Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2009 Issue 15
Bitmap data structure:Towards high-performance network algorithms designing
YANG Bao-hua;QI Ya-xuan;XUE Yi-bo;LI Jun
..............page:1-5
Auto-recognizing concavo-convex edge of street elevation
LI Chang;ZHANG Jian-qing;ZOU Song-bai;YANG Ling
..............page:6-8
Combining principal components analysis and clustering to extract key-frame
XU Wen-zhu;XU Li-hong
..............page:9-10,23
Distributed correlated M-ary sources coding using LDPC codes
CHEN Rni;WANG Zun-liang;LI Xue-ming
..............page:126-129
Research about false-sharing of SCTP based on QoS
LI Xiao-xia
..............page:130-131,157
Distributed video coding using non binary LDPC
ZHAO Min;WANG Zun-liang;LI Xue-ming
..............page:118-121
ID-based threshold blind multisignature scheme
ZHANG Xin-ping;YU Long-jiang;SUN Sheng-he
..............page:115-117
VoIP talk time modeling and prediction on output link of metro area network
CHEN Nan-nan;YUAN Xiao-fang;WANG Dong;XIE Gao-gang;HUANG Jin-chai
..............page:111-114
On constructing 2-connected 2-dominating set using two centralized algorithms
SUN Li-shan;ZHANG Rui-hong;WU Wen-bin
..............page:107-110,176
P2P network model based on physical topology
HOU Xiu-hong;LIU Jie;WANG Guo-an;CAI Dao-jia
..............page:102-106,143
Efficient certificateless convertible limited verifier signature scheme
LIANG Zhong-yin;YANG Xiao-yuan;WEI Ping;ZHOU Xuan-wu
..............page:99-101
P2P reputation model simulator framework based on NS2
DU Ping;HE Da-ke;DENG Zi-jian
..............page:95-98
Research on performance of MZS-DSR based on OPNET simulator
XU Jian;PENG Shu-guang;QIN Yong
..............page:91-94,125
QoS orientied service process optimization
SUN Xiao-han;CAO Jian;ZHAO Hai-yan
..............page:86-90,117
Modeling and definition of alert urgent degree in IDS
JIANG Shao-hua;HU Hua-ping
..............page:81-85
Cryptographic key generator based on biometric characteristics and signal processing
ZHOU Qing;HU Yue;LIAO Xiao-feng
..............page:78-80
Decision tree algorithm optimized using method of program transformation
FU Ming;ZHANG Ying;CHEN Xi;WAN Li
..............page:72-74
New method in gene expression programming and its application:LFC
WANG Yan-chun
..............page:70-71,80
Feedback immune network cancer therapeutic instrument
LI Hui;WANG Lei
..............page:67-69,74
Ant colony optimization on reliability optimization of redundancy allocation problem
CHENG Shi-juan;LU Wei;HE Ping
..............page:64-66
Algorithm for uncertainty assignment problem
LI Yan;GUO Qiang
..............page:61-63,66
Research on linear complexities of modified de Bruijn sequences
FU Sai-hong;YOU Lin
..............page:58-60
Novel method for feature selection based on entropy
LI Yang-huan;GAO Feng;LI Teng;ZHOU Zhi-min
..............page:54-57
Novel hybrid optimization algorithm and applications
QU Liang-dong;HE Deng-xu
..............page:51-53,60
Products and decomposition of probabilistic finite automata
WU Zong-xian;DENG Pei-min;YI Zhong
..............page:47-50
Construction of finite-length filter for orthonormal wavelet basis
HONG Ming-jian;ZHANG Xiao-hong
..............page:44-46,66
Modified combination rules of conflict evidences based on reliability
WANG Yi-jun;LUO Da-yong;ZHANG Hang
..............page:41-43
Formulas truth function degree generated based on II system
LI You-yu;ZHANG Xing-fang;LI Cheng-yun
..............page:39-40
Research on data fusion algorithm of redundancy information based on least square method
LI Xue-lian;SUN Yao;MO Hong-wei
..............page:34-38
Speech synthesize using Chinese tone sandhi
KANG Guang-yu;GUO Shi-ze;SUN Sheng-he
..............page:28-30
Greedy algorithm for solving energy hole problem in wireless sensor networks
SONG Chao;LIU Ming;GONG Hai-gang
..............page:24-27,60
Reliability in intrusion-tolerance system of diverse redundancy
ZHOU Hua;MENG Xiang-ru;ZHANG Li;QIAO Xiang-dong
..............page:20-23
IT investment decision model for different stakeholders' requirement
WE Zhong;XIA Zhi-jie
..............page:15-19,33
Confidence factors spreading in intuitionistic fuzzy approximate reasoning
XIA Bo-ling;HE Zheng-hong;LEI Ying-jie
..............page:160-162
Improved linear predictive speech ceding technique and realizes
JI You-fang;LIU Gui-bin
..............page:163-165
Easy and efficient algorithm to determine number of clusters
ZHANG Zhong-ping
..............page:166-168
Realistic video rain editing
DONG Zhuo-qun;MA Li-zhuang
..............page:173-176
Improvement of LBF active contours model
YUAN Ye;HE Chuan-jiang
..............page:177-179,228
Evolutionary game strategy for grid resource allocation
LI Zhi-jie
..............page:132-135
Reputation-based on trust evaluation mechanism for P2P system
WANG Liang;GUO Ya-jun
..............page:136-138,162
Research on kind of light-weight dynamic cryptographic key establishment algorithm
JIANG Li-fen;ZHAO Xin;LI Zhang-lin
..............page:139-143
Network congestion control method based on GAPSO path optimization
KONG Jin-sheng;HU He-wei;WANG Na-na
..............page:144-146
Study of beam domaim MUSIC algorithm based on acoustic vector array
WANG Xu-hu;CHEN Wan-ping;TIAN Tan
..............page:147-149
Interoperability architecture of heterogeneous systems based on mobile agent
SHI Xue-lin;ZHAO Ying
..............page:150-153
Application of optimal reduct in classification problem
ZHANG Xiao-feng;ZOU Hai-lin;JIA Shi-xiang;ZHANG Li-feng
..............page:154-157
Pitch detection using improved algorithm based on cepstrum
ZHU Ying;QIAN Sheng-you
..............page:158-159,172
Research on genetic algorithm of defect feature selection method
HAN Jian-song;WU Gui-fang;XU Ke;XU Jin-wu
..............page:241-244
Taylor-series expansion location algorithm based on RBF neural network
ZHANG Bao-jun;MAO Yong-yi
..............page:245-248
Algorithm of fingerprint feature extraction and matching based on contour
MENG Xiang-ping;WU Zeng-guang;ZHAO Yu-lan;LIU Shu
..............page:191-193,218
Speaker recognition based on KLT and MMCE
FAN Xiao-chun;QIU Zheng-quan
..............page:194-195,215
Criterion of video quality assessment based on property of HVS
LU Guo-qing;LI Jun-li;CHEN Gang;ZHANG Ying;MAN Jia-ju
..............page:196-199
Image retrieval based on region features and relevance feedback
SU Guang-wei;ZHANG Min-qing;YANG Xiao-yuan
..............page:200-201,208
Improved subdivision over arbitrary topological meshes
JIA Tai-feng;GU Yao-lin
..............page:202-205,212
Optimization d equipment multi-echelon inventory in environment of SC
DUAN Li-jiang;DU Yan-ke;YANG Ping-hua
..............page:206-208
Removing EOG artifacts from EEG signal based on ICA
LI Ying;AI Ling-mei
..............page:209-212
Bidding game model of suppliers based on first-price sealed auction
ZHUO Xiang-zhi;WANG Xu;DAI Ying;WANG Yong-ning
..............page:213-215
Heredity-control based on S-rough sets
ZHANG Ling;CAI Cheng-wen;QIU Yu-feng
..............page:216-218
Hybrid ant colonies algorithm for grain urgency transportation
ZHANG Qiu-wen;ZHEN Tong;MA Zhi
..............page:219-222
Machining path planning of robot based on artificial fish-swarm algorithm
CHEN Jian-rong;NIE Li-ming;ZHOU Yong-quan
..............page:226-228
Camera calibration for monocular vision
LI Xiao-feng;LI Feng
..............page:229-232
Sub-pixel area measurement method of ICT image
MA Rui;ZENG Li;LU Yan-ping
..............page:233-236