Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2007 Issue 13
Convolution morphological filter and images noise removal
DUAN Shan;QIN Qian-qing
..............page:37-40
New method of multiple object tracking under circumstance of occlusion
TIAN Wei;LUO Yu-pin;HUA Cheng-ying
..............page:33-36
Delay constrained Web proxy problem in tree network
YANG Jian-fang;CHEN Guang-ting;HUANG Sun-qin
..............page:140-142
Important email account discovering method based on structure
XIONG Jin;LIU Yue;XU Hong-bo
..............page:143-145
MR image enhancement algorithm based on threshold and B-spline interpolation
CHEN Bei-jing;LI Jun-li;WEI Ping;CHEN Gang
..............page:41-44,51
Process model supporting software evolution-SDDM
ZHAO Na;ZHAO Jin-xin;LI Tong
..............page:61-63,88
Contour tracking method of dynamic tongue using optical flow-snakes model
SONG Kai;CAI Yi-heng;SHEN Lan-sun
..............page:64-66
Iterative algorithm for evaluating criticalvalue of F-test
ZHU Rong;ZHAO Jun;XIONG Wei-qing
..............page:67-69,95
Watermarking scheme based on B-spline multiresolution representation
XU Yu-dong;YAO Zhi-qiang
..............page:70-72
New chain code based on hexagonal grid
ZOU Li-li;TANG Di
..............page:73-75
Software defect tracing system based on orthogonal classification method
PAN Tie-jun;ZHENG Lei-na
..............page:76-79,101
New method for transforming vague sets into fuzzy sets
ZHAO Ya-juan;WANG Hong-xu;REN Bao-dong
..............page:80-82,136
Improvement interacting multiple models algorithm
WANG Jun;WU Cheng-fu;CHEN Huai-min;QIN Wei-hua
..............page:83-85,91
Rapidly constructive method of fuzzy concept lattice with computer actualization
CHEN Ji-hua;LUO Cong-wen;TANG Yun;WEN Yan
..............page:86-88
Novel mixed-strategy evolutionary programming algorithm
SHI Yan;ZHANG Hua-xiang;ZHAO Rui-dong
..............page:89-91
Nonlinear equalization based on least squares support vector machine
ZHANG Jian;PENG Qi-cong;SHAO Tian-ge
..............page:92-95
Genetic algorithm for job shop scheduling based on work piect position crossover
WANG Bao-wen;LI Chun-ting;LIU Wen-yuan;WANG Ya-dong
..............page:96-97,123
Research on general assembly modeling supporting product Lifecycle Engineering Design
YI Jian-jun;LI Cheng-gang;HU Di-qing;DONG Jin-xiang
..............page:98-101
Design scheme of interleaver based on chaotic map
ZHANG He;ZHOU Qiang;MIN Le-quan
..............page:102-104,181
Implementation of variable block-size mostion estimation on FPGA
XIAO Wei-hua;GAO Yi;BI Du-yan
..............page:105-107,119
Research and implementation of Chinese Game(Hua Rongdao)
LI Rui-min;JIANG Chang-jun
..............page:108-110,129
Hardware design and implementation of reconfigurabe cipher card
SUN Wan-zhong;DAI Zi-bin;ZHANG Yong-fu
..............page:111-113,142
Efficient intra-prediction algorithm for H.264 based on information entropy
CHEN Wei-wei;WANG Xuan;MA Jian-feng;HANG Juan;FU Bo;WANG Yi-yan
..............page:114-116
New method of designing threshold in speaker identification based on vector quantization
CHEN Ming-yi;ZHOU Kun-xiang;YU Ling-li
..............page:117-119
Research on prediction model of software reliability based on SVR
MA Sa-sa;FENG Zhe;ZHAO Shou-wei
..............page:120-123
Implementing mechanism for fully parametric design and constraint visual management
ZHAO Qing-song;CHEN Li-ping
..............page:124-126,190
Implementation of new protocol in NS2
LIU Wen-hua
..............page:127-129
New multicast routing algorithm based on immune principle
WANG Jiang-qing;QIN Jun
..............page:130-131,181
Research on hierarchical trust model in grid environment
GAO Cheng-shi;WANG Jian-zheng;SHEN Chang-xiang;LIU Yi
..............page:132-136
Simulative study of satellite network management
LI Jian;GAO Qian;ZHENG Gang
..............page:137-139,142
Intrusion detection research based on outlier detection
LUO Min;YIN Xiao-guang;ZHANG Huan-guo;WANG Li-na
..............page:146-149,152
Structured P2P system exploiting network topology
CHEN Zhi-gang;ZENG Yu-guang;LI Deng
..............page:150-152
Formal specification and verification of andrew secure RPC protocol based on strand spaces model
ZHOU Qing-lei;ZHAO Lin;ZHAO Dong-ming
..............page:153-155,158
Prodiction of disulfide bonding in protein structure based on method of graph matching
SHI Xiao-hong;WANG Yan;ZHANG Kai;LUO Liang;XU Jin
..............page:30-32,75
Computer viruses detection based on ensemble neural network
ZHANG Bo-yun;YIN Jian-ping;ZHANG Ding-xing;HAO Jing-bo;WANG Shu-lin
..............page:26-29
Improved KNN algorithm applied to text categorization
WANG Yu;ZHANG Ming;WANG Zheng-ou;BAI Shi
..............page:159-162,166
Representative samples and linear discriminant analysis
XU Yong;CHI Yan-guang
..............page:163-166
E-cash system based on restrictive proxy blind signature
CAI Xiao-qiu;ZHANG Jian-zhong
..............page:246-248
Research of quantum-inspired multi-objective evolutionary algorithm
TANG Huan-rong;JIANG Hao;ZHENG Jin-hua
..............page:45-48,60
New pattern automated classification method based on SOM combining with GRNN
ZHANG Jun-ben;LI Chao-feng;JU Hong-yun;NIE Bai-sheng
..............page:49-51
Improvements of ART2 neural network based on amplitude component
GU Min;GE Liang-quan
..............page:52-54,72
Novel image encryption scheme based on chaotic system
WANG Peng-fei;FENG Gui
..............page:55-57
Watermarking algorithm robust to geometric distortion based on SIFT feature points
HE Li-ying;LI Zhi-yong;LIU Wei-ling;SUN Xing-ming
..............page:58-60
Progress of research on digital watermarking techniques applied to multimedia
FENG Xue;ZHU Xin-shan;TANG Zhi
..............page:1-6,10
R & D of RFID system for supply chain management
WANG Jun-yu;MIN Hao
..............page:22-25
Research on performance of real-time transaction processing in mobile broadcast environments
LEI Xiang-dong;ZHAO Yue-long;CHEN Song-qiao
..............page:14-17
Bayesian network-based multiple granularity trust model in P2P
GAO Ying;CHENG Tao-yuan
..............page:11-13,21
Approach to tackling semantic conflicts based on ontology
WU Ke-he;MA Ying-long;LIN Peng-cheng;ZHOU Ming-quan;ZHENG Yi
..............page:182-185,202
Spam filtering model research based on advanced Na(i)ve bayes
WANG Tao;QIU Guo-yong;HE Ju-hou
..............page:186-190
Research on data synchronization model under mobile environment
YANG Zhi-he;HU Xu-huai
..............page:191-193,196
On chip realization of speaker-independent isolated word speech recognizer
ZHANG Chen-yan;SUN Cheng-li
..............page:194-196
Application of quotient space theory in yield prediction
CHENG Wei;SHI Yang;ZHANG Yan-ping
..............page:197-199,206
Segmentation of attached tumor in pathological lung
ZHONG Ling;ZHANG Jian-zhou;ZHANG Jiu-long
..............page:217-219
Detection method for face synthetic inage
ZHU Lin;WANG Shi-tong
..............page:224-227,235
Software framework of open control systems for industrial automation
YI Fan;XU Hua;WANG Jia-xin;JIA Pei-fa
..............page:228-232,235
Study and application on shortest path search problem based on ant algorithm
HUANG Gui-ling;GAO Xi-quan;JIN Song-jie;TAN Fei-yang
..............page:233-235
QRS wave detection algorithm based on morphological wavelet
ZHAO Zhi-hua
..............page:236-238,248
Research on data mining method based on data grid carrying on association rules
YANG Yu-qiang;ZHAO Lian-peng
..............page:167-169,190
Improvement of maximal-flow algorithm for discovering Web mass organization
HE Yong-jun;GONG Fa-gen
..............page:170-173
Strategy of supporting complex query in schema heterogeneous P2P network
YU Min;LI Zhan-huai;ZHANG Long-bo
..............page:174-178,196
New fuzzy entropy of vague sets
FAN Ping;LIANG Jia-rong;LI Tian-zhi
..............page:179-181
Discussing spatial data mining of cadastral database based on SQL server
SUN Yuan-jun;ZHENG Xin-qi
..............page:200-202
New pattern recognition method of surface defect images of cold steel strip
WANG Cheng-ming;YAN Yun-hui;HAN Ying-li;LI Jun;WU Yan-ping
..............page:207-209,219
Gasoline sales prediction and sample data design
YANG Qing;HUANG De-xian
..............page:210-213,219
Fabric texture image identification method for CCD-based weft-straightening machine
LI Jia-yan;DING Yong-sheng;ZHANG Zhong-wei;WANG Hong
..............page:214-216,219