Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2012 Issue 28
Complex Internet router-level topology model
LIU Yu;PAN Lin;LIU Baoxu
..............page:1-5
Petri nets analysis on structure and function of metabolic network
DING Dewu;LI Wenze
..............page:42-46
Markdown money mechanism coordination model under VMI
LIU Pengfei
..............page:6-9,51
Membership queries using double bloom filters
TIAN Xiaomei;ZHANG Dafang;SHI Changqiong;YANG Xiaobo
..............page:10-15
Harmony search algorithm with BtW and application in BP network optimization
WANG Yingbo;WANG Lin;LI Yang;LI Zhongxue
..............page:52-56,76
Competitive decision algorithm for minimum ratio spanning tree
XIONG Xiaohua;NING Aibing
..............page:47-51
Speech recognition algorithm based on artificial bee colony modified DHMM
NING Aiping;ZHANG Xueying
..............page:16-19,41
Study on object oriented method for calculating out-of-gauge goods outline in railway
LEI Dingyou;WANG Juan;TANG Bo;ZHANG Yinggui
..............page:20-25,122
Parallel algorithm of contour renderling
WANG Zhibin;WAN Yufa;LUO Bing;WO Weifeng
..............page:61-65,116
Android multi-touch screen input system design and realization
SHI Jian;BAI Ruilin;ZOU Junyu;MA Tao
..............page:66-70
Research on data synchronization for integrated alignment based on IIR
SUN Wei;XU Aigong;CHE Lina
..............page:31-35
Access control based on clustering in Ad Hoc networks
CHENG Fan;WANG Xiaoming
..............page:97-100,111
Research and realization of generic identity based on functional language
LI Yang;YU Shangchao;WANG Peng
..............page:71-76
Improvement and implementation of general thread pool under Linux
TANG Fuqiang;YU Hongyang;ZHANG Ping
..............page:77-83
Conformance test cases design and implementation for identifier mapping server
XIAO Manman;SU Wei;YAN Huan
..............page:84-89
Reverse platform based on fine-grained taint analysis
YE Yonghong;WU Dongying;CHEN Yang
..............page:90-96
Study of electronic official documenet encryption based on modified RSA public-key code algorithm
ZHANG Shanwen;ZHOU Zhengguang;WANG Baocang
..............page:127-129
User selection algorithm for multi-user MIMO system
XIE Zhibin;TIAN Yubo;YAN Peiyu;LIU Qinghua
..............page:107-111
Rough boundary entropy for measuring uncertainty of information system
SHAN Xuehong;WU Tao;GAO Xiancai
..............page:147-149,177
Ranging and location based on chirp spread spectrum ultra-wideband technology
ZHANG Yan;WEI Shutian;ZHANG Shouxiang
..............page:130-134
Routing algorithm suitable for different node density for UWSN
HU Changjun;LI Xin;ZHONG Mingyu
..............page:112-116
Reduction of attribute in decision table based on clustering rate
LU Jing;ZHANG Tao;REN Honglei
..............page:135-138,233
Faster fully homomorphic encryption scheme over integer
TANG Dianhua;ZHU Shixiong;CAO Yunfei
..............page:117-122
Application of frequency similarity algorithm in audit rulebase
XIE Yueshan;FAN Xiaoping;LIAO Zhifang;QIU Lixia
..............page:154-158
Two dimensional DOA estimation based on compressed sensing
CHEN Yulong;HUANG Dengshan
..............page:159-163
Esthetical improvement of space-optimized tree visualization
WU Xiaozhi;CUI Jun
..............page:164-167
Classification of tea and stalk based on minimum risk Bayesian classifier
ZHANG Chunyan;CHEN Sun;ZHANG Junfeng;LI Tan
..............page:187-192,239
Use improved words filed general usage extracting Kazakh common-used words
WANG Yali;Gulila · Altenbek
..............page:168-173
Speech endpoints detection based on improved HHT in strong noisy environment
HOU Lixia;ZENG Yicheng;JIAO Bei
..............page:139-142,158
Feature extraction method of PMMW radiation image based on security inspection
QIN Wenjie;ZHANG Guangfeng;LOU Guowei
..............page:193-196
Detection algorithm of printing crosslines overprinting accuracy
LI Junfeng;TANG Zhengning;LI Miaoxin;PAN Danhong;CHEN Yuxi
..............page:174-177
Image steganalysis based on wavelet coefficient dependencies
XU Pan;SU Guangwei
..............page:178-182,213
Blind watermarking algorithm based on haar wavelet transform of block morphology
LI Min;ZHANG Xiaoying;LU Linju
..............page:183-186,217
Algorithm of image edge detection based on UGM grey forecast model
WU Zhichuan;PENG Guohua
..............page:214-217
Research on impact of introducing direct channel on supply chain numbers' strategies
CAO Zonghong;WANG Hongxi;ZHOU Yongwu
..............page:218-224
Genetic annealing algorithm for police officer scheduling problem
DAI Yanan;FENG Huayu;SUN Guoli
..............page:225-228
Optimum design for unit cell of composite material with periodicity
ZHAO Junfeng;LI Wei
..............page:229-233
Application of immune particle swarm algorithm in biological treatment process of wastewater
GAO Yuefang;LIANG Yongsheng;TANG Fei;ZHAN Shaobin
..............page:234-239
Delivery sequence limit single container packing problem
YU Lei;CHEN Guohong
..............page:240-244
Weight assignment research of improved entropy method in effectiveness evaluation
HUANG Guoqing;WANG Mingxu;WANG Guoliang
..............page:245-248