Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2012 Issue 20
Model and algorithm for nodes decision of medicine logistics alliance under cooperative game
HU Zhengdong;LI Xiamiao;LI Lihua;WANG Guoming
..............page:32-38
Reconfigurable multiprocessor system-on-chip: survey of architecture
TANG Liu;HUANG Zhangqin;HOU Yibin;FANG Fengcai
..............page:39-45
Genetic algorithm improvement for Powell image registration
LI Wei;HE Pengju;YANG Heng;CHEN Ming
..............page:1-5
SIP video monitoring client design and implementation based on OMAP3530
LV Shiqin;ZHU Xiaojun;ZHANG Gang
..............page:81-86
Design and implementation of RDF mapping system
LV Yanhui
..............page:87-90,111
Soft sensor modeling based on improved extreme learning machine algorithm
ZHANG Dongjuan;DING Yuhan;LIU Guohai;MEI Congli
..............page:51-54
Algorithm for generating instances from given UML meta-model
CHANG Shanshan;ZHU Jiagang;DENG Yueshe
..............page:91-97
Simulating fishing optimization algorithm for solving matrix eigenvalues
CHEN Jianrong;CHEN Jianhua;WANG Yong;WEN Zhijuan
..............page:55-58,80
Study on network terminal to terminal reliability under capacity and delay constraint
QIAO Xiaodong;MAO Zhi;DENG Hongzhong
..............page:98-102
Improved symbol timing synchronization algorithm for OFDM systems
ZHAO Hailong;ZHANG Jian;ZHOU Jie
..............page:23-27
Coordinate interleaved space time coded spatial modulation scheme
NIE Zhong' er;WANG Anguo;QU Qianqian;XU Yuanxin
..............page:103-107
Variable step double chains quantum genetic algorithm
SHA Linxiu;HE Yuyao;CHEN Yanwei
..............page:59-63
Routing scheme of opportunistic network with Epidemic based on priority strategy
SUN Jianzhi;ZHANG Yingxin;CHEN Dan;HAN Zhongming
..............page:108-111
SVMs speech recognition algorithm implementation on DM6446
NIU Yanbo;ZHANG Xueying;LIU Xiaofeng
..............page:67-69,86
Application of data stream clustering algorithm in intrusion detection
HUANG Hongyan;AN Sufang
..............page:112-116
Privacy-preserving data publishing method for dataset with multi-dimensional sensitive attributes
WANG Shenghe;WANG Jiajun;LIU Tengteng;NI Weiwei
..............page:136-141
3D-SIC TSV fault-tolerant scheme based on multi-chains
WANG Wei;DONG Fudi;CHEN Tian;FANG Fang
..............page:75-80
Multi-level secure tunnel establishment protocol and its security analysis
CAO Lifeng;CHEN Xingyuan;DU Xuehui;WANG Huaipeng
..............page:117-122,135
Dynamic threshold signature scheme under special access right
WANG Jiandong;ZOU Hui
..............page:123-125,223
Improved method of tree matching using XML
YU Yajun;JIANG Ying
..............page:177-181,210
Reliable task scheduling in mobile grid
DU Lijuan;JU Hongjun
..............page:142-145,205
Wireless sensor network node localization based on shuffled frog leaping algorithm
GE Yu;LIANG Jing;XU Bo;YU Jianping
..............page:126-130,186
Improved method for RBF neural network parameters optimization
ZHANG Hui;CHAI Yi
..............page:146-149,157
Method of modification and feature selection of Zernike moment
CHEN Ling;LI Xiying;LUO Ling
..............page:182-186
Improved method to D-S evidence theory based on weight and matrix
YANG Jing;LIN Yi;HONG Lu;LI Zetao
..............page:150-153
Optimization algorithm of TDE based on ultrasonic echo envelope correlation
WANG Hongjiang;GUO Huijun;LI Junhuai
..............page:154-157
Attribute reduction in real-valued information systems
HUANG Xiaogang;CHEN Zichun
..............page:158-163
Method of copy-move forgery detection based on blur moment invariants
XU Guodong;LI Feng;XIONG Bing;YIN Changming
..............page:211-215
Voice activity detection with vehicle interior noise based on Hilbert-Huang transform spectral matrix
LIU Baisen;LU Zhimao;JIN Hui;SUN Meiling
..............page:164-167,215
Study of key frame extraction from hazard installation monitoring video
WANG Huadong;LIU Guozhu;LI Zhaoling
..............page:187-190,199
FIR digital filter design based on crossbreeding particle swarm optimization algorithm
WANG Ruifeng;KONG Weizhen;ZHAN Xuemei
..............page:168-171,176
New L-M algorithm with high accuracy for estimating fundamental matrix
MAO Yanming;FENG Qiaosheng
..............page:191-194,205
Immune classification algorithm under incomplete data
SHU Cailiang;YAN Xuanhui;ZENG Qingsheng
..............page:172-176
Resolving vehicle routing problem with improved sweep-particle swarm optimization algorithm
LI Defu;GUO Haixiang;LIU Longhui;LI Weiwei
..............page:216-223
Switching law design for candidate controllers of switched nonlinear systems
WANG Xia;TANG Yujun;WANG Peiguang
..............page:224-226,248
Prediction UGB based on integration of GIS/RS and radial basis function network
ZHANG Shiliang;YE Bixiong;XIAO Shouzhong
..............page:227-231,235
Super-resolution reconstruction of image via NSCT and improved BP network
FU Limei;PENG Guohua
..............page:195-199
Improved method for moving target detection
YANG Huifeng;CAO Jie;SHUAI Liguo
..............page:206-210
New application of Markov model in Cokriging
ZHANG Ting;DU Yi
..............page:28-31
FAHP-based feature evaluation for advanced radar emitter signals
ZHU Bin;JIN Weidong;YU Zhibin
..............page:18-22
Simulation optimization based on production of queuing theory of logistics system
MA Xuyao;QIN Xiansheng;CHENG Cheng
..............page:244-248