Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2012 Issue 21
Bound on the second derivative of rational Bézier curves
LI Ning
..............page:160-162,173
Image edge analysis algorithm based on block
GAO Liang;WANG Xiangwen;LIU Shunlan
..............page:197-200
Chinese short message text clustering using rescaling
LIU Jinling;FENG Wanli;ZHANG Yahong
..............page:146-150
Branch scheduling optimization on VLIW processors
SHI Lei;WU Xiao;TU Dengbiao;CHENG Gong;LIU Feng;YU Cuiling;REN Yan
..............page:41-44
Time-frequency blind source separation based on Hough transform
GUO Jing;ZENG Xiaoping
..............page:26-30
Emergency supplies scheduling based on K-mean cluster and LK algorithm
WANG Liang;XIE Jiancang;LUO Jungang
..............page:35-40
Design and implementation of domain-oriented intelligent searchengine
MO Qian;ZHANG Shu;WANG Fang
..............page:112-117,150
Research on fast path planning for UAV in complex circumstance
YANG Jun;ZHU Fan;ZHANG Jian;HAO Zhen
..............page:225-229,234
RPES: new approach of multi-dimensional information visualization
ZHENG Long;AO Yonghong;LIANG Yingying;SUN Yang
..............page:107-111
Moving target detection method based on artificial bee colony algorithm
CHEN Lei;ZHANG Liyi;GUO Yanju;LIU Ting;LI Qiang
..............page:178-181,221
Research of particle filtering algorithms in multi-modal noise
YANG Qiang;Senbai DALABAEV;LIAO Yanfang
..............page:123-125,136
Fabric defect detection approach based on texture periodicity analysis
ZHU Shuangwu;HAO Chongyang
..............page:163-166
Study for key generation based on iris feature
ZHOU Jun;CAO Qi;WANG Shuai
..............page:31-34,44
Study of fuzzy dendritic cell algorithm
GUO Chen;LIANG Jiarong;LUO Chao;PENG Shuo;WANG Bo
..............page:53-57
Application of SIFT algorithm in image registration of cigarette case
ZHU Meihua;WEI Chengke;ZHANG Suwei
..............page:244-248
Image representation based on visual vocabulary shape description
WANG Hongxia;YANG Kejian;ZHANG Min;AI Haojun;CHEN Xianqiao
..............page:191-196,204
Speech source localization based on microphone arrays and labview
FENG Daoning;WANG Hao
..............page:130-132,142
Research on personal hybrid recommendation overcoming data sparse problem
JIANG Wei;PANG Xiuli
..............page:21-25,30
Investigation of ray tracing in dynamic scenes on CPU-GPU hybrid paltform
ZHANG Jian;JIAO Liangbao;CHEN Rui
..............page:151-154,159
Effective model checking of network authentication protocol based on SPIN
MIAO Li;TAN Zhihua;ZHANG Dafang
..............page:62-67
Improved statistical identification method of high resolution range profiles
ZHAO Naijie;LI Hui;JIN Baolong
..............page:118-122
Simulation optimization for multi-type and batch production system based on Witness
ZENG Qiang;SHEN Ling;YANG Yu;WANG Yongzhi
..............page:209-216
Method for optimization of data replication in Hadoop
LI Yeda;LIN Weiwei
..............page:58-61
Modified predictor-corrector NURBS interpolation algorithm
NIE Mingxing;JIANG Xinhua;CHEN Xingwu
..............page:1-4
Adaptive interactive genetic algorithm oriented to car styling design
MENG Weidong;HUANG Yongqing;LU Qing;ZHANG Chong
..............page:240-243,248
Trimming Bézier surfaces over polynomial surfaces with polynomial curves
YANG Lianqiang;DAI Ximin
..............page:201-204
Studies on fine-grained access control based on trust in RBAC
XIA Qishou;YIN Xiaoling;WANG Ruchuan
..............page:75-78,111
Network traffic forecast based on weighted support vector regression
ZHAO Yun;XIAO Wei;CHEN Alin
..............page:103-106
Trademark image retrieval based on particle swarm optimization in multi-feature fusion
ZHANG Wenwen;WANG Bin;SHU Huazhong
..............page:186-190
Image splicing detection using multi-features amalgamation
ZHOU Wenbing;LI Feng;XIONG Bing
..............page:167-170,177
Distribution network reconfiguration using Improved Knowledge Evolutionary Algorithm
LI Xue;CUI Ying'an;CUI Duwu;TAO Yongqin
..............page:9-14
Intrusion detection algorithm based on fuzzy evaluation and clustering analysis
ZHAI Guangqun;WANG Yongsheng
..............page:99-102,122
Distributed data mining of association rules based on principle of locality
ZHANG Chunsheng;LI Yan;ZHUANG Liyan;TU Ya;ZHANG Yuchun
..............page:143-145,190
Novel algorithm for compressing recording data of power system
LI Fuliang;QIU Xinyan
..............page:217-221
Network security evaluation algorithm based on extension theory
LI Jingzhi;YIN Xiaochuan;HU Tu;LI Mingxun
..............page:79-82,88
SCR-based genetic algorithm and its application for telecommunication networks
LIU Guosheng;TANG Xiangjing
..............page:68-74
BEMD in weak and small target detection under complicated background
DENG Jianghua;WANG Ran;CHEN Zhong;CHENG Jiacong
..............page:205-208,216
Research and realization of high-precision synchronization of visual stimulator
WAN Hong;LIU Xinyu;ZHOU Liangjie;PING Yanna
..............page:133-136
Pre-obstacle detection in the case of motion blur
HU Xiaohui;SU Xiaoxu;SUN Miaoqiang
..............page:230-234
Research on phase error compensation of digital monopulse radar tracking system based on GA
WANG Tao;ZHANG Qingle;FU Lianqing;MA Yaning;TANG He
..............page:126-129,150
Application of Kmeans and maximum weighted entropy on color image segmentation
CAO Zhiguang;CHEN Wei;MA Rubao
..............page:174-177