Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2007 Issue 9
Motion detection with uniform mixture model
ZHANG Hai-qing;LI Hou-qiang
..............page:28-30,52
Image searching using multilevel indexes
YANG Xiao-dong;TAO Qing-chuan;LUO Dai-sheng;WANG Yu;ZHANG Wei;ZHANG Jia-xiang
..............page:25-27
Random research of the SHA-256 output sequence
LI Bo;LIU Ping;WANG Zhang-yi
..............page:142-144,156
Scheme of multipath routing based on lifetime-forecast in mobile Ad hoc networks
TANG Yan-fen;WANG Dong;MENG Fan-fan
..............page:145-147
Research on ontology-driven semantic Web services dynamic composition
LI Ying-jie;WANG Li;YU Xue-li
..............page:31-35
Progress in audio-visual conversion algorithms in facial animation
ZHOU Dong-sheng;ZHANG Qiang;WEI Xiao-peng
..............page:36-39
Application of canny operator in image scrambling degree evaluation
SUN Qiu-yan;LEI Zhong-kui;NING Xuan-xi;NING Angeliaka
..............page:40-44
Study on image accurate geometric correction
MA Guang-bin;ZHANG Wen-yi;CHEN Fu
..............page:45-48
Extended image encryption algorithm
ZHANG Xue-feng;FAN Jiu-lun
..............page:49-52
Semi-fragile watermarking algorithm in dual transform domains
ZHANG Xian-hai;YANG Yong-tian
..............page:59-62
Generalized parametric P-ordered slant transforms with applications
ZHENG Qiong;SHI Bao-chang
..............page:63-65
Parallel algorithm for solving periodical block-tridiagonal linear equations
XIAO Man-yu;LV Quan-yi;WANG Bao;OUYANG Jie
..............page:69-71,75
Trends in 1/f noise:effect and remedies
TIAN Ze;XIE Duan;ZHAO Jian;HAN Jun-gang
..............page:72-75
Parameter model motion estimation using statistical learning theory
FENG Yun;FANG Zong-de;JIN Sheng-yi
..............page:76-77,80
Key points-based interpolation method for slice contour
JIA Chao;HAN Zhi-gang;CHEN Su-jun
..............page:78-80
Random Niched Pareto Genetic Algorithm for solving multi-objective optimization problem
LEI Xiu-juan;SHI Zhong-ke;WANG Lai-jun
..............page:81-83,87
New algorithm of blind sparse source separation
FU Yu-li;XIE Sheng-li;HE Zhao-shui
..............page:84-87
Several pathways to implement product design reuse for small and medium-sized enterprises
WANG Yi-shou;TENG Hong-fei;JIN Bo;QU Fu-zheng
..............page:88-91,135
Research and implementation of white-box testing framework for object-oriented program
LIU Yong-po;ZHAO Chang-hai;JIANG Zi-bin;JIN Mao-zhong;SONG Hua-jun
..............page:92-94
Design and implementation of risk assessment tool
SUN Peng-peng;ZHANG Yu-qing;HAN Zhen
..............page:95-98,135
Adaptive binary-volume pyramid-based volume-rendering algorithm for quickly generating image
HONG Qi;ZHANG Shu-sheng;LIU Xue-mei;WU Xin-zhong;YANG Min
..............page:99-100,173
Code-generation-supported design approach for multi-device user interfaces
GAO Huai-jin;HOU Jin-kui;SHI Bing;LI Xiao-long
..............page:101-103
Real-time processing with multi-processor applied to beamspace MUSIC
YAN Zhen-hua;HUANG Jian-guo;ZHANG Qun-fei;ZHANG Yong-feng
..............page:104-106,135
Design of portable navigation system based on FPGA
NIE Ze-dong;FANG Kang-ling;XU Xin
..............page:107-109
Realization of automated testing on USB interface software
ZHANG Hua;DENG Zhong-min;LU Kai-suo
..............page:110-113,214
Genetic Algorithm for degree-constrained QoS multicast routing
MA Xuan;SUN Li-min;ZHANG Ya-long
..............page:114-116,120
Application study of threshold DSA signature scheme in P2P setting
GAO Feng;LI Li-juan;YUE Guang-xue;XIE Wei-wei
..............page:117-120
Movement scenario influences routing protocol simulation in NS-2
ZHANG Wen-bin;ZHANG Zhong-zhao;SHA Xue-jun
..............page:121-124
Network performance study for mobile node in IEEE 802.15.4
ZHANG Yu;HUANG Liu-sheng
..............page:125-130,183
Design and implementation of anomaly detecting engine for inter-domain routing system
WANG Xiao-qiang;ZHU Pei-dong;DENG Wen-ping;ZHAO Jian-qiang
..............page:131-135
Learning of continuous Bayesian networks structure from data set based on forecasting ability
DONG Li-yan;YUAN Sen-miao;LIU Guang-yuan;LI Yong-li
..............page:23-24,48
Risk evaluation in bidding for software projects based on life cycle theory
DONG Tie-niu;YANG Nai-ding;YAN Peng-yu;JIANG Ji-jiao
..............page:18-22
New adaptive Lee image enhancement algorithm
WANG Bao-ping;XIN Yun-hong;ZHANG Lin-xi;LIANG Hua-qiang;ZHANG Yan-ning
..............page:11-13,22
Study of cellular automata model based on SIMG
WEI Shuang-feng;LI Jing-liang;SHAO Zhen-feng
..............page:4-7,35
Investigation and implementation of real-time transportation protocol for wireless sensor network
TONG Hong-liang;ZHU Pei-dong;MAO Yu-gang
..............page:136-138,226
Packet loss rate estimation algorithm based on one trip time
MENG Fan-fan;WANG Dong;TANG Yan-fen
..............page:139-141,180
Physical topology discovery algorithm based on STP
SHI Mei;LI Xiang-he
..............page:148-150,204
Security improved threshold group-signature schemes with privilege subsets
WANG Ze-cheng;SI Tao-zhi;LI Zhi-bin
..............page:151-153,248
Prediction of Churn of customers with Data Mining method
HU Guang-yuan;YUAN Sen-miao;DONG Li-yan
..............page:154-156
Multiple factor fitting based on GEP
LUO Yu;WANG Rui
..............page:157-160
Chinese FAQ system based on sentence similarity
YE Zheng;LIN Hong-fei;YANG Zhi-hao
..............page:161-163,248
Solution to data integration based on Pub/Sub system
WANG Yang;LI Ai-ping;MIAO Jia-jia;ZOU Peng
..............page:164-166,177
Concept similarity calculating during the process of Ontology mapping
XU De-zhi;XIAO Wen-fang;WANG Huai-min
..............page:167-169
Fast updating frequent itemsets based on classifying incremental transactions
CAI Jin;XUE Yong-sheng;ZHANG Dong-zhan
..............page:170-173
Distributed mining of similarities of outlier patterns
TANG Rui
..............page:174-175,230
Qualitative reasoning for Web classification
WANG Tian-jiang;KONG Hua-wu
..............page:176-177
Algorithm for attribute reduction based on discernibility matrix
HU Yu;LI Zhi-ling;LI Chun-wei
..............page:178-180
Improved algorithm for fingerprint enhancement based on Gaussian filtering and reliability discriminant
WANG Zhan-qing;ZHANG Xue-feng;DU Si-si;ZHANG Gui-lin
..............page:181-183
Application of Support Vector Machine to noninvasive diagnosis of colonic motility
ZHANG Wen-qiang;YAN Guo-zheng;YU Lian-zhi
..............page:184-185,230
Study on high speed real-time serial communication bus for motion control
WU Hong-en;ZHANG Cheng-rui;HU Tian-liang;WANG Bao-ren
..............page:186-188,214
Application of volunteer computing model in power flow computation
XU Sheng-chao;FANG Hua-liang;CAO Fang
..............page:189-192
Architecture for network security operation management based on ITIL
LIU Hai-feng;LIAN Yi-feng
..............page:193-197
Eye detection based on red-eye effect
CHEN Chun-bo;WANG Yuan-qing
..............page:198-200,222
Development and application of large-scale transport vehicle and cargo monitoring system
YANG Yang;ZHENG Si-fa;CAO Jian-dong;LI Bing;LIAN Xiao-min;LI Ke-qiang
..............page:201-204
Efficient algorithm for shortest-path searching in ITS
YE Qing;CHEN Hong-zhong
..............page:205-207
Embedded power lithium-ion battery management system used on fuel cell hybrid vehicle
DAI Hai-feng;SUN Ze-chang;WEI Xue-zhe
..............page:208-210,230
Design and implementation of semantic analysis interactive knowledge system
LI Lei;LI Ye;WANG Jin-lin
..............page:215-218
Cost-effectiveness analysis for material based on DEA
LIAO Wu;CHEN Yun-xiang;MENG Biao
..............page:219-222
Research and implementation of the manufacturing resource-sharing technology
JU Wen-jun;SUN Lin-fu
..............page:223-226
Face recognition using regularized Kernel Direct Discriminant analysis Algorithms
SHI Cao;XU Can-hui;YANG Jia-hong
..............page:227-230
Leaf reconstructing combining L-system and synthetic image
LI Yun-feng;WANG Cheng-liang;CAO Yu-kun;HE Xi-ping
..............page:231-233,236
Cigarettes tar content estimation based on Support Vector Machine
WANG Qiang;CHEN Ying-wu;LI Meng-jun
..............page:234-236
Electronic seal system based on Web Service
XU Zhong;CAO Li;DAI Guan-zhong
..............page:237-241
Application of radio frequency identification technology for handling process of EMS post bag
WANG Zhi-gang;CHEN Liang-an;WU Zheng-da
..............page:242-248