Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 18
Research of Hill encryption and decryption algorithms with GPU
liu dan ; zhao guang hui ; zhong zuo
..............page:49-51
Design and implementation of signal oriented instrument class driver
yuan qing feng ; lu hui
..............page:52-55
Bursting of piecewise linear spiking neuron model
zuo xiang hong
..............page:7-8,55
Improved automatic color equalization for contrast enhancement
xu xin ; chen qiang ; sun huai jiang ; xia de shen
..............page:4-6,96
Study of image classification with spatial pyramid color histogram
zhang zuo ; liu bing quan ; zhang de yuan ; liu yuan chao
..............page:152-155
Self-adaptive localization algorithm in Wireless Sensor Networks
wang dong dong ; sun yan
..............page:77-79
Gaussian sequence kernel support vector machine for speaker recognition
li jie ; liu he ping
..............page:183-185
Design of hybrid means algorithm for clustering
chen shou wen ; li ming dong
..............page:132-134
Adaptive lifting wavelet transform and aeroengine fault analysis
ma jian cang ; peng jin tao ; meng fan lu
..............page:202-204,232
Robust signcryption scheme
li ta ; he ming xing ; luo da wen
..............page:93-96
Improvement of BT downloading algorithm for video broadcast
miao wen jian ; yang ya hui
..............page:68-70
Novel adaptive fast level set evolution without re-initialization
tian qiao yu ; huang shui bo ; he chuan jiang
..............page:174-176,208
FT:Efficient top-k algorithm in distributed networks
li lei ; li xiao dong ; liu xin yang
..............page:89-92
Loop subdivision based on ternary
song shuang zhu ; sun da song ; peng xiao guang ; sun li zuo
..............page:190-191,236
Adaptive particle swarm optimization based on colony fitness variance
tian dong ping ; zhao tian xu
..............page:24-26,39
Research of adaptive fuzzy controller based on variable universe of asynchronous motor soft start
liu zhong ; li shi yu ; jin yao ; liang cheng jie ; peng jin yan ; li wei
..............page:205-208
Study on fault diagnosis for rotary machinery based on vector spectrum and Petri net
dong xin ; han jie ; shi lai de ; hao wei
..............page:224-227
Performance evaluation of NoC architectures using NS2
yang zhi feng ; tian ze
..............page:74-76,79
Design and research of dynamic password user authentication protocol
wang chong xia ; zhu yan qin
..............page:71-73,82
Robust H∞ control of network control system with random time-delay
zhang zuo ; guo xi jin
..............page:211-214,219
Analysis of topology control\'s impact on energy consumption and lifetime in Ad hoc networks
wang wen yan ; wang dong ; cai xiao li ; li xiao hong
..............page:83-85,88
Transmission delay analysis for hypercube network and crossed cube network
wang yan hui ; zhang de quan
..............page:86-88
Study on balanced-energy of node-scheduling algorithm in wireless sensor networks
liu lin zuo ; guo shao hua ; chen yu bin
..............page:97-99,102
Research on interaction of collaborative virtual environments based on set theory
wu xiao fang ; xu zhi yong
..............page:56-59
Adaptive genetic algorithm fitting for blind extraction
dong zuo min ; li yao ; qiao shuang
..............page:142-145
Research on new strategy for transforming from soft PLC ladder diagram to sentence list
shi rui ; zhou lei ; yang zheng yi
..............page:244-248
Research on generating streamlines in seepage flow field
li hai sheng ; cai qiang ; liu yue wu
..............page:233-236
Recognition of MNP with"De-Phrase"core
qian xiao fei
..............page:138-141
Face detection method by boosting covariance feature
hua ying ; peng hong jing ; gu jia ling
..............page:186-189
Synchronous machines valued in complete lattices and their smallest realization
li ping ; li yong ming
..............page:13-14,17
Information fusion algorithm based on extenics and D-S evidential reasoning
qi fu rong ; li zhong ; wu qiang ; dan wei feng
..............page:43-44,59
Curvature preserving PDE-based nonlinear structure tensor
zheng zuo hui ; pan zuo ; sun quan sen ; wei zhi hui ; xia de shen
..............page:156-159,185
Improved quantum ant colony algorithm for QoS unicast routing algorithm
cao jian guo ; tao liang
..............page:116-118
Fuzzy timed Petri net attack models with dynamic reliability
huang guang qiu ; wang jin cheng
..............page:110-115,118
Designated-verifier proxy signcryption from bilinear pairings
yu hui fang ; wang cai fen
..............page:125-127
Efficient interleaved encryption scheme in wireless sensor networks
fu jie ; lu jian zhu ; zheng xuan
..............page:119-120,124
Modified SIFT for localization of omnidirectional vision robot
xia gui hua ; wang bo ; zhu qi dan
..............page:196-198
Truth degree analysis of classical logic axiom in fuzzy logic
niu guang hua ; chen huai jin ; yuan yan li
..............page:38-39
Research on recommendation of Web services based on QoS execution information
zhu hong kang ; yu xue li
..............page:237-239
Enhanced unsuperised discriminant method for face recognition
huang zuo ; chen cai kou
..............page:167-169,173
Dual population differential evolution algorithm based on crossover and mutation strategy
tan yue ; tan guan zheng ; wu xue dong
..............page:9-12
Double swarm variation particle swarm optimization
peng zuo ; ma lin hua ; wang jun pan ; su qiang
..............page:35-37
Cryptanalysis of two password authenticated key exchange protocols
hu xue xian ; liu wen fen ; zhang zhen feng
..............page:18-20
New constuction method of intuitionistic fuzzy similarity matrix
he zheng hong ; lei ying jie ; li jing tao
..............page:27-29
Research on structured composition transaction compensation of refinement qualities
wang yong lin ; jiang ai jun
..............page:30-34,37
Improved KNN algorithm based on contribution of attribute value and average similarity
zhang ling zhu ; zhou zhong mei
..............page:130-131
Nodes\' weighted localization research of wireless sensor network
chen de min ; zhang yuan ; li peng
..............page:100-102
Skin segmentation using similarity of skin color and dynamic threshold
guo song ; gu guo chang ; cai ze su ; liu hai bo ; shen jing
..............page:1-3,12
Research and design of electronic patient record mining model based on rough concept lattice
ding wei ping ; dong jian cheng ; wang bin ; shi ; shi zhen guo
..............page:215-219
DCT based image compression algorithm and application
cong shuang ; pu ya kun ; wang jun nan
..............page:160-163
Grid resource schedule optimizing based on QoS parameters induced by cloud model
yao jun ; he ting nian ; li yong ; qu wei li ; ma man fu
..............page:80-82
Improving of image edge detection technique
li dan ; qian jian sheng ; lu zuo zuo ; zhou jun min ; tian wen ke
..............page:164-166
Eye location algorithm based on adaptive smoothing self-quotient image and hierarchical block
jiang xiong hui ; huang dong jun
..............page:170-173
Genetic algorithm of genetic-couple cross for curriculum scheduling in multi-campus
shi hui ; peng xiao hong ; zuo zhi hong ; shu yuan zhong
..............page:240-243
Mammogram image enhancement based on wavelet fusion
zuo meng jie ; wen xue bing
..............page:177-179,195
Precise program worst-case execution time analysis method
wu guo wei ; li zhang
..............page:60-64
Identity-based threshold multi-proxy blind multi-signature scheme
yang chang hai
..............page:121-124
Novel parallel interference cancellation QR factorization detection algorithm
li yong jie ; fu hong liang ; yang tie jun
..............page:135-137
Face detection based on adaptive dyadic wavelet transform
tu er hong jiang a bu du ke li mu
..............page:149-151,166
Random walk for circuit analysis and improving by parallel computing
guo jun ; li ming hui ; dong she qin ; shen wei chang
..............page:199-201,243
Modeling temperature characteristics of solid oxide fuel cell using T-S fuzzy model
xu chuan pei ; yang fan ; cao hong liang
..............page:220-223,227
Dynamic characteristics of P-sets
yu xiu qing
..............page:45-48
Lagrange optimized LMK criteria feed-forward neural network blind multi-user detection
li yan qin ; zhang li yi ; guo chun sheng ; chu lin lin
..............page:146-148