Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2009 Issue 6
Research on dynamic gait planning for underactuated biped robot
SHENG Tao;CHENG Si-wei;WANG Jian;MA Hong-xu
..............page:1-4,97
Secret sharing scheme based on multi-dealer
GUO Cheng;LI Ming-chu;WANG Zhi-hui
..............page:10-12
Routing strategies for delay tolerant mobile sensor networks
ZHU Jin-qi;LIU Ming;XU Fu-long
..............page:13-15
Pull-based broadcasting algorithm in P2P file-sharing system on HFC network
WANG Lei;PAN Liang;NI Hong
..............page:16-19
Design approach for EFSM based on supervisory control theory
WANG Xiang-yun;ZHAO Lei;CAI Kai-yuan
..............page:20-24,81
Study on dependency analysis method for learning possibilistic network structure
LENG Cui-ping;WANG Shuang-cheng
..............page:29-31
Interval number method for object threat assessment
WAN Shu-ping
..............page:32-34
Water distribution system simulation software based on EPANET and ArcEngine
YU Zhi-qiang;ZHAO Xin-hua;CHENG Shu-chu
..............page:35-37,130
Framework for pen-based three dimensional interaction in desktop virtual environment
FU Yong-gang;AN Wei-hua;DAI Guo-zhong
..............page:38-42
Research of dynamic reverse k nearest neighbor search for moving objects
DONG Jun;YANG Xiu-juan
..............page:155-157,160
Method for designing ETL conceptual model based on architecture graph
ZHANG Zhong-ping;ZHAO Rui-zhen
..............page:161-164
Audio signal denoising research based on wavelet domain
ZHU Jun-min;ZHANG Xiao;WANG Jing-yang;WU Yue-bei
..............page:149-154
Cluster analysis of college English writing in automated essay scoring
GE Shi-li;CHEN Xiao-xiao
..............page:145-148
New algorithm for mining maximum frequent itemsets based on datasets iteration
CHEN Bo;WANG Le;DONG Peng
..............page:141-144
Multiple granularity trust model in mobile P2P network
REN Yan;REN Pin-gan;WU Zhen-qiang;MA Jian-feng
..............page:137-140
Research in multi-user detection using improved micro-genetlc algorithm
ZHANG Zhen-he;TANG Pu-ying
..............page:134-136,154
Improved operation mode on authenticity of OCB
CHAO Shi-de;ZHANG Shao-lan;YANG Yi-xian
..............page:128-130
P2P network topology model based on interest grouping
HOU Xiu-hong;CAI Dao-jia;WANG Guo-an;LIU Jie;HUANG Xiao-qiao
..............page:124-127,140
Proposal of route optimization security in mobile IPv6
HUANG Zhi-bin;HONG Pei-lin
..............page:120-123
New data gathering protocol of wireless sensor networks
GONG Bo;XU Jian-bo
..............page:113-116
Random key pre-distribution scheme based on secure connectivity detection
CHEN Gang;WANG Guo-jun;GUO Min-yi
..............page:109-112,116
New threshold partially blind signature scheme without trusted center
NONG Qiang;HAO Yan-hua;WU Shun-xiang
..............page:105-108
Design and implementation of chaotic email encryption soft ware
ZHAO Liang;LIAO Xiao-feng;XIAO Di;ZHOU Qing
..............page:101-104,133
New adapted multiple strings matching algorithm
SONG Yun;LONG Ji-zhen;LI Feng;LIU Zhen-hai
..............page:98-100,123
TRUST-TIE:Tunable inter-domain egress selection algorithm based on evolution of trust
ZENG Zhi-wen;CHEN Zhi-gang;LIU An-feng
..............page:92-97
Research and design of digital synthesizer
MAO Chun-jing;GUAN Yong;LIU Yong-mei;WU Min-hua;LIU Xu-min
..............page:89-91
Research on particle swarm optimization based on dynamic neighborhood
HAN Li-na;XIONG Sheng-wu
..............page:60-62,65
Iterative algorithms of neural network for nonlinear equation groups
SUN Yin-hui;BAI Zhen-xing;WANG Bing;WANG Qiang
..............page:55-56,59
Improved parallel ORTHOMIN(m) algorithm
ZHAO Li-bin;TIAN YOU-xian
..............page:52-54
Construction of S-chains and quantum codes based on three self-dual codes
HE Xiao-jan;GUO Luo-bin;LI Rui-hu
..............page:46-47,51
Novel path planning for robot based on particle swarm and ant algorithm
LIANG Ming;XU Shou-jiang
..............page:43-45
Realistic feathers based on detailed geometry modeling and bidirection-al texture function
DONG Hong-wei;DING Jin-zhong;CAO Cai-xia
..............page:190-193
Fixed bitrate image compression based on second generation Bandelets trans-form
SONG Bei-bei;SUN Yuan;SUN Wen-fang
..............page:194-196
Facial expression recognition based on improved active shape models
WANG Ye;WU Xiao-jun;WANG Shi-tong;YANG Jing-yu
..............page:197-200
New regional filling algorithm based on seed
ZHANG Zheng-feng;MA Shao-fei;LI Wei
..............page:201-202,206
Application of ant colony decision rule algorithm for up-down short term traffic flow prediction
MEI Hong-biao;WANG Jian;ZHANG Hui-zhe
..............page:203-206
Approach for machining paths optimization based on variable-length genome genetic algorithm
GUO Hua-fang;LIU Hai-li;LI Hai-sheng;ZHANG Yan-lin
..............page:207-209,248
Semi-structure page information extraction algorithm with automatic granularity selection
WANG Xiao-bin;WANG Peng-po;SHI Zhao-xiang
..............page:165-167,172
Research on shot detection based on feature information
LI Yu-feng;ZHAO Zheng
..............page:168-169,175
Coarse classification scheme for Chinese character based on RBF neural net-work
YANG Fang;LI Hong-rui;TIAN Xue-dong
..............page:170-172
Trellis decoding scheme for uncoded Differential Unitary Space Time Modulation
LI Jun;JIN Ning;CAO Hai-yan
..............page:173-175
Improved tampering detection using color filter array characteristic
ZHANG Wen;LI Xue-ming
..............page:176-179,196
Image annotation based on genetic feature selection and support vector machines
LI Ran;ZHAO Tian-zhong;ZHANG Ya-fei;XIAO Qi;LI Yang
..............page:180-183
Study on characteristics of blurred boundary moments
HAN Bin;WANG Shi-tong
..............page:184-186,200
Contour extraction algorithm based on threshold segmentation and sequential edge linking
DUAN Peng;LIU Wei;REN Xian-yi
..............page:187-189,193
Research on SVM and its application of remote sense image classification for regions of interest
ZENG Lian-ming;WU Xiang-bin;LIU Peng
..............page:243-245
Single-source traffic flow data quality control algorithm and program design
GENG Yan-feng;ZHAO Hui
..............page:240-242,245
CBR dynamic forecast for CFW
YANG Zhen-gang;LIU Wei-zhang;FANG Yong-mei
..............page:236-239
Trapezoid wave timbre model analysis of computer musical instru-ment
CAO Xi-zheng;ZHANG Cong-pin;FENG Nai-qin
..............page:232-235
Library budge forecast based on SVM combining forecasting
DING Bao-lin;NI Tian-quan
..............page:221-223
Camouflage color selection based on improved K-means clustering
ZHANG Yong;WU Wen-jian;LIU Zhi-ming
..............page:210-212
Binary PSO combination of SVM in evaluation of garden
LI Xue;LIU Hong
..............page:213-215,239
Path planning of flocking task for multiple mobile robots based on game theory
YE Ye;CEN Yu-wan;XIE Neng-gang
..............page:216-218
Predicting protein secondary structure by balancing data method
LI Wei;ZHAO Ya-ou;CHEN Yue-hui
..............page:219-220,239
Research and implement of method for source code variation and management on white-box testing
LIU Yong-po;LIU Ling-hui;YAN Hai-hua;JIN Mao-zhong;LIU Xue-mei
..............page:85-88
Virtual design for RHEED patterns of GaAs(001)_β2(2×4) surface
CUI Ying-shan;ZHANG Zheng-ping
..............page:82-84,88
Interactive visual analysis system based on pen-interface
ZHAO Qian;REN Lei;TENG Dong-xing
..............page:78-81
Research and realization of OCL-based configuration tool
YAN Hui-qiang;XIAO Guo-xi;TAN Run-hua;WANG Xiu-juan
..............page:73-77
Surface-based DNA algorithm for minimal vertex covering problem
YANG Si-qing;LI Xiao-long;YUAN Hui-yong
..............page:69-72
Attribute reduction based on rank correlation
BAI Jiang;WEI Li-li
..............page:66-68,72
Research on fuzzy λ-quotient space
WANG Jia-yang;PENG Lan-lin
..............page:63-65
Study of semantic and norm analysis for adaptive dinical path-way modeling
YANG Hong-qiao;LI Shu-zhang;ZHAO Jun-ping;LI Wei-zi
..............page:229-231,235
Genetic algorithm for picking routing problem in 2-block warehouse
WANG Hong;FU Zhuo;ZUO Wu
..............page:224-228