Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2007 Issue 15
Novel hybrid GA based on position displacement idea of PSO and its application
MIAO Rong;YAN Wei;LI Shu-rong
..............page:37-40,68
Niche Particle Swarm Optimization algorithm
XIANG Chang-cheng;HUANG Xi-yue;YANG Zu-yuan;YANG Xin
..............page:41-43
SVM based on improvement Particle Swarm Optimization Algorithm
ZHOU Tao;ZHANG Yan-ning;YUAN He-jin;DENG Fang-an;LU Hui-ling
..............page:44-46
Steganographic method based on fuzzy classification
LI Qing-zhong;SUN Sheng-bin;ZHU Dong-sheng
..............page:47-49
Study on collaborative semantic feature modeling
SUN Li-quan;GAO Xue-yao
..............page:50-52,192
End to end improvement of TCP Vegas over Mobile Ad Hoc Networks
WANG Yu-liang;ZHENG Chang-wen;ZHANG Yang
..............page:105-107,127
Self-similarity research of complex networks based on information dimension
TAO Shao-hua;LIU Yu-hua;XU Kai-hua;HUANG Hao
..............page:108-110
Firewall rule conflict discovery algorithm
ZHANG Zhao-li;HONG Fan;XIAO Hai-jun
..............page:111-113,117
Entropy weight coefficient based risk evaluation method with BWIP networks
ZHANG Jie;WU Zhen-qiang;HUO Cheng-yi;JIAN Xiao-chun
..............page:114-117
Timing synchronization algorithm for OFDM system based on curve fitting
YAO Zhi-qiang;YIN Jun-xun
..............page:118-120,124
Performance analysis and comparison of shared bus and NoC on chip communication architecture
ZHOU Wen-biao;ZHANG Yan;MAO Zhi-gang
..............page:121-124
Call blocking performance study of M/P/C/K queuing system
FU Tao;LIN Feng;HUANG Sheng-ye;YE Wu;FENG Sui-li
..............page:125-127
Improved pattern matching algorithm based on WM
YUAN Shi-zhong;CAO Min;WANG Yan-yan
..............page:128-130,143
Searching trust path model based on ant colony algorithm
GAO Cheng-shi;WANG Jian-zheng;ZHANG Dong
..............page:131-133
Test and study of FC network performance
XU Ya-jun;ZHANG Xiao-lin;GUO Cai-jian;XIONG Hua-gang
..............page:137-139
New DTW algorithm based on segment cutting in parallel
AN Zhen-zhou;YANG Jian;WANG Hong;YU Yin
..............page:35-36,88
Method to identify random characteristic of chaotic attractors
FENG Ming-ku;XUE Ying-xiao
..............page:56-58
Comparison and research over genetic selection operators
YANG Ping;ZHENG Jin-hua
..............page:59-62,65
Post-processing algorithm for DCT-coded image based on human visual system
SHI Min;YI Qing-ming;LIU Jin-mei
..............page:63-65
Application of complexity method in extending depth of field of image
XIANG Jian;FAN Ying-le;PANG Quan
..............page:66-68
Analysis of firmware volume format based on framework
CHEN Mei;ZHOU Zhen-liu;XU Rong-sheng
..............page:86-88
Virtual scene walkthrough technology and implementation of system
GONG Yong;PU Xiao-qiong;ZHANG Xiang
..............page:89-91
Geometry culling in 3D graphics system
HU Guo-zan;CHEN Xian-qiao
..............page:92-94
Loosely coupled and reusable MVC model Web paging design
HE Ling-juan;YI Long;LIU Lian-chen
..............page:95-97
Algorithm of object serialization based on JSON
ZHANG Tao;HUANG Qiang;MAO Lei-ya;GAO Xing
..............page:98-100,133
Research & design of IDP NC code compiler
TANG Qiang-ping;XUE Xiao-ping;QIN Guo-rong;XUE Zhong-qiu
..............page:101-104
Application of multiwavelet filter in medical image fusion
WANG Xiu-xin;HU Wei-ping;LI Yong-jun
..............page:198-200,214
Host-based intrusion detection based on support vector approach and keystroke sequences
LIU Zhi-cai;PENG Hong;DENG Shuang;ZHAO Yu-gao
..............page:140-143
Blind parameters extraction of frequency-hopping signals based on reassignment SPWVD
ZHANG Xi;DU Xing-min;ZHU Li-ya
..............page:144-147
Performance analysis on NPU-based application with monotonous load
XIE Kang-min;ZHAO Rong-cai;SHAN Zheng
..............page:148-150,172
Estimation of duplicate routing for WSN based on minimum hop count routing
ZHENG Ming-cai;ZHANG Da-fang;ZHAO Xiao-chao
..............page:151-156
Segmentation of point cloud based on Adaptive Fuzzy c-Elliptotype clustering
LIU Xue-mei;ZHUANG Jin-lin;ZHANG Shu-sheng;LI Bing-sheng
..............page:33-34,82
Research on anti-collision algorithm in Radio Frequency Identification system
JIANG Li-fen;LU Gui-zhang;XIN Yun-wei
..............page:29-32
Research on resource-constrained project scheduling based on proving particle swarm algorithm
SHAN Mi-yuan;WU Juan;WU Liang-hong;LIU Qiong
..............page:26-28,104
Formal analysis of EAP-AKA protocol based on authentication tests
WANG Peng;LI Xie-hua;LU Song-nian
..............page:157-159
Usage and research of GeoTIFF on MGIS
JIANG Qiu-wei
..............page:201-204,220
Formal models of threat and its evaluation in argumentation-based negotiation of Agent
WU Jing-hua;JIANG Guo-rui;HUANG Ti-yun
..............page:205-207,211
Pricing in marketplaces by multiagent learning
HAN Wei;WANG Yun;LV Jie
..............page:208-211
Off-line handwritten amount Chinese characters recognition based on multiple classifiers combination
YU Ying;YANG Yang;DONG Cai-lin;HE Xiu-ling;CHEN Zeng-zhao
..............page:212-214
Fast search algorithm of adaptive code-book for speech coding
WANG Yan;HUANG Jian-guo;LI Fan
..............page:69-71,94
Research of profit-sharing reinforcement learning method based on semi-autonomous agent
YANG Ke-wei;ZHANG Shao-ding;CEN Kai-hui;TAN Yue-jin
..............page:72-75,97
Improvement of deblocking filter in scalable video coding for low bit-rate coding
LIU A-jun;TAN Yi-hua;TIAN Jin-wen;LIU Jian
..............page:76-78
Design and implementation of CAN device driver under embedded ARM Linux operating system
WANG Yan-tang;LI Yi-bin;SONG Rui
..............page:79-82
Design of general simulation test platform for embedded system software
SHEN Yong-qing;XU Zhong-wei
..............page:83-85
WSDM algorithm in archaeological digital museum
MA Xiao-na;ZHANG Jian;WANG Lin
..............page:215-217,245
Skin-color model in view of luminance
HUA Ji-zhao;GUO Zhi-bo;CHEN Cai-kou;YANG Jing-yu
..............page:218-220
New algorithm of paper checking based on BP neural networks
LIU Zhe;WANG Yue-zong;YANG Jian-kun;LI De-sheng
..............page:221-223,242
Gradient based weighted averaging algorithm for compution of fingerprint directional image
FU Jia;PAN Wei;WEI Jun;HAO Chong-yang
..............page:224-226
Freeway incident detection based on probabilistic neural network
LIANG Xin-rong;PEI Rui-ping;YI Shao-qin
..............page:227-229
Method of publishing relational data as XML document
YAO Quan-zhu;ZHAO Peng-fei
..............page:160-162,175
Research on on-line analysis of variances over data streams
WANG Xiao-long;MA Rui-min
..............page:180-183
Study on modular idea in tools rapid preparation and its application
ZHANG Guang-feng;HE Wei-ping;ZHANG Wei;DONG Rong
..............page:188-192
Parameter optimization based on GA for camera calibration in stereo vision
GAO Lin-long;HAO Kuang-rong;DING Yong-sheng
..............page:196-197,229
Method to model fruit growth of fruit tree
DENG Qing-qing;ZHU Qing-sheng
..............page:234-237
Study on business process model of separating business rules and process flows
DU Shuan-zhu;CHI Cheng-zhong;ZHAO Hui-juan
..............page:238-242
Method of medical ultrasound image denoising based on PDE
GUO Min;MA Yuan-liang;ZHU Ting
..............page:243-245
Study of networked manufacturing resource Web service encapsulation based on WSRF
JING Hao;ZHANG Jing;LI Jun-huai
..............page:22-25
Detectability of Discrete Event Systems
SHU Shao-long;LIN Feng;HUANG Zhi-qiang
..............page:19-21,226
Research of simulation executing operational goals method
LI Yong-hua;WU Guo-qing
..............page:15-18
SVM based on PSO and its application in traffic flow predication
CAO Cheng-tao;XU Jian-min
..............page:12-14
Expressway dynamic traffic flow modeling using BP neural networks
ZHANG Yu-mei;QU Shi-ru;WEN Kai-ge
..............page:9-11
Application research of BLP in networks isolation system
WU Hai-yan;TAN Cheng-xiang;WANG Hai-hang
..............page:6-8,11
Survey of network vulnerability modeling method
MAO Han-dong;CHEN Feng;ZHANG Wei-ming
..............page:1-5,14
Method of expressing features used for large-scale text classification
HAO Chun-feng;WANG Zhong-min
..............page:170-172
Auto-indexing based on Chinese characters coding on words platform
JIAO Hui;LIU Qian;JIA Hui-bo
..............page:173-175
Data hoarding algorithm based on vector-relation-table
YANG Jing;WANG Qian-ping;HUANG Yi-shan
..............page:176-179