Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2008 Issue 21
Novel color edge detector derived from CNN mode
ZHANG Chuang;CHI Jian-nan;ZHANG Zhao-hui;JIANG Qing-ling;WANG Zhi-liang
..............page:17-19,24
Approach for process pattern optimization in workflow generation
ZHANG Shao-hua;XIANG Yong;SHEN Yu-zhu;SHI Mei-lin
..............page:12-16
Automatic identifying query interfaces of deep Web with maximum entropy classifter
FANG Wei;HUANG Li;CUI Zhi-ming
..............page:133-137
Grid resource management model based on mobile agent
ZENG Zheng-jun;SHU Wan-neng
..............page:138-141
Research on spatio-temporal topologies based on Cartesian operations
XUE Cun-jin;SU FEN-zhen
..............page:20-24
Lie algebraic criteria for stability of linear neutral systems with 'multiple delays
TAI Zhi-xin;WANG Xing-cheng
..............page:30-32,71
Applying difference detection and pruning to emotional speaker recognition
HUANG Ting;YANG Ying-chun
..............page:33-36
Combining HMM and SPSM for sign language recognition
ZHOU Yu;CHEN Xi-lin;WANG Chun-li;ZHAO De-bin;GAO Wen
..............page:37-40
Study of three dimensional location definition(3D-LD) system
MA Feng-ning;LEI Xin;GAO Hong
..............page:41-45,51
Design of multi-channels high-speed CMOS image acquisition system based on FPGA
SUN Chun-feng;YUAN Feng;DING Zhen-liang
..............page:46-48,105
Design and realization of accurate parasitic parameter extraction tool
SUN Shi-lei;XUE Jin-tao;WANG Gao-feng
..............page:49-51
Design of automobile collision avoidance warning system based on LabVIEW
ZHANG Da-biao;YU Hua-long
..............page:54-56,63
Secure locating and location verifying in wireless sensor network
ZHU Bin;LIAO Jun-guo
..............page:57-63
Traffic characterization and modeling for multimedia networks based on wavelet model
WANG Jun-yuan;BAI Guang-wei;SHEN Hang;TAO Jin-jing
..............page:64-68
Delayed multiple TCP connection handoff mechanism
TANG Di-bin;NI Hong;CHEN Xiao
..............page:72-74
Improvement of steganalysis method for LSB matching
CHENG Dao-fang;LI Xiao-long;YANG Bin
..............page:75-77
Services oriented availability services computation model
HUANG Cheng-rong;LIU An-feng;CHEN Zhi-gang
..............page:78-81
Simulation and research on congestion control algorithm
ZHANG Mu;LI Jun
..............page:82-84,108
Underwater acoustic communication system based on unique word and It's performance analysis
ZHANG Tao;HUANG Jian-guo;HE Cheng-bing;YAN Zhen-hua
..............page:85-88
Method to reduce PAPR in OFDM system
CHEN Ning;LU Chang-bing
..............page:89-91
Reasearch of HTN-based anytime planner in FPS games
LUO Wen-jie;YANG Pei;WANG Hao;GAO Yang
..............page:92-95,108
Equivalence and approximate equivalence problem in cognitive learning
FAN Jian-cong;LIANG Yong-quan;TANG Lei-yu;RUAN Jiu-hong
..............page:96-98
Decision forest learning algorithm based on relational data analysis
WANG Li-min;LI Xiong-fei
..............page:99-101
Fast attribute reduction algorithm based on improved discernibilty matrices
QIAN Jin;YE Fei-yue;XU Ya-ping
..............page:102-105
Improved learning algorithm for LMBP based on conjugate gradient methods
LI Ye-li;FENG Chao;LU Li-kun
..............page:106-108
Study on extraction of coastal wetland using ETM+
CI Hui;ZHANG Xing-nan;RUAN Ren-zong
..............page:109-112,141
Genetic algorithm based on dissipative theory and It's application
YU Hui;WANG Hong-guo;ZHUANG Bo;GUO Yan-wei;XU Wei-zhi
..............page:113-115,141
Formal analysis of concept lattice mining from textual knowledge sources
LEI Yu-xia;WANG Yan;CAO Bao-xiang
..............page:116-118,122
Incremental parameter selection for ISOMAP algorithm
SHAO Chao
..............page:119-122
Multi-classification approach based on PSVM
CAO Rong;YANG Ming
..............page:123-125,183
Locality discriminative canonical correlation analysis algorithm
PENG Yan;ZHANG Dao-qiang
..............page:126-129
Comparative study of feature selection methods for regional land cover classification
LI Shi-jin;TAO Jian;LIN Lin;FENG Jun
..............page:130-132,170
Immune quantum evolutionary algorithm based on chaos theory
LIU Sheng;YOU Xiao-ming
..............page:142-144
Seed-driven pattern representation and acquisition of "isa" relation based on Web
LIU Lei;ZHANG Sen;DIAO Lu-hong;YAN Shu-ying
..............page:148-150
Parallel backward reasoning study using fuzzy Petri net
ZHANG Bai-yi;CUI Shang-sen
..............page:151-153,161
Application of one-class classifier with negatives in security audit data analysis
LI Jia-zhen;PAN Zhi-song;NI Gui-qiang;WANG Qiong
..............page:154-156
Study of personal name recognition
ZHANG Su-xiang;ZHANG Su-xian;WANG Xiao-jie
..............page:157-161
Algorithm based on texture character analysis for fingerprint image segmentation
ZHAN Xiao-si;MENG Xiang-xu;YIN Yi-long
..............page:162-165,170
Implementation of rule induction-based information extraction system
SHI Qian;CHEN Rong;LU Ming-yu
..............page:166-170
SVM-Adaboost based Chinese text chunking
BIE Zhi;ZHOU Jun-sheng;CHEN Jia-jun
..............page:171-173,211
Analyzing 3D model visual features based on neural networks
WEI Wei;YANG Yu-bin;LIN Jin-jie;RUAN Jia-bin
..............page:174-178,216
Composing modeling method for causality diagram of complex system
LIANG Xin-yuan;SHI Qing-xi
..............page:179-183
Performance evaluation of 3D model retrieval using similarity sequence analysis
LIN Jin-jie;YANG Yu-bin;LU Tong;RUAN Jia-bin;WEI Wei
..............page:184-187
Study of example-weighted method for tracking concept drift
HU Xue-gang;PAN Chun-xiang
..............page:188-191
Learning algorithm based on homology boundary
XIAN Min;LI Fan-zhang
..............page:192-194,244
Approximate query based on similarity degree in rough relation ratabases
QIU Tao-rong;GE Han-juan;WEI Ling-ling;XU Su;YAO Xiao-kun
..............page:195-198
Extendable digital dictionary for automatic Chinese word segmentation
HE Sheng;QU Wei-guang;XU Chao
..............page:199-201
Incremental fuzzy concept formation approach based on alternate object and attribute
SUN Ling-yu;LENG Ming;PENG Xuan-ge
..............page:202-205
Neutral-emotion model transformation algorithm based on polynomial function fitting
SHAN Zhen-yu;YANG Ying-chun
..............page:206-208,221
New method for dynamic itemset mining
LI Guang-yuan;LEI Hong;LONG Long
..............page:209-211
Study on linear text segmentation method
LIU Na;TANG Huan-ling;LU Ming-yu
..............page:212-216
Novel modified AdaBoost algorithm for imbalanced data classification
GUO Qiao-jin;LI Li-bin;LI Ning
..............page:217-221
Bayesian classifier based on hypothesis testing
LI Jin-shan;WANG Zhi-hai;WANG Zhong-feng
..............page:222-224,230
Application research of wavelet transform in de-noising of bullwhip effect
SHI Cheng-dong;YU Lan-lan;BIAN Dun-xin
..............page:225-226,248
Stackelberg game model and algorithm of OEM
SU Jie
..............page:227-230
Integration model for reconfigurable manufacturing system based on multi-a-gent system
HE Peng;YU Jia-cheng;WANG Qing-lin
..............page:231-234
Chance criterion models for optimization decision-making of loan portfolio of commercial banks
NING Yu-fu;TANG Wan-sheng;YAN Wei-zhen
..............page:235-237,244
Research on vendor evaluation and selection based on AHP and two-tuple linguistic
LI Zhao-ling;GAO Qi-sheng
..............page:238-240
Simulation study on short sales mechanism based on agent in China market
TIAN Feng;LI Xia;LI Jian-shi
..............page:241-244
Hybrid model for overlapping ambiguities resolution
LI Tian-xia;DAI Xin-yu;CHEN Jia-jun
..............page:5-8
Research and development of burst detection in data streams
YUAN Zhi-jian;WANG Le;TIAN Li;JIA Yan;YANG Shu-qiang
..............page:1-4