Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2012 Issue 18
Multi-secret sharing scheme without dealer based on Hash function
LI Jing;LI Zhihui;LAI Hong
..............page:64-65,131
xin xi dong tai
..............page:封2
Improved repair-based CSP algorithm for reheating furnaces scheduling
ZHAO Yanyan;LI Tieke;WANG Bailin
..............page:23-26,56
Similarity comparison of triangular mesh models based on region segmentation
MA Yuankui;ZHANG Shusheng;BAI Xiaoliang
..............page:32-37
Combined forecasting model of principal component analysis for SaaS operation
ZHANG Jing;WU Jiang;LI Hong\'an;ZHAO Jiandong
..............page:217-222,230
Clustering algorithm based on relay region for WSN
HU Changjun;YAO Shanhua
..............page:104-109
Interface automata model of database activity monitoring tool
XUE Yi;YE Xiaojun
..............page:110-114,171
Closure of fuzzy tree automaton languages.
WANG Zewen;SHU Lan;WENG Fuli
..............page:61-63
Research of neighbor particle search algorithm based on CUDA
LIU Dan;CHEN Jiejie
..............page:53-56
Tibetan recognition based on geometric shape analysis
ZHOU Wei;CHEN Liangyu;ZENG Zhenbing
..............page:201-205
Novel dynamic stream characteristic selection algorithm
guo lei ; wang ya di ; chen shu zuo ; zhu zuo ; yi peng
..............page:4-8
Novel RFID authentication protocol with ownership transfer property
ZHANG Longxiang
..............page:95-97,118
Improved Monte Carlo filter for target tracking
ZHU Juan;MENG Fanying;HAO Junhong;YU Dahai;SUN Shaofu
..............page:168-171
File format of digital image in vector and raster data structure
XUE Guanchen;YAO Dongxing;SUN Honglei;CHEN Xi;SONG Ruixia
..............page:164-167
Efficient certificateless proxy signature scheme
chen hu ; zhu chang jie ; song yong sheng ; yang yi ; sun mei
..............page:89-94
Probability-rough model on α-dominance relationship and its application
MAO Junjun;YAO Dengbao;WANG Cuicui;WU Tao
..............page:48-52
Improved knowledge reduction algorithm with fuzzy rough set
ZHOU Zhiping;LIU Fuxian
..............page:132-135
Optimization of power and time allocation in cognitive radio networks
ZHANG Luhua;CHEN Zhong
..............page:84-88
Service resource\' s adaptive perception and load-balance of data exchanging bus
WEN Rui;ZHANG Qian;YANG Rui
..............page:236-242,248
Speech emotion recognition based on improved MFCC with EMD
TU Binbin;YU Fengqin
..............page:119-122
Survivable routing strategy in IP over WDM networks
ZHANG Li;ZHANG Ning;LI Zhinan
..............page:81-83,109
License plate character images authenticity detection based on features and prior knowledge
LUO Huiwu;TANG Yuanyan;LAN Lijun;WANG Yi
..............page:187-192,196
Research on multi-Agent fuzzy Q-learning in intelligent office environment
WANG Haizhen;LIAN Zuozheng;TENG Yanping
..............page:231-235
Recognition of lineaments on road from high resolution remote sensing image
YUAN Congzhou;ZHANG Jinfang;PENG Jin
..............page:142-147
Soft intuitionistic fuzzy sets
NIU Gang
..............page:45-47
Perspective N line problem based on dual numbers
ZHANG Caixia;SUN Fengmei
..............page:38-44
Constraint conditions and new constructional method of Vague entropy
GAO Mingmei;SUN Tao
..............page:27-31
Improved method of attribute weight based on rough sets theory
TAN Zongfeng;XU Zhangyan;WANG Shuai
..............page:115-118
Clustering method based on concept and semantic similarity
JIAO Fenfen
..............page:136-141
Research on enterprise performance evaluation model in supply chain management
LI Jianfeng;CHEN Yan;YANG Xiaoyu;LIU Shuyong
..............page:243-248
Very sparse circulant matrices in image reconstruction
YANG Hairong;FANG Hong;ZHANG Cheng;WEI Sui;PAN Gen\'an
..............page:206-211
C-V model with edge information
HE Ruiying
..............page:181-186
MAC protocol based on orderly competition in wireless sensor networks
ZHAO Xiaochao;ZHENG Mingcai;LIAO Ruihua
..............page:76-80,141
Research on file-slice model for data security storage
ZHANG Hong;LU Songfeng;ZHAO Youqiao;XU Yongkang;HU Heping
..............page:66-70
Algorithm of parameter estimation of HMM via Gibbs sampling
ZHU Chengwen;LI Bing;HU Kui
..............page:57-60
Traffic flow forecast based on optimal order fractional neural network
LI Xin;XING Likun
..............page:226-230
ICP method improved by constraints for point cloud registration
ZHANG Lei;JI Zhihang;PU Jiexin;KIN Wei
..............page:197-200
Survey on content-based retrieval of 3D human motion data
LIU Xianmei;ZHAO Dan
..............page:148-153,163
Noise spectrum estimation algorithm based on constrained variance
ZHOU Chengyan;ZHOU Qiang;GU Jihua;ZHAO Heming;TAO Zhi
..............page:127-131
Study on data sharing mechanism based on dynamic content routing in Ad Hoc networks
MA Ying;ZHANG Laomo;WANG Guodong
..............page:98-103
Application in multi-models rendering with new implementation of progressive mesh
FENG Qin;LUO Jianxin;NI Guiqiang
..............page:175-180