Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Electronica Sinica
0372-2112
2010 Issue 2
Divide and Conquer Algorithms for Quantum Circuit Simulation
xue xi ling ; chen han wu ; liu zhi zuo ; li zhi qiang
..............page:439-442
A Duplicate Records Identification Model for Deep Web Data Sources
shen de rong ; liu li zuo ; kou yue ; nie tie zuo ; yu ge
..............page:275-281
Dynamic Joint Nearest Neighbor Algorithm
zhou wu ; zhao chun xia ; zhang hao feng
..............page:359-365
A Convex Combination of Variable Step-size Adaptive Filter and Its Mean-Square Performance Analysis
yu xia ; liu jian chang ; li hong ru
..............page:480-484
Averaged One-Dependence Decision Trees Ensemble Algorithm
zhou chuan hua ; wang qing ; wu ke zhu ; zhao bao hua
..............page:434-438
Supply High Voltages with Single-Inductor Multiple-Output DC-DC Buck Converter
lv chang hui ; zhou feng ; ma hai feng
..............page:493-496
An Piecewise Linear Fitting Algorithm for Infinite Time Series
zuo qiu yan ; xia shi xiong
..............page:443-448
Image Denoising Using Subsquarewise Threshold in Bandelets Domain
zhang wen ge ; liu fang ; jiao li cheng ; zhang xiang rong
..............page:290-294
A Novel Multiple Model Particle Filter Algorithm Based on Particle Optimization
liu xian sheng ; hu zhen tao ; jin yong ; yang yi ping
..............page:301-306
A Fuzzy Clustering Algorithm for Interval-Valued Data Based on Gauss Distribution Functions
lv ze hua ; jin hai ; yuan ping peng ; zou de qing
..............page:295-300
Improved Authentication Protocol for WLAN-3G Interworking Networks
liu yun ; fan ke feng ; zhang su bing ; mo zuo ; shen yu long
..............page:399-404
Architecture Design of Simultaneous Multithreading VLIW DSP
shen zuo ; sun yi he
..............page:352-358
An Efficient Complete Global Value Numbering Algorithm
nie jiu zuo ; cheng xu ; wang ke yi
..............page:416-421
Mapping Model for the Service Layer of Universal Network Based on Network Utility Maximization
li shi yong ; qin ya juan ; zhang hong ke
..............page:282-289
Application of Wavelet to the Cancellation of ECG Interference in Diaphragmatic EMG
xie yan jiang ; yang zhi ; fan zheng ping ; luo yuan ming
..............page:366-370
Sliding Multi-Windows Based Trend Change Detection on Time Series Stream
li xiao guang ; song bao yan ; zhang zuo
..............page:321-326
A Disaster-Tolerant Storage Model and a Low Data Failure Model for Data Grid
qu ming cheng ; wu xiang hu ; liao ming hong ; zhang yin ; yang xiao zong ; zuo de cheng
..............page:315-320
Estimation of Distribution Algorithm Based on Bacterial Foraging and Its Application in Predictive Control
wang xue song ; cheng yu hu ; hao ming lin
..............page:333-339
Ideal Contrast Secret Image Sharing Using Reversing
zhang hai bo ; wang xiao fei ; xu hai zuo ; huang you peng
..............page:465-468
Amplitude-Phase Detached Interpolation of Scattering from Complex Targets in a Broad Band
tian chao ; xie yong jun ; li xiao feng ; wang bo
..............page:485-488
A Review of Off-Line Handwritten Chinese Character Recognition
zhao ji yin ; zheng rui rui ; wu bao chun ; li min
..............page:405-415
A GOP Level Video Scene Change Detection Algorithm in H.264/AVC Compression Domain
gao yu ; zhuo li ; wang su yu ; shen lan zuo
..............page:382-386
Petri-Net and GA-Based Approach to Modeling and Optimize for Semiconductor Wafer Fabrication
cao zheng cai ; yu hong xia ; qiao fei
..............page:340-344
Design and Analysis of IDMA Interleavers Based on Linear Congruences
luo zhi feng ; wang qi xin ; qiu shui sheng
..............page:489-492
An Approach for Discovering Frequent Patterns from Log Ontologies with DL-safe Rules
sun ming ; chen bo ; zhou ming tian
..............page:376-381
On the Construction of a Delay-Constrained Maximum Lifetime Tree in Wireless Sensor Networks
liang jun bin ; wang jian xin ; chen jian er
..............page:345-351
Sea Clutter Suppression in Image Domain for Coast-Ship Bistatic SWOTHR
chen duo fang ; chen bo xiao ; qin guo dong
..............page:387-392
A Trust Game Method Basing on Probability Model in Networks
chen jing ; du rui ying ; wang li na ; tian zai rong
..............page:427-433
Theory and Algorithm of Concept Lattice Union
zhi hui lai ; zhi dong jie ; liu zong tian
..............page:455-459
Cylindrical Model Algorithm for Calculation of Human Body Impedance
ruan fang ming ;tomasz dlugosz; gao zuo gang
..............page:469-472
A Moving Object Detection Algorithm Base on Choquet Integrate
ding ying ; li wen hui ; fan jing tao ; yang hua min
..............page:263-268
A Fault-Tolerant Cooperation Incentive Strategy for Overlay Network Nodes
wang rui ; zhu qing lin ; qian de pei ; liu tao
..............page:327-332
A Performance Analysis Model for BitTorrent-Like Peer-to-Peer Systems Based on the Notion of Emergence
huang hong bing ; ren chuan jun ; jin shi yao
..............page:307-314
A Feature Matching Algorithm Based on Adjacent Spectrum of Modificatory Minimize Spanning Tree
xuan shan li ; liang dong ; zhu ming ; fan yi zheng ; wang nian
..............page:269-274
An Improved Learning Algorithm for Branch and Bound for Semi-Supervised Support Vector Machines
zhao ying ; zhang jian pei ; yang jing ; wang guan jun
..............page:449-454
Reliability Analysis of Combined Hardware/Software System Based on Markov Process
yu min ; he zheng you ; qian qing quan
..............page:473-479
Acoustic Emission Analysis and Location Based on Generalized S-Transform
quan hui min ; dai zuo xing ; wang peng ren
..............page:371-375