Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2008 Issue 14
Approach and Dephi programming for attributes discretization and reduction
FAN Min;ZOU Ping;ZHU Xing-dong
..............page:152-154
Improved mining method for association rules based on genetic algorithm
LI Feng-ying;ZHAO Lian-peng;WANG Hong-yu
..............page:155-158,165
Incremental rule-extraction algorithm based on variable precision rough set and search tree
QIU Zhao-lei;WANG Ai-yun;CHEN Chuan-zhen
..............page:163-165
Human skin color model using BP networks
CHEN Zhen;WANG Su-jing;ZHOU Chun-guang;CAO Huan-huan
..............page:166-168
Study on efficient recognition method of large-scale closed graph in 2D
YAN Chun-ping;FAN Hui-xian;YIN Zhen-biao;QIN Bin;LIU Fei
..............page:169-171
Massive volume data organization in geo-science based on relational database
dai wan zuo ; pan zuo ; li jun ; lv guang xian
..............page:145-148
Research of designing Boolean function based on swap sequence PSO
QHN Shen-yi;HUANG Min;JIN Song-he
..............page:42-44
Contour matching based on curvature feature
ZHANG Zhi-gang;ZHOU Shu-cheng;MA Jun;LUO Yang-xia
..............page:57-58
Detection method based on sub-pixel edge locating points' lookup table
LU Li-yan;WANG Ming-quan;LI Zhi-gang;REN Shao-qing
..............page:59-61,171
Fuzzy reasoning Triple Ⅰ method under family of implication operator L-λ-R0-respect to FMP model
KAN Ting;ZHANG Xing-fang;WANG Zuo-zhen
..............page:62-64,99
Comparison and analysis of particle swarm optimization method based on genetic operator
LEI Xiu-juan;SHI Zhong-ke;SUN Gui-qi
..............page:65-66,79
Multi-objective evolutionary algorithm based on similar individuals
WU Jun;ZHENG Jin-hua;WEN Shi-hua
..............page:67-72,84
Rational genetic algorithms-based fuzzy modeling identification
XUE Mei;GONG Yan-hua
..............page:73-75
Training neural networks with PSO for identification of chaotic systems
WU Zheng-long;WANG Qi;LIU Kai-gang
..............page:76-79
Evaluating genes without expression trees construction
LI Chuan;TANG Chang-jie;CHEN Yu;DAI Shu-cheng;QIU Jiang-tao;LUO Qian;ZHU Jun
..............page:80-84
Realization of automated face-mesh linking in GAMBIT based on journal file technique
HUANG Zhang-feng;SUN Chao
..............page:85-87,126
Zero-knowledge proof watermark verification protocols based on RSA
ZHENG Jing;TANG Guang-ming;WANG Jian
..............page:88-90
Asymmetric digital watermarking based on content of image
ZHONG Shao-hui;WANG Zhi-gang
..............page:94-95,126
Finite element stiffness analysis of novel optical dynamic target's structure
LI Bo;WANG Wei-na;TANG Jie
..............page:100-102,121
ID-based signature scheme from bilinear pairings. Computer Engineering and Applications
LI Pei;WANG Tian-qin;PAN Mei-ji
..............page:103-106
Node scheduling algorithm based on coverage and connectivity in Wireless Sensor Networks
ZENG Fan-zi;YANG Dan;SHEN Lian-feng;LUO Juan
..............page:107-110,154
Two secure key exchange protocols
LIU Jie;LI Jian-hua
..............page:111-112,117
Research on QoS auto-adapted negotiation algorithm based on 3G net edge
GONG Long-hui;ZHOU Lian-ying;ZHANG Zhen-bo
..............page:118-121
P2P traffic classification method based on SVM
DENG He;YANG Ai-min;LIU Yong-ding
..............page:122-126
Distributed configuring method for IPSec gateways
TANG Yi;ZHANG Lian-kuan
..............page:127-129,141
Approach to network service availability evaluation in situation analysis
WANG Hui-ying;ZHOU Ning;CHEN Xiu-zhen;LI Jian-hua
..............page:130-133,137
Design and implementation of network intrusion detection system based on data mining
JIA Shi-guo;ZHANG Chang-eheng
..............page:134-137
Dual channel power controlled backoff based on geographic location in Ad Hoc networks
JIANG You-fu;ZHENG Qing-hua;WANG Ting
..............page:138-141
New method for text concept clustering based on GN algorithm
an na ; xie fu ding ; zhang yong ; liu shao hai
..............page:142-144,180
Improved operators to dilate and erode color images based on morphology
YIN Xing-yun;WANG Jun
..............page:172-174,183
Compressing method of monitored video based on ridgelet motion detection
LI Zong-jian;ZENG Li;GUO Yan
..............page:175-177,204
Extension and application of Wiener filtering in image processing
GUO Shui-xia;TANG Yong-jun
..............page:178-180
Parallel segmentation of textured images by using Markov random field
XIE Jian-chun;XIA Yong;ZHAO Rong-chun
..............page:181-183
Adjacent pixels image inpainting based on deviation and edge interpolation
ZHOU Chun-xia;WU Xi-sheng
..............page:184-186
Image restoration new model based on PDE
JIANG Wei;HU Xue-gang
..............page:187-189,218
Medical image segmentation algorithm based on Chan-Vese model
ZHI Zhan-jiang;SONG Jin-ping
..............page:190-194
Morphology medical image filtering based on genetic algorithm
ZHAO Yu-qian;LI Gui-yuan;HUANG Zhong-chao
..............page:195-197,201
Vehicle license plate location and segmentation in LPR system
ZHU Jun-mei;CHEN Shao-ping
..............page:198-201
Method of face detecting based on feature model
XU Qing;SHI Yue-xiang
..............page:202-204
SSVR algorithm and time series prediction of furnace combustion state
ZHANG Xin;WANG Bing;ZHAO Pu
..............page:205-207,211
Research for process identification in multivariable open-loop paper-making process
LIU Jin-xing;LIU Huan-bin;SHEN Wen-hao
..............page:208-211
Aircraft manufacturing process oriented unified user management system and strategy
LI Zhou-yang;TIAN Xi-tian;JIA Xiao-liang;CHEN Guo-ding
..............page:212-215,245
Preprocessing of ECG signal based on empirical mode decomposition
KANG Jian-nan;LI Xin;WANG Xiu-qing;ZHANG Tao
..............page:216-218
Hame tracking algorithm based on hybrid particle filter
ZHANG Jin-hua;WANG Sun-an
..............page:235-238
Linear SVM based construction of cascade detectors
AN Ping;WU Tao;HE Han-gen
..............page:39-41,53
5C process method for mobile Web browsing
LI Ye;CHEN Xiao;WANG Jin-lin
..............page:34-38
Inpainting model which based on curvature driven oriented heat-flows
Qu Lei;WEI Sui;HANG Dong;WANG Nian
..............page:31-33,38
Simulation modeling for contention-collision cancellation access mode in multi-star LAN
SUN Li-jun;WANG Li-hong;LU Zhao-yi
..............page:27-30
Research of fast intra prediction algorithm for H.264/AVC
DING Yuan-yuan;SI Yu-juan
..............page:1-4,12
Formalization modeling of resources among workflow
XING Guang-lin;LIU Wei-ping
..............page:219-221,241
BP for character, taste, channel of Chinese medicine and antihyperlipidemia
YE Zheng;LI Xu-e;LIAO Qi-guang;LIAO Sen-tai
..............page:222-224,227
Kolmogorov entropy of space object RCS
CAO Zhan-hui;LI Yong-hua;LI Yan-jun
..............page:225-227
Application of Boosting algorithm to sample categorization of gene expression profiles
LIU Quan-jin;LI Ying-xin
..............page:228-230,238
Multi-objective portfolio optimization utilizing hybrid QPSO-SA algorithm
JIANG Jia-bao;ZHENG Shang-zhi
..............page:231-234,241
Research on DNA encoding constraints based on Hamming distance
ZHANG Kai;XIAO Jian-hua;GENG Xiu-tang;SHAO Ze-hui
..............page:24-26
Transformation between graphic enterprise model and enterprise model in knowledge form
MA Zhi-bin;WANG Gang;PEN Bing-yin
..............page:21-23,106
Towards semi-automatic generation of program assertion and proof logic
HE Pei;KANG Li-shan
..............page:18-20,30
Interval-valued fuzzy Shapley value of cooperative games based on dynamic fuzzy alliance
LIU Tian-hu;XU Wei-sheng;WU Qi-di
..............page:13-17
Outlook and application of chaotic systems in cryptography
LIU Jin-mei;QIU Shui-sheng
..............page:5-12