Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 3
Multiple classifiers fusion algorithm based on GA
duan jing hong ; wang li
..............page:163-165
Study on image enhancing algorithm based on improved lateral inhibition
xie xiao fang ; mao xiao bo ; chen tie jun
..............page:148-150
Static allocation management strategy for SPM based on energy hotpot
hu zhi gang ; shi jin feng ; jiang xiang tao
..............page:58-61,75
Covering rough intuitonistic fuzzy set model
gong zeng tai ; ma yan
..............page:42-45
Briefest rule acquisition method based on granular binary operations
shen jin biao ; lv yue jin
..............page:30-32
Implementation method of high-speed asynchronous FIFO using FPGA
huang zhong chao ; zhao yu qian
..............page:13-15,26
Heuristic algorithm for detecting overlapping communities
wan xue fei ; chen duan bing ; fu yan
..............page:36-38,41
Adaptive MAC protocol for wireless sensor network
fan qing feng ; zhang rui hua
..............page:76-78,83
Index based approach for heuristic query optimization in data warehouses
huang jin zuo ; yang ke hua ; chen zuo zuo
..............page:122-124,150
Suspicious transaction detection model based on Radial Basis Function Neural Network
lv lin tao ; ji na ; zhang jiu long
..............page:207-210
Research on walking stability of humanoid robot upstairs
xiao le ; li ming jie
..............page:195-197,245
Spatially adaptive image restoration model
xu da hong ; wang run sheng
..............page:179-182
Improved algorithm of template matching
luo san ding ; yang jin ping ; li guo fu
..............page:169-171,174
Study on Chinese text classification based on dependency relation
wang peng ; fan xing hua
..............page:131-133,141
Storage of hierarchical dimension in port data MOLAP
pan ming xia ; wang yu
..............page:211-214
Adaptive particle swarm global optimization algorithm based on chaos
gao lei fu ; liu xu wang
..............page:51-53,101
Rebuild 3D object based on module control points
lin xin
..............page:90-93
Generalized predictive control using LS-SVM error compensation
di yong jie ; li hai li ; wang dong feng ; han zuo
..............page:192-194
Distributed source coding using RA codes
wang jing yu ; wang zun liang ; li xue ming
..............page:118-121,130
Research and application of reliable data transmission technique based on UDP
wang yan fang ; dai yong ; liu dong hua ; kong hua wei ; zeng yan yan
..............page:105-108
Research on algorithm of Chinese word automatic segmentation
he guo bin ; zhao jing zuo
..............page:125-127,130
Research and implementation of VLSI partitioner
leng ming ; sun ling yu ; yu song nian
..............page:62-66
Study of building low-cost pervasive network and optimizing its services
cao zhuang ; dai yong ; hu ming qing ; chen yi qiang
..............page:79-83
Technique for constructing multiple classification systems based on rough set reduction
wang ming yang ; yu da ren ; hu qing hua
..............page:49-50,93
Role-task based controlled delegation model
mou ya li ; zeng hao ; yao hong
..............page:87-89,114
Low-latency and energy-efficiency MAC scheme in wireless sensor networks
li qiao qin ; zeng jia zhi
..............page:1-3,8
Method to realize rule-based reasoning using CLIPS and VC ++
dai rong ; he yu lin ; yang xian gang
..............page:54-57
Object separating algorithm based on background alternation and dynamic expanding filter
wang shuang lin ; kang mu ning ; deng zheng hong ; li jian wen
..............page:246-248
Application of genetic BP Neural Network on risk assessment of debris flow
chen gang ; he zheng wei ; yang bin ; yang yang
..............page:228-231
Spatial information augmented representation using affine transformations registration
wu xue ling ; ren fu ; du qing yun
..............page:16-19,29
Intrusion detection based on supervised S-kv-Isomap algorithm
zheng kai mei ; qian xu
..............page:20-22,66
Vague relations and Vague mapping
fu jin qiang ; yao bing xue ; wang zhong hua
..............page:39-41
Solving PUMA robot inverse kinematics based on simulated annealing particle swarm optimization
zuo ting ; zhu jing wei ; jiang xin sheng ; liao ming
..............page:27-29
Study on similar subnet searching method of protein-protein interactions network
li song bei ; xie jiang ; zhang wu ; wu pin
..............page:33-35,45
A more effective algorithm of automatic recognition urinary sediment
zhang can long ; tang yan ping ; wang qiang ; wei chun rong
..............page:232-235
Signal recovery based on iterative weighted l_1 norm
yang yang ; liu zhe ; lv fang yuan
..............page:128-130
Improvement of technology of traversing through Symmetric NAT based on ICE
liu sheng hui ; zhou ye
..............page:109-111
Method of motion detection based on symmetrical differencing and background subtraction
zhao guan hua ; feng xiao yi ; wang hu ; luo yan bo
..............page:145-147
Research on object Adaboost location algorithm for image sequence
hou yi min ; lun xiang min ; lan jian jun
..............page:151-153
Research on classification of wood texture based on feature level data fusion
wang hui ; yang lin ; ding jin hua
..............page:215-218
Improved wavelet neural networks in damage of bridge forecasting
pan zuo ; huang zuo
..............page:204-206
Algorithm design of information retrieval based on P2P community
wang xin hui
..............page:134-136,158
Improved algorithm of enhancing handwritten digit thinning effect
liu li na ; wu xi sheng
..............page:137-138,153
New rate model based ρ domain
huang xiao ping ; yang li dong ; zhong yan wen ; shen wei ming
..............page:154-158
Grid scheduling strategies of trust mechanism and computation performance
qiao fu ; zhang guo yin ; he ming
..............page:72-75
Research on HMIPv6 handover latency of improved DAD policy
deng ya ping ; wu ying qiu
..............page:94-97
Application of RS-SVM model for fire identification
sun fu zhi ; yu jun zuo ; yang liu
..............page:198-200
D-stable robust fault-tolerant control of discrete multi-time-delay systems
zhang jie ; bao zuo ming ; du guo ping
..............page:243-245
A multi-scale estimation algorithm for NLOS mitigation based on Haar wavelet
xing pei ji ; tian zeng shan ; yang liu fei
..............page:222-224
Skew correction method for document image based an projection
zhang shun li ; li wei bin ; ji jun
..............page:166-168
Regularied SAR image super-resolution reconstruction based on multi-scale Contourlet-domain
wang qiang ; peng guo hua ; chen xiao
..............page:186-188
Application of jumping point in image restoration
xing yue qi ; wang wei wei
..............page:177-178
Method for image segmentation based on niching particle swarm optimization
bai ming ming ; sun hui ; wu lie yang
..............page:183-185
Watermarking classified DWT coefficients algorithm based on blending
li xing hua ; zhang gui cang ; wang jiang tai
..............page:139-141
Vertex program texture hardware volume rendering
hu hui jun ; fei yao ping ; li min
..............page:159-162,165
Automatic edge and detail preserving smoother for color image
li xue wei ; zhang xin rong
..............page:172-174
Railway network optimization path planning based on improved ant colony algorithm
xue ming zuo ; yang huai qing
..............page:189-191,210
TSOA/AOA tracking in CDMA cellular networks using particle filtering
gong ji gang ; ji zhong heng ; peng jian hua
..............page:98-101
Hybrid global optimization algorithm based on PSO and DE
wang jie wen ; xia chang qing
..............page:46-48
Binary document authentication technology based on Chinese character structure hiding
li xiao ; gao bao jian ; wang cui fang
..............page:102-104,111
Prediction truncation based on regression analysis for JPEG2000 embedded block coding
xu yan ling ; xiang si yuan ; wang ying yi
..............page:142-144,147
Improved adaptive median filtering
wang xiao kai ; li feng
..............page:175-176,218