Scheme
ZHANG Jian-Zhong;RU Xiu-Juan
..............page:134-135
Communication Optimization Based on Accurate Array Data-Flow Analysis Framework
Ren Hua;Zhao Rong-cai;Zhang Ping;Meng Ran
..............page:130-133
Metabolic Network Simulation Environment Based on Web
ZHANG Sheng-rong;LUO Ruo-yu;LIU Qian;LI Yi-xue;LUO Qing-ming
..............page:97-99
Design and Performance Evaluation of Backup Routing Mechanism Based on DSR Routing Protocol
LI Jun;SHU Yan-tai;DOU Zhi-bin;ZHANG Lian-fang
..............page:100-103
Implementation of Mobile IP Independent of Mobile Node
XIE Yun;HAN Guo-qiang
..............page:104-106,113
Performance Comparison of Ad Hoc On-demand Distance Vector Routing Based on Rate of 3G in Mobile Ad Hoc Networks
ZHANG Jie;WANG Han-xing;GAO Sheng-guo;LU Gui-lin
..............page:107-109
P2P Recommendation Algorithm Based on Hebbian Consistency Learning
WANG Zhi-mei;YANG Fan
..............page:110-113
Adaptive Mechanisms to Enhance Internet Connectivity for Mobile Ad Hoc Networks
SHEN Bin;KE Hai-yan;HU Zhong-gong;LI Bo
..............page:114-117,126
Simulation Research on Optimum Payload Length of IEEE 802.11 WLAN
SHI Ling-zhi;YANG Shou-bao;SUN Wei-feng
..............page:118-120,133
Dynamic Probability Detecting to Solve Splitting of Chord
HUANG Yan;ZHOU Xue-hai;LI Xi
..............page:121-123
Anomaly Detection for Privileged Programs with Fuzzy Abnormal Membership
PENG Xin-guang;JIA Ning;WANG Zheng
..............page:124-126
Survey of Unfairness in IEEE 802.11DCF and its Solutions
LINing;XIN Hui-bin;WANG Zhi-ming;CHEN Qiang
..............page:127-129,133
Classification of Polarimetric SAR Image Based on Cameron Decomposition and SVM
WANG Yang;LU Jia-guo;ZHANG Chang-yao
..............page:17-19,22
Color Image Segmentation Based t Mixture Model and Split and Merge EM
WANG Hui-Lan;CHEN Si-bao;LUO Bin
..............page:55-58,62
Confidence Measures Based on Word Lattice for Speech Recognition
FU Yue-wen;CHEN Guo-ping;LIU Hao-jie
..............page:51-54
Application of SPSS Technique in Demonstration Study Data for Statistics and Analysis
WANG Jin-tao;JIANG En-hai;WANG Xiao-guang;ZHAO Xin-ran;YAO Lei
..............page:201-203
Method of Completing Missing Values Based on Support Vector Machine
ZHAO Lei;LI Guo-he;MA Xian-feng
..............page:207-208,215
Rapid Topological Searching-based Intersection Algorithm of Triangulated Networks
YIN Chang-lin;YU Ding-quan
..............page:209-211
Traffic Abnormity Detection Algorithm Base on Vision in ITS
FANG Xiao-ying;HUANG Lin-wei;LIU Fu-qiang
..............page:212-215
Artificial Ant Colony Based on Grayscale Grads Perception on Digital Image Edge Detection
YAN Chen-yang;ZHANG You-peng;XIONG Wei-qing
..............page:23-27
One Direction S-probability Rough Sets
LIU Ji-qin
..............page:20-22
Design of Intelligent I/O Modules Based on SCM and CPLD
LI Bin;XIAO De-yun;ZHANG Zheng-fang
..............page:66-69,75
Fuzzy Scheduling Algorithm of Task with Multiple Characteristic Parameters
DAO Li;LIU Jian-cheng
..............page:63-65,96
Conflict Resolution Algorithm for Authorization Rules of RB-RBAC Model
YU Hai-bo;CHE Hai-yan;LV Wei
..............page:59-62
Best-First Search Algorithm for Solving HP Lattice Model
CHEN Hao;HUANG Wen-qi
..............page:49-50,72
Signal Sparse Decomposition Based on MP with AA
YIN Ming;YIN Zhong-ke;WANG Jian-ying
..............page:47-48,85
Research on Models of Reward in Argumentation-based Negotiation of Agent
WU Jing-hua;JIANG Guo-rui;HUANG Ti-yun
..............page:172-175
Method of Granular Computing in Decision Table
DAI Jin;HU Feng
..............page:167-171
Mining Algorithm for Temporal Association Rules Based on Interest Measure
WU Jia-ying;LI Ping;ZHENG Jin-hua;LI Shao-nian
..............page:165-166,171
Algorithm for Incremental Generation about Effective Decisions
ZHANG Zu-tao;CHEN Shi-lian
..............page:162-164,171
Self-adapted Median Filtering Inspired by Quantum Theory
XIE Ke-fu;LUO An
..............page:11-13
Signal Feature Detection Based on Third Order Cumulant Diagonal Slice
FAN Hong;MENG Qing-feng;ZHANG You-yun;GAO Qiang
..............page:7-8,109
Analyzing Embedded Multitasking System's Performance Using Queuing Theory
CHEN Fu-long;FAN Xiao-ya
..............page:4-6
Solving N-Queens Counting Problem by Using Improved Parallelized Backtracking Algorithm
HAN Yu-nan;LV Ying-hua;HUANG Xiao-hong
..............page:1-3
Optimization of Multi-Purpose Watermarking Algorithm Based on Tabu Search
CHEN Tian-ding;CHEN Ning-ning
..............page:42-46,135
Research for Robust Watermarking Algorithm
SUN Xin-de;WANG Su-li
..............page:38-41
Robust Video Watermarking Algorithm Based on Adaptive Methods
ZHU Zhong-jie;WANG Yu-er;JIANG Gang-yi;LIANG Feng
..............page:35-37,103
Optimization of MPEG4 Encoder Based on TriMedia Processor
TIAN Gang;HU Rui-min;WANG Zhong-yuan;Gao Ge
..............page:78-81
Study of 3D Models' Similarity Assessment Based on UG
LI Rong;WANG Jin-nuo
..............page:86-88,175
Research on Group Key Management Framework for Wireless Sensor Networks
TANG Wen-sheng;ZHANG Bin-lian;WANG Wei;LUO Juan
..............page:89-93
Recovery Technology of Cracked PDF Files
YANG Jin-sheng;LIU Gong-shen;LI Sheng-hong
..............page:76-77,123
Adaptive Notch Filter Based Signal Processor System of Nonuniform Sampling
WANG An-min;CHEN Liang-fu
..............page:73-75
Research on Trusted Computer Based on Portable TPM
JIAN Xiao-xiang;GAO Hong;LIU Wen-huang
..............page:70-72
Adaptive Background Update Algorithm for Bus APC
LI Miao;LIU Wei-ning;SUN Di-hua
..............page:216-218
Time-space Consistency in Web-based Marine Training System
LIU Xiu-wen;XIE Cui;JIN Yi-cheng
..............page:219-221,228
Establishing of Service System Based on Metadata for Digital Town
WANG Shu-dong;LIU Su-hong
..............page:222-224
Using RUP in Protection Device Integrative Coordination System Development
SHI Dong-yuan;DUAN Li;ZHOU Ding;XIEJun
..............page:225-228
Self-adaptive Track Algorithm of Mobile Target Based on Neural Network
Fan Zhi-ming;QU Zhi-yi;ZHANG Li-hong;WEN Xue-fei
..............page:229-232