Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2007 Issue 1
Modeling principal curve based on B-Spline network
HAO Ji-sheng;HE Qing;SHI Zhong-zhi
..............page:35-37
Face detection based-on gabor filter and support vector machines
LIN Yu-sheng;YANG Jing-yu
..............page:33-34,37
New discernibility matrix and computation of core
XU Feng-sheng
..............page:38-40
Develop Direct Acyclic Graph (DAG) corresponding to serial program
GUO Long;CHEN Hong-zhong;YE Qing
..............page:41-43,46
Mixing compression algorithm of video and audio based on correlation of DCT coefficients
QI Li-feng;CHEN He-xin;ZHAO Yan
..............page:44-46
T-Bézier curves and G1 condition
WANG Liu-qiang;LIU Xu-min
..............page:47-49,60
Fast algorithms for polynomial representations of boolean functions and pseudo-boolean functions
LI Yun-qiang;SUN Huai-bo;WANG Ai-lan
..............page:50-52
New variable learning rate adaptive independent component analysis Algorithm
WU Cheng;LI Hong-wei;WANG Guo-qing
..............page:53-56,82
Model for transforming vague sets into fuzzy sets
Huang Zhi-wei;HE Ming-rui
..............page:57-60
Algorithm design and application research of Josephus problem
CHEN Hai-shan;QIAN Feng;TIAN Ying;LEI Ming
..............page:61-64
Image gauss noise filtering based on PCNN
LI Yong-gang;SHI Mei-hong;WEI Yuan-wang
..............page:65-67,93
Analysis and improvement of montgomery algorithm
LI Ming-jiu
..............page:68-69,78
Selection-based genetic algorithm
QIAO Chao;TANG Hui-jia;WANG Chun-hong
..............page:70-73,89
Study on unspeculation techniques
SUN Wei-xin;ZHAO Rong-cai;SU Ming;QI Ning
..............page:74-78
Efficient motion estimation algorithm based on multi-resolution for H.264
CHEN Chun-yan;WANG Ji-cheng
..............page:83-85,89
Newly steady RFID anti-collision algorithm
YU Song-sen;YUAN Bin;ZHAN Yi-ju
..............page:90-93
Optimization of RBF neural network based on evolvement ideology
WANG Yin-kun;WANG Xue-qi;XIAO Ming-qing;YOU Pei-han
..............page:94-95,124
Memory management unit design for embedded system
ZHU He-fei;LU Chao;ZHOU Xiao-fang;MIN Hao;ZHOU Dian
..............page:96-99
Design of optimization platform using evolutionary algorithm
LIU Hong-xing;ZHAO Ying;ZHU Bo;GAO Dun-tang
..............page:100-103,106
Application of branch-and-bound algorithm in path-finding for the map of game
XU Hong-zhi;LI Ren-fa;YAN Yi-ming
..............page:104-106
Study on optimization of uncertainty of client classification based on fuzzy integral
KONG Zhi-zhou;CAI Zi-xing
..............page:212-214,248
Automatic calibration of paper map by hough transform
LI Xin-peng;CHEN Fu;LIU Jian-bo
..............page:215-216,224
Fault diagnosis feature subset selection using rough set
GUO Xiao-hui;MA Xiao-ping
..............page:221-224
Design of I2C slave device structure and Its VLSI implementation
WANG Gang;YU Yu;ZENG Xiao-yang;FAN Yi-bo;ZHANG Guo-quan;ZHANG Qian-ling
..............page:107-110,114
CTI support multimedia channel for call center
ZHOU Zhen-gang;YANG Xue-liang
..............page:111-114
Creative conception design based on pattern recognition
LI Tong-xi;LIU Hong;GAO Li-li
..............page:115-117
Design and implementation of JTAG controller for Nexperia platform
LI De-sheng;LUO Yu-ping
..............page:118-120,129
Design and implementation of hard disk encryption card based on IP reuse
MIAO Sheng;DAI Guan-zhong;MU De-jun;LI Mei-feng
..............page:121-124
Research of replica selection scheme based on ant algorithm in data grid
SUN Min;SUN Ji-zhou;LI Ming-chu;YU Ce
..............page:145-147,158
Model of emotion agent
HU Jun;SHI Zhong-zhi;WANG Mao-guang;LIN Fen;GUAN Chun
..............page:30-32
Key server based re-keying scheme of IEEE 802.11i
ZHOU Xian-wei;BAI Hao-han;QIN Bo-ping
..............page:148-151
Problem and solution on intranet based on ethernet technology
HUANG Dao-ying;GAN Cheng;LI Xia
..............page:152-154,166
Hierarchical message queue model supporting dynamic load balancing
BAO Chun-jian;WU Jun-min;XU Yin-long;LI Huang-hai;WANG Wen-tao
..............page:155-158
Efficient and secure routing approach for Ad hoc network
YANG Fu-rong;HONG Pei-lin;LI Jin-sheng;XUE Kai-ping
..............page:159-162
Enhancement for non-real time traffic transmission in PCF
SHI Ling-zhi;YANG Shou-bao;SUN Wei-feng
..............page:163-166
Spam behavior recognition based on data mining in session layer
BAI Qiu-ying;ZHANG Xuan;ZHANG Yao-long
..............page:167-169
Rough set and decision tree based incremental rule reduction algorithm
WANG Yang;YAN De-qin;ZHANG Feng-mei
..............page:170-172,180
Semi-supervised clustering based on auxiliary space and maximum entropy
LUO Xiao-qing;WANG Shi-tong
..............page:173-177,188
Novel method for rule extraction in consistent classification problem
ZHANG Xiao-feng;ZHOU Feng-xiang;SONG Li-hua;SUN Yu-juan
..............page:178-180
Design of feature selection library based on strategy-pattern (FSLS)
SHI Jia;SHARDROM Johnson;ZHANG Wu
..............page:181-184,197
Improved algorithm for incremental learning based on rough sets theory
HAN Ye-hong;DAI Ling-xiao
..............page:185-188
Knowledge reduction based on oriented relevance information
YANG Li-xia;WEI Li-li
..............page:189-191
Technique of characteristic-based self-embedded watermark using in audio
FENG Ying;LIN Tu-sheng;TAN Qi-xiang
..............page:192-194,203
Model about real-time multimedia data mining based on multi-level vector distance
GAO Zhi-hao;JIANG Jian-zhong;XIA Lei
..............page:195-197
Range box-based algorithm for optimal blank layout
LI Ai-ping;ZHANG Feng;LIU Xue-mei
..............page:198-200,220
Research on meteorological time series data mining based on quotient space
SHI Yang;ZHANG Yan-ping;ZHAO Shu;ZHANG Ling;TIAN Fu-sheng;WANG Xiao-han
..............page:201-203
Ultrasound image de-noising study based on balanced orthogonal multiwavelet
WANG Xiu-xin;HU Wei-ping
..............page:209-211
Iucident detection algorithm based on wavelet transform and LS-SVM
PEI Rui-ping;LIANG Xin-rong;LIU Zhi-yong
..............page:229-231
Improved expert system for mechanical fault diagnosis based on L-M neural network
PENG Tao;WANG Lu-cai;WU Gui-qing;ZHANG Ying
..............page:232-234
Handwritten chinese character recognition based on fuzzy sub-stroke statistical feature
LIU Wei;ZHU Ning-bo;LI De-xin;HE Hao-zhi;TAN Lun-zheng
..............page:239-241,244
Application of UCC/EAN-128 bar code technology in agricultural product safety traceability system
YANG Xin-ting;SUN Chuan-heng;QIAN Jian-ping;CHEN Li-ping;LIU Xue-xin
..............page:242-244
Design and implementation of general examination system based on COM technique
LI Mei-man;XIA Han-zhu;Yi De-cheng
..............page:245-248
UML metrics for iterative and incremental software process
LI Jin-hua
..............page:125-129
New ID-based strong designated verifier proxy signature scheme
XIANG Xin-yin;WANG Xiao-feng;WANG Shang-ping;LIN Ting-ting;WANG Juan
..............page:130-131,138
Redirect-based routing optimizing method on structured P2P network
YU Jing;WANG Bin-qiang
..............page:132-134
System for attack recognition based on mining fuzzy association rules
ZHU Ke;HU Ke-jin
..............page:135-138
Risk assessment of information security based on BP neural network
ZHAO Dong-mei;LIU Hai-feng;LIU Chen-guang
..............page:139-141
New ID-based blind signature and proxy signature without trusted party
ZHANG Xue-jun;WANG Yu-min
..............page:142-144
Immune algorithm for optimization under changed environments
XU Xue-song;PENG Chun-hua
..............page:27-29,32
Comparison and research on TCP Reno,TCP Vegas,Fast TCP
ZHANG Mu;ZHANG Shun-yi
..............page:19-23
Classification of speech under G-force based on subspace method
LV Cheng-guo;HAN Ji-qing
..............page:16-18
Artificial life and artificial life computation
YU Hai-fei;WANG Ding-wei
..............page:12-15
Study on grid service management model based on OGSA
GUO Li-wen;YANG Yang;ZHAI Zheng-li
..............page:9-11,40
Open remote field upgrade of embedded wireless mobile device
FU Chao;YU Ben-gong
..............page:3-5,15
Design dictionary of chinese word segmentation
ZHAI Wei-bin;ZHOU Zhen-liu;JIANG Zhuo-ming;XU Rong-sheng
..............page:1-2,26