Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2007 Issue 28
Firewall system based on embedded linux OS
WEN Jun-hao;JI Kai;GAO Cun-zhi;HAO Jian-wei
..............page:144-146,152
Research on minimizing key storage of HOFT with communication constraints
DUAN Chang-min;ZHENG Ming-hui
..............page:141-143,209
Kind of CGA based on MAC address
SHI Min-yu;TANG Shu-ke
..............page:4-6,28
Approximation operators based on set-valued mappings in semi-partition approximation space
WU Zheng-jiang;WANG Cui-hong;SUN Shi-bao
..............page:7-9
Simulation of CDMA-CSMA multi-user communication systems in PLC networks
WU Xiao;ZU Yun-xiao;LV Yu-qin
..............page:147-149
Enhanced AODV routing protocol based on energy efficient
WANG Shao-qing;Nie Jing-nan
..............page:150-152
Zoned MANET routing protocol
HE Wen-hua
..............page:153-156
Data dimensionality reduction algorithm when source data is spare
SONG Xin;YE Shi-wei
..............page:181-183,186
Fuzzy partition based Support Vector Machine classifier
YANG Xiao-wei;YAN Li
..............page:187-189,248
New algorithm of face detection and real-time tracking in video sequences
GUO Zhi-bo;YAN Yun-yang;YANG Jing-yu
..............page:190-192,213
Automatic performance evaluation of palmprint recognition
QI Zhen-yu;XU Jing;LI Ji-yi;SHI Guang-shun
..............page:214-216,239
Dynamic soft classifying algorithm of traffic data stream based on cloud model
YU Shao-wei;CAO Kai
..............page:217-219,245
Application of texture synthesis in old photograph completion
ZHU Wei;LI Guo-hui;TU Dan
..............page:220-222
Intelligent map-matching algorithm using Fréchet distance measure based
CAO Kai;TANG Jin-jun;LIU Ru-cheng
..............page:223-226
Underwater target classification based on fuzzy counter propagation network
LIU Bing;SUN Chao;WANG Xu-yan
..............page:227-229
Model and algorithm of reliable path finding under sudden-onset disaster
MIAO Cheng;WU Qi-di;XU Wei-sheng
..............page:1-3,9
Face recognition based on Fourier features selected by GA algorithm
CHEN Mian-shu;CHEN He-xin;SUN Zhong-hua
..............page:10-11,98
Effect of channel mismatch on performance of 2-D MUSIC algorithm
YANG Jian-ting;ZHANG Zhi-jun;ZHANG Hao
..............page:55-57,64
Color multi-focus image fusion method based on dual-tree complex wavelet transform
WANG Ya-jie;LI Dian-qi;XU Xin-he
..............page:12-14,40
Effluent quality prediction of wastewater treatment plant based on wavelet neural networks
ZHU Qi-bing;HUANG Min;CUI Bao-tong
..............page:15-17,33
Algorithm for mining association rules based concept lattice
WANG Su-jing;CHEN Zhen
..............page:157-161
Multi-space FCM algorithm
JIN Ping;ZONG Yu;JIANG He;ZHANG Xian-chao;LI Ming-chu
..............page:162-165
Cluster algorithm based on parallel particle swarm optimizer using adaptive inertia weight
LIAO Zi-zhen;LUO Ke;ZHOU Fei-hong;FU Ping
..............page:166-168
Efficient index for XML full text queries
HAN Zhong-ming;MO Qian
..............page:169-172
Modified attribute significance and quick reduction algorithm for decision table
HUANG Guo-shun;LIU Yun-sheng
..............page:173-176
Study on duplicated removal algorithm web pages based on elements of news subject
WANG Peng;ZHANG Yong-kui;ZHANG Yan;LIU Rui
..............page:177-180
Improved adaptive fuzzy kalman filter algorithm
ZHANG Chi-ping;LIU Zong-yao
..............page:25-28
Symbol LU decomposition method of large scale sparse linear equations
ZHANG Yong-jie;SUN Qin
..............page:29-30,72
Approach of intelligent data analysis for X-ray sign
WU Da-yue;XIE Fu-ding
..............page:193-195
Researching model of weather radar system based on grid computing and 3S
ZHAN Shao-bin;ZHOU Yun-xuan;CHENG Bin;CHUAI Yuan-yuan;WANG Zi-jun
..............page:196-198,232
Research on modeling method of complicated information system based-on axiomatic design
YANG Bin;XIAO Ren-bin;CAI Zheng-ying
..............page:199-202,236
Gearbox fault diagnosis based on wavelet neural network
WANG Lu-cai;PENG Tao;ZHANG Ying
..............page:203-205,226
Image registration algorithm in PC-based real-time US-EFOV system
SHAO Bin;TANG Ping;ZENG Qing-ye;ZHANG Song-gen;YAO Ke-chun
..............page:206-209
Remote sensing image registration based on fitted straight lines of edges
YANG Xin;TANG Jin-hui;NIU Zong-biao;WU Xiu-qing
..............page:34-36
Immune good-point set genetic algorithm
LI Zhi-jun;CHENG Jia-xing
..............page:37-40
New filter algorithm based on extreme value and orientation
DOU Yan;KONG Ling-fu
..............page:41-43
Freeway incident detection based on Adaboost method
ZHANG Liang-chun;XIA Li-min
..............page:230-232
Study of dynamic knowledge bases and concept lattices applied to intelligence disease diagnosis
LIU Ling;ZHANG Yong;LI Ming;YANG De-san
..............page:233-236
Water-bloom short-time predicting system of Beijing based on neural network
LIU Zai-wen;YANG Bin;HUANG Zhen-fang;ZHANG Yan
..............page:243-245
FLUENT and its application in parallel computing of aircraft flow field
XIE Jiang;MAO Guo-yong;ZHANG Wu
..............page:246-248
Color texture segmentation algorithm using quaternion-gabor filters
MA Yu;WANG Xiao-hui
..............page:51-54,156
Improved algorithm based on quantum-behaved particle swarm optimization
KONG Qing-qin;SUN Jun;XU Wen-bo
..............page:58-60
Algorithm identifying mutations and post-translational modification of protein
XIE Jing-yu;XIE Shen-quan
..............page:61-64
Efficient conversion of non-manifold vertex to a manifold
SUN Mo-zhou;FEI Yao-ping
..............page:65-69
Algorithm of image segmentaion with multi structures based on mathematic morphology
LIANG Guang-ming;SUN Ji-xiang
..............page:70-72
Method for recognizing colored target based on improved SSDA
SUN Li-gong;RAO Wen-bi;YAN Bao-ding
..............page:73-74,102
Evolutionary algorithms of TSP based on monomer operators
LIU Hong-bing;XIONG Sheng-wu
..............page:75-77
SINR and bandwidth-based call admission control in WiMAX network
SHI Dai;LIU Fu-qiang;XU Shang-zhi
..............page:138-140
Dynamic general secret sharing scheme
ZHAO Rong;DAI Fang;ZHAO Feng-qun;ZHAO Jian-jie
..............page:125-126,180
New verifiable protocol for member expansion in secret sharing schemes
WANG Feng;ZHANG Jian-zhong
..............page:122-124,149
Spam filtering method based on cognition learning
ZHOU Xiao;SHUAI Jian-mei
..............page:118-121
Mobile network performance evaluation based on support vector machines
WANG Jun;YU Yan-hua;SONG Jun-de
..............page:115-117
LASF:flow management and scheduling policy in stateful packet inspection systems
ZHANG Yan-jun;ZHANG Zhi-bin;GUO Li;FANG Bin-xing
..............page:111-114,176
FPGA implementation of Fast Phong shader
LIU Dong-zhi;GUO Li
..............page:107-110
Study of execution mechanism of service proxy in Web composite service execution engine
YUAN Xiao-juan;GAO Chun-ming
..............page:103-106
CAVLD architecture basing on fast algorithm
HE Jun;TIAN Ying-hong;ZHOU Yang;HONG Zhi-Liang
..............page:99-102
Ralization of coding for CNC program based on embedde-rtos
XU Ai-fen;WANG Tai-yong;WANG Tao;ZHAO Li
..............page:95-98
Fault detection algorithm of mutation search in non-self space
ZHANG Qing-hua;QIAN Yu;XU Bu-gong;GAO Ting-yu;XIE Ke-ming
..............page:92-94,106
Image features selection based on genetic algorithm
CHEN Wei-dong;LIU Su-hua
..............page:78-80
Ant colony algorithms with hybrid chaos searching
JIN Yan;ZHAO Yao
..............page:81-83
Fractal image compression algorithm base on broad mandelbrot collection
LI Peng;ZHAO De-ping;NIU Zhi-cheng;WEI Ming;PENG Peng
..............page:84-85,110
Reduction theory of covering approximation space
HU Jun;ZHANG Min
..............page:86-88
Design and implementation of new vector heuristic information for MKP
WANG Jie-xin;LV Qiang;QIAN Pei-de
..............page:89-91
Security analysis and improvement of two proxy sgnature schemes
SHI Rong-hua;WANG Qiu-guo;XU Lei
..............page:127-130
Mobile nodes fault location in tactical network
WEI Xiang-he;LI Qian-mu;ZHANG Hong
..............page:134-137,161