Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2009 Issue 11
Sinkhole Attack Detection in Sensor Networks Based on Convergence Degree
XIE Lei;XU Yong-jun;ZHU Yue-fei;PAN Yong
..............page:1-3
Partition and Realization of Reusable Component in Service Management Net
CHEN Yan-ping;LI Zeng-zhi
..............page:4-6
Stereo Matching Algorithm Based on Image-segment and Neighbor Relativity
FENG Lin;SUN Tao;HAN Ning
..............page:7-9,12
Code Generation of Retargetable Compiler for Media Processor
JU Xiao-ming;ZHANG Zhao;SHI Ce
..............page:13-15,19
Public Key Cryptosystem with Self-generated Certificate
GUO Bao-an;ZHANG Qing-sheng;LAI Jun-zuo;LIU Sheng-li
..............page:16-19
Standardized Representation Model and Case Application of TCM Massage Therblig
LIU Chao;JIANG Zu-hua;LIU Yu-long
..............page:20-22,25
Self-adaptive Middleware Framework Based on Performance Requirement
WANG Dan-zhen;WU Qing;ZHOU Bi-shui
..............page:23-25
Comparative Analysis of XML Compression Methods
ZHANG Sheng;BAO Xiao-ling;SHU Jian;CHEN Sha
..............page:26-28,31
Design and Implementation of Metadata Management and Application System
LIU Feng;GU Jun-zhong
..............page:29-31
Comparison of Real-time Performance for Middleware Techniques
HUANG Shu-juan;DU Cheng-lie;YOU Tao
..............page:32-34,37
Exposed-set Calculating Algorithm for Eliminating Redundant Communication
LIU Xiao-xian;ZHAO Rong-cai;LIANG Ling
..............page:35-37
Semantic Web Service Discovery Mechanism Based on P2P
SUN Shang;WU Qing;ZHOU Bi-shui
..............page:38-39,42
Frame Design and Performance Research of Parallel File System
XIE Gui-yuan;WEI Wen-guo
..............page:40-42
lwThread:Lightweight General Multithreading
DU Min;ZHANG Li;ZHU Kun;WU Bai-feng
..............page:43-45
Approach for Transformation of ConcurTaskTrees to UML2.0
WANG Zhi-qun
..............page:46-48
FTDA2 Algorithm for Finding Fuzzy Association Rule
QIAN Zeng-jin;XU Huan;JU Shi-guang
..............page:52-54
Application of Walking Through Data in Software Reliability Measure
ZUO Wan-juan;YANG Meng-fei;DUAN Yong-hao
..............page:55-58
Web Service Test Method Based on TTCN-3
WANG En-lei;ZHAO Hui-qun;SHANG Si-chao
..............page:59-61
Capacity Optimizing Theory on Wireless Mesh Networks
HUANG Shu-qiang;ZHENG Qi-lun
..............page:62-64
Improved Growth Codes Based on Bloom Filter
HU Shi-wen;HUA Bei
..............page:65-67
Rare Peer-to-Peer Resource Searching Strategy Based on Network Cover
TIAN Zhou-xian;GU Nai-jie;HE Song-song
..............page:68-70
Design and Implementation of WSN Sink Node with Multi communication Methods
ZHOU Tao;LI Shi-ning;ZHANG Ji-wen;SHEN Jing-jing
..............page:71-73
Hierarchical Clustering Routing Scheme Based on LEACH in Wireless Sensor Network
JIA Yong-can;LIU Yu-hua;XU Kai-hua;GAO Jing-ju
..............page:74-76
Research on Avionics Full Duplex Switched Ethernet
DU Ya-juan
..............page:77-79,82
Fault-tolerant Routing Based on Flag Bit in Torus Networks
LI Yin;LIANG Jia-rong;WU Hua-jian
..............page:80-82
WMPLS Multicast Protocol for Ad Hoc Network Supporting Recovery
CHEN Jing;YANG Xing-hai;MA Xiu-ming
..............page:83-85,88
Backstepping Control Algorithm for Network Congestion
WU Sai;DENG Fei-qi;ZHANG Cheng-ke;SUN You-fa
..............page:86-88
Revenue-based Call Admission Control Algorithm in WiMAX Networks
TANG Chao-wei;CHEN Hong-dan;SHAO Yan-qing;MA Wen-xing
..............page:89-91,94
Improved Chord Searching Algorithm Based on Grouping Grading
LIU Tang;PENG Jian;CAO Xiao-yang
..............page:92-94
P2P Trust Model Based on Super Node
WU Hai-zhen;CHEN Yuan-tao
..............page:95-97,100
Multicast Model Based on Application Level Active Network
KONG Hua-feng;LU Hong-wei;ZHAO Yi-zhu
..............page:98-100
Throughput Optimization Algorithm for Wireless Local Area Networks
YANG Yi-jiao;ZHAO Hong;LU Wu-yi
..............page:101-103,115
Influence on ALM nee Construction Performance by Connection Request Sequence
LI Jun;LUO Dai-sheng;WANG Lei;WANG Wei
..............page:104-106,119
Ca-Chord:Chord Routing Algorithm Based on Main and Subordinate Ring
LI Jing-wen;XIONG Yan;GAO Yan
..............page:107-109,122
Traffic Load Model of Sharing Token Scheduling in Multi-logical Links
LIANG Gen;GUO Xiao-xue;QIN Yong;WEI Wen-hong
..............page:110-112,125
Digital Watermark Algorithm Based on Tchebichef Moments and Wavelet Lifting
ZHAO Jie;WANG Xuan;HE Bing
..............page:113-115
Research and Implementation of Secure-Mobile Storage System
SUN Guo-zi;CHEN Dan-wei;WU Deng-rong
..............page:116-119
Improvement and Simulation of Snort Rule Chains Structure
SUN Min;GU Xiao-ming;ZHANG Zhi-li
..............page:120-122
Zero Watermark Algorithm Against Rotation Attack Based on Binary Image
HE Bing;WANG Xuan;ZHAO Jie
..............page:123-125
Ring Signature with Strong Anonymity and Weak Linkability
MENG Zhao-xia
..............page:126-127
Algorithm of View Secure Publishing Based on Multi-set
JIN Xiao-dan;LIU Gno-hua;ZHANG Yan;JIN Li-li
..............page:128-130
Formal Verification of L4 Memory Management Using SPIN
CHEN Chao-chao;ZENG Qing-kai
..............page:131-133
Blind Watermark Algorithm Based on DWT and Edge Mask
SU Qing-tang;ZHANG Ying-li;LI Tao;LI Hong-guo
..............page:134-136
Real-time Encryption System for Audio Frequency Domain Based on Cascaded Chaos
JIN Jian-guo;LIN Rui;ZHANG Qing-ling;HOU Guo-qiang;DI Zhi-gang;JIA Chun-rong
..............page:137-139
Improved Traceable Threshold Signature Scheme
WANG Ping-shu;GUAN Hui-sheng
..............page:148-149
Gray Image Watermark Embedded Algorithm Based on Wavelet Block Theory
ZHENG Jiang-yun;JIANG Ju-lang
..............page:150-151,154
Repetitious Key Negotiations in Wireless Sensor Networks
SUN Fa-jun;ZHOU Zhi-qiang;ZHANG Wen
..............page:152-154
Survivability Schedule Algorithm for Pseudo-random Autonomous Service
ZHANG Lei;DAI Hao;MA Ming-kai;XU Shao-qing
..............page:155-157,160
Improved Chaos Negative Selection Algorithm
YAN Yi-wei;ZHANG Feng-bin;YANG Xiao-jun;ZHANG Ke
..............page:158-160
Zero-watermark Algorithm Based on SVD
LI Xue-bin;YU Deng-feng;CHENG Liang
..............page:163-165,177
Fast Detection Method for Network Performance Anomaly Based on Statistics
SUN Yan-tao;YANG Fang-nan;XU Song-tao
..............page:166-168,180
PDF Digital Rights Management System Based on Dynamic Logical License
WANG Jing-yan;ZHONG Yong;ZHU Zhen
..............page:169-171,183
Face Detection Based on Multiple Thresholds Boosting Method
ZHONG Xiang-yang;LING Jie
..............page:172-174
Particle Swarm Optimized Simultaneous Localization and Mapping Approach
YUAN Cheng;CAI Zi-xing;CHEN Bai-fan
..............page:175-177
Comparative Analysis of Relation Between Face Recognition Rate and Image Resolution
DING Xiao-lian;ZHOU Ji-liu;LI Xiao-hua;WU Peng
..............page:181-183
Vertical Search Engine-aimed Semantic Correlation Algorithm Based on Knowledge
GAO Yi-bo;ZHAO Xian-zhang;SUN Shuo;HUANG He
..............page:184-186
Automatic Aperture Identification Based on Fiber Video Well Logging Technique
BIAN Yu-hua;LU Jie-cheng;CHEN Xi;YAN Ming
..............page:187-189
Improved Fuzzy Clustering Algorithm for Outlier Kernel
ZHANG Hong-yi;WU Xiu-wei;ZHANG Zhong-wei
..............page:190-192
Multi-modal Face Recognition Based on Local Binary Pattern and Fisherfaces
YE Jian-hua;LIU Zheng-guang
..............page:193-195
Enhanced Neighbor Set Personalized Recommendation Algorithm
LIU Mei-lian;CONG Xiao-qi;YANG Huai-zhen
..............page:196-198
Ontology-oriented Service Component Differential Evolution Policy
ZHOU Xiang-bing;YANG Xiao-ping;XIE Cheng-jin;YANG Xing-jiang
..............page:199-201
Multicast Routing Based on Information Entropy Multi-population Genetic Algorithm
YUE Cheng-jun;YIN Feng-jie;JING Yuan-wei
..............page:205-206,209
Incent Mechanism in P2P System Based on Game Theory
OUYANG Jing-cheng;LIN Ya-ping;ZHOU Si-wang;TAN Yi-hong
..............page:207-209
Multidimensional Sparse Fuzzy Reasoning Method Based on Weight of Precedence Chart
LIE Wen-yuan;WU Li-xia;WANG Bao-wen
..............page:210-212,215
Estimation Method for Sinusoidal Frequency in Strong Chaotic Noise
SUN Xiao-dong;SHI Yao-wu;KANG Xiao-tao
..............page:213-215
Novel Chaos Differential Evolution Algorithm
TAN Yue;TAN Guan-zheng;TU Li
..............page:216-217,220
QoS Multicast Routing Based on Ant Algorithm in Ad Hoc Network
WANG Xin-sheng;JIA Dong-yan;LI Xue;LIU Qing
..............page:218-220
Research on Task Allocation in Multi-Agent System
YAN Jian-feng;LI Wei-hua;LIU Ming
..............page:221-222,225
Image Artificial Degradation Based on Additive Noise
ZHOU Chang;WANG Di;ZHOU Qing
..............page:223-225
Image Classification Method Based on Vague Fusion
HU Xiao-hong;QIAN Xu;WANG Pei-chong;WANG Ke
..............page:226-227,230
Image Fusion Algorithm Based on Weighted and Improved Wavelet Transform
WANG Zhi-wen;LIU Mei-zhen;CAI Qi-xian;XIE Guo-qing
..............page:228-230
Image Adaptive Median Filtering Algorithm Based on Human Visual System Characteristics
YANG Heng-fu;SUN Guang;TIAN Zu-wei
..............page:231-233
SAR Image Segmentation Based on Region Homogeneity and NonSampled Contourlet Transform
SONG Xiao-feng;LIU Fang;LI Zhi-yuan
..............page:234-236
Video Object Segmentation Algorithm Based on Spatio-temporal Domain Information
ZHANG Yang;LI Jia-bing;FU Mao-sheng;LUO Bin
..............page:237-239
VBR Rate Control of AVS Real-time Encoding
ZHENG Cong-zhuo;LI Jun-li;CHEN Gang;HUANG Chao;MAN Jia-ju
..............page:240-242
Shot Boundary Detection Algorithm Based on Multiple Video Features
DU Kui-ran;XIAO Guo-qiang;JIANG Jian-min
..............page:243-245,250
Audio Data Retrieval Method Based on LPCMCC
JIANG Xing-hua;LI Ying
..............page:246-247,253
Application of Embedded System in COTM Antenna Controller
ZHANG Bo;DU Bao-lin;ZHOU Shu-hua
..............page:248-250
Non-driver Application of Modbus Protocol in S7-300
CHEN Qun
..............page:254-255,259
Full-mode Channel Estimation and Hardware Implementation for DTMB System
PAN An;CHEN Yun;CHEN Yuan;WU Jian-ming;ZENG Xiao-yang
..............page:256-259
Research and Realization of High Availability Industrial Ethernet Technology
JIANG Li-qun;XU Ai-dong;SONG Yan;WANG Jing
..............page:260-262
High-performance Communication Architecture Supporting Dynamic Reconfigurable SoC
ZHONG Sheng-hai;WEN Dong-xin;WU Feng;WANG Ling
..............page:263-265
Physical Layer Implementation of High-speed Video Data Fiber-optic Transmission System
LI Zeng;GAO Shi-jie;WU Zhi-yong
..............page:266-268
Linux Real-time Schme Based on Enhanced Time System
HU Qiang;CAI Zi-xing
..............page:271-273
Visual Metabolic Network Modeling Tool
LI Yi;ZHENG Hao-ran;NIU Jun-qing;LI Heng;ZHOU Hong
..............page:274-275
Design of Regional Medical Information System Based on Ontology
YANG Hong-qiao;BU Hai-bing
..............page:283-285
Analysis and Improvement of Memory Management Method in μC/OS-Ⅱ
YU Qin-feng;SUN Yong
..............page:280-282
Design of Real-time Processing and Display System of ATS-1 Lidar
FANG Xin;HU Shun-xing;ZHAO Pei-tao;WANG Min;CAO Kai-fa;XIE Jun;WANG Shao-lin
..............page:276-279