Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2016 Issue 21
Research on face detection, tracking and recognition system based on video surveillance
HU Yifan;,HU Youbin;,LI Qian;,GENG Dongdong;
..............page:1-7,35
Clustering algorithm of remote sensing image based on object oriented
CHEN Renxi;,LI Xinhui;,ZHOU Shaoguang;
..............page:8-13,93
Zeroth-level classifier system with average reward reinforce-ment learning
ZANG Zhaoxiang;,LI Zhao;,WANG Junying;,DAN Zhiping;
..............page:14-20,48
Asymptotic fitting optimization technology for source-to-source compile system on CPU-GPU architecture
WEI Hongchang;,ZHU Zhengdong;,DONG Xiaoshe;,NING Jie;
..............page:30-35
Salient object detection based upon region contrast and background prior
ZHANG Qing;,LIN Jiajun;,SHI Yanjiao;
..............page:36-41
Migration cost-aware dynamic consolidation of virtual machines algo-rithm
ZHANG Huan;,LI Renfa;,HUANG Jing;
..............page:42-48
Multi-granulation fuzzy soft rough set model
LIU Yanjun;,ZHANG Xiaoxia;,WU Hongping;
..............page:49-56,133
Adaptive genetic algorithm for problems with interval and hybrid indices
JI Xinfang;,KANG Xiangnan;
..............page:57-62
Generalizations of closure operators and neighborhood systems
ZHAO Fangfang;,LI Lingqiang;
..............page:68-71
Flocking analysis of multi-agent systems with time-delay
SHI Lin;,JIN Yinghua;,WU Chen;
..............page:72-75,87
New medical image classify approach based on decision tree twin support vector machine
ZOU Li;,JIANG Yun;,CHEN Na;,SHEN Jian;,HU Xuewei;,LI Zhilei;
..............page:76-80
Lucene index accelerated scheme based on large amount of data
LIU Xin;,CHEN Wu;
..............page:94-100
Multi-level immune intrusion detection model for cloud computing
DONG Feng;,ZHOU Pengxu;
..............page:101-104,174
Tracking area list design method based on tracking area correla-tion
KUANG Xiaohong;,MAO Jianxu;,WANG Yaonan;
..............page:105-110
Detection of application layer DDoS attacks based on clustering
SUN Jian;,LIU Yuan;,ZHAO Xinjie;
..............page:116-120,139
Pixel normalization method applied in malware visualization analysis
REN Zhuojun;,HAN Xiuling;,KONG Defeng;,CHEN Guang;
..............page:121-125
Research on function call graph based method for similarity analysis of binary files
SUN He;,WU Lifa;,HONG Zheng;,XU Mingfei;,ZHOU Shengli;
..............page:126-133
Method of program tracking based on heuristic recording
LIN Wei;,ZHU Yuefei;,CAI Ruijie;
..............page:134-139
Quantum secret sharing scheme based on cluster states
CHENG Siting;,TAN Xiaoqing;
..............page:140-145,161
Realizing speech to gesture conversion by keyword spotting
ZHAO Na;,YANG Hongwu;
..............page:146-151,194
Research on algorithm of spectral feature extraction for speech emotion recognition
TANG Guichen;,FENG Yueqin;,LIANG Ruiyu;,BAO Yongqiang;,ZHAO Li;
..............page:152-156,174
Hybrid algorithm of firefly algorithm and self-adaptive flower pollina-tion algorithm
BIAN Jinghong;,HE Xingshi;,YANG Xinshe;
..............page:162-167,217
New improved fruit fly optimization algorithm
DING Guoshen;,ZOU Hai;
..............page:168-174
Haar characteristics LBP text feature for pedestrian detection
ZHOU Shuren;,WANG Gang;,XU Yuefeng;,SHE Kaisheng;
..............page:175-179
Bag of convolutional words networks for visual recognition
XUE Kunnan;,XUE Yueju;,MAO Liang;,LIU Hongshan;
..............page:180-187
Efficient segmentation algorithm for white blood cell
HUANG Zhen;,ZHAO Jianwei;,CHU Jianjun;,CAO Feilong;
..............page:188-194
Fast image segmentation algorithm based on noise benefit
NIU Yirong;,WANG Shitong;
..............page:195-201,217
Effective extraction method of the Yellow River mainstream from remote sensing image
MA Ning;,YANG Sen;,SHE Hongwei;
..............page:202-205,240
Improved optimal stitching line applied to image stitching
SUN Peishuang;,HAN Qirui;
..............page:218-221,234
Indoor map matching method based on link table
TANG Shunbiao;,LU Yuanyuan;
..............page:222-228
Nested-Logit model of combined selection for commuters analysis in urban transportation corridor
SHEN Li;,ZHANG Tong;,WANG Zhouquan;
..............page:229-234
Tool combination optimization for complex triangular mesh model
YE Lifei;,HUANG Changbiao;,YANG Ruxiao;
..............page:235-240
Optimization of question upload method in online examination system
LIU Siting;,GU Naijie;,LIN Chuanwen;
..............page:241-246
Optimization of tracing target curve of high speed train ATO based on genetic algorithm
MENG Jianjun;,YIN Ming;,QI Wenzhe;,WANG Anming;,XU Ruxun;
..............page:247-251
Multiple model fault diagnosis method for quadrotor UAV
XU Xuesong;
..............page:252-257
Improved bacteria foraging optimization for disassembly line balancing problem
HU Yang;,ZHANG Zeqiang;,LI Ming;,SU Yajun;
..............page:258-262
Capability and risk analysis of wartime logistics center using queueing Petri nets
HAO Jialiang;,ZHOU Kuanjiu;,HOU Gang;,JIANG Haiyang;,GUO Cheng;
..............page:263-270