Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2012 Issue 19
Registration algorithms of dental cast based on unorganized 3D point-cloud
ZHANG Xiaojuan;LI Zhongke;LV Peijun;WANG Yong
..............page:16-19
New combination prediction model of network traffic
DUAN Moyi
..............page:85-88
Image segmentation of multilevel thresholding method using Ncut
ZOU Xiaolin;FENG Guocan
..............page:174-178
Method of image edge detection based on wavelet filter and morphology
HUANG Jianling;ZOU Hui
..............page:187-190,242
Clustering ensemble algorithm based on adaptive nearest neighbors
HUANG Shaobin;LI Jian;LIU Gang
..............page:157-162
Modified artificial bee colony algorithm for numerical function optimization
WANG Huiying;LIU Jianjun;WANG Quanzhou
..............page:36-39
Representation and analysis of enhanced 3DR34 relation model
LI Zhanxuan;HE Yunbin;LI Song
..............page:131-134
Mictographs image registration of collagen fibers slices in periodontal ligament
YANG Ling;SUN Cuigang;WANG Zhongke;RAO Nini
..............page:167-170,229
Improved concentrated network selection method for isomerous wireless networks
ZhANG Zhijie;CHENG Zhi
..............page:101-105
Impact of limiting number of links on lifetime of wireless sensor network
GE Jun;WANG Zhichao
..............page:82-84,134
Multi-core chaotic motion analysis of nonlinear system with five equilibrium points
KONG Lingyun;FAN Yangyu;ZHOU Jingchao
..............page:145-149
New model of neighborhood used in segmentation of vehicle plate
MU Lijuan;JI Yan
..............page:191-196
[52,26,10] binary self-dual codes with type of (17, 3,1).
WANG Rong;WANG Junxin
..............page:46-47,100
Image detection algorithm research for asphalt pavement crack
LI Wei;ZHU Pingzhe
..............page:163-166,219
Performance evaluation based on grey clustering of segmentation
WU Zhichuan;PENG Guohua
..............page:197-200
Enhanced smart card based remote user authentication scheme
TANG Hongbin;LIU Xinsoug
..............page:61-65
Structured P2P approach for high effcient distributed task scheduling
FAN Yuanyuan;MI Xifeng
..............page:97-100
Research and application on prediction deformation of foundation pit based on wavelet neural network
WANG Bo;SHANG Anfan;GUO Chen;LUO Chao;LUO Wenlang
..............page:225-229
Semantic recognition of altered Chinese junk short messages based on lexical chain
LIU Jinling;FENG Wanli;GAO Li
..............page:135-139
State space model predictive control based on subspace identification
LUO Xiaosuo;ZHOU Guoqing;ZOU Tao
..............page:234-237,248
Study on digital IQ processing method of linear frequency modulation wideband PD radar
HE Songhua;NIU Lifang;ZHANG Jun
..............page:122-125
Twig pattern query algorithm over GML document
WANG Jingbin;MIAO Youmeng;PENG Zhixing
..............page:150-156
JPEG image forgery detection based on quantization noise
WANG Hong;LI Feng;XIONG Bing;YIN Changming
..............page:205-208
Research on pavement image denoising using transform domain and noise estimation
HAN Lina;GENG Guohua;ZHOU Mingquan
..............page:1-3
Predication of traffic flow based on local polynomial fitting
CHEN Xiangdong;ZHANG Yong
..............page:238-242
Research on advanced frequent itemsets mining algorithm
WANG Yan;LI Lingling;SHAO Xiaoyan
..............page:119-121,144
Reduction redundant coupled factors of cooperative anti TBM operations tasks
DONG Tao;LIU Fuxian;LI Xiang
..............page:20-22,27
Ultrasound pulsed wave doppler based on CUDA
YIN Huaguo;HE Xingwu;ZHOU Honglin
..............page:140-144
Further cryptanalysis and improvement of threshold signature scheme
ZHANG Jianzhong;ZHOU Yingying
..............page:106-108,113
Displacement control system design and simulation of giant magnetostrictive smart component
SUI Xiaomei;ZHANG Xiping;ZHAO Zhangrong
..............page:215-219
ID-based forward secure proxy signature scheme
ZHANG Xuejun;ZHANG Yue
..............page:66-68,118
Multi-feature object tracking algorithm based on spatial histogram
XU Kun;YANG Xiaojun;GUO Lanying
..............page:28-31
Network calculus based performance upper bounds analysis of cluster-tree wrieless sensor network
HONG Yanbing;WANG Yijun;LIU Guibo;XI Bin
..............page:48-53
Research of virtual driver\' s visual attention model
REN Xiaoming;XUE Qing;YANG Ji
..............page:209-214
New method for detecting and dividing vehicles blocking
YUE Hengjun;WU Jian;CUI Zhiming
..............page:179-182
Frame code based blind fingerprint scheme of anti-CTP attack
ZHAO Weiguang;YIN Zhonghai;ZHOU Yongjun;LIANG Shuang
..............page:69-76
Study of Gabor feature selection for iris recognition
JIN Qiuchun;TONG Xiaoli;BO Shukui
..............page:201-204
Study of speech enhancement algorithm based on multilayer spectral estimation
PENG Yuchen;WANG Zhong
..............page:114-118
Parsing algorithm based on adaptive templates for real-time heterogeneous data
ZHU Li;CHANG Fei;HE Jinxing;MI Yue;TIAN Yuanqiang
..............page:243-248
Extended rough set model in generalized incomplete information system
MO Jinglan;LV Yuejin;GUO Heng
..............page:126-130
Fingerprint image level compression algorithm based on wavelet packet
LI Jianpo;TANG Ning;ZHU Xuning
..............page:183-186
Measure method on similarity between Vague sets
XU Fengsheng
..............page:40-41,130
Convergence analysis of nonlinear Mean Shift algorithm
CAO Nan;WANG Ping;LI Jing
..............page:171-173,242
Extended role based access control
LI Shuang
..............page:54-60
Fuzzy attribute authentication scheme based on vector space
LIU Jia;WANG Jiandong;ZHUANG Yi
..............page:4-7
Thermodynamics genetic algorithm for constrained multi-objective optimization
TANG Tianbing;LI Ding;YAN Yi
..............page:32-35,45
Research on scan mechanism of wifi in typical mobile scenario
KANG Yuwen;ZOU Fnmin;KANG Xingbin;YAN Dan
..............page:89-96