Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2011 Issue 19
Improved deterministic tag anti-collision algorithm
LI Shuangqing;SU Hui
..............page:68-70,92
StreamQCTree:efficient compression structure for streamcube
GAN Liang;LIU Donghong;JIA Yan;HAN Weihong
..............page:140-143,185
Modified voice activity detection based on wavelets using order statistics tilter
LI Qiang;HUANG Bing;WANG Miao
..............page:144-146,162
Recognition of MPSK and MFSK signals based on distance and fuzzy
WANG Lanxun;WU Honglin
..............page:150-152,155
Iterative Wiener filtering-based real-time voice in noises
WANG Jingfang
..............page:132-135
Reverse 1-median problem under Hamming distance
BAI Yanqin;WANG Qin;WU Shulong
..............page:39-41
Design and implementation of dynamic negotiation mechanism in multi-domain
GUO Xiaoqing;XIE Zhonghong
..............page:21-23
Probabilistic teleportation of quantum state
REN Linyuan
..............page:24-26
Combined approach of polarity analysis on stock analyst
MO Qian;ZHANG Yujie;HU Hangli;ZHANG Huaping
..............page:222-225
Design of online thesis plagiarism detection system
QIU Zhuangli
..............page:12-14
Video images vehicle detection and recognition
ZHOU Tao;ZHANG Jiye
..............page:166-169
Approach of combined-kernel support vector machines
WAN Jiaqiang;WANG Yue;LIU Yu
..............page:35-38
Research on eigenface based on reordered DCT coefficients
ZHANG Nana;WU Xiang;MA Yan
..............page:197-199,237
New feature selection algorithm based on two-phase filter
JI Zhiwei;HU Min
..............page:190-193,206
Parallel particle swarm optimization combined K-means
ZHANG Jie;FENG Junhong
..............page:60-62
Effective approach to re-engineering of protocol\'s state machine model
TIAN Yuan;LI Jianbin;ZHANG Zhen
..............page:63-67
Ensembling clustering validation indices
LIU Yanchi;GAO Xuedong;GUO Hongwei;WU Sen
..............page:15-17,30
Research and construction of remote operation management simulation system for reservoir
PENG Jian;SUN Zhijiang;ZHANG Shuai
..............page:226-229,248
Distributed power control algorithm in CDMA systems
GU Fanglin;ZHANG Hang
..............page:118-120
Improved ant optimization method for travelling salesman problems on cuboid
XU Huali;SU Shoubao
..............page:46-48,53
Nonrepudiable multi-proxy multi-signature scheme with shared verification
WANG Zhibo;LI Xiong;DU Ping
..............page:93-96,127
Semantic attribute-based cartoon scene image search system
DENG Liqiong;CHEN Danwen;YUAN Zhimin;WU Lingda
..............page:1-4
Optimal strategies of developer Markov games equilibrium with incomplete information
LIU Tianhu;HUANG Wujun;XU Weisheng;WU Qidi
..............page:233-237
New multi-constrained variable-sized bin packing problem
DU Shaobo;ZHANG Guoji;LIU Qing
..............page:242-244,248
Research on network maximum flows algorithm of cascade level graph
PAN Hexin;YI Chongxin;LI Man
..............page:78-81,135
Method of retrieval 3D models based on spherical harmonics
TAN Xiao
..............page:194-196,202
Improvement for 3D reconstruction algorithm of intestine CT images by employing VTK
WANG Rui;WAN Wanggen;ZHANG Jinglin;QIAN Feng
..............page:186-189
Two sub-swarms exchange particle swarm optimization and its application in Shearlet image denoising
ZHAO Jia;CAO Hanwen;SUN Hui;LI Wenli
..............page:207-210
Non-line-of-sight ranging algorithm based on linear frequency pulse
ZHANG Shouxiang
..............page:230-232
Algorithm for generating human face texture images based on geometric model segmentation
CHEN Chanjuan;KANG Baosheng;FENG Jun
..............page:156-158
Image retrieval based on Contourlet transformation and Gaussian descriptors
LOU Pengxu;CAI Nian;ZHANG Guohong;DAI Qingyun
..............page:163-165
Multifractal model based on Gamma distribution for network traffic
ZHAO Lu;BAI Guangwei;SUN Yong
..............page:124-127
Rapid algorithm for left(right) entropy of character strings based on exterhal sort
ZHANG Haijun;PENG Cheng;LUAN Jing
..............page:18-20
Modified MAI suppression algorithm in MC-CDMA systems
LIANG Ruiyu;XI Ji;ZHANG Xuewu
..............page:153-155
Improved scheduling algorithm design for QoS in IEEE 802.16
ZHANG Bo;ZHANG Chunye;MA Xiaoqiang;YANG Shiqiang
..............page:97-100
Semi supervised discriminant neighborhood embedding algorithm
LIU Zhiyu
..............page:173-175,181
Peer-to-Peer network resource locating model of layer-management
ZHANG Ying;ZHOU Ya;HUANG Guimin;ZHU Xiaoshu
..............page:113-117
Case based reasoning and application based on dynamic data stream mining
DAI Qibo;NI Zhiwei;WANG Chao;JIANG Miao
..............page:31-34
Improved image fusion algorithm based on PCNN
GUO Chuanqi;WANG Wenge;CHU Binbin
..............page:176-178
Research of K-means algorithm combined with neighbors and density
WANG Chunfeng;TANG Yongzheng
..............page:147-149,158
Application of quantum blind and group signature in e-payment system
TIAN Yuan;WEN Xiaojun;GONG Yanjun;NIU Xiamu
..............page:108-112
Study on dynamic oil distribution based on GPS/GIS/RFID
WANG Xu;ZHAO Yongsheng
..............page:219-221,232
Neural network method applied to contour location
XIAO Ping;ZHOU Zhiheng
..............page:179-181
Multi-object planning model of urban emergency logistics facilities location
LI Guoqi;ZHANG Jin;LIU Sijing
..............page:238-241
Simulation and analysis of resource request task in enterprise storage grid
LIU Hao;TANG Peihe;LIU Jinwei
..............page:82-84,131
Simplified method and its implementation on computation of intensity map
LIU Ying;HAN Zhongming;DAI Mingli;HUANG Jinhui;SUN Jianzhi
..............page:203-206
Task planning combined weighted and/or tree and AOE-network
XIE Guoqi;PENG Jun;ZHANG Xiaoyong
..............page:49-53
Allocation granularity adaptive control algorithm for shared balance of concurrent multi-services
DONG Yuanyuan;NI Hong;DENG Haojiang;LIU Lei
..............page:5-8,34
Blind recognition of RS codes parameters
WEN Niancheng;YANG Xiaojing
..............page:136-139
Research on key technology of situation assessment in network situation awareness
FENG Xuewei;WANG Dongxia;MA Guoqing;LI Jin
..............page:88-92
Nonlinear collusion attack method on digital fingerprinting
CAO Peng;LI Qiaoliang
..............page:85-87,139
Improved strategies and researches of NSGA-H algorithm
CHEN Jie;XIONG Shengwu;LIN Wanru
..............page:42-45
Comparison and analysis of matrix multiplications on GPU and CPU
LIU Jinfeng;GUO Lei
..............page:9-11,23
Face recognition with single training sample based on fuzzy decision and MSD
WANG Xiaojie;LI Xiaodong
..............page:200-202