Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 28
Mass data cleaning algorithm based on extended tree-like knowledge base
YAN Cai-rong;SUN Gui-ning;GAO Nian-gao
..............page:146-148
Method of extracting features from DNA microarray data for classification
PENG Hong-yi;YE Yan-rui;ZHANG Jun-hui;LUO Ze-ju;FENG Guo-he
..............page:40-42
Multi-criteria routing metric for Wireless Mesh Networks
JIANG Yu-sheng;REN Jing-jing;HE Fang
..............page:88-89,97
WEB near-duplicate image detection based on local feature
LIU Hong;WEN Zhao-hui
..............page:189-191,195
Lighting-variant face recognition based on illumination categorization
CUI Rui;ZHANG Yan-ning;HU Yue-ning;ZHU Yu
..............page:185-188
Improved interactive genetic algorithm with interval value fuzzy set
HU Xiao-hui;CHEN Jun-lian;ZHANG Xiao-ying
..............page:51-53
New all-zero blocks detection algorithm suitable for AVS
GUO Yi-zheng;JIAO Peng-peng
..............page:208-210
Research on extracting human finger vein pattern characteristics based on residual image
YU Cheng-bo;ZHOU Zhao-min;LI Hong-bing;LI Yan-lin
..............page:167-169,174
Research and application of nonlinear quantization CMAC
WANG Hua-qiu;LIAO Xiao-feng
..............page:218-221,239
Research on static analysis method for software security based on XML
ZHOU Kuan-jiu;ZHENG Hong-bo;LAI Xiao-chen;LIU Chun-yan;CHI Zong-zheng
..............page:64-69
Research on target tracking algorithm based on marginalized particle filter
CHEN Jin-guang;MA Li-li;CHEN Liang
..............page:128-131
Method of Web service discovery based on semantic rule
WANG Hai;FAN Lin;LI Zeng-zhi
..............page:80-84
Analysis of boundary region attribute on rough set decision table
CHEN Wen;ZHU William;SHE Kun;TANG Jian-guo
..............page:33-35,69
Steganography method of Excel 2007 document
LIU Yu-ling;WAN Jing;XIN Guo-jiang
..............page:70-72
Notes on quantum operation
MA Fei;ZHANG Jian-hua;WANG Xiao-han;LI Li
..............page:46-48
Implicative closure operators on complete residuated lattices
YU Hai;ZHAN Wan-rong
..............page:49-50,84
Real-time retrieval in Chinese webpage by using keywords inverted table
WANG Yuan-ding;LIANG Jiu-zhen
..............page:135-137,159
High-capacity blind digital watermarking technology based on curvelet transform
GAO Huan-zhi;PANG Guo-li;HE Xiu-ling;LIU Qing-jie
..............page:105-108
Study on ship detection with improved Dempster-Shafer theory
CHEN Bo;WAN Shou-hong;YUE Li-hua
..............page:222-224
Inference rules for XML strong multivalued dependencies based on XML Schema
YIN Li-feng;HAO Zhong-xiao
..............page:152-156
q-composite key management scheme of multiple key spaces based on wire-less sensor network
YANG Shun;LI Qiao-liang;LONG Xian-ai
..............page:94-97
Weighted centroid relative localization algorithm in wireless sensor network
ZHANG Hui-min;CHAI Yi;XU Lei
..............page:22-24,60
Speech emotion recognition using ensemble methods
BI Fu-kun;BIAN Ming-ming
..............page:205-207,235
Study on 3D terrain model of plate tectonics
YU Chun-yang;ZHAO Hai-bin;ZHAO Hai
..............page:10-12
Improved algorithm for robot online path planning
SUI Ling-ling;CHEN Xiong
..............page:36-39
Method for parameter optimization of nonlinear PID controller
SUN Wei;ZHOU Yang-hua;XI Mao-long
..............page:244-248
Research on security protective framework for typical application system
GONG Lei;ZHAO Yong;HAN Pei-sheng;LI Yu
..............page:90-93
Privacy preserving using fuzzy sets
ZHANG Guo-rong;YIN Jian
..............page:118-121
Research on reliable multicast protocol in HF data communication
JING Yuan;CAO Peng;HUANG Guo-ce;ZHAO Hui
..............page:122-124,131
Real time detection of image defect for phone LCD screen
LIU Bo;LI Xin-hua;QIAN Xiang;OU Shu-qin
..............page:77-79
New particle swarm optimization algorithm with position mutation
XU Sheng-bing;LI Guo;XU Chen
..............page:54-56,93
Genetic algorithm based on multi-population evolution
LV Hui;ZHOU Cong;ZOU Juan;ZHENG Jin-hua
..............page:57-60
Hardware/software partitioning based on combination of genetic algorithm and simulated annealing
LI Lan-ying;HAN Su-juan;DIAO Shuang-jun
..............page:73-76
Design and implementation of encrypted data in outsourced database
WANG Zheng-fei;WANG Wei;SHI Bo-le
..............page:141-145
Application of improved CPSO-SVM approach in face recognition
LI Ming;SUN Xiang-feng;XING Yu-juan
..............page:175-177,180
Ray-tracing acceleration algorithm based on median-cut kd-tree
HUANG Zhong;JIANG Ju-lang;ZHANG You-sheng;CAI Qing-hua
..............page:202-204,243
Construction of irregular quasi-cyclic LDPC codes with low encoding complexity
ZHAN Wei;LIANG Jun-jie
..............page:102-104
Image partition method in face recognition
HE Guang-hui;TANG Yuan-yan;FANG Bin;ZHANG Tai-ping
..............page:196-198
Feature selection algorithm toward abnormal traffic detection
WANG Xiu-ying;SHAO Zhi-qing;CHEN Li-qiong
..............page:125-127
Research on multi-Agent interaction protocols based on RASA
YANG Yi;WANG Li-ming
..............page:232-235
Non-Local Means algorithm based on structure tensor
XU Juan;SUN Yu-bao;WEI Zhi-hui
..............page:178-180
Color image segmentation by fusion of mean shift and region saliency
WANG Zhao-ying;LI Guang;HOU Zhi-qiang;LIN Nan-zhang
..............page:181-184,210
P2P storage system based on on-line rate and response time of node
LIU Zhi-ming;SHA Ji-chang;WAN Ya-ping;YANG Xiao-hua
..............page:1-5
Distributed data mining on grid services
DENG Yong;WANG Ru-chuan;DENG Song
..............page:6-9,60
Chaos encryption algorithm based on dual scrambling of pixel position and value
CAO Jian-qiu;XIAO Hua-rong;LAN Zhang-li
..............page:192-195
Lag synchronization of chaotic systems with uncertain parameters
HU Ai-hua;XU Zhen-yuan;GUO Liu-xiao
..............page:25-27,32
Liver CT image retrieval based on non-tensor product wavelet
YU Mei;LU Zhen-tai;FENG Qian-jin;CHEN Wu-fan
..............page:28-32
Targets localization for proximate sensor based on neural network
XU Xiao-long;XU Guo-hua
..............page:211-214,217
Application of concave semi-supervised support vector machines
XIAN Guang-ming;QI De-yu;FANG Qun;KE Qing;ZENG Bi-qing;PANG Xiong-wen
..............page:132-134
Design and implementation of attacker-oriented intrusion alert analysis system
PENG Xue-na;ZHU Hong-kai;WEN Ying-you;ZHAO Hong
..............page:109-113,121
Hierarchical quantization technique based on hierarchical B pictures coding
ZHENG Jia-li;QIN Tuan-fa;NI Guang-nan
..............page:199-201
Application of Hilbert-Huang transform to fine time
SONG Qian-qian;YU Feng-qin
..............page:149-151,156
Application research on data ferrying in secure portable storage
WANG Tong-yang;YU Peng-fei;WU Jun-jun;ZHANG Xin-fang
..............page:114-117
Improved algorithm for vector viewshed on RSG terrain
SUN Tao;XIE Xiao-fang;SUN Yong-qin
..............page:160-162
IMM-UPF algorithm in maneuvering target tracking research
CAO Jie;WEN Ru-quan
..............page:240-243
Fast adaptive constant piecewise CV model
GE Qi;WEI Zhi-hui
..............page:13-16
Research and design on carbon emission warning decision support system based on Web GIS
PENG Yan-fang;PENG Jun;LI Jing;LI Zhe-qin
..............page:61-63
Anomaly network intrusion detection based on HL-Isomap and SVM
ZHENG Kai-mei;QIAN Xu;HU Xiao-hong
..............page:85-87
Analysis and application of network traffic based on seasonal periodicity Elman network
DANG Xiao-chao;HAO Zhan-jun
..............page:98-101,117
Variable step size decorrelation Volterra LMS algorithm
ZHANG Xiu-mei;ZHAO Zhi-jin;SHANG Jun-na
..............page:157-159
Disturbance compensation control for servo tracking system mounted with small arm
WANG Hong-ru;WANG Jian-zhong
..............page:215-217