Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2009 Issue 3
Comparison of neural network and evolutionary algorithm on engineering optimization.
ZHANG Yu-dong;WU Le-nan;WU Han-qian
..............page:1-6
Profit allocation model of joint distribution based on time risk
WANG Xu;HE Mei-liang;LIN Yun
..............page:214-216
Distributed configuring IPSec gateways with redundant policies
TANG Yi;ZHANG Lian-kuan
..............page:106-108
Cryptanalysis of two proxy blind signatures based on DLP
QIN Bao-dong
..............page:104-105,112
Analysis on generation mechanism of self-similar traffic and its accuracy of model
CHEN Bing-feng;XU Cong-fu;HE Jun
..............page:101-103
Sharing token traffic scheduling algorithm in multi logical links based on feedback information
LIANG Gen;GUO Xiao-xue;QIN Yong;WEI Wen-hong
..............page:97-100
Comparison and analysis of anti-collision in RFID system and improved algorithm
WU Yue-qian;GU Da-guang;FAN Zhen-yue;DU Ming-hui
..............page:210-213
Selectivity obstacle_avoidance research based on relative speed
WANG Jian-guo;MENG Xiang-fu;JIANG Jiang
..............page:207-209
Applying frequent episode algorithm in masquerade detection
YU Feng;GAO De-yuan;WANG Min
..............page:205-206,209
Study on temporal isolation safeguard mechanisms for avionics integrated core processor
LI Quan-jun;ZHANG An;ZHANG Yao-zhong
..............page:202-204,248
Memory optimization for static scheduling of Synchronous Data Flow pro-grams
LIU Guo-xin;TAN Guo-qiang;HE Ye-ping
..............page:198-201
Use of adaptive decoupling control for Variable-Air-Volume air-conditioning system
HU Qin-hua;DONG A-ni;REN Qing-chang
..............page:194-197,244
Handwritten signature verification based on contourlet
ZHU Men;YANG Ming;LONG Yi
..............page:191-193
Efficient method for image inpainting based on texture synthesis
MA Qian;WANG Zhao-zhong
..............page:187-190
Improved method for getting orientation field of fingerprint image
SU Yong-li;ZHANG Bo;ZHANG Shu-ling
..............page:184-186
Gender identification based on biomimetic pattern recognition
LI Han;WU Yan
..............page:181-183
Research on mathematic model of system of detecting steel ball surface quality
LI Yang;LIU Run-tao;ZHANG Jia-jia
..............page:178-180,186
Improved Particle Swarm Optimization with dynamically changing inertia weight
FENG Ting;LU Xue-song;YANG Wei;ZHANG Su
..............page:175-177
Combined approach of blind image restoration
BAI Xiang-jun;PENG Guo-hua;CHEN Xiao
..............page:172-174
Fractal feature of CT image and facet edge detection
PU Yun;ZENG Li;MA Rui
..............page:165-167,171
New method for mining frequent itemsets with item constraints
LI Ying-jie
..............page:161-164
New algorithm of distributing nodes in R-tree
AN Xiao-hua;LIU Run-tao;WANG San
..............page:158-160
Research on weak functional dependencies and its mono-dependent set for XML
LIU Xian-feng;LI Gao-shi;HUANG Hai-yan
..............page:155-157
Research of data mapping inference algorism of peer-to-peer
JIANG Min;DU Xue-dong;ZHANG Xiao-hui;HU Mei-yan
..............page:152-154,157
Optimization of fuzzy decision tree with multiattribute based on genetic algorithm
ZHOU Wan-li;QIU Hong-ze;YIN Zuo-hai
..............page:148-151
Nearest-neighbors based approach for detection of incomplete spatial Data
LI Guang-qiang;ZHAO Di;DENG Min;ZHU Jian-jun
..............page:145-147,151
Image retrieval using contourlet transform
HUANG Chuan-bo;SHAO Jie;WAN Ming-hua;JIN Zhong
..............page:24-27
Resource description approach for pervasive computing environments.
WANG Hai-peng;ZHOU Xing-she;ZHANG Tao
..............page:20-23
Cores and bargaining sets of cooperative games based on TU dynamic fuzzy-alliance.
LIU Tian-hu;XU Wei-sheng;WU Qi-di
..............page:16-19,41
Real-time shared control simulation without time delay for teleoperation
LI Hua-zhong;LIANG Yong-sheng;TANG Qiang-ping;LIU Yun-xia;HONG Bing-rong
..............page:11-15
Multi-agent layered cooperation planning method with domain knowledge.
ZHANG Xiao-yong;WU Min;PENG Jun
..............page:7-10,15
Modal parameter identification using independent component analysis
LI Yan-hua;FAN Ke-qing
..............page:220-221,228
Faced-AIS medical system of application service's research and design
LI Yuan-yuan;WANG Lei;LIANG Li;LI Hui
..............page:222-225
Design for two dimensional LP-NPR filter banks based on cosine modulation
ZHU Jian-dong;WANG Xiao-long
..............page:141-144
IM-FTS:high-speed incremental algorithm for mining frequent traversal sequences
PENG Hui-li;ZHANG Xiao-jian;ZHANG Ya-dong
..............page:138-140,160
Autolabeling of Chinese verb-verb collocation based on maximum entropy principle
BAI Miao-qing;ZHENG Jia-heng
..............page:135-137
Fuzz mull-sensor data fusion using Theil disequilibrium index
WAN Shu-ping
..............page:133-134,144
Study on encryption algorithm of sub-function junk code
SUN Guo-zi;CAI Qiang;CHEN Dan-wei
..............page:130-132
Network traffic prediction based on fractal filter
WANG Zhi-yong;QIU Xiao-hong
..............page:124-126
Repeated game modeling for intrusion detection in wireless sensor network
ZHOU Si-qing;LI Zhi-yan;LIU Tian
..............page:119-123
Wireless sensor network clustering algorithm based on principles of rainning
HU Xiao-hui;LI Xin;LV Deng-feng
..............page:116-118,126
Symbol synchronization method for mobile digital television receiver
GONG Guo-qiang;GE Wan-cheng
..............page:113-115
Risk assessment method of information security based on threat analysis
YANG Yang;YAO Shu-zhen
..............page:94-96,100
Research of MIB browser on SNMP++
LIU Xue-fei
..............page:91-93
Parallel processing technologies in EPA node-device
JIANG Xiu-zhu;FENG Dong-qin;XU Zhao;CHU Jian
..............page:87-90
Method for conflict resolution based on fuzzy preference in collaboration design
SUN Bo;ZHANG Rong-guo;WANG Yan-yan;WANG Rong
..............page:84-86,93
Realization of PID simulating software based on VC and Matlab
LAI Shuang;MU De-jun
..............page:81-83
Radix-4 MAP decoder with fast recursion architecture
ZHANG Cheng;SU Wen-yan;LIU Liang;YE Fan;REN Jun-yan
..............page:77-80,90
Research on methods of transmitting large amounts of data with MON08 interface
LIU Xiao-sheng;SHEN An-dong;WANG Yi-huai
..............page:74-76,83
Interface automata-based verification for Web applications
TAN Liang;ZENG Hong-wei
..............page:70-73
Improved parallel algorithm for solving block-tridiagonal linear equations.
FAN Yan-hong;LV Quan-yi;NIE Yu-feng
..............page:60-63
New method for computing convex hulls of point sets on plane
LIU Run-tao;WANG San;AN Xiao-hua
..............page:58-59,69
Parameters estimation in parallel repairable system of two components
HOU Hua-lei;KANG Hui-guang;SHI Yi-min;JIANG Yao-wei
..............page:55-57
Algorithm of multi-PSO co-evolution based on GA and PSO
XU Ke;LIU Dong
..............page:51-54
NeiMu:novel clustering algorithm based on graph theory
YING De-quan;YING Xiao-min;YE Ji-hua
..............page:47-50
Genetic algorithm for special class of bi-level programming problem
CHANG Yong-ming;WANG Yu-ping
..............page:45-46,50
Modified ant colony algorithms for solving Satisfiability problem
LIN Fen;ZHOU Yu-ren
..............page:42-44,54
Research of image mining based on improved genetic algorithm
LEI Liang;WANG Tong-qing;YANG Bo
..............page:38-41
Algorithm for finding all-solutions of satisfiablity problem
BI Zhong-qin;CHEN Guang-xi;SHAN Mei-jing
..............page:35-37
Analysis on network delay in NCS based on EPA
LIU Ning;ZHONG Chong-quan
..............page:30-34
Novel multi-swarm cooperative particle swarm optimization
NIU Ben;LI Li;CHU Xiang-hua
..............page:28-29,34
Research of supply chain core enterprise performance decision making
HU Jian;SHI Cheng-dong;BIAN Dun-xin
..............page:229-232
Prediction of product cost based on DE-BP algorithm
DENG Hua;ZHAO Hui
..............page:233-234,241
DSS framework based on ontology and CBR
LIU Xiao-wen;HU Ke-jin
..............page:235-238
Application of 3D geological body modeling method in potential field simulation
XIANG Peng;LIU Zhan;SUN Ji-hong;SONG Xue-feng
..............page:239-241