Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2013 Issue 24
DDoS attack detection based on fast fractional Fourier transform
CHEN Shiwen;GUO Tong;HUANG Wanwei
..............page:4-7
New algorithm for determining delay time by mutual information
HE Peng;ZHOU Deyun;HUANG Jichuan
..............page:8-10,54
Road traffic accidents prediction based on optimal weighted combined model
ZHAO Ling;XU Hongke;CHENG Hongliang
..............page:11-15
Wolfberry classification method based on machine vision
WANG Lvcheng;TAN Junmei;WANG Xiaopeng;LEI Tao
..............page:16-18,23
Efficient point pattern matching algorithm using graphical model
HE Feiyue;TIAN Zheng;DUAN Xifa;ZHAO Wei
..............page:19-23
New entropy formular for intuitionistic fuzzy sets and its application
SHEN Xiaoxue;GUO Sicong
..............page:28-31,37
Method of non-uniformly sampled-data system identification based on coop-erative PSO
WANG Tao;LIN Weixing;BAO Jianmeng
..............page:32-37
(∈,∈ Vq(λ,μ)) - fuzzy prime ideals of N(2,2,0) algebras
ZHANG Jianzhong;FU Xiaobo;LIAO Zuhua
..............page:41-44
Efficient provably secure certificate-based signature scheme
HUANG Rufen;NONG Qiang;HUANG Zhenjie
..............page:55-60
Weighted cooperative spectrum sensing algorithm based on improved energy detection
ZHAO Xiaolong;ZHAO Hangsheng;CAO Long;XU Jinyong
..............page:61-64,129
Skipping optimization for P2P video on demand system
DU Lei;JIN Zhigang;WANG Xiaohai
..............page:65-69
Blind extraction algorithm of embedded messages based on CSR-ICA
FENG Fan;WANG Jianhua;ZHANG Zhengbao;WANG Huiping;QI Hongjun;ZHANG Hailong
..............page:70-73
Fingercode based remote fingerprint authentication scheme using homomorphic encryption
HE Kang;LI Mengxing;ZHAO Jian;FENG Quan
..............page:78-82
Dynamic joint call admission control algorithm in heterogeneous cellular systems
LING Yutao;WU Jianbin;LIU Lili
..............page:88-92
Research of Linux server multiple Ethernet ports load balancing algorithm
XING Fu;YANG Feng;YAN Xiaoxiang;WANG Wenzhi
..............page:93-96
Novel designated verifier signature with message recovery
WANG Feng
..............page:97-99,143
Non-control data attacks prevention through Anomalous Path Lazily Detection
WANG Ying;ZHANG Lantu
..............page:100-104,121
Improved K-means algorithm based on expectation of density and clustering validity index
HE Yunbin;XIAO Yupeng;WAN Jing;LI Song
..............page:105-111
New model analysis method of combined kernel Support Vector Machine
XU Lixiang;LI Xu;LV Wanli;LUO Bin
..............page:112-115
Random projection algorithm for outlier mining technology research
LI Qiao;ZHOU Yinglian;HUANG Sheng;MA Xiang
..............page:122-129
Shot boundary detection using Biased-SVM in H.264 compressed domain
YOU Yunxi;ZHANG Endi;GOU Zhijian
..............page:138-143
Fast fractal image encoding algorithm based on improved moment of inertia feature
LI Gaoping;YANG Jun;CHEN Yihong
..............page:144-148
Detection algorithm research of online real-time microelectronics packaging position
LI Changyou;WANG Wenhua;SHANG Jingyu;JIA Mingming
..............page:149-151,156
Research and optimization of landmark matching algorithm for meteo-rological satellite image navigation
GUO Qiang;YANG Lei;ZHAO Xiangang;FENG Xiaohu;LIN Weixia;ZHANG Zhiqing;WEI Caiying
..............page:152-156
Image segmentation on Possibilistic C-Means clustering algorithm based on Markov spatial constraint
ZHOU Tongtong;YANG Huixian;LI Miao;TAN Zhenghua;ZHANG Jianbo
..............page:157-160
Image threshold segmentation method based on CSACS
TONG Chengyi
..............page:161-164
Comparison study of two numerical schemes for PDE-based fusion method
LIU Kai;KOU Zheng;LUO Limin
..............page:165-171
Iris location algorithm using orientation gradient and Random Sample Consensus
HE Zunliang;CAI Biye;LI Feng;ZHANG Dengyong
..............page:172-174,199
Method of on-line Uyghur handwriting recognition using HMM
CHEN Xiaojiao;Halmurat·MAMAT
..............page:175-178,237
Improved real-time camera video mosaic method
XU Jie;JIN Xiangliang;BAI Ruiguang
..............page:179-181,237
Image filtering algorithm based on granular computing theory of quotient space
GAO Zhenglong;WU Tao;CHEN Xiaobo;YANG Yingying
..............page:182-185
Automatic repair of lung boundary concave in chest CT images
ZHANG Xin;WANG Bing;YANG Ying;WANG Miao;WU Chen;ZHANG Jinxing
..............page:191-194,218
Method for multiple speech source localization based on sub-band steered response power
NI Zhilian;CAI Weiping;ZHANG Yidian
..............page:205-209
Independent Component Analysis based denoising for blind multiuser detector
BAI Xiahong;LI Hui;XING Gang
..............page:210-213
H-infinity fault tolerant guaranteed cost control for a class of network con-trol system with time delay
LIU Xinjuan;SUN Wen’an;LI Pixian;PEI Bingnan
..............page:224-228
Optimization for military AS/RS storage location reassignment based on Ge-netic Algorithm
CHEN Yuanwen;WU Xiaobo;SUN Yaolei
..............page:233-237
Risk assessment method on train control system using Bayesian network
CHE Yulong;SU Hongsheng
..............page:238-242
Flexible job-shop scheduling based on multiple ant colony algo-rithm
XUE Hongquan;WEI Shengmin;ZHANG Peng;YANG Lin
..............page:243-248,261
CO concentration detection based on OBLPSO-LSSVM
ZHANG Yu;TONG Minming;DAI Guiping
..............page:249-252,261
Time delayed input identification of a kind of networked control system
SUN Bin;LI Nan;SHI Yang
..............page:253-255
Rollover warning algorithm for heavy vehicles
HE Hao;SUN Tao;WANG Yansong
..............page:256-261
Time delayed input identification of a kind of networked control system transmission line
CHEN Youhui;WANG Yaonan;XIAO Zan;DONG Xiaojian
..............page:266-270