Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2012 Issue 32
Homotopy perturbation method for linear fuzzy differential systems
WANG Lei;GUO Sicong
..............page:30-32,207
Pitch detection method based on waveform extremum
SHI Rui;YE Liangliang;HE Qinghua
..............page:107-112
Translation rules extraction for statistical machine translation
LIU Ying;JIANG Wei
..............page:98-101,146
Harmony search algorithms for dynamic optimization of composite knowledge as a service
NI Zhiwei;YIN Daoming;WANG Li;LI Huaiying;WANG Shikai
..............page:212-217,243
Hop optimized unequal clustering routing algorithm for wireless sensor networks
BAI Dang;SHI Weiren;GAO Peng;XIE Sijia;LI Yanping
..............page:60-64
Note for definitions of similarity measures between Vague sets
SHI Yuqiang;WANG Hongxu
..............page:129-131,169
Personalized recommendation based on trust of user multi-faced interest
YANG Changchun;SUN Jing
..............page:80-84
Digital watermarking algorithm for PDF document
TAN Guolv
..............page:85-88
Predicting intelligibility of noise-suppressed speech
MA Jianfen;ZHANG Xueying
..............page:5-8
Oil-bearing formation recognition based on fusion of soft computing and hard computing
LI Defu;GUO Haixiang;LI Weiwei;ZHU Kejun
..............page:229-235
Video retrieval based on visual feature and structural spectral feature
ZHAI Sulan;ZHA Daoli
..............page:176-180
Support vector machine study by combining feature selection and learn strategy
LV Pin;ZHONG Luo;CAI Dunbo
..............page:140-146
New method of singular points accurate location for fingerprint
ZHANG Zulong;YANG Yongming;HAN Fengling;LIN Kunming
..............page:203-207
Research on interactive surfaces and relevant technologies
CHEN Yaxi
..............page:147-152
Hidden station detection in IEEE802.11 infrastructure network
HUANG Bo;ZHANG Xiaomin;ZHAI Linbo
..............page:72-75
Heuristic algorithm for flowshop scheduling with limited buffer constraint
YU Yanhui;LI Tieke;WANG Bailin
..............page:18-22
Feature enhancement method for bare land in remote sensing images
QIU Yonghong;TAN Yongzhong;ZHOU Guohua
..............page:196-199
Clustering method based on quantum particle swarm optimization
YE Anxin;JIN Yongxian
..............page:52-55,97
On stowage planning for mult-port container transportation based on stability constraint
SUN Junqing;CHEN Chen;LIU Fenglian
..............page:236-243
Study on multi-stage fuzzy multiple attribute decision making based on Vague set
JIANG Xunlin;YAN Jun;SU Zhenglian;GUO Jianyi
..............page:102-106
Imaging processing method for linear array ISAR based on image entropy
GAO Qiang;XUE Le;WANG Zhennan;WEI Xin
..............page:125-128,248
ID-based threshold group signature scheme without trusted party
LI Haifeng;LAN Caihui;ZUO Weiping;MA Haiyun
..............page:89-93
Analysis and improvement of signature scheme with message recovery
LI Xiaoxiong;ZUO Liming;TANG Pengzhi
..............page:69-71,163
Spatial information based fuzzy C-means for nerve sliced image segmentation
ZOU Jijie;TANG Ping;ZHANG Yi;LUO Peng;JIANG Xiaoping;WANG Ting
..............page:164-169
Method for removing point clouds in overlapping airborne LiDAR strips
PENG Jiangui;MA Hongchao;WU Jianwei;WANG Zongyue;GAO Guang
..............page:33-38,112
Method of constructing bivariate osculatory rational interpolation function
JING Ke;KANG Ning;WANG Maohua
..............page:56-59,207
Blurring detection in image forensics based on posterior probability
PAN Shengjun;YANG Benjuan;LIU Benyong
..............page:181-186
Study on fault tolerance of E-2DMesh networks based on node stochastic failure probability
DOU Qiuli;LIANG Jiarong;WANG Xinyang;CAO Ruhui
..............page:76-79
Subspace-based semi-blind channel estimation for MIMO-OFDM systems
YANG Jie;GAO Yuexing;ZHU Weiping;MENG Qingmin
..............page:117-120,228
Shot boundary detection based on structure preserving projection
XIAO Yongliang;ZHU Shaoping;LIU Chaoqun
..............page:187-190
Self-assembly model of simple arithmetic in DNA computing-subtraction
SUN Shouxia;LIU Wei;GUO Ying;MENG Dazhi
..............page:39-42
Method of facial skin image diagnosis
LI Chenglong;WU Fuhu;TANG Jin;LUO Bin
..............page:200-202,243
T/4 coherent integration fractionally spaced multi-modulus blind equalization algorithm
HAN Yingge;GONG Xiuli;GUO Yecai
..............page:113-116
Joint TDOA ranging and locating algorithms for TDMA multi-target
WANG Xu;HE Zishu
..............page:121-124,175
Algorithm for contour clipping against general polygon window
ZHAO Hongbo;ZHANG Han
..............page:170-175
Multiple information projection based on locality preserving projections
LIN Kezheng;LI Shu;LIN Sheng
..............page:208-211
Urban travel time prediction model based on floating car data mining
LI Huibing;YANG Xiaoguang
..............page:9-13
Wingtip tracking algorithm based on shape context and particles filter
HOU Jianbo;GU Hongbin;SUN Jin
..............page:191-195
Elaborate bus load forecasting about lean grid security check
CAI Jianbiao;LUO Diansheng;HE Hui;CHENG Yiming;LIAO Feng;GUO Jingren
..............page:218-223,243
New intrusion detection method based on fuzzy kernel clustering algorithm
LIU Yongfen;CHEN Zhi'an
..............page:65-68
Research on segmentation method for silicon steel surface defect based on structure tensor and active contour
SONG Kechen;YAN Yunhui;WANG Zhan;HU Changfa
..............page:224-228
Contour extraction based on gradient saliency
LI Dongyang;WANG Ping;GAO Yinghui;QU Zhiguo
..............page:157-163
UEFI malicious behavior detection model based on minimal attack tree
JIANG Zhengwei;WANG Xiaozhen;LIU Baoxu
..............page:14-17,46
Design and implementation of certificates query scheme for network isolation
CAI Guoming;WANG Yadi;WANG Miao;LING Yongxing
..............page:94-97
Research and design of enhanced Anti-Xprobe2
MA Junliang;WANG Xili;HE Juhou;XIAO Bing
..............page:1-4,112
Orientation analysis of Web review based on template matching
WANG Xiaodong;LI Yongbo;ZHENG Ying
..............page:136-139,199