Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 36
Extract playing shots for racket sports video using spatio-temporal slice
FAN Bai-chao;WANG Tian-yu;BO Yu-ming
..............page:246-248
Attribution reduction for incomplete information systems
YAN Yan;DING Jian;GUAN Xue-zhen
..............page:165-167
Design and implementation of I/O trace replay system in distributed environment
ZHAN Ling;MA Jun;CHEN Bo-jiang;CHEN Wei-liang;LV Rui
..............page:91-94
Improved genetic algorithm for vehicle routing problem
CHENG Lin-hui;WANG hang-qing
..............page:219-221
Decomposition theorems of Vague sets based on binary cut sets
YANG Li-jun;WANG Lin;YU Jian-kun
..............page:51-52,73
Hybrid binary ant colony algorithm for container loading problem
YUAN Jun-hang;XIONG Wei-ging;JIANG Bao-chuan
..............page:222-225
Theory of similarity measures between Vague sets
HAN Cheng
..............page:56-60,69
Research of cloud storage technology for mobile terminal based on WEB
ZHANG Di;ZHU Li-gu;HOU Zhen-yu;ZHANG Fu;ZENG Sai-feng
..............page:66-69
Classification method of ultrasonic images of fatty livers based on threshold segmentation
LIU Jin-zhu;WANG Jiang-he;HONG Hui-wen;LIU Yan-ling;MIN Le-quan
..............page:198-201
Truth degree function on set of formulas in propositional logic system Ln
MA Li-na;LIU Shuo;WANG Guo-jun
..............page:37-39
New algorithm for solving degree constrained minimum spanning tree problem
SUN Xiao-jun;LIU San-yang;WANG Zhi-qiang
..............page:40-42,47
Implementation of virtualization on private enterprise cloud storage system
ZENG Sai-feng;ZHU Li-gu;LI Qiang;ZHANG Fu
..............page:70-73
2D polygon morphing based on polygonal shape controlling
XU Ting;LIU Zhan-yi;HU Mei-gui
..............page:216-218
Priority-based lateral error recovery model in application layer multicast
XU Jian-zhen;XIE Chuan-chuan;MA Cai-ling
..............page:136-138,245
Traffic evacuation analysis for explosion and burning radius of CNG station
LI Hui;LUO Yong;MANG Shi-bo
..............page:230-233
Survey on machine vision systems based on FPGA
YUAN Kui;XIAO Han;HE Wen-hao
..............page:1-6
Research on logistics distribution center stowage vehicle scheduling problem
XIE Tian-bao;LEI Xi-ling;XI Wen-ling
..............page:237-240
Unified formulation of several multistage interconnection networks
ZHAO Cheng-gui
..............page:118-121
Research on adaptive genetic algorithm injected learning mechanism
ZHU Yan-guang;XU Yong-ping;ZHOU Xuan;ZHU Yi-fan
..............page:34-36,39
Unconstrained convex programming multi-surface modified twin support vector machine
XU Jin-bao;YE Qiao-lin;YE Ning;WU Mei-hong
..............page:29-33
Knowledge acquisition method in incomplete formal context
KANG Xiang-ping;LI De-yu;QU Kai-she
..............page:16-18,28
Application of D-S evidence theory in audit evidence fusion
CHEN Sheng-lei;CHEN Geng;XUE Hui
..............page:23-25
Research on indoor tracking algorithm for RFID network
YANG Gong-jian;LIU Yong;HAN Jian-song;HUO Hua
..............page:114-117,191
Cryptanalysis and improvement of forward secure threshold proxy signature scheme
SUN Mei;WEI Shi-min;ZHAO Bing
..............page:109-111
Novel hybrid GA based on bare bones PSO and its application
LEI Yang;LI Shu-rong;ZHANG Qiang;ZHANG Xiao-dong
..............page:7-10
Template matching based blur estimation method for out-of-focus images
ZHU Hong-liang;ZHANG Rong;YIN Dong
..............page:184-187,201
Formal concept analysis of attributes constrained by equivalent relation
MAO Hua;LI Bin
..............page:158-160,205
Modeling and FLOC spectrum properties of stable colored noise in non-linear system
LIN Zheng-jian;ZHA Dai-feng;QiU Tian-shuang
..............page:171-174
Fault injection method for testing mass storage system availability
PAN Qing;ZHUANG Ze-nan;WANG Xiao-jun;ZHANG Xiao-qing
..............page:85-87,94
FSVM connected with normal distribution probability
LIU Ting-ting;YAN De-qin;WANG Lin
..............page:210-212,233
Image encryption technology based On dual chaotic maps
LIN Ke-zheng;ZHONG Yuan
..............page:195-197,209
Fast BSE algorithm on ill-conditioned mixing matrix
BAI Lin;CHEN Hao
..............page:241-245
Research of parallel volume rendering of large-scale battlefield electromagnetic environment
YU Rong-huan;QU Shi;YANG Chao;WU Ling-da
..............page:19-22
Analysis on security of a class of unbalanced Feistel ciphers
WANG Nian-ping
..............page:26-28
Fast intra mode decision algorithm for H.264/AVC high profile
GU Mei-hua;YU Ning-mei;JIANG Chan;ZHU Lei
..............page:202-205
Simulation and spectral analysis of random sea wave
XU Jing-bo;BIAN Xin-qian;FU Ming-yu
..............page:226-229
Research on improved Markov process reliability model for high-performance disk array
WANG Xiao-jun;PAN Qing;ZHUANG Ze-nan;ZHANG Xiao-qing
..............page:95-97,174
Design and implementation of I/O trace collection system in distributed environment
ZHAN Ling;MA Jun;CHEN Bo-jiang;CHEN Wei-liang;LV Rui
..............page:88-90
Survey on applying evolvable hardware for pattern recognition
WANG Jin;CHEN Wen;KANG Xiong;LI Li-fang
..............page:180-183
Predicting Chinese prosodic phrase with height of syntax tree
YANG Hong-wu;WANG Xiao-li;CHEN Long;PEI Dong;GUO Wei-tong;CAI Lian-hong
..............page:139-143,167
Flexible hybrid RBAC model and inconsistency resolution
Nurmamat Helil;Kaysar Rahman;Azhar Halik
..............page:101-104
Efficient identity-based blind signature scheme
CHU Wan-xia;ZHANG Jian-zhong
..............page:112-113,164
Guarantee-based cloud computing architecture and risk analysis for guarantee agents
MANG Chang-li;YAN Mao-de
..............page:234-236,240
Fuzzy classification based on similarity measures between Vague sets
XU Chang-lin;WEI Li-li
..............page:161-164
Resource searching strategy of reducing redundancy in unstructured P2P network
WANG Jian-yong;GONG Fu-ting;LI Yu-ling
..............page:122-125
Application of rank-ordered filter in edge detection of defects
CONG Jia-hui;YAN Yun-hui;ZHANG Zi-qian;WEI Yu-lan
..............page:178-179,183
Research of disk array storage systems performance testing software
MA Na;ZHU Li-gu;CHEN Zhi-jie;HU Huai-xiang;YI Qi;YAN Chu-ping;YANG Fan
..............page:74-78
Comprehensive evaluation technology for networked storage system
ZHU Li-gu;YANG Xiao-shan;LUO Hong-yuan;HU Huai-xiang;YAN Chu-ping
..............page:61-65
Traceable scheme for anonymous communications in mobile Ad hoc networks
SUN Qing-ying;WU Ke-li
..............page:133-135,245
Semantic similarity computation between sentences
LV Qiang;DENG Wei;SONG Ling
..............page:150-153,229
Edge-based active contour model without Gaussian smoothing
FENG Yu-ling;HE Chuan-jiang;LI Meng
..............page:192-194
Research on modeling of high-performance disk array reliability test
PAN Qing;ZHUANG Ze-nan;ZHANG Xiao-qing;WANG Xiao-jun
..............page:82-84,132
New method for common factor enhancement in IR/vsible image registration
WANG Kun-peng;LI Zhuang;YU Qi-feng
..............page:206-209
Novel algorithm for fast extracting edges from massive point clouds
WANG Zong-yue;MA Hong-chao;XU Hong-gen;YANG Zhi-wei
..............page:213-215
Diversity-guided quantum-behaved particle swarm optimization gene expression data clustering algorithm
CHEN Wei;LI Cheng-yuan;SUN Jun;XU Wen-bo
..............page:11-15,22
Evidence theory information fusion algorithm based on fuzzy reasoning
WANG Yun-fei;LI Hui;LI Yun-bin
..............page:144-146
Scribble-based interactive mesh segmentation
YANG Fu-yan;ZHOU Ming-quan;DENG Qing-qiong
..............page:175-177
Multi-signers strong designated verifier signature scheme
LI Nan;WANG Shang-ping;ZHANG Ya-ling;WANG Xi
..............page:105-108
Automatic extraction and utility of multimedia object metadate in CAS
ZENG Sai-feng;ZHOU Jian-wei;ZHANG Fu;LI Qiang
..............page:79-81
Design of evaluation method of storage virtualization
ZHENG Liang;ZHU Li-gu;ZHAO Ting-tao;YI Qi;YAN Chu-ping;Hu Huai-xiang;YANG Fan
..............page:98-100,121
Improved hidden Markov models used in Kazakh part-of-speech tagging
HOU Cheng-feng;Gulila·Altenbek
..............page:147-149