Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2008 Issue 15
Organization of ontology-based P2P communities
YANG Yan
..............page:43-47
Identification and disposal of ambiguity based on Omni-Segmentation arithmetic
CHANG Chao-wen;WEI Jin
..............page:145-147
Improved decision tree algorithm based on database query
YANG Yi-zhan;LI Xiao-ping;DUAN Xia-xia
..............page:148-150,191
Improved effective algorithm for VLSI block placement
ZHAO Xin-fang;YU Peng;YANG Ying;CUI Yao-dong
..............page:51-53
Omnidirectional image unwrapping based on quadratic interpolation method
FENG Yong-ming;YANG Dong-yong;LU Jin
..............page:54-55,78
Study of fault cluster based on ART2 progressed algorithm
DUAN Xia-xia;LIU Yan-ming;LI Xiao-ping;YANG Yi-zhan
..............page:56-57,64
Embedded Peer-to-Peer file sharing system
QI Wei-ning;WANG Jin-lin
..............page:76-78
Study on energy-saving,adaptive and graded power control technique in MANET
LI Wen-xiang;JIANG Hao;LIU Shi-qi;HU Tong
..............page:79-81
Search table topology structure based OH dynamic time coordinate system
WU Guang-zhu;WANG Jin-lin
..............page:82-84
Study of TCP congestion control algorithm based on fuzzy tuning sliding mode surface
YIN Feng-jie;YUE Cheng-jun
..............page:85-87,102
Trust evaluation model based on semiring
TIAN Jun-feng;CHEN Xiao-xiang;LIU Tao
..............page:88-91,109
Identity authentication scheme for Ad Hoc network without trusted party
HE Cheng-yong;LI Fang-wei
..............page:92-93,138
Study on multi-objective optimization of flow control and allocation in stochastic-flow network
LIU Qiang;ZHAO Qing-zhen;HU Ming-feng
..............page:94-96,126
New identity based Chameleon threshold signature without trusted dealer
WEI Fu-shan;HUANG Gen-xun;SHI Ya-nan
..............page:97-98,105
Multicast routing algorithm with QoS constraint based on IP network
LV Feng;HUANG Ke
..............page:99-102
3G authentication and key agreement scheme based on NTRU
LAI Xin;HUANG Xiao-fang;HE Da-ke
..............page:103-105
Grid resource scheduling strategy based on improved genetic algorithm
DING Rui;ZHUANG Yi;HUANG Fu-xing
..............page:106-109
Dynamic rate handoff algorithm based on LBS information
PEI Ting-rui;GUO De-zhi;WANG Ya-lan;ZHANG You-zhi
..............page:110-112,130
New multi-proxy signcryption scheme with shared unsigncryption
HU Jiang-hong;ZHANG Jian-zhong
..............page:113-115,165
Controllable node degree extended scale-free model
ZUO Ji-wei;ZHU Na;ZHU Shi-fen
..............page:116-117,169
Intrusion detection based on boosting method and RBF neural network
DANG Chang-qing;LIU Jie;NIU Fen-zhong
..............page:118-120
Distribution Web service discovery method
ZHU Shu-ren;HE Zhu-li
..............page:121-123
Cryptanalysis of efficient revocable group signature scheme with forward security
LU Rong-bo;YANG Xing-ping;HE Da-ke
..............page:124-126
Tree-based strategy for automated trust negotiation
YAO Hui;GAO Cheng-shi;DAI Qing;ZHANG Xu
..............page:127-130
Ontology integration method based on RDFS
ZHANG Zhong-ping;ZHAO Hai-liang;TIAN Shu-xia
..............page:131-135,141
Gird-pattern method for model selection of support vector machines
LI Bing;YAO Quan-zhu;LUO Zuo-min;TIAN Yuan;WANG Wei
..............page:136-138
Research and realization of classification based on rough set theory
LI Bo;WANG Yan-bing;YAO Qing
..............page:142-144,157
Implementation of wide band digital signal accurate time delay
MA Ling-kun;HUANG Jian-guo;XIE Da
..............page:158-160,172
Linear separability of gender classification
YAO Lu;XU Yong;LI Wei-jie
..............page:161-165
Feature extraction and classification of Chinese Painting
CHEN Jun-jie;DU Ya-juan;LI Hai-fang
..............page:166-169
Algorithm for locating driver's eyes under conditions of infrared images
GUO Ke-you;ZHANG Guang-yuan
..............page:170-172
Novel scheme for disparity estimation based on variable feature primitive
CHEN Wen-xin;CHEN Wei-dong;ZHU Zhong-jie;BAI Yong-qiang
..............page:58-60
Modd checking obfuscated binary malicious code
CHEN Chao;LI Jun;KONG De-guang;SHUAI Jian-mei
..............page:61-64
Improved method to describe instantiation of software testing process
LIU Xue-mei;LIU Yong-po;ZHANG Mao
..............page:65-67
Digital watermark algorithm based on block energy analysis in wavelet domain
MENG Xiao-feng;ZHANG Yue-ting;YIN Zhong-ke;QANG Jian-ying
..............page:71-72,81
Research on 3D simulation of specially diagonal package
QI Wen-fa;LI Xiao-long;YANG Bin;GUO Wei
..............page:73-75
Selective multiple eigenspaces and multistage face recognition
ZHAO Li-qiang;ZHANG Xiao-hua;LIU Zhi-fei;LI Shao-ying
..............page:173-175
Detection of pedestrian crossing in image-based blind aid devices
CAO Yu-zhen;LIU Gang;YANG Hai-feng
..............page:176-178,198
Scalable model for weather and hydrology grid
CAI Jun;QIAN Yue-ying;HU Mei-zhi;ZHENG Wei-min
..............page:214-217
Research on design and simulation of ship course controller based on QFT
WANG Jie;LIU Jin-feng;QIN Ya-hong;ZHOU Yong-nian
..............page:221-223
Decomposition of rough sets,based on Vague equivalence relation
YANG Hai-long;LI Sheng-gang
..............page:22-24,28
Research on security-handoff of near-space network
QIAN Yan-bin;CHEN Xing-yuan;DU Xue-hui
..............page:18-21
Multilayer survivable architecture for information service
CHEN Hai-tao;LU Yu-tong;HUANG Zun-guo
..............page:15-17
Data stream analysis and research
LI Yan;WANG Hui-wen;YE Ming
..............page:8-11
Algorithm for thinning hand-written text based on Voronoi diagram
WANG Hui-ying;ZHANG You-hui;ZHANG Jing;LIU Shu-juan
..............page:179-181,184
Face recognition based on support vector machines
ZENG Yang-yan;YE Bo-long
..............page:182-184
Camera tracking algodthm based on statistics of feature blocks
CHEN Lin-qiang;LV Liang
..............page:185-187
Multi-focus image fusion method based on weights optimized by EI
LI Ting;TAN Yong;XIA Dong-kun;CHEN Xue-quan
..............page:192-194,201
Remote-sensed image fusion based on mulfiwavelet packet transform
WANG Hai-jiang;WANG Zhou-long;WU Meng-quan;WANG Da-peng;CUI Qing-chun
..............page:195-198
Application of Monte Carlo method to estimate traffic information for local urban network
XU Tian-dong;SUN Li-jun;GENG Yuan-jing;DU Yu-chuan
..............page:202-204,230
Hybrid genetic algorithm for distribution vehicle routing problem
QU Qian-qian;QU Shi-ru;WEN Kai-ge
..............page:205-207,227
Intelligent fire detection system based on weighted support vector regression
XIA Tai-wu;LIU Jin-xiang;PENG Jing-hua
..............page:208-210
Parallel Kriging interpolation for estimating stratum electromagnetic parameters
CHEN Peng;WANG Cheng;REN Bo
..............page:211-213
Rough set attribute reduction algodthm based on GA and its application
XIAO Hou-guo;SANG Lin;DING Shou-zhen;GONG Yue
..............page:228-230
Application of Fuzzy ART neural network for evaluation of banking credit risk
DONG Xiu-xiu;ZHANG Hong-wei
..............page:231-233
Quantum wavelet neural networks and its application in breakout prediction
YANG Qin;PENG Li
..............page:242-245,248
Application of direct vector quantization to speech coding algorithm
ZHAO Qun-qun;ZHANG Xue-ying
..............page:39-42
Echo canceling algorithm without double-talk detection
YUAN Jia-neng;YU Feng-qin
..............page:33-35
Brain MR images de-bias model based on adapted genetics algorithm model
CHEN Yun-jie;ZHANG Jian-wei;WANG Li;WANG Ping-an;XIA De-shen
..............page:29-32,35
Metric model and system for software selection
ZHANG Yang;FANG Bin;XU Chuan-yun
..............page:25-28
Research on regional cooperative multi-agent Q-learning
LIU Liang;LI Long-shu
..............page:4-7
Knowledge reduction algorithm for rough sets base on adaptive genetic algorithm
PAN Wei;WANG Yun-feng;SAN Ye
..............page:1-3,11