Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2008 Issue 4
Improved image fuzzy-enhancement algorithm
LIU Xi-wen;JIANG Yan-rong;LUO Xian-guang
..............page:50-52
Spatio-temporal role-based access control model
ZHANG Guang-wei;WANG Xiao-ming;LUO Qin;FU Zheng-fang
..............page:46-49
Region based image retrieval using multi-feature integration
DANG Chang-qing;JIANG Fang-zheng;NIU Feng-zhong
..............page:53-55
Adaptive motion object shadow detection algorithm
ZHANG Jin-xiong;ZHANG Ji-hong;GUO Sen
..............page:56-58
Image compression using complex contourlet transform
WANG Xiang-yang;ZHANG Guo-xing
..............page:59-62
New method for transforming vague sets into fuzzy sets
XU Feng-sheng
..............page:63-64,76
Ellipse detection based on center estimation
ZHU Jian-zhong
..............page:65-67,103
Feature extraction and classification experiment based on energy entropy of IMF's
ZHANG Xiao-ji;ZHANG Xin;SUN Jin-cai
..............page:68-69
Adaptive improved-intersecting ray casting algorithm
FAN Peng;GUO Bao-long
..............page:70-72
Basic rules and general method on similarity measures between Vague sets
WANG Wei-ping;WU Qi-zong;LI Yu-ling
..............page:73-76
Research on modified flexible workflow process definition meta model
XU Jin-song;DING Zhi-qiang;CHEN Wei
..............page:77-79,158
Optimization of fast fixed point fast scalar multiplication algorithm
YIN Xin-chun;HOU Hong-xiang
..............page:80-82
Research on resource allocation algorithm with QoS support in storage server
FU Qing-yun;LIU Xin-song;WU Ai
..............page:83-85,171
Flexible workflow modeling based on case reasoning
LI Wei-gang
..............page:89-91
Software of position monitoring based on bounding-volume hierarchies
LI Yue-xiang;ZHANG Lin-hua;YUAN Tao
..............page:92-93,215
Research and implementation on multi-mode parallel I/O benchmark Jetter
CAO Li-qiang;LUO Hong-bing;ZHANG Xiao-xia
..............page:97-100
Heuristic algorithm for computing quasi-support set in PAS
YE Jian-wei;ZENG Cheng;WU Ping-hui
..............page:101-103
Multipurpose image watermarking
WANG Li-jun;LIU Hong-bin;WANG Ke-gang;CHEN Sheng
..............page:104-106
Verification of safety and liveness property based on concurrent system
LI Yang;CHENG Jian-hua;FANG Ding-yi;CHEN Xiao-jiang;FENG Jian
..............page:107-110
Grid resource discovery algorithm integrated P2P mode
XIONG Zeng-gang;YANG Yang;LIU Li;CHEN Fu;ZHOU Jing-jing
..............page:111-113,140
Optimization design of batch rekeying scheme based on LKH
WANG Wei;ZHANG Wei
..............page:114-115,154
Central station performance analysis of a kind of polling protocol
FENG Ji-lin;CHEN Dan-qi;LIU Qiang
..............page:116-118
Improved APIT positioning algorithm in wireless sensor network
HAN Biao;XU Chang-biao;YUAN Hai;PENG Lei
..............page:122-124
New image encryption algorithm based on unified chaotic system
HAN Feng-ying
..............page:125-126,134
Construcing method of application layer Overlay based on physics network topology
MAO Jun-peng;MA Xiang-jie;HUANG Jian-hua;Lin Qiang
..............page:127-129
Survey of K-anonymity research on privacy preservation
CEN Ting-ting;HAN Jian-min;WANG Ji-yi;LI Xi-yu
..............page:130-134
Anti-spam technique with SVM and K-NN cooperation method
LU Mei;YE Cheng-qing
..............page:135-137,168
ID-based designated-verifier proxy signature scheme without trusted PKG
ZUO Wei-ping;WANG Cai-fen;FAN Rui;LAN Cai-hui
..............page:138-140
Re-research on scalar multiplication of Koblitz elliptic curves
LIU Lian-hao;SHEN Yong
..............page:141-144
Forward-secure proxy multi-signature scheme
LIANG Xiang-qian;WANG Yan-dong;QU Lin-yan
..............page:145-146
Knowledge acquisition method of intuitionistic fuzzy rough sets
FAN Lei;LEI Ying-jie
..............page:39-41
New local search algorithm for k-median problem
PAN Rui;ZHU Da-ming;DONG Lin-guang;DONG Ying
..............page:36-38
Intrusion detection based on boosting method
KUANG Hang
..............page:151-154
Analysis and improvement of 3-party authentication protocol:BNV
GAO San-hai;DONG Rong-sheng;WU Guang-wei
..............page:155-158
QoS-based distributed admission control algorithm for Ad Hoc networks
ZHOU Li-wei;ZHOU Man-yuan
..............page:159-162,248
New algorithm to scale up efficiency of K-Nearest-Neighbor
LU Wei-wei;LIU Jing
..............page:163-165,178
Handling of incomplete data sets based on ICA and SOM
FENG Guo-he;PENG Hong-yi;JIANG Chun-fu;DU Ming
..............page:166-168
Generalized fuzzy rough set approach to fuzzy information reduct
ZHAO Yue-ling;WANG Ying-li
..............page:169-171
Enhanced full text retrieval kit based on Lucene
SONG Jia;ZHU Yun-qiang;LIU Run-da
..............page:172-175
Credible validation based DBMS access control model
MU Yali;ZENG Hao
..............page:179-181,218
Fused Sarsa (λ) learning algorithm based on multi-agent
XUE Li-hua;YIN Chang-ming;LI Li-yun;HU Ming-hui
..............page:182-183,189
Research and implementation of self-optimize query processor
LI Jian;SHI Lei;BAI Wen-yang
..............page:184-186
Algorithm to cluster search results based-on users' interest
LI Ying;WANG Ru-jing;WANG Da-wei;WEI Bao-zi
..............page:187-189
Coordination model of two-echelon supply chain with linear time-varying demand
CAO Zong-hong;ZHOU Yong-wu
..............page:194-197,235
River catchment precipitation forecast system with Matlab and VB
LIN Wen-peng;XU Hui;ZHANG Yi-fei;LIU Yun-long;LIU Dong-yan;ZHAO Min
..............page:198-200,232
Genetic algorithm optimization based PI controller for freeway ramp metering
LI Zheng;LIANG Xin-rong
..............page:216-218
Partner selection approach based on multi-Agent negotiation for virtual enterprise
WU Yan;ZENG Jian-chao;BAI Shang-wang
..............page:219-223,241
New method of vehicle-logo recognition base on PCA and Edge invariant moment
WANG Mei;WANG Guo-hong;GAO Xiao-lin;WANG Yong
..............page:224-226,229
Research of uncorrelated linear discriminant analysis based on support vector machine
ZHANG Xiao-dan;LV Jian-ping
..............page:227-229
Cell image segmentation method based on watershed transformation
BAO Zhen-jian;DI Shu-ling
..............page:230-232
Combinated optimization algorithm of ant colony and genetic based on Vehicle Routing Problem
ZHANG Cui-jun;ZHANG Jing-min;WANG Zhan-feng
..............page:233-235
Fuzzy reasoning α-triple Ⅰ constraint method under family of implication operator L-λ-R0
WANG Qing-ping;ZHANG Xing-fang;SONG Ying
..............page:42-45
Object-based reconstruction algorithm of binary image
WANG Shu-mei;ZHAO Wei-dong;WANG Zhi-cheng
..............page:27-29,82
Extension of Kalman filtering when noise could be non-additive
WANG Yi-fu;CHEN Song-qiao
..............page:24-26
Realization of book embedding for Rivas-Eddy RNA secondary structures
GAO Shi-le;DING Ke-quan
..............page:20-23,72
Feature line extraction from triangular meshes based on STL files
YANG Sheng-yuan;SHU Shi;ZHU Shao-ming
..............page:14-19
Design and implementation of system of information fusion based on evidence theory
LUO He;FU Chao;HU Xiao-jian
..............page:11-13
Power-saving scheme for mobile Ad hoc networks based on pre-estimation of average noise power
MA Zeng-dong;GU Xue-mai;ZHANG Wen-bin;SHA Xue-jun
..............page:7-10,19
Co-occurrence matrices texture feature-based segmentation of SAR Image
LIU Bao-li;TIAN Zheng
..............page:4-6,62
Multi-robot systems task deadlock resolution based on combinatorial auction
JIANG Jian;YAN Ji-hong;ZANG Xi-zhe;ZHAO Jie
..............page:1-3
Dynamical model for HBV based on 2D probability cellular automata
WU Zhi-cheng;XIAO Xuan
..............page:201-203,207
Monitoring and spatial decision-making supporting system of Zhalong wetland based on "3S" technologies
WANG Zhi-qiang;ZHANG Shu-qing;ZHANG Bai;HU Mao-gui
..............page:204-207
Face recognition with single training sample per person based on generalized slide window and weighted 2DLDA
CHEN Cai-kou;HUANG Jian-ping;LIU Yong-jun
..............page:208-211,248
Evaluation model of targets threat extent based on refinements to gray relation analysis
WANG Bai-he;HUANG Jian-guo;ZHANG Qun-fei
..............page:212-215
Airborne monocular vision-aided landing measurement using existent installations in airport
ZHANG Xiao-miao;LIU Xiao-lin;YU Qi-feng
..............page:236-238
Research on vision-based localization system underwater of condenser tubes
CAI Yu-lian;WANG Yao-nan;ZHANG Zhi-guo
..............page:242-244,248
Non-upright frontal face detection in complicated background
WU Cai-hong;CHEN Jin-ming
..............page:245-248