Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Electronica Sinica
0372-2112
2008 Issue z1
ICEMDA: An Interoperable Configurable Executable Model Driven Architecture
ZHAN De-chen;FENG Jin-dan;NIE Ian-shun;XU Xiao-fei
..............page:120-127
Local Online Time Series Prediction Based on the Residual Compensation with Online SVR
LIU Da-tong;PENG Yu;PENG Xi-yuan
..............page:81-85
A Discussion on Relationship between Revisable and Non-revisable Document Formats
LI Ning;TIAN Yin-gai;HOU Xia;LIANG Qi
..............page:128-132
Multi-Scale Sequence Spectrum Kernel Optimization Through SDP for Signature Verification
QIU De-hong;PAN Xin-xin;CHEN Chuan-bo
..............page:44-49
Search Result Clustering Based on Centroid Optimization by Ontology Extraction
CHEN Yi-heng;QIN Bing;SONG Fan;LIU Ting;LI Sheng
..............page:166-170,156
3D Solid Models Rendering Based on GPU Acceleration
YUAN You-wei
..............page:144-146
Rough Set Based Multi-Class Core Vector Machine
NIU Gang;SHANG Lin
..............page:55-59,49
The Dynamic Distribution Smoothing Technique Based on Time Series Analysis
HUANG Yong-wen;HE Zhong-shi;WANG Hai-yan
..............page:147-151
The Feature Selection of Regional Style Classification of Chinese Folk Songs
LIU Yi;WEI Lei;LIU Zi-li;WANG Peng
..............page:152-156
An Adapting Image Coding Method Based on Implicit ROI
SUN Chao;WANG Jian-feng;JIANG Shou-da
..............page:171-174,137
A Commodity Workflow Mining Approach Based on RFID Data Sets
DUN Hai-qiang;ZHAO Wen;DENG Peng-peng;ZHANG Shi-kun;WANG Li-fu;TAN Jie
..............page:86-93
Research on P2P-Based RFID Code Resolution Network Architecture and Algorithm
LIU Xue-yang;ZHAO Wen;ZHANG Shi-kun;WANG Li-fu
..............page:102-108
A Random Subspace Method for Co-Training
WANG Jiao;LUO Si-wei;ZENG Xian-hua
..............page:60-65
Clustering-Based Feature Selection
JIANG Sheng-yi;ZHENG Qi;ZHANG Qian-sheng
..............page:157-160
An Improved Co-training Text Categorization Algorithm Based on Diversity Measures
TANG Huan-ling;LIN Zheng-kui;LU Ming-yu
..............page:138-143
A Strategy to Form Agent Coalition Based on Encouragement
LI Jian;JING Bo;YANG Yi-xian
..............page:71-75
A New Method for Restrain the Cross-terms of Time-Frequency Distributions
WANG Yong;JIANG Yi-cheng
..............page:161-165
A New Motion Estimation and Intra-frame Prediction Method forH.264 Video Coding
LI Shao-zi;SU Song-zhi;CHENG Yun;SUN Yan;GUO Feng
..............page:175-180
A formal Specification of EPCIS Discovery in the RFID Network
LI Xin-peng;ZHAO Wen;ZHANG Shi-kun;WANG Li-fu
..............page:9-18
Research on the Kind of Dynamic Fuzzy Machine Learning Algorithm
XIE Lin;LI Fan-zhang
..............page:114-119
Transfer of Reinforcement Learning:The State of the Art
WANG Hao;GAO Yang;CHEN Xing-guo
..............page:39-43
Weighted Laplacian Clustering Algorithm
HUANG Peng-fei;ZHANG Dao-qiang
..............page:50-54
Research on Key Techniques of Publish/Subscribe System in RFID Information Services
LIU Dian-xing;ZHAO Wen;DENG Peng-peng;ZHANG Shi-kun;WANG Li-fu
..............page:94-101
Image Perceptual Hashing Based on Human Visual System
ZHANG Hui;ZHANG Hai-bin;LI Qiong;NIU Xia-mu
..............page:30-34
Pattern Based Code Generation Method for the Business Component
FENG Jin-dan;ZHAN De-chen;NIE Lan-shun;XU Xiao-fei
..............page:19-24
Research on Composite Event Detection in RFID Middleware Based on Colored Petri Net
YE Wei;HUANG Yu;ZHAO Wen;ZHANG Shi-kun;WANG Li-fu
..............page:1-8
Adaptive Steganography Based on Hilbert Filling Curve
DAI Yue-wei;LIU Ouang-jie;YE Shu-guang
..............page:35-38,24
A Planning-based Method of Risk Process Modeling for Information Security
WANG Zhen-zhen;WU Xiao-yue;LIU Zhong
..............page:76-80,70
A Face Region Hierarchical Encryption Algorithm for Palette Images
HAN Qi;WANG Zhi-fang;NIU Xia-mu;LI Qiong
..............page:25-29
lest Platform for Video Authentication Algorithm Based on MPEG Compression
LIANG Chang-yin;LI Ang;HUANG Ji-wu
..............page:133-137