Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2009 Issue 16
DS Compositive Algorithm Based on Matrix Analysis
XI Ting-ting;XIONG Wei-li;ZHANG Lin;XU Bao-guo
..............page:264-266
Reconfigurable Design Method for Embedded Virtual Instrument
MIN Hua-song;ZHOU Huang-he;CHEN Yu-ting
..............page:267-269
Web Service Automatic Composition Algorithm Based on Semantics
SHEN Gai-ying;LI Jian-hua
..............page:262-263,266
Computer Aided Layout Optimization of Monitor Lines for Grounding Grids Corrosion Diagnosis
LIU Jian;LI Zeng-li;WANG Jian-xin;WANG Sen
..............page:259-261
Traditional Chinese Medicine Prescription Similarity Model
CAO Mu-dan;HE Qian-feng;WANG Bai
..............page:275-277
Dictionary-based Method for English-Chinese Bidirectional Cross-Language Information Retrieval
YANG Hui;ZHANG Yue-jie;ZHANG Tao
..............page:273-274,277
Ontology-based Dynamic Knowledge Management System
LIAO Liang-cai;QIN Wei;SHU Yu
..............page:256-258,261
Development Framework of Virtual Camera Based on DirectShow
WANG Chun-jie;LI Ming-lu;WU Fan
..............page:253-255
Invalid Block Management Algorithm of Flash Based on CAM
YU Hui-long;HE Xin;WEI Zhong-hui;WANG Dong-he
..............page:251-252,255
Application of Improved Ant Colony Algorithm in WSN Routing Protocol
LIU Xiao-dong;MAO Yong-jun
..............page:243-244,247
Firmware Development for TMS320C6000 Series DSP Application System
LIU Xiu-juan;WANG Hao;NIE Lei;ZHANG Zhi-ming
..............page:240-242
File System Design and Implementation Based on NAND Flash
NIU Wei;ZHANG Yan-yuan
..............page:248-250
Ling Carry-Select Adder
TIAN Yu;ZHOU Duan;XU Yang-yang
..............page:245-247
Servo Control System in Small Low Altitude Airship
SHI Xing-zu;LIU Shi-qian;JING Zhong-liang
..............page:237-239,242
Construction and Simulation of Large Dynamic Range AGC System
CAO Chen;SU Wei-qiang
..............page:234-236
Fuzzy Distance Measuring Technology Based on RSSI in Single Target Tracking
FENG Xiu-fang;SUN Chao;CAO Mei-li
..............page:170-172
Reconfigurable VLSI Architecture of 2D-DWT
ZHANG Fan-jiong;LAI Jin-mei;TONG Jia-rong
..............page:231-233
Adaptive Fuzzy k-NN Classifier Based on Transferable Belief Model
LIU Qiu-yun;FU Xue-feng;WU Gen-xiu
..............page:183-185,188
Classifier for Distributed Data Mining Based on Cellular Automata
YANG Ming-xin;ZHOU Lian-ying
..............page:180-182
Classifier Design Based on Laplacian Eigenmap
ZHOU Mei;LIU Bing-han
..............page:178-179,182
Visibility Detection Algorithm for Road Video
LI Jia;GE Jia-qi;CHEN Qi-mei
..............page:175-177
New Two-subpopulation Particle Swarm Optimization Algorithm
JIAO Wei;LIU Guang-bin
..............page:173-174,177
Cutting Algorithm for 3D Surface Model in Medical Images
SUN Xu-jiang;ZHOU Ming-quan;GENG Guo-hua
..............page:214-215,218
Texture Image Retrieval System Based on Contourlet-S Transform
CHEN Xin-wu;LIU Wei;GONG Jun-bin;TIAN Jin-wen
..............page:211-213
CV Model Based on Adaptive Local Statistic
GE Qi;ZHANG Jian-wei;CHEN Yun-jie
..............page:209-210,213
Algorithm of Macro-Configurable Fast FPGA Placement
XU Jia-wei;LAI Jin-mei;TONG Jia-rong
..............page:228-230
Shadow Elimination for Moving Vehicle Based on Local Texture Characteristic
ZU Zhong-lin;LI Bo;CHEN Qi-mei
..............page:167-169
Availability Analysis of Double-star Network Topology
QIAN Yi-dong
..............page:224-227
tou gao xu zhi
..............page:封2
Virtual Brush Model Based on Statistical Analysis and Its Application
ZHU Mo-zi;SHEN Fei;WU Zhong-cheng;BAO Xin
..............page:283-封3
Business Integration Method Based on Enterprise Service Bus
KONG Xiang-rui;ZHENG Hong-yuan
..............page:280-282
Least Square/Singular Value Decomposition Algorithm
CAO Xin-rong;HUANG Lian-fen;ZHAO Yi-feng
..............page:278-279,282
Elevator Control Modeling Based on Statecharts and Its PLC Implementation
MA Yin-yuan;YAO Chuang
..............page:221-223
Application of TMS320C6713B in Marine Strap-down Inertial Navigation System
ZHANG Peng-fei;TANG Jian-xun;WANG Yu;YU Xu-dong
..............page:219-220
Camera Calibration Method Based on Single Rondo Surface Image
SUI Lian-sheng;YANG Hua
..............page:216-218
Gradient Characteristics Obtaining from Aeromagnetic Images
LIU Yan;ZHENG Jun;GE Wei-hua
..............page:206-208
Bayes Text Classification Algorithm Based on Stump Network
YANG Yan-jiao;WANG Zhi-he
..............page:201-202,205
GA-based Multiple Constraints QoS Multicast Routing Algorithm
LI Fei;HOU Hui-fang
..............page:198-200
Improved Algorithm of Threat Assessment Based on Intuitionistic Fuzzy Reasoning
XIA Bo-ling;HE Zheng-hong;LEI Ying-jie
..............page:195-197,200
Fuzzy K-Modes Clustering Algorithm Based on New Dissimilarity Measure
BAI Liang;CAO Fu-yuan;LIANG Ji-ye
..............page:192-194
Application of Visual Prolog in Expert System Fault Diagnosis
ZHENG Xuan;MA Xin;ZHANG Bei-ke
..............page:189-191,194
Face Recognition Method Based on Support Vector Machine
XIE Sai-qin;SHEN Fu-ming;QIU Xue-na
..............page:186-188
Digital Watermark Algorithm Resisting to Geometric Attack Based on Histogram Specification
GUO Fang-xia;WANG Xuan;CHEN Wei-wei
..............page:130-132
Weighted Fair Queuing Schedule Algorithm Based on Service Time
MA Jun;YANG Gong-liu
..............page:35-38
Sensitive Information Retrieval Method with Minimal Information Sharing
YUAN Ying;LIU Guo-hua;ZHANG Yu;LI Ying
..............page:39-41
UML-based Modeling Method of Spatial Position and Coordinate Conversion
XU Zhong-fu;WANG Guo-liang;YIN Zhao-wu;JIANG Fang;DIAO Yi
..............page:42-44
Time Series Incremental Outlier Pattern Detection Algorithm
ZHOU Da-zhuo;LIU Lei
..............page:45-47
Query Model of Rough Relational Databases
WEI Ling-ling;YAO Lei-yue;WANG Rong-fu;XIE Qiang-lai
..............page:51-53
Optimization Model for exFAT File System
SHI Jiu-gen;WANG Yue;HAN Jiang-hong
..............page:54-55,58
Error Detection Technology of Space-robot High-dependable Software
GAO Xing;LIAO Ming-hong;WU Xiang-hu
..............page:56-58
Design and Implementation of Classified Retrieval System for Scientific and Technological Resources
GAO Yong-gang;ZHOU Ming-quan;GENG Guo-hua;LIU Yan-wu
..............page:59-61,64
Jena-based Dynamic Semantic Retrieval Method
SHENG Qiu-yan;YIN Gui-sheng
..............page:62-64
Item-based Non-neighbouring Sequential Pattern Recommendation Algorithms
LI Wei;WANG Xin-fang;LIU Ni
..............page:65-67,70
Zero Watermark Algorithm Resisting to Rotation Attack Based on Radon Transform
HE Bing;WANG Xuan;ZHAO Jie
..............page:128-129,132
Application of Elliptic Curve Cryptography in WSN
WANG Wei-hong;LIN Yu-bing;CHEN Tie-ming
..............page:125-127
Bi-watermark Algorithm Based on H.264/AVC Video Stream
ZHANG Wei-wei;FENG Gui;YANG Yi-min
..............page:123-124,127
Group Key Management Scheme in Wireless Sensor Networks
ZHANG Zhi-ming;DENG Jian-gang;PENG Ya-li;YU Min
..............page:120-122
Database Encryption System Based on Metadata
CHEN Xue-tao;HAO Wen-ning;LI Tie-jun;GU Lei
..............page:117-119,122
Security Proof of Public-key Encryption Algorithm Rabin-OAEP
LIU Jia;XIE Fang-qing;DU Shu-qin
..............page:115-116
DRM Model Based on Friend Peer in P2P Networks
MENG Xian-fu;LI Li
..............page:148-150,153
Signcryption Key Encapsulation in Insider Security Mode
LAI Xin;YU Xiu-yin;HE Da-ke
..............page:145-147
Secure Encapsulation Wrapper Technology for Middleware
ZHANG Fang-zhou;YAN He;SHENG Xiao-yu;NIU Ying-ying
..............page:143-144,147
Flaw and Improvement of Three Certificateless Signature Schemes
NONG Qiang;HAO Yan-hua;WU Shun-xiang
..............page:140-142
Efficient Self-certified Signcryption Scheme
YU Hui-fang;WANG Cai-fen
..............page:138-139,142
Reversible Information Hiding Algorithm Based on Difference Matrix of Cover Image
QIANG Yuan;GAO Bao-jian;MENG Yan-yan
..............page:135-137
Improvement of Slide-algebraic Attack 1 on KeeLoq Cipher
WANG Qiu-yan;JIN Chen-hui
..............page:133-134,137
Covert Channel Based on NDIS Intermediate Driver
LI Pin;BAO Han-qing;CHEN Dan-wei
..............page:151-153
Clone Attack Detection Protocol of Wireless Sensor Network
LI Duan-duan;ZENG Zi-wei;PAN Xiao-hong;PAN Rui
..............page:161-163,166
Two Different Application of Chaotic Sensitivity in Image Encryption
JIANG De-lei;BAI Sen;ZHU Gui-bin;DONG Wen-ming
..............page:159-160,166
Channel Encryption Scheme of Smart Card Based on Chaotic Mapping
WANG Jie-ran;MA Xiu-rong;ZHANG Jia-ming
..............page:156-158
Database Intrusion Detection Based on Improved Apriori Algorithm
HE Hai-tao;LV Shi-yong;TIAN Hai-yan
..............page:154-155,158
Improved F5 Algorithm Based on Surplus Zero Coefficient Elimination
WANG Jian;TANG Guang-ming
..............page:164-166
Information Security Boundary Based on Fine-grained Radio-map Localization
WU Yong;HU Jian-bin;TANG Li-yong
..............page:1-3
Regional Haze Monitoring System Based on Component and Its Retrieval Algorithm
LI Shen-shen;CHEN Liang-fu;WANG Zhong-ting;HAN Dong
..............page:23-24,28
Genetic Reinforcement Learning Algorithm for Job-shop Scheduling Problem
PAN Yan-chun;ZHOU Hong
..............page:25-28
Impostor Selection for SVM Models Training in Speaker Verification
LIU Ming-hui;HUANG Zhong-wei;DAI Bei-qian;XIONG Ji-ping
..............page:4-6
Policy Refinement of QoS Management in Satellite Communication System
HE Jian;WANG Zu-lin;ZHONG Xuan-ming;LI Xi
..............page:7-9
Emergency Relation Niche and Its Discernible Feature
LUO Bang-ying;WANG Qin-min;MAO Zheng-yuan
..............page:10-13
Study on Semantic Based Moving Objects Trajectory Knowledge Discovery
GUI Zhi-ming;CHEN Cai
..............page:14-16
Dynamic Address Mapping Virtualization Storage System
KE Jian;ZHU Xu-dong;NA Wen-wu;XU Lu
..............page:17-19,22
Detection of Copy-Transform-Move Forgery in Color Digital Image
WANG Xin;XUAN Bo;PENG Si-long
..............page:20-22
Database Distributed Semantic Caching Based on Agent
FU Yu;TANG Guo-wei;GAO Ya-tian
..............page:48-50
Automatic Test Data Generation Technology Based on Regular Expressions
DONG Min;BI Sheng;QI De-yu
..............page:29-31
Municipal Road Management Model Based on GML
JIAO Dong-lai;ZHANG Shu-liang;LV Guo-nian;SUN Yu-ting
..............page:32-34
Hash & Tree Tree: Cache Conscious Index of Memory Database
XIAO Fu-ping;LUO Jun
..............page:68-70
Extension of SQL Aggregation Functions
XIAO Jie;XIE Dong;ZENG Fen-shi
..............page:73-75
Stream Clustering Model and Its Unified Representation
YUAN Zhen-gwu;YUAN Song-biao
..............page:76-77,80
Improved Algorithm of Fast Similar Time-subsequence Search
ZHANG Tao;JIN Shun-fu;LIU Guo-hua;WANG Li-zhen
..............page:78-80
Software Process of Complex System Simulation
ZHAO Wei;SU Ming
..............page:81-83,86
Packet Forwarding Method for Self-adapted Changeable Time Piece of Router
LI Jin-fang;ZHANG Jun;RAO De-sheng;ZHANG Yan-li
..............page:84-86
New Evaluation Method of Data Allocation Algorithm in P2P Streaming Media
XU Jie-bin;SONG Ya;LIANG Yong-chun
..............page:87-89
Application Mode of Port-based Network Access Control
CHEN Li;ZHOU Yong-bin;MA Jian-guo;FANG San-hui
..............page:90-92
Grid Routing Protocol Based on Energy Consumption
XIAO Ying-jie;XIAO Zong-shui;SU Ji-bin
..............page:93-94
End System Multicast Method Based on Loop Overlay Network
YUAN Ping-peng;CHANG Bing-lin;YAN Yao-wei
..............page:95-96,100
On-Demand Power Control Algorithm Based on Vehicle Ad Hoc Network
DU Shan;LIU Fu-qiang;XU Shang-zhi;WANG Xin-hong
..............page:97-100
Protocol of Wireless Monitoring and Control Network Based on IEEE802.15.4a
HOU Wei-yan;YANG Ao-lei
..............page:101-103,106
Impact Analysis of Anonymous Router on Sample Network Topology
YANG Guo-zheng;LU Yu-liang;XIA Yang;ZHU Feng
..............page:104-106
Improved Sleep Mode Algorithm of IEEE 802.16e
ZHANG Xiao-ping;ZHANG Chun-ye;ZHAO Li;ZHANG Yan
..............page:107-108,111
Study on Coverage Problem in Wireless Sensor Networks
ZHANG Xi-hong;MIAO Wen-liang;GAO Yan-yan
..............page:109-111
DDoS Attack Detection Algorithm Based on TCP Backlog
HU Hong;YUAN Jin-sheng;GUO Min-zhe
..............page:112-114