Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 21
Research on feature-preserving method of point-sampled model simplification
ni tong guang ; gu xiao qing ; yang chang chun
..............page:202-204
Refinery scheduling optimization research based on continuous process characteristics
li ming ; li qi qiang ; guo qing qiang ; ding ran
..............page:205-209,234
Mesocyclone recognition based on new flooding algorithm
pan yun hong ; zhang yun ; wu zhi fang ; zhong ling
..............page:171-174,198
Cryptanalysis and improvement of(t,n)threshold proxy signature scheme
zuo zhen yuan ; xie zuo
..............page:119-121
Multi-Agent Q-learning based on quantum theory and ant colony algorithm
meng xiang ping ; wang sheng zuo
..............page:43-46
SCO algorithm based on entropy function for NCP
sun jia ze ; wang shu yan ; zhang jian ke ; cao xiao peng
..............page:40-42
Research and application on medical data mining based on rough sets
ye ming quan ; wu chang rong ; hu xue gang
..............page:232-234
Algorithm of digraph connected dominating set
gao wen yu
..............page:9-13
Study on QoS performance statistical bounds about wireless multi-hop networks
chen zhi gang ; zhong hong bo ; qi hua mei ; zeng feng
..............page:126-128,134
Matriculate probability model of national college entrance examination
lu chang hui ; luo yong ; huang quan ; liu qing bao ; deng su
..............page:14-16,24
Design of RPR data transmitting scheme using VOQ
yuan na ; li hui ; ma yong gang ; wang yun fei
..............page:63-65,115
Implementation of parallel algorithms for randomized pattern matching on cluster of workstations
xue zuo wen ; shen wei chang ; zuo gong xiao ; qiao long
..............page:129-131
Improved indoor location scheme for Cricket wireless sensor network
liu yu hong ; zhan ying
..............page:227-228,234
Improved method for modeling leaf venation patterns
gu wen zhe ; jin wen biao ; zhang zhi feng
..............page:242-245
Effective hybrid differential evolution algorithms for lot-streaming flow shop scheduling problem
sang hong yan ; pan quan ke ; wu lei ; pan yu xia
..............page:47-50,93
Identification of dynamic nonlinear systems based on modified LSSVM
du zhi yong ; wang xian fang ; zheng li zuo
..............page:238-241
Quantum competitive decision algorithm for function optimization
liu yong ; ma liang ; ning ai bing
..............page:21-24
Identification method combining PSO and improved BP neural network
gao lin ; sun hai rong ; yang huai shen
..............page:37-39,62
Dynamical multi-secret sharing scheme in access structure
liu zuo ; li zhi hui ; guo rui
..............page:132-134
Intrusion detection based on cluster connectivity clustering algorithm
dang xiao chao ; hao zhan jun ; wang zuo juan
..............page:82-85,99
Extended coded cooperative diversity in wireless sensor networks
li dong ; shi hao shan ; cheng wei ; yang jun gang
..............page:1-3,20
Study of water system remote sensing image
xu lu qiang ; liu jing xia ; qin jun ; zhu jun
..............page:168-170
Outlier data mining application in power load forecasting
shi dong hui
..............page:213-215
Guide star identification method for star sensor
li xue zuo ; tan hai shu ; zhang huan ming ; yu zuo mei ; hao zhi hang
..............page:220-222,241
Research on Ad Hoc clustering algorithm
yang wei dong
..............page:111-115
Research on combined method in missing flight data complement
xu lei ; zhang feng ming
..............page:210-212,215
Application of Hermite operator in image registration
zhang ming hui ; gao yuan yuan ; lu zhen tai ; feng qian jin
..............page:178-180
Microscopic Image compression using global motion estimation and Canny algorithm
shao hua ; yang ming ; sun yan yan ; wang song liang
..............page:188-190
Mechanism and prevention of cross-domain Web page malicious code
li zhi yong ; xue liang ; tao ran ; zhang zuo
..............page:135-137
Routing algorithm with prediction in Ad hoc networks
wu zheng yu
..............page:90-93
Image processing method using mixed non-linear Butterworth filter
wang da hong ; hu mao lin
..............page:195-198
Adaptive-parallelism scheduling for Internet-based volunteer computing system
chen zuo zuo ; xu sheng chao
..............page:86-89
Color image segmentation based on JSEG and watershed methods
sun wei fang ; duan zhi yong ; zhu zhong jie
..............page:185-187
Dual-watermarking policy based on Arnold transform and error correcting coding
zhang li ; jia zhen hong
..............page:100-102,121
Adaptive algorithm for lip detection and location
huang yong hui ; pan bao chang ; liang jian ; fan xiao yan
..............page:17-20
Three kinds of adjusted trigonometric spline curves
yan lan lan ; liang jiong che
..............page:191-194
Online estimation of image Jacobian matrix with time-delay compensation
liu wen fang ; zuo zhi gang ; lu sheng li ; lu hai long
..............page:181-184
Simulation method of rock stability analysis based on block theory
li jian yong ; xiao jun ; wang ying
..............page:4-8
Partial multi-objects extracted based on single level set
li wei bin ; song song he
..............page:199-201
Least P norm criterion α spectrum estimation with carrier frequency detection
jiang jin long ; cha dai feng ; fan hong she
..............page:138-141,194
Two new methods of transforming Vague set into Fuzzy set
xu feng sheng
..............page:160-161,198
Application for gene clustering based on quantum-behaved particle swarm algorithm
gao zuo zuo ; xu wen bo ; sun jun
..............page:152-155
Improved algorithm of data preprocessing in audio fingerprint search
guan yao zuo ; shen ling ; wu yun ; zhao yong
..............page:145-147,170
Intelligent driving behavior research to virtual autonomous vehicle
cui xiao yi ; wang xian mei ; zhong yan jiong ; dong ping
..............page:223-226
Research of agreement context based on logical scaling
li xiao rui ; zhong feng ; yu yuan ; feng zuo
..............page:142-144,159
Enhanced privacy preserving K-anonymity model:(a,L)-diversity K-anonymity
zuo ying ying ; cao tian jie
..............page:148-151,180
Data cluster based on extension K nearest neighbor algorithm
yang yi ; xiang chang cheng ; wei dai jun
..............page:156-159
Steganalysis method based on improved SVM
chen xiao zuo ; zhang min qing ; ma lin
..............page:97-99
Improvement of Pastry routing mechanism
liu shi peng ; deng ya ping
..............page:103-105
Energy efficient routing protocol based on energy of node and stability of topology
chen yong hui ; liu zhi qin ;nagasaka; zhang chun feng
..............page:79-81,89
Study on fast program worst-case execution time estimation
wu guo wei ; yao lin ; yue feng
..............page:69-71,96
Efficient ID-based threshold signature scheme in standard model
da qing feng
..............page:76-78,99
Enhancement algorithm for X-ray images based on neighborhood related information
gui zhi guo ; zhang peng cheng
..............page:175-177
Control method of headland turning based on improved pure pursuit model for agricultural machine
huang pei zuo ; luo xi wen ; zhang zhi gang
..............page:216-219
Study on semantic Web service discovery based on service grouping
li man ; li jian hua
..............page:162-164
Stratified resampling strategy imported by residual information in SMC framework
wu gang ; tang zhen min ; yang jing yu
..............page:30-33
Effective supply chain performance prediction method and its application
chen dong dong
..............page:235-237,241
Improved method for sensor fault diagnosis based on strong tracking filtering
liu zhi cheng ; lang jian hua ; qiu hai lian
..............page:229-231
Detection of intrusion samples in IDS based on improved AdaBoost algorithm
chen nian ; wang ru chuan
..............page:94-96
Structural risk minimization principle of random rough samples
zhang zhi ming ; tian jing feng
..............page:51-54
System designation for computer aided rejoining of bones/tortoise shells with inscriptions based on contour matching
wang ai min ; liu guo ying ; ge wen ying ; zhou hong yu ; wang ding lei
..............page:59-62
Grammar and semantic extensions of Front compiler front-end generator for Elegant
zhu heng wei ; zhang ming guo ; qiao hai quan
..............page:66-68
Analysis and improvement of two digital signature schemes without certificates
nong qiang ; hao yan hua ; huang ru fen
..............page:106-110
Method of image retrieval based on bit-plane histogram features vector
yang hong ju ; han jian dong ; cao fu yuan
..............page:165-167