Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 22
Adaptive scheduling QoS enhancement mechanism research based on IEEE802.11
yin ai zuo ; qian fei peng ; huang chang sheng
..............page:107-109,120
Quasiphysical strategy for solving triangles Packing problem
jia hai feng ; wang rui min ; pei li jun
..............page:49-51
Improvement in proving generalized semantic MP rule of Hα logic system
yu hong li ; wu hong bo
..............page:52-53,87
Review on evolution of planning domains definition language
rao dong ning ; jiang zhi hua ; jiang yun fei
..............page:23-25,46
Performance-balanced replication coherence algorithm in data grids
rong cui fang ; li ming chu ; sun wei feng ; yao hong yan
..............page:83-87
Research on threshold cipher for anonymity communication
xu jing ; wang zhen xing
..............page:91-93,123
Synchronous audio watermarking algorithm based on error correction and adaptive quantization
wang yong zuo ; yang yang ; deng zuo
..............page:133-135,156
Trilateration localization algorithm based on weighted disposal
xiong zhi guang ; shi wei ren ; xu lei ; jia chuan jiang ; wang hai yuan
..............page:99-102
Search engine:Model-driven development with UML/OCL
ma su la ; zhu sheng
..............page:54-61
Tensor dimensionality reduction via harmonic function
hu kui ; hou chen ping ; wu zuo
..............page:184-186
Real-time adaptive scheduling algorithm for sensor networks
ding hai xia
..............page:110-112,116
Design for the asymmetric Turbo codes
wang han xin ; zhu cui tao
..............page:65-67
Improved multi-objective hybrid genetic algorithm and its application
tang tian bing ; shen wen jie ; wei ling yun ; xie xiang hong
..............page:242-244,248
Research on minimum hop count routing protocol in wireless sensor network
duan wen fang ; qi jian dong ; zhao yan dong ; xu qiu hong
..............page:88-90,102
New modeling method on network topology
zhang yan ping ; li dong liang ; zhao zuo ; zheng yao jun
..............page:113-116
Algorithm for frequent items mining based on tree and pattern guidance
zhang da wei ; huang dan ; zuo min ; xie fu ding
..............page:147-150,232
Improved CLARA clustering algorithm based on SOFM algorithm
duan ming xiu
..............page:210-212
Applications of EMD in generating synopses of data stream
liu hui zuo ; ni zhi wei
..............page:6-8,15
Study on adaptive cancelling algorithm of music disturbance in car word command recognition system
xia hong gen ; song yan ; dai li rong
..............page:168-171
Cloud theory-based artificial fish swarm algorithm
wei xiu xi ; zeng hai wen ; zhou yong quan
..............page:26-29
Research and application of improved editing model in dissolve detection
li yu feng ; zhao zheng
..............page:151-152,224
Research on moving vehicles tracking algorithm based on cube model and EKF
cao jie ; wang wei
..............page:236-238,241
Evaluation of 3D menu performance on mobile phone
xu rong long ; liu zheng jie ; zhang ning
..............page:20-22,31
Overlay topology optimization in unstructured P2P systems
xu hao ; ou yang song
..............page:144-146,171
Fatigue recognition based on adaptive locality preserving projections
lv zuo zuo ; xia li min
..............page:187-189
Noise estimates of largest Lyapunov exponents from multivariate time series
liu li xia ; miao hai feng
..............page:239-241
Information security risk control model based on PROMETHEE method
lv jun jie ; dong hong
..............page:103-106
Composition and preparation of key for matrix tensor product encryption
tan guo lv ; wang zuo jun ; tang jin xiu
..............page:131-132,212
Requirements evolutionary model under chaos theory
ge jun wei ; ge zhi ; fang yi qiu
..............page:68-70,143
Connectivity compression for non-triangular meshes by context-based arithmetic coding
liu ying ; han zhong ming ; chen yi ; huang jin hui ; mao ming yi ; li hai sheng
..............page:178-183
Novel artificial fish-school algorithm based on chaos search
qu liang dong ; he deng xu
..............page:40-42
Security analysis of group signature scheme based on RSA
zhang jian zhong ; wang yong feng ; zhang yi lin
..............page:121-123
Method to seek Pareto improvement in multi-Agent system
chai yu mei ; jing hui min
..............page:229-232
Research of enhanced dynamic source routing protocol
zhao fu qiang ; yao shao wen ; zhang lei ; chen fan
..............page:136-138
Research on P2P traffic prediction models in metro area network
dong zhi chao ; yuan xiao fang ; wang dong ; pei wei ; xie gao gang
..............page:94-98
Design of stimulator based on audio-visual feedback
guo xu dong ; xu xiu lin ; zhang dong heng ; zhou yue ping
..............page:233-235
Fast hybrid clustering for Web documents
yang rui long ; zhu qing sheng ; xie hong tao
..............page:12-15
Study on data mining technology in workshop scheduling
wang zuo ; zuo fei ; fu wei ping
..............page:217-220
Real-time trucks recognition method for truck-no-entry roads
mo shao qing ; liu zheng guang ; zhang jun
..............page:225-228
Research and challenge on 802.11s wireless mesh network
zhang mu ; yan jun rong
..............page:75-79
Weaken crest and fill trough adaptive algorithm about license plate location
guan ming shan ; ren hong e ; wang yang ; han na
..............page:199-202
Similarity measures between Vague sets and its application
zhang fu jin ; wang hong xu
..............page:47-48,51
Minimal attribute reduction based on Simulated Annealing Genetic Algorithm
ren xue hui ; zhou xiao jian
..............page:165-167
Development of self-validating pressure sensor hardware platform
feng zhi gang ; xu tao ; wang qi
..............page:71-74
Study of target tracking in vehicle rear collision avoidance system
pan jie ; shi li
..............page:245-248
Generalized Voronoi diagrams for multiple robots motion planning
feng hong kui ; bao jin song ; jin zuo
..............page:1-3,19
Recognition study on positioning line transection of nerve slice image
li fang ; zhong ying chun ; zhang yi ; qi jian ; liu xiao lin
..............page:203-205
Study of Information uniformization course in multi-source evaluation
wu zheng jiang ; zhou yu hua
..............page:34-36,42
Construction of cubic Bezier continuous subsection curve\'s control points
wang jia run ; zhao nan song ; hua wen yuan ; wang yu mei
..............page:190-193
Improvement of fast association mechanism in wireless sensor network
meng fan liang ; han yi gang
..............page:126-130,174
Design and implementation of hardware-encrypted mobile hard disk drive
hu wei ; mu de jun ; liu hang ; li mei feng ; dai guan zhong
..............page:62-64
Watermarking method using texture and edge character of image
li ya qin
..............page:124-125,161
Approximately deleting machine based on quantum bit
ren lin yuan ; zhang cheng
..............page:30-31
Research on document classification based on k-means and Support Vector Machine
jia yan hua ; xu wei hong
..............page:172-174
Algorithm for semantic approximately matching of heterogeneous graphic data
shi nian feng ; wang guo qiang ; tang wei qing
..............page:194-198,220
Face pose correction for facial recognition based on sine transform
gong wei guo ; huang zuo ying ; li wei hong
..............page:213-216
Research on indexing of moving objects in road networks
song guang jun ; hao zhong xiao ; wang li jie
..............page:157-161