Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2009 Issue 30
Victorious-directed tasks scheduling algorithm for grid computing based on game theory
yao lei ; dai guan zhong ; wang dan dan ; zhang hui xiang
..............page:84-87
Multi-dimensional trust model for Web service
liu shi yong ; luo mei shu ; du bai ling
..............page:161-164
Method of image segmentation based on support vector clustering algorithm
jiang jia fu ; zhao jia ; hu yi hong
..............page:165-167
Blind separation of non-independent images using complexity pursuit
li bing ; liu ying ; ge zheng kun ; guo wu
..............page:168-170,184
Human ear detection algorithm of weighted inside and outside contour
lei song ze ; yao hong ge ; qi min ; hao zhong yang
..............page:171-173
New application on face authentication with pyramidal neural network
shao chang bin ; wu xiao jun
..............page:181-184
Bark texture synthesis by patch-based sampling
cao zuo ; yang gang ; wang zhong zhi ; huang xin yuan
..............page:194-197
Finite texture mixture model and corresponding texture segmentation scheme
xie xing ; xie yu bo ; qin qian qing
..............page:188-193
Decomposition of decision table and computation for minimum attribute reduction
ye ming quan ; wu chang rong
..............page:126-128
Heterogeneous data clustering algorithm of BIRCH
li xian ; luo ke
..............page:123-125
New optimization GATS algorithm method used in text features subsets
jiang pei pei ; liu pei yu
..............page:121-122,149
Authenticated encryption scheme with message recovery based on ECC
hou ai qin ; yang shi yong ; ge jian hua
..............page:118-120
Parallel complementary decoding based on OSD and Chase
qiao guo lei ; dong zi jian
..............page:116-117,125
Performance analysis of quantization audio watermarking in DFT domain
kang fang ; zhou jun ; yang sen bin
..............page:110-112
Recent-behavior based on trust model for P2P systems
cui lei ; xie xian zhong
..............page:107-109
Chunk hybrid self-scheduling on grid environments
ji qin ; li pei feng ; zhu qiao ming
..............page:104-106,120
New key pre-distribution scheme for wireless sensor networks
zuo bo ; chen wen jie ; guo yong hui ; luo chang yuan
..............page:101-103
New genetic algorithm to solve 0-1 knapsack problem
zhou ben da ; chen ming hua ; ren zhe
..............page:45-47,52
Research of ontology description languages with value restrictions
li zhi ping ; sun zuo
..............page:42-44
Configuration of parameters α,β and ants\' number for function optimization
zhang bao ge ; du cheng xin
..............page:40-41,44
New TCP/AQM model of high-bandwidth congestion control algorithm
tian li wei ; chen yuan zuo ; luo xiao shu
..............page:98-100
Cluster maintenance algorithm based on LEACH-DCHS protocol
gao jing ju ; liu yu hua ; zhu long quan ; meng yong wei
..............page:95-97
Object-oriented based method of information system risk evaluation
wang zuo zhen ; wu xiao yue ; xie yong qiang
..............page:92-94,112
Double quantum delta particle swarm optimization based on chaos optimization strategy
qi ming jun ; yang ai hong
..............page:34-36,39
Restudy of entropy for Vague sets
wang ling yun ; lu xiao yun ; wang zhi he
..............page:31-33
Application of attribute dependency formulas in constructing concept lattice.
li xiao rui ; qian xu ; zhong feng ; yu yuan
..............page:28-30
Some logical and operational operators on grey sets
feng zhi qiang ; liu cun gen
..............page:22-27
Novel fuzzy channel quality feedback scheme
cheng jun ; li ou ; li tie feng
..............page:19-21
Data MODEM for GSM full rate voice channel.
yang yu cun ; feng sui li ; cui miao ; ye wu
..............page:15-18
Convergency theory in quantitative logic
han bang he ; li yong ming
..............page:4-5,12
Multisensor information fusion Wiener filter and smoother
mao lin ; deng zi li
..............page:1-3,33
Blind watermarking algorithm in wavelet domain based on SVR
zhang min ; jiang hua
..............page:174-176,207
Research on intersection and trimming algorithms for subdivision surfaces
li tao ; zhou lai shui
..............page:177-180,184
Airport damage assessment algorithm and design of semi-physical simula-tion platform
zuo peng fei ; xiao gang ; jing zhong liang
..............page:204-207
Effective evaluation method of image scrambling degree
huang jian ; bai sen
..............page:200-203
Single frame image definition based on edge character
yang si han
..............page:198-199,203
Artificial immune algorithm for solving priority constraint scheduling problem on parallel machines
liu wen cheng ; gao jia quan ; fang zhi min
..............page:208-210,213
Research of ontology description languages with value restrictions
li zhi ping ; sun zuo
..............page:143-145
Research on method of dynamic multi-strategies ontology mapping and integration
li peng ; xu de zhi ; yin yan
..............page:150-153
CKDB-Tree: Effective index structure in high-dimensional data spaces
sun jin guang ; wang shu e
..............page:157-160
Manifold learning about novel continuous autoencoder network
hu zhao hua ; song yao liang ; wu you lin
..............page:154-156,223
Second generation contourlet transform based texture image retrieval system
chen xin wu ; liu zuo ; tian jin wen
..............page:185-187,193
Detection of cross-point of optical axis of lamp based on Hough transform
he yang ming ; dai shu guang
..............page:240-241,244
Application of ANN in study of hysteretic nature of factors influencing inflow runoff
ran zuo kui ; li min ; wu zuo ; jie jian cang
..............page:242-244
Study on dynamic function allocation of human supervisory control multi-UAV
wang kuo tian ; zhang guo zhong ; shen lin cheng ; huang ding cai
..............page:245-248
SVM in research of mine forecast
chen zhi fen ; zhang dong mei ; yao zhen zhong
..............page:234-236
Estimation of rock-particle volume model based on PCA and BP neural net-work
zhao pan ; chen ken ; wang yi cong
..............page:237-239,244
Similarity measures between Vague sets of (b,c) expand and its application
fu xiao fang ; zhang fu jin ; wang hong xu
..............page:37-39
Reliability software development of WEDM using MATLAB
zhang hong bin ; jia zhi xin ; zuo an min
..............page:62-64,103
Necessary and sufficient condition of graphic isomorphism
hou ai min
..............page:57-61
Cross-entropy method for solving maximal cut problem
ding hai jun ; yang le hao
..............page:53-56
Research of improved hybrid quantum algorithm in Job Shop scheduling problems
fu jia qi ; ye chun ming ; xie jin hua ; zhao wei min
..............page:48-52
Certificateless short signcryption scheme for 3G network.
luo ming ; he guang yu ; wen ying you ; zhao hong
..............page:6-9
Security analysis of verifiably encrypted signature scheme
xia zuo ; xu chun xiang
..............page:13-14,18
Direct F0 incorporation for acoustic modeling in Mandarin speech recognition
huang hao ; ha li dan
..............page:132-134,164
Improve KNN algorithm based on entropy method
wang zeng min ; wang kai zuo
..............page:129-131,160
Audio steganalysis based on Hide4PGP re-embedding
you juan ; tang guang ming
..............page:135-137,142
AM-FM model of gravity tide IMF and its non-linear data fitting
wu qing chang ; zhou zhi ; liang hong ; quan hai yan ; wang tian li
..............page:138-142
Translation scheme from type system of TTCN-3 to C ++
jiang fan ; wang jian xue ; zhang lei ; chen jun cheng
..............page:65-68,72
Hardware/Software co-verification solution integrated FPGA and ISS
wang pei dong ; li feng wei ; yang jun cheng
..............page:73-75,79
Wireless locating application framework
teng ling ling ; shao dong ; rong guo ping
..............page:69-72
Binary PSO algorithm for test paper problem
wei ping ; xiong wei qing ; wei ying
..............page:80-83,97
Improvement of ectenics assessment method and its application
qi fu rong ; li zhong ; wu qiang
..............page:211-213
Antomatic ROI extraction from satellite cloud image based on gray level histogram
lai xu ; li guo hui ; zhao fu hua
..............page:230-233
Research about application of rough set attribute reduction methods in stock prediction
wang tian e ; ye de qian ; ji chun lan
..............page:227-229,236
Optimize flexible flow-shop scheduling using genetic algorithm
zhou hui ren ; tang wan sheng ; wei ying hui
..............page:224-226,233
Method for multi-attribute decision making applying rough set
zhang ai ping ; zhang xiao hong
..............page:220-223
Design and research of mathematical model and simulation system for earth-rock excavation
xu ying cheng ; wang li ; xia guo ping ; wang ting liang
..............page:214-219