Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 19
Multi-colony particle swarm optimization algorithm
luo de xiang ; zhou yong quan ; huang hua juan ; wei xing qiong
..............page:51-54
Lipper simulation method of small water area
lu wei liang ; cheng tian tian ; he wei ; li yun fei
..............page:193-195,199
Extension of Basis system L* and its relative properties
zhang qiong ; wu hong bo
..............page:36-38
Traffic scheduling based on queue delay detect for available bandwidth in logical links
tan wei ; li yong ; yao xi fan ; ge dong yuan
..............page:21-24
Compare of range image segmentation methods with differential coefficient operation and binary morphology
zhang mei ; wen jing hua ; zhang zu xun ; zhang jian qing
..............page:173-176,181
Application of wavelet packet analysis for GPS data de-noising
liu qi fen ; guo wei ; shen rong hui
..............page:231-233,237
RTP encapsulation for scalable video coding stream and Rs application
liu wei ; chen xu ; liang yong sheng
..............page:27-32
Research of path planning algorithms based on vector map data structure
chen he ping ; li xiao qin ; gu jin guang ; chen bin ; shen lei
..............page:238-240,245
Research of ontology modeling methods for integration of secure heterogeneous data
meng yu long ; yin gui sheng ; wang hui qiang
..............page:138-140
Design of environmental monitoring system with mobile sink
liu hong tao ; cheng liang lun
..............page:7-9,24
Hybrid algorithm for traffic flow breakdown identification
zhang jing lei ; wang xiao yuan
..............page:220-223
SPKI/SDSI extension model in computational grid
qiao long ; shen wei chang ; xue zuo wen
..............page:88-90
Rough integrals and rough degree of function rough sets
yu xiu qing
..............page:55-57,84
Network load balancing algorithm based on ecological predator-prey model
hu yi hong ; jiang jia fu ; zhao jia
..............page:103-105
Method for question answer pair extraction based on domain knowledge
wang su ge ; song xiao lei ; li hong xia
..............page:214-216,223
Biomimetic pattern face recognition integration of PCA and LDA transform
jiang jia fu ; yuan cheng wei
..............page:160-163
Path planning based on extension strategy in unknown environment
ye zuo qiong ; yu yong quan
..............page:10-13,17
Improvement of similarity measure method
zhang xia ; wang jian dong ; gu hai hua
..............page:141-144,147
LDA algorithm and its application to face recognition
xie yong lin
..............page:189-192
Neural network for speaker recognition of PCA technology
yu li qiang ; ma dao jun
..............page:211-213
Self-organization on-demand certification architecture for MANET
shen ming yu ; yang wei jie ; chen juan
..............page:91-93,131
Modified word sense disambiguation algorithm
guo zhi bing ; huang guang jun ; lu chao hua
..............page:148-150,153
Neural network learning algorithm based on random annealing and it\'s application
dong guo jun ; ha li mu la ti mai mai ti
..............page:39-42,47
Improved self-organizing migrating algorithm and its application in Bump problem
lin zhi yi ; wang ling ling
..............page:25-26,35
New method of improved extended Kalman falter
yang hong ; li ya an ; li guo hui
..............page:18-20
Spam detection approach based on Support Vector Machine and Kernel Principal-Component Analysis
qin yu ping ; geng zuo ; sun zong bao
..............page:94-96
Image denoising with multiwavelets
jia xing tuo ; wang cheng ru
..............page:204-206,237
Fault diagnosis for AUV based on FRPN
liu xin ; yin gui sheng ; zhang lei
..............page:217-219
Image inpainting based on 1 Norm
he wen xi ; ding xing hao
..............page:164-165,188
Method of improving central difference Kalman filter
yang hong ; li ya an ; li guo hui ; yuan run ping
..............page:132-134,137
Novel stability based segmented backup routing protocol
zhang zuo ; dong yu ning ; yang long xiang ; zhu hong bo
..............page:14-17
Method for designing H∞ structured specified controllers
zhao ao dong ; zuo mao long ; sun jun
..............page:67-70
Survey on development of expert system
zhang zuo dong ; wu le nan ; wang shui hua
..............page:43-47
Stochastic stability of neural networks with interval time-varying delays
wu hai xia ; feng wei ; zhang wei
..............page:48-50,112
Model of self-adapted routing for intelligence push in computer network operations
zhou jia jun ; wang feng ; wang zuo zuo ; li xiao jian
..............page:120-124
Sink mobility scheme with energy-balanced clustering in wireless sensor net works
zhao er dun ; liu wei ; li chong ; tang pei he
..............page:77-80
Formal analysis of Needham-Schroeder protocol with authentication test methods
li ting yuan ; qin zhi guang ; liu xiao dong ; zhang xuan fang
..............page:100-102
Study of segmentation of hand X-ray regions of interest
ji yu fang ; wu xi sheng
..............page:246-248
Double identity authentication system of one-time pad based on Schnorr protocol
zhang xiao hong ; fan zhong kui ; zhong xiao yong
..............page:81-84
Non-touched system for 6D motions of model surveillance
jia qi ; guo he ; wang yu xin ; liu tian yang
..............page:241-245
Cryptanalysis of deciphering MD5 algorithm
chen shao zuo ; di xiao ning ; yan na ; su guo xing
..............page:109-112
Multi-interface routing protocol based-on Ad hoc network
peng zhong jun ; wei yong lin
..............page:113-116
Image hiding algorithm based on WPT and SVD
zheng wei ; cheng zhi gang ; chen li xia
..............page:170-172,192
Improved hierarchical AODV routing protocol for hybrid wireless Mesh network
zeng wen li ; pei ting zuo ; zhang chao xia ; zhao zhi
..............page:125-128,131
Automatic threshold selection based on grey system theory
wang xiao fang ; liu chi ; zhao yu qian
..............page:154-156,219
Image encryption technology based on DWT
liu zuo
..............page:157-159,163
Research of lager-scale network for topology discovery
pan lei ; pei zuo
..............page:74-76
Secure threshold proxy signature scheme
lv zuo ; wang zhi jian ; xu feng
..............page:85-87,119
Study on implementation of multi-bits watermark
cheng chao ; zhu xiao dong ; liu jing ; zhang xiao xu
..............page:177-181
Rough set algebra and R0-algebra based on implication operator
wei hai xin ; li xiu qing
..............page:33-35
Reconstruction technique of 3D object based on interpolating subdivision triangles
du li mei ; gu yao lin
..............page:166-169,192
Intelligent extending to efficiently deriving XML keys
liu xian feng ; gong hui
..............page:145-147
Application of fuzzy bayes theory in change detection of remote sensing images
chen ke ; zhang bao ming ; xie ming xia
..............page:185-188
Research of steepest descent and conjugate gradient in digital beamforming
zong rong fang ; li feng lin
..............page:151-153
Performance testing for network security audit devices
shi lin ; huo xin
..............page:61-63,80
Improved sort method for Chinese strings
zhang hai jun ; ding xi yuan ; zhu chao yong
..............page:129-131
Design and research of low-voltage DC Servo with EPA
wang xiu jun ; hu xie he ; zhang yong liang ; hu jian ting
..............page:58-60,70
Research and implementation of automatic adaptation 3-dimension face-modeling
yi fa ling ; xiong wei ; wang sheng ; zhang zuo ming
..............page:200-203,213
Personalized recommendation algorithm for smart museum environment
zhou shan dan ; zhou xing she ; wang hai peng ; ni hong bo ; zhang gui ying ; miao qiang
..............page:224-226
Routing selection of WSN restricted by double factors
sun ming song ; wang zhan zuo ; zhang ren wei
..............page:97-99,124
Wireless Mesh Network based on rate-adaptive with congestion control strategy
wang jun ; zhu cui tao
..............page:117-119
Analysis of SEIQ epidemic model in homogeneous complex net works
chu yang jie ; zhou jia hua ; wang jin shui ; huang zhang can
..............page:106-108,119
Research on standard and process of avionics software development
wan ming ; fan xiao guang ; nan jian guo
..............page:71-73,96
Research on target tracking based on Gene Algorithm\'s resampling particle filter
liu gang ; liang xiao geng
..............page:196-199
Analysis and improvement of warning propagation algorithm
qin yong bin ; xu dao yun
..............page:1-6,54