Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2012 Issue 23
Study on invulnerability measure based on community structure of complex networks
LAN Mingming;HAN Hua;LIU Wanlu
..............page:67-71
Improved algorithm for extraction of boundary characteristic point from scattered point cloud
CHEN Yiren;WANG Yibin;PENG Zhangjie;JIANG Jiansheng
..............page:177-180,190
Research on recognition of phased-array radar based on analysis of pulses amplitude
CHENG Sheng;WANG Xing;CHU Wei;ZHANG Guanrong
..............page:120-124,211
Research on session length and user categorization in large scale P2P TV network
JIANG Zhihong;WANG Hui;LI Pei;FAN Pengyi
..............page:6-12
Multiuser detector based on blind adaptive Kalman filtering
SHI Peng;LI Hui;REN Mengying
..............page:131-134,138
Construction of Gbent functions
XU Guangkui;MA Fengli;LIU Heng
..............page:99-101,154
Analysis on similarity of multivariate time series based on Eros
GUO Xiaofang;LI Feng
..............page:111-114,119
Mean-shift image segmentation with importance map constraints
YAN Binbin;CHEN Qihua;PAN Xiang
..............page:173-176,238
Minimal covering for precomplete sets in partial four-valued logic
GONG Zhiwei;LIU Renren
..............page:52-57,76
Improved EBF algorithm of LDPC codes
TONG Ningning;ZHAO Danfeng;WU Yuping
..............page:32-35
Image segmentation based on automatic markers in compressed domain
SUN Ning;XIAO Guoqiang;YANG Heng;QIU Kaijin
..............page:168-172
Dynamic assignment of coupled tasks based on design iteration
XING Lebin;LI Jun
..............page:219-223,248
Fast adaptive backup routing for mobile Ad Hoc network
ZHOU Peng
..............page:21-26
Research on shortcut energy balance tree routing algorithm in LR-WPAN
WANG Junjie;CHEN Qigong;JIANG Ming;GAO Wengen
..............page:95-98,172
Decision analysis of logistics resources integration based on maximum utility of customer
TIAN Shuaihui;WANG Xu;WANG Zhenfeng;CHANG Lan
..............page:203-206,218
Fuzzy adaptive moving target tracking algorithm
YANG Zhehui;GUO Lei;HU Zhe;YU Bo
..............page:181-184
Fabric defect classification based on local binary patterns and Tamura texture feature method
JING Junfeng;ZHANG Huanhuan;LI Pengfei;WANG Jing
..............page:155-160
ID-based threshold signature scheme without random oracles
ZHANG Jianzhong;GAO Huanhuan;ZHAO Bingji
..............page:77-80
New method to analysis dynamic characteristics of Lorenz system
YANG Jianping;ZHU Ping
..............page:230-233
Effective noise image filter algorithm
HUANG Chunyan;ZHANG Yunpeng
..............page:165-167,172
Novel characteristic evaluation method based on entropy weight and fuzzy set and its application
RAO Hong;DONG Xiaorui;HE Yudong;LI Xiangwen
..............page:47-51
Detection model of traffic flow parameters oriented Internet of vehicles
WANG Chengliang;ZHANG Chen
..............page:212-218
Ant colony algorithm for path optimization of NC flame cutting under thermal deformation constraint
WANG Xiangluo;FAN Ganglong;YANG Chunlei
..............page:239-243
Maneuvering target tracking algorithm based on improved "self-adaptive turning rate" model
HE Xiuling;LI Tao;JIANG Yunfang
..............page:135-138
New research on intelligent fault diagnosis technology of on-board traction transformer
ZHU Jiaojiao;CHEN Tefang;FU Qiang
..............page:27-31,35
New motion estimation algorithm based on block partition structure
LI Zhimin;GUO Kewei;HUANG Hong;HUANG Kailiang
..............page:143-147
Fast intra mode decision for H.264/AVC encoding
LI Shiping;ZHENG Wenbin
..............page:191-195,202
Research on reinforcement learning negotiation strategy and its optimization
SUN Tianhao;DENG Junkun;CHEN Fei;ZHU Qingsheng
..............page:44-46,51
Markov logic networks with its application in trust based recommender systems
XIONG Zhongyang;LIU Ming;WANG Yong;ZHANG Yufang;TANG Rongjun
..............page:81-84,147
Speech/music discriminator based on sample entropy
YANG Song;YU Fengqin
..............page:125-127,154
Incremental construction algorithm for concept lattice
XI Huidan
..............page:115-119
Research on dynamic trust model in open network environment
LI Yundi;MU Kun
..............page:107-110
General mote platform design for wireless sensor network
QIU Ying;LI Shining;WU Wen;LI Zhigang
..............page:90-94
Saliency detection for sea visual scene using SVD
REN Lei;SHI Chaojian;RAN Xin
..............page:161-164,172
Dynamic parameter adjustment based chaos PSO algorithm
LI Feng;SUN Lijuan;ZHANG Jiajing
..............page:40-43,211
Research on pedestrian detection based on multi-detector fusion
ZHOU Shuren;TANG Chen;YIN Jianping
..............page:36-39,89
Relationship of direction of image in time domain and frequency domain
LI Xingmei;YAN Guoping;CHEN Liang
..............page:128-130
Study of hybrid flow shop rescheduling with consideration of machine breakdown
DING Shuai;LI Tieke;SHI Cantao
..............page:234-238
Secure proxy multi-signature scheme in standard model
CAO Feng;CAO Zhenfu
..............page:72-76
Optimal service resource allocation model for virtual organization
MA Shugang;YANG Jianhua
..............page:224-229,248
Research and improvement of Chinese word segmentation dictionary
YE Jiping;ZHANG Guizhu
..............page:139-142
Single-frame image superresolution using grouping SVR and KNR
CUI Jing;LIU Benyong
..............page:185-190
Designing network immunization method in email networks using graph partitioning
NIU Changxi;LI Lemin;XU Du
..............page:13-15
Dynamic access control algorithm based on trust model in cloud computing
WU Hui;YU Jiong;YU Feiran
..............page:102-106
Multiple-image parallel encryption algorithm based on chaotic picture and phase retrieval
ZHANG Wenquan;XUE Xia;ZHOU Nanrun
..............page:63-66
Efficient detail-preserving and fast nonlocal means filtering algorithm
XU Guangyu;TAN Jieqing;ZHONG Jinqin
..............page:196-202
Personalized (l, c)-anonymity algorithm based on clustering
WANG Pingshui;WANG Jiandong
..............page:16-20