Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2007 Issue 34
Adaptive update-lifting wavelet and its applications using gradient
ZHOU Jian-ping;ZHENG Ying-ping
..............page:226-228
Chess-board recognition based on vision
DU Jun-li;ZHANG Jing-fei;HUANG Xin-han
..............page:220-222,232
Adaptive OFDM system based on embedded constellations
WANG Yong-xue;YE Li-bing
..............page:159-161
Proactive secure multisecret sharing threshold scheme
ZHANG Yan-yan
..............page:156-158,179
Research on routing strategies of satellite communication networks based on GEO/LEO constellations
WANG Ying;HU Xiu-lin;HU Wei-sheng;ZENG Yu-jiang
..............page:153-155,195
Computationally efficient multi-modulus blind equalization algorithms
LIU Feng;GE Lin-dong
..............page:150-152
Adaptive choking algorithm in BitTorrent system
LIU Yong-wei;WANG Dong;HUANG Kun;ZHANG Da-fang
..............page:122-124
Design and implementation of hierarchical mobile IPv6 authentication based on NAI
CHEN Hao;ZHOU Hua-chun;QIN Ya-juan;ZHANG Si-dong
..............page:125-128
Process modeling and simulation on multisensor image fusion
ZHANG Qiang;WANG Jiong-qi;ZHOU Hai-yin
..............page:32-34,77
Trust model based on entity behaviors in grid
LIU Li-ping;CHEN Zhi-gang
..............page:29-31
Study on flexible KNN algorithm
ZHANG Yun-liang;ZHANG Quan
..............page:25-28
Research on domain name service infrastructure security
LI Xiao-dong;MAO Wei;YAN Bao-ping
..............page:22-24
Design and simulation for location detection algorithm preventing wormhole attack in MANET
LIU Nan;YANG Sen;CHAI Qiao-lin;WANG Xiang-hui
..............page:119-121,135
Research of automatic wrapper generation method based on suffix tree
LI Yong-li;ZHANG Yu-liang
..............page:114-118
Digital audio fingerprinting algorithm based on echo hiding
FU De-sheng;ZHANG Xue-mei
..............page:111-113
Multiple digital watermarking algorithm based on integer wavelet matrix norm quantization
LIU Xin;WANG Ying;YANG Guo-wei
..............page:108-110
Analysis of resource leveling problem with activity break
GUO Hai-bin;ZHENG Pi-e
..............page:207-212
Distinguishing between left and right finger movement from EEG using SVM
TANG Yan;TANG Jing-tian
..............page:204-206,232
Face recognition method based on 2DPCA and RBF neutral network
BAI Xue-fei;LI Ru
..............page:200-203
Research on crawling Hidden Web based on heuristic query selection algorithm
YAO Quan-zhu;YANG Zeng-hui;ZHANG Nan;TIAN Yuan
..............page:174-176,203
Novel IEEE 802.11 adaptive multirate MAC protocol——implementation and performance measurement
JIANG Bo;XI Yong;WEI Ji-bo;WANG Li-jie
..............page:171-173,184
High-performance string matching algorithm for large scale string set
LI Xue;XUE Yi-bo;WANG Chun-lu
..............page:168-170,212
Research on model of combining multiple neural networks by fuzzy integral
FU Yue;AN Su-fang;CHAI Bian-fang;HU Ji-chao
..............page:165-167
Detection algorithm of audio steganography based on wavelet packet statistics
SONG Kun;YANG Xiao-yuan;LIU Jia;PAN Feng
..............page:162-164
Reduction algorithm for information systems based on knowledge partition granularity
FENG Qin-rong;MIAO Duo-qian;CHENG Yi
..............page:19-21,24
Improvement of automatic acquisition of translation template based on sentence pairs comparison
FANG Miao;GUAN Xiao-wei;GAO Qing-shi
..............page:16-18,28
Improved DV-Hop localization algorithm of sensor networks
JIANG Shan;LI Jian-bo
..............page:141-143,203
Applying IPSec in overlay routing using technology of SPINAT
SUN Ning;ZHANG Xing-ming;ZHU Ke
..............page:129-131,135
Research on trail algorithm of security audit based on genetic algorithm
ZHAO Cheng-ming;YANG Shu-tang;LU Song-nian
..............page:132-135
Proxy digital signature algorithms of e-learning system
WANG Yun
..............page:136-137,152
Fine-grained role-based access control model
LIAO Jun-guo;HONG Fan;XIAO Hai-jun;ZHANG Zhao-li
..............page:138-140,191
Fuzzy-adaptive control law design for lateral model of a helicopter
LU Jing-chao;ZHANG Jia-ming
..............page:236-238,242
Bottleneck expanding problem with quickest path model
CHEN Guang-ting;LIU Zhou;ZHANG Yue
..............page:46-48
Mixed simplification algorithm of point clouds
DU Xiao-hui;YIN Bao-cai;KONG De-hui
..............page:43-45
Predict protein structural classes based on GM (1,1) modeling
LIN Wei-zhong;XIAO Xuan
..............page:41-42,45
Optimization of deblocking filter for H.264/AVC based on pre-judging BS
GAO Yuan;HU Rui-min;CHEN Hao
..............page:38-40
Adaptive super-resolution restoration method based on MAP
WANG Wei;PENG Guo-hua;ZHAO Cong
..............page:35-37,40
Real-time & high accuracy TDOA estimation method for tracking fast moving target
WANG Li-xin;LIN Xiao-yan;WU Tao
..............page:239-242
Visually-guided autonomous helicopter landing on deck
WULAN Ba-gen;HU Ji-zhong;XU Yuan-ming
..............page:243-245
Cancer classification for microarray gene data based on SVM
MENG Fan-jing;LIU Yi-hui;WANG Hong-guo;CHENG Jin-yong
..............page:246-248
ACF-based digital image watermark algorithm in wavelet domain
ZHOU Wei;ZHENG Jin-hua;XU Hai-xia
..............page:105-107,118
EPS design and realization based on fuzzy control strategy
XIONG Jian-qiao;TANG Xiao-qi;CHEN Ji-hong
..............page:101-104
Region determination protocol for increasing stealthiness of watermarking algorithm
SUN Su-jing;GUAN Hui-sheng;WANG Da-qing;WANG Yan-yan;DU Jia
..............page:98-100
Research and improvement of basic algorithm over terrain analysis
JIANG Qiu-wei
..............page:95-97,104
Research on algorithm of protein surface simulation
WANG Chi-she;CHENG Jia-xing;SONG Jie;SU Shou-bao
..............page:92-94
Fair group blind signature scheme
HE Ye-feng
..............page:13-15
Color-based SIFT feature point detection and matching
GAO Jian;HUANG Xin-han;PENG Gang;WANG Min;WU Zu-yu
..............page:10-12,15
Grid management system and evaluation model for Multi-Qos
CUI Zhen-dong;WANG Xi-cheng
..............page:7-9,51
New kind of secrecy/integrity union policy
ZHOU Zheng;LIU Yi;SHEN Chang-xiang
..............page:1-2,54
Fuzzy control and synchronization for fractional-order hyperchaotic systems
LIU Jian-chen;TAN Wen
..............page:196-199
Web based user scalable interest model
WANG Wen-xing
..............page:188-191
Algorithm for vector data compression based on GA
CHEN Fei-xiang;YU Wen-yang;LI Hua
..............page:185-187
Dynamic version vector maintenance algorithm in mobile computing environment
ZHANG Xiao-dan;HE Rui;NIU Jian-wei
..............page:180-184
Study on weighted class-incremental learning algorithm for support vector machines
QIN Yu-ping;LI Xiang-na;WANG Xiu-kun;WANG Chun-Li
..............page:177-179
Optimal quaternary self-orthogonal code chains of short code length
WANG Lei;FENG You-qian;LI Yi-qun
..............page:88-91
Texture synthesis based on neighboring triangulated surfaces
SHU Heng;GU Yao-lin
..............page:85-87,91
New local descriptor extracting and matching approach
WANG Shi-jun;YANG Shu-yuan
..............page:78-80
Unsupervised texture segmentation algorithm based on wavelet transform
HOU Yan-li;YANG Guo-sheng
..............page:74-77
Image restoration based on feature directions method
LIU Xiao-yan;FENG Xiang-chu
..............page:71-73
Minimization of Lattice-valued fuzzy finite automata
FENG Zhen-ling
..............page:65-70
Particle filter based maneuvering target tracking
WANG Ya-li;LIN Jia-jun
..............page:61-64,80
Adaptive and real-time voice activity detection method on G.729
LIU Si-wei;LV Hai-bo;MU De-jun
..............page:57-60
Speech endpoint detection method based on signal subspace and information complexity
TAN Qiao-lai;QIAN Sheng-you;CHEN Ya-qi
..............page:55-56,60
Manifold learning algorithm based on weighted landmark points
GU Rui-jun;YE Bin;XU Wen-bo
..............page:52-54
Image encryption method based on three-dimension chaotic system
ZHANG Xue-feng;FAN Jiu-lun
..............page:49-51