Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2009 Issue 1
Research on modeling and scheduling of stacker via colored timed petri net
LUO Jian;CHENG Yong;WU Chang-qing
..............page:207-210
Research on credibility model in manufacturing grid contexts
ZHANG Tao;HE Yan-li;DENG Lei;WU Jian
..............page:211-212,241
Available bandwidth estimation using self-loading decreasing rate train
ZHANG Da-lu;ZHU An-qi
..............page:105-107
New image encryption algorithm based on combined high-dimension Chaotic system
LI Yun;HAN Feng-ying
..............page:103-104,107
Cartoon facial animation system oriented mobile entertainment
ZHOU Ren-qin;LIU Fu-xin
..............page:96-98
Real-time scheduling design of SCADA based on validity period of data
YAN Li;PENG Chen-hui
..............page:92-95
Analysis and modeling of GPS positioning error
TENG Yun-long;SHI Yi-bing;KANG Rong-lei
..............page:204-206
Brain MR images skull stripping model based on multi-Gaussian mixture model
WANG Shun-feng;ZHANG Jian-wei
..............page:198-203
Novel algorithm and its realization of optical character recognition based on statistical entropy power
WU Yong-liang;WAN Wang-gen;QIAN Feng;XU Hong-wei
..............page:195-197
New fuzzy vector median filtering algorithm for color images
DENG Ting-quan;WANG Xiao-chen
..............page:191-194
Image segmentation based on rough set theory and neural networks
HE Wei;JIANG Jia-fu;QI Qi
..............page:188-190
Algorithm for chessboard corner detection based on USAN
ZHU Wei-xing;XIA Li-bing
..............page:186-187,210
Parellel bicubic B-spine interpolation algorithms for image zooming based on CUDA
GUI Ye-chen;FENG Qian-jin;LIU Lei;CHEN Wu-fan
..............page:183-185,194
Performance of different classifiers in blind image forensics
ZHANG Zhen;BIAN Yu-kun;PING Xi-jian;ZHANG Tao
..............page:179-182
Research on precise collision detection between deformable objects
ZHANG Zhong-hui;CHOU Wu-sheng
..............page:176-178
Learning-based super-resolution reconstruction of face image
ZHENG Mei-lan;ZHANG Pin-zheng;GUO Wei-wei;BAO Xu-dong
..............page:170-175
Incremental updating algorithm for mining association rules based on change in attributes
SHAO Yong;CHEN Bo;FANG Jie;DONG Peng
..............page:166-169
Study on Chinese named entity recognition based on cascaded conditional random fields
HU Wen-bo;DU Yun-cheng;LV Xue-qiang;SHI Shui-cai
..............page:163-165,227
Support vector machines based classification algorithm
ZHOU Kuan-jiu;ZHANG Shi-rong
..............page:159-162,182
Clustering algorithm for multi-density based on grid relative density
CHENG Guo-qing;CHEN Xiao-yun
..............page:156-158,169
Content-based image retrieval using combination features
LUO Jun;KUANG Hang
..............page:153-155,197
Research on brain-computer interface based on AR
TANG Yan;LIU Jian-xin;ZOU Qing
..............page:149-152
Application of minimum consistent subset cover in incomplete rule set
WU Yan;ZHANG Chun-hui
..............page:147-148,152
On approximate measures for rough functional dependencies
AN Qiu-sheng
..............page:144-146
Combing node frequency and semantic feature for webpage informative content extraction
MENG Jun;LIU Qiu-shui;WANG Xiu-kun
..............page:140-143
Steganography detection algorithm based on MC theory
MA Yi;ZHANG Zheng-bao;FENG Fan;WANG Jia-zhen
..............page:137-139
Genetic Algorithms attacks on NTRU cryptosystem based on lattice theoretic
TANG Yuan-gang;CHEN Jia-qi
..............page:134-136,143
Research on physical topology discovery algorithm for IP subnets
LI Xue-feng;YANG Jian-qiang
..............page:131-133,146
Analyzing model of amended wireless authentication protocol SSM
GUO Yu-yan;WEI Shi-min;ZHUO Ze-peng
..............page:129-130
Estimate strategy to manage rendezvous peers based on JXTA protocols
REN Zhong;CHEN Zhi-gang;ZENG Zhi-wen
..............page:126-128
Forward-secure threshold signature scheme
MI Jun-li;ZHANG Jian-zhong
..............page:124-125,128
Snort network intrusion detection based on data mining techniques
WANG Jian-jun;LUO Ke;ZHAO Zhi-xue
..............page:121-123
Electrical distributed computing model based on process communication
WEN Jun-hao;LUO Feng-ji;YAN Wei;CHEN Ying-ying
..............page:213-216,241
Research on Bayesian network knowledge reasoning in ITS
LIU Xian-feng;DING Ji-hong;ZHU Qing-hua
..............page:220-223
Link importance comparison based on communication networks invulnerability
CHEN Si-jun;JIA Lian-xing;LI Jing-jing;ZHENG He-feng
..............page:118-120
Research and implementation of ALM tree maintenance policy
ZHANG Pan-xiang;PAN Zhi-hui;CHANG Hui-you
..............page:115-117
Distributed key generation protocol based on Elliptic curve
YAN Shao-ge;SU Jin-hai
..............page:113-114,175
Audio watermarking sharing algorithm based on Blakley scheme
ZHANG Hui-mei;LV Hong-wei;WU Xiang;GUO Yao
..............page:111-112,120
Study of adaptive algorithm based on federated filtering
CAI Yi;ZHANG Yi;YANG Ge;TONG Hao
..............page:108-110
Analysis on subscription mechanism of OPC
YUAN Xiao-fang;WANG Dong;XIE Gao-gang
..............page:89-91
Pseudo-parallel I/O schedule of RAID based on close queuing model
LUO Xun;XU Hai-zheng;PEI Jing;LI Da-cheng
..............page:86-88
Design and implementation of a unit testing framework for aspects
CHEN Ling-he;MAO Xiao-guang;LEI Yan;WANG Cheng-song
..............page:80-85,95
Standardization of DTV STB software update protocol
HE Yu-qing;HUANG Xiang-dong
..............page:77-79
Parameters' algorithm of semisoft shrinkage based on wavelet transforms
WEI Wen-chang;YANG Jun-jie;CAI Jian-li
..............page:73-76
Multiobjective Genetic Algorithm based on dynamic ε dominance
LI Ke;ZHENG Jin-hua;ZHOU Cong
..............page:69-72
Probability characteristic of function two direction S-rough sets
ZHANG Ling;HUANG Shun-liang;CAI Cheng-wen
..............page:66-68
AFSA-BFGS hybrid algorithm of global optimum for optimization problems
HUANG Hua-juan;ZHOU Yong-quan
..............page:63-65,79
Research for relationship between general Julia set and iteration parameters
DENG Zhu-zi;REN Bo;QIN Xuan-yun
..............page:61-62,95
Efficient convex hull algorithm for plane point set
ZHAO Jun;QU Shi-ru
..............page:56-58
Structural risk minimization principle of birandom samples
ZHANG Zhi-ming
..............page:51-55
Adaptive particle swarm optimization algorithm based on cloud theory
WEI Xing-qiong;ZHOU Yong-quan;HUANG Hua-juan;LUO De-xiang
..............page:48-50,76
New immune genetic algorithm based on vaccination
MI Huan-xia;XING Zhi-dong;DONG Jian-min;LI Yu-mao
..............page:45-47
Modeling research of soda carbonization process
ZHU Yan-fei;CHENG Liang-lun;ZENG Ying;XU Liang
..............page:228-229,237
Teaching qualify evaluations of college teachers based on group consensus
LIU Xiang-qin;CHEN Xia;CHEN Yan
..............page:230-233
Performance evaluation of supply chain collaborative management
WANG Hong-mei;SHI Cheng-dong
..............page:234-237
Fast reconstruction method based on reverse Shear-Warp and boundary voxels
ZHAO Hang;ZHOU He-qin;WU Long-hai
..............page:238-241
Research on distributed earth system scientific data sharing platform
ZHU Yun-qiang;LIU Run-da;FENG Min;SONG Jia
..............page:245-248
Research on concept lattice's intent reduction
ZHI Dong-jie;ZHI Hui-lai;LiU Zong-tian
..............page:42-44
Research on cross-layer protocol design for DVB-RCS
LI Lu;GUO Qing;GUAN Ming-xiang
..............page:39-41
Novel orthogonal least squares algorithm
FU Li-hua;LI Hong-wei;PENG Xi
..............page:36-38
Knowledge reduction in inconsistent set-valued decision information system
SONG Xiao-xue;ZHANG Wen-xiu
..............page:33-35,107
α-decomposition of vague relation
YANG Hai-long;LI Sheng-gang
..............page:30-32,47
Multi-path transmission method using SCTP between hosts with uni-interface
LI Ting-yi;WANG Jin-lin;WANG Ling-fang
..............page:25-29
Shrink planning graph algorithm based on domain information mining
CHAI Xiao-long
..............page:22-24,29
Improved variable step-size frequency-domain LMS adaptive filtering algorithm
YANG Qun;XIAO Lin;ZENG Xue-wen;WANG Jin-lin
..............page:17-21
Study of car-following risk estimation by probability method
ZHU Tong;ZHAO Yong-hong;BAI Yu;YANG Xiao-guang
..............page:13-16
Two improved designated verifier signatures
ZHANG Xue-jun
..............page:10-12,55
Graphic mapping on NURBS surface based on knot vector matching
LI Xue-yi;WANG Zhao;LIAN Xiao-min
..............page:7-9,21
Survey on QoS routing algorithms based on stability in mobile Ad hoc networks
ZHANG Hui;DONG Yu-ning;YANG Long-xiang;ZHU Hong-bo
..............page:1-6