Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 8
Contour symmetry axes algorithm applied to skull restoration
liu yan wu ; geng guo hua ; zhou ming quan ; li lei
..............page:156-158,169
Analysis on image fusion rules based on wavelet transform
li ya chun ; wu jin gang ; wang jing ; wang zuo qing ; wu jian jun
..............page:180-182,189
Application of irregular LDPC code in digital watermarking
chen zhi hong ; liang zuo
..............page:103-105
S-rough Vague set and its application
lu xiao yun ; yang yong ; wang ling yun
..............page:34-36
Application research of fuzzy logic theory in intrusion detection systems
huang guo yan ; chang xu liang ; gao jian pei
..............page:110-112
Theory of generalized tautology in subaigebras of system H_α
li shun qin ; wang guo jun
..............page:37-39,51
Equation diagnosis problem of three-valued models of society diagnosis
li zuo ; liu ren ren ; yang wang dong
..............page:32-33,36
Improved box dimension calculation algorithm for fractality of complex networks
yao can zhong ; yang jian mei
..............page:5-7,55
Tracking control of robot\'s trajectory based on FNN
hao xiao hong ; liu xiao peng ; yue he ping ; zhang fan
..............page:232-233,237
Study on detection of toxic gases in traffic environment
yang li ; wang lei
..............page:202-204
Study of Hp feature point location in visual speech synthesis
ma e e ; wang cheng ru
..............page:190-192
Spatial registration based on balanced VP-Tree
zou shui zhong ; jiang gui ping ; zhang zuo ; dai zhen zuo
..............page:159-162
Spatial overlapping based semi-supervised feature selection
chen hong ; guo gong de
..............page:130-132,140
Semi_supervised clustering algorithm based on seeds set and frequent itemset mining
zhao zuo ; shang xue qun ; wang zuo
..............page:123-126,176
Background reconstruction method for fast change in scene intensity
chen jian zuo ; chen ji rong
..............page:183-186
Improved algorithm of association rule mining in privacy preserving
shen zhong lin ; cui jian guo
..............page:133-136
Novel adaptive HARQ system based on channel condition
liu feng ; huang sheng ye ; feng sui li ; ye wu
..............page:99-102
New role-based privilege management model on crossing trusted-domain
wang jun ; zhang hong qi ; zhang bin
..............page:106-109
Engineering approach for generation of optimization test case set based on factor relationship
yu li zhong ; zhou jing cai ; yang jia hong
..............page:71-74
Mining of negative frequent patterns in databases
yuan ben gang ; chen li ; jin yan
..............page:117-119,143
Construction and optimization of biorthogonal wavelet filter bank using lifting scheme
wang hai tao ; ding xuan hao
..............page:137-140
Abstract interpretation theory and its application
yang bo ; zhang ming yi ; xie gang
..............page:16-20,44
Log-space constructible traversal sequences for undirected graphs
shi fu song ; qin zhi guang
..............page:11-15
Design and realization of MCNP output data analysis and visualization software
chen nian nian ; cai yong ; zhang jian sheng ; zhang jian hua
..............page:208-210,231
Mixed tabu search algorithm for logistics dynamic vehicle scheduling problem
wang xun bin ; lu hui juan ; zhang huo ming
..............page:228-231
Hybrid How Shop scheduling with special time constraints
xiao yong jun ; li tie ke ; yin zhao tao
..............page:205-207,231
Adaptive dynamic sliding mode control for robotic manipulator based on backstepping
wang hong rui ; feng yu dong ; liu xiu ling ; feng zhan fang
..............page:211-213
Study on GA_ANN based ambient air SO_2 and NO_2 concentration forecasting model
zhao hong ; liu ai xia ; wang zuo ; bai zhi peng
..............page:199-201,213
Improved incremental construction algorithm of Voronoi region
xu peng fei ; chen zhi gang
..............page:8-10
Genetic algorithm and haplotype assembly problem Weighted Minimum Letter Flips
yao xiong wu ; zheng jin hua ; li jing ; wen shi hua
..............page:217-220
Application of Curvelet transform on multifocus image fusion
an hong yan ; zhang zheng xiao ; yang wu nian
..............page:170-173,176
Approach of image segmentation using fuzzy clustering based on rough-set
zhang yue qin ; bai ya bin
..............page:177-179,248
Face recognition technology based on Quantum Neural Networks
gai huai cun ; zhang xiao feng ; jiang ze tao
..............page:187-189
Image fusion algorithm based on NSCT and non-negative matrix factorization
li mei li ; li yan jun ; wang hong mei ; zhang ke
..............page:21-24
High speed FFT butterfly unit and addresses generator optimization
wang zhen dao ; wang yu feng ; chen di ping
..............page:64-66,70
Improvement of SET protocol model and formal analysis via SMV
lu si mei ; zhang jian lin
..............page:113-116
Improved classification attribute selection scheme for decision tree
wang miao ; chai rui min
..............page:127-129
New dynamic materialized view selection adjustment algorithm in data warehouse
ge xue bin ; zhou li juan ; wang lin shuang ; shi zuo
..............page:120-122,143
Evaluation method of image scrambling degree based on texture feature
zuo ke ; zhang da fang ; xie dong qing
..............page:174-176
Surface-based DNA algorithm for Hamiltonian path problem
li chao peng ; cheng yun ; li ken li ; zhou xu
..............page:48-51
TDS-OFDM system based on imposed PN sequences
gong guo qiang ; ge wan cheng
..............page:81-83,102
Security analysis of network security components composition
li shu de ; zhang ming qing ; tang jun
..............page:84-86,98
Approximation algorithms for k-product centralized facility location problem
he xiao qiong ; chen chong ; li rong zuo
..............page:238-241
Calculation of system demarcation based on binocular location
zhuang guang ming ; cui jian wei ; peng zuo xiang
..............page:45-47
Fractal image encoding using fixed image as domain pool
hu zhi jun ; hu xiao bing
..............page:196-198
Stochastic particle swarm optimization algorithm based on cluster analysis
hao wu wei ; zeng jian chao
..............page:40-44
Constructing certificateless-based two-party authenticated key agreement protocol
hou meng bo ; xu qiu liang ; jiang zuo
..............page:1-4,28
Image digital watermarking based on HVS in improved Bandelet domain
wu xiao ; long zuo ; yin zhong ke ; wang jian ying
..............page:163-166
Design of BGP routing stability monitoring tool based on routing updates
li zuo ; zhang da fang ; zhang yuan zuo ; zeng bin
..............page:75-77,136
Dynamic simulation and hardware design for fractional-order chaotic system based on Simulink
yang hong ; li ya an ; li guo hui ; lin guan cheng
..............page:61-63
Multi-path routing protocol of node cover layer in WSN
zhang ji zan
..............page:87-91
Improved VolumeLIC method for three-dimensional vector field visualization
jiang xin li ; li zong min
..............page:167-169
Video texture synthesis algorithm using segment genetic algorithm
meng yu ; mao li zeng ; li wen hui ; ma yu peng
..............page:148-152
Security analysis and improvement of new certificateless proxy signature
shen jun wei ; yang xiao yuan ; liang zhong yin ; chen hai bin
..............page:96-98
Pattern recognition technology integrating Mahalanobis-Taguchi system and SVM
zeng jiang hui ; zeng feng zhang ; chen zuo hui
..............page:245-248
Application of improved fourth order cumulants in acoustic pyrometry
ge hui ; chen ping
..............page:234-237
Improved dynamic source routing protocol using new routing metric
hu ting ; pei ting zuo ; zhu xiao zuo ; tian shu juan
..............page:92-95
Research on generating model transformation rules automatically
liu zuo zuo ; jiang fan ; yang jun
..............page:56-60,95