Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2010 Issue 18
Improved Modulation and Demodulation Algorithm for GSM Voice Business Channel
yang yu cun ; feng sui li ; cui miao ; ye wu
..............page:13-14,18
Two-phase Intrusion Detection Algorithm in Mixed Attributes Data Stream
su xiao zuo ; lan yang ; qin yu ming ; wan ren xia ; cheng yao dong
..............page:19-20,23
Object Recognition Method Based on Fusing Multi-features of Interest Points
li wei sheng ; zhao ling zhi
..............page:7-9
Study of Distributed Simulation System for Satellites on Orbit
zhang lian wei ; liu xiao lin ; shen yang ; he han gen
..............page:1-3
Improved PFS Algorithm Partial to Delay-sensitive Traffics
zhang ru yun ; guo shu ming ; luo xing guo ; ji xin sheng
..............page:15-18
Distributed Software Framework Based on Code Down
wu chen zuo ; wang ying hui
..............page:60-63,69
Energy-aware WSN Routing Protocol
xu jing dong ; li zuo ; zhao wen yao ; lu hua jun
..............page:123-125
Security Vulnerability Detection Method of Logic-unknown PLD
zhou li ; li qing bao ; fan min ; zhao yan
..............page:132-134
Design of Multi-channel Access Protocol for Low-speed Ad Hoc Networks
zhao zuo ; quan hou de
..............page:91-94
Fault Diagnosis Based on Extended Fuzzy Time Petri Net
wang yan ping ; ma liang li ; liu yong zuo
..............page:52-53,56
Control Strategy for Traffic Flow Congestion in Partial-shared Integrated Services Network
jiang hong yan ; lin ya ping ; hu yu peng
..............page:70-72
Fingerprint Image Thinning Algorithm Based on Improved PCNN
wang xiao tao ; xu da cheng
..............page:180-181,190
Security Mobile Payment Scheme Based on the Third-party
huang xiao fang ; zhou ya jian ; lai xin ; yang yi xian
..............page:158-159,162
Hole Boundary Identification Algorithm for 3D Closed Triangle Mesh
kong ling xia ; yao yuan ; hu qing xi
..............page:177-179,187
Spam Filter Based on Multiple Classifier Combinational Model
liu ju xin ; xu cong fu
..............page:194-196
Fundus Vessel Edge Detection Method Based on Embedded Confidence
pan lin ; huang lin lin ; wei li fang ; yu lun
..............page:174-176,184
Research on Aggregate-based Congestion Control Mechanism and Its Improvement
wu dong ; chen yuan zuo ; wang wen juan
..............page:82-84,87
Distributed Data Compression Method in Wireless Sensor Networks
wang ying jie ; ju shi guang ; yin xiao jia
..............page:88-90,94
Cross-layer Routing Protocol for Ad Hoc Networks Based on Synthetical Metric
zhu ying feng ; lei lei ; xu zong ze
..............page:79-81
Clustering Routing Algorithm for Wireless Sensor Network Based on Ant Colony
wang gui feng ; wang yong ; tao xiao ling
..............page:73-75
Research on TCP Throughput Upper Bound About Wireless Ad Hoc Network
chen guo ; li qing hua
..............page:95-97,100
Remote Data Transmission Technology Based on Multi-priority Buffer Queue
li zhou zhi ; wang xiao dong ; wang zhen zhi ; feng zhi min ; zhou yu
..............page:105-108
Ad Hoc Networks Route Discovery Algorithm Based on Expanding Ring
li shi bao ; hong li
..............page:112-114
Performance Analysis of P2P VoIP Based on Two-hop-worst Lookup
wang bin ; shen qing guo ; wang wen hua ; zhong qin
..............page:109-111,114
Design and Implementation of RapidIO-IP Based on VxWorks
huang zhen zhong ; ni ming ; chai xiao li
..............page:243-244,249
Analysis of Data Link Timeslot Requirement and Simulation
xia bai zuo ; tao xiao yu
..............page:259-261
WSN Voice Communication System Based on Jennic Platform
yu ning ; hua zuo ; gong bin
..............page:126-128,131
Self-adaptive Cross-layer Scheduling Algorithm Based on Differentiated Services
shen jian fang ; cheng liang lun
..............page:115-117,120
Research on Process Hiding Technology Based on Direct Kernel Object Manipulation
pan mao ru ; cao tian jie
..............page:138-140
Analysis of Improved MFE Multivariate Public Key Scheme
tian li ; bao wan su
..............page:155-157
Improved Scheme for Smart Card Password Authentication Based on Bilinear Pairings
deng li ; wang xiao feng
..............page:150-152
Implementation of SSL Embedding Based on Cipher Chip
yu xiong ; duan bin ; lin zuo yuan ; zhang yan
..............page:141-143,146
Document Encryption and Decryption System Based on Trusted Process
jing zheng jun ; wu fang sheng ; li bing zuo ; gu chun sheng
..............page:147-149,152
Grid Map Building Method Based on Ground Disparity Distribution
zhang hai qiang ; zuo li hua ; fang hao
..............page:247-249
Semantic Role Labeling Based on Tree Conditional Random Fields Model
li ming ; wang ya bin ; zhang qi wen ; wang xu yang
..............page:41-42,45
Design and Implementation of Meta-structure of Embedded Software Test Tool
li xiao long ; lu jian hua ; shen lei ; luo xi ; yan shao qing
..............page:46-48,51
Service-oriented Computing Model Based on Event Driven
he lang ; shi wei feng ; dong jian gang
..............page:57-59,66
tou gao xu zhi
..............page:封2
Design of Variable Fractional Delay Filters Based on PSO
sun dong yan ; zhao jia xiang ; zhao xiao ming
..............page:4-6
Differentiated Services Mechanism Based on PDoSS in DCF
xu ying ; bai guang wei ; wang ming chao ; cao lei
..............page:285-287,290
Research on Refinement of GPU Kernel
jiao liang zuo ; chen rui
..............page:10-12
Artificial Emotion Model Based on Matrix Model of Finite State Machine
shi xue fei ; wang zhi liang ; zhang qiong
..............page:24-25,28
Improved Situation Clustering Display Algorithm Based on Density Method
zhao en lai ; hao wen ning ; zhao shui ning ; han xian yong
..............page:35-37,40
Naive Bayes Classification Protocol Based on Privacy Preservation
zuo chen xue ; zhu jian ming
..............page:26-28
Image Retrieval Method Based on Distinct Interest Points
cheng tao ; hou yu qing ; li ming li ; chang zhe
..............page:171-173
Dynamics Visual Servo Method for Robot\'s Grasping Moving Object
zuo hong wu ; hao kuang rong ; ding yong sheng
..............page:232-234,237
RBF Neural Network Prediction Model Based on Hidden Layer Optimization
wang chun zi ; zhang bin
..............page:191-193,196
Attack and Defending Technology of shellcode
wang ying ; li xiang he ; guan long ; cui bao jiang
..............page:163-165,168
Novel Algorithm of Recovering Depth from Defocus Image
liu hong ; jia yu ; cheng hong ; wei sui
..............page:169-170,173
Face Recognition Based on Classifiers Fusion Using Fuzzy Integral
gu xiao min ; lin jin guo ; mei xue
..............page:188-190
Immune Genetic Algorithm Based on Uniform Design Sampling for Solving Maximum Clique Problem
zhou ben da ; yue qin ; chen ming hua
..............page:229-231
Modeling and Implementation Method for MIPS64 Instruction Set Simulator
cai qi xian ; liu ming ; yu zu feng
..............page:245-246,252
High-speed RapidIO Based on Multi-processor
zhang juan ; su hai bing ; wu qin zhang
..............page:238-239,242
Implementation of HLA/LAN-based Heterogeneous Simulation System
di ling xiao ; ma jie zhong ; lu yan hong ; di zheng jun
..............page:235-237
Task Allocation and Scheduling Algorithm Based on Fuzzy Theory
gong yue ; zhang zhen zhen ; zhang gang gang ; ma xiao hai ; bao jie
..............page:38-40
Measurement and Management Research of Internet Socialization
du jian qing ; yang jia hai ; huang shao jun
..............page:262-263,266
Web Services Transaction Scheduling Algorithm Based on Cost of Failure Risk
li zhuang ; cao bao xiang ; xia xiao na
..............page:64-66
Improved Bi-group Evolutionary Programming Algorithm
zhao rui ; chen yun hua ; deng jiu ying
..............page:21-23
Research on Multi-path Packet Redundancy Strategy Based on Wei Bull Transform
zhu cheng jian ; jiang bing ; zhao yue
..............page:118-120
Module Automatically Loading Mechanism Based on VxWorks
yu kang ; ning hong ; deng sheng lan ; zhang yi
..............page:264-266
Revocation Self-healing Key Management Scheme in Wireless Sensor Network
xiong yan ; cai xiang ; miao fu you
..............page:144-146
Two-scale Foreground-background Separation Model Based on Depth
pan jun lin ; shen yi fan ; chen wen bin
..............page:166-168
Speech Emotion Recognition of Multi-segment Fusion Based on D-S Evidence
lu jie rong ; zhan yong zhao ; mao qi rong
..............page:205-207
Face Gender Classification Method Based on Improved Eigenspace Separation Transform
gu cheng yang ; wu xiao jun
..............page:223-225
Research of High-dimensional Data Adaptive Classification
wu yong liang ; wan wang gen ; xu xue qiong
..............page:210-213
RFID Authentication Scheme Based on EPC-C1G2 Standard
wang yi wei ; zhao yue hua ; li xiao cong
..............page:153-154,157
Detection Resource Scheduling of Near Space Based on Differential Evolution
dai jing ; cheng jian ; song min
..............page:220-222
Naive Bayes Classification Protocol Based on Privacy Preservation
zuo chen xue ; zhu jian ming
..............page:26-28
Improved Situation Clustering Display Algorithm Based on Density Method
zhao en lai ; hao wen ning ; zhao shui ning ; han xian yong
..............page:35-37,40
Improved Modulation and Demodulation Algorithm for GSM Voice Business Channel
yang yu cun ; feng sui li ; cui miao ; ye wu
..............page:13-14,18
Two-phase Intrusion Detection Algorithm in Mixed Attributes Data Stream
su xiao zuo ; lan yang ; qin yu ming ; wan ren xia ; cheng yao dong
..............page:19-20,23
Object Recognition Method Based on Fusing Multi-features of Interest Points
li wei sheng ; zhao ling zhi
..............page:7-9
Artificial Emotion Model Based on Matrix Model of Finite State Machine
shi xue fei ; wang zhi liang ; zhang qiong
..............page:24-25,28
Research on Refinement of GPU Kernel
jiao liang zuo ; chen rui
..............page:10-12
Design of Variable Fractional Delay Filters Based on PSO
sun dong yan ; zhao jia xiang ; zhao xiao ming
..............page:4-6
Study of Distributed Simulation System for Satellites on Orbit
zhang lian wei ; liu xiao lin ; shen yang ; he han gen
..............page:1-3
Improved PFS Algorithm Partial to Delay-sensitive Traffics
zhang ru yun ; guo shu ming ; luo xing guo ; ji xin sheng
..............page:15-18
Distributed Software Framework Based on Code Down
wu chen zuo ; wang ying hui
..............page:60-63,69
Service-oriented Computing Model Based on Event Driven
he lang ; shi wei feng ; dong jian gang
..............page:57-59,66
Design and Implementation of Meta-structure of Embedded Software Test Tool
li xiao long ; lu jian hua ; shen lei ; luo xi ; yan shao qing
..............page:46-48,51
Semantic Role Labeling Based on Tree Conditional Random Fields Model
li ming ; wang ya bin ; zhang qi wen ; wang xu yang
..............page:41-42,45
Document Encryption and Decryption System Based on Trusted Process
jing zheng jun ; wu fang sheng ; li bing zuo ; gu chun sheng
..............page:147-149,152
Implementation of SSL Embedding Based on Cipher Chip
yu xiong ; duan bin ; lin zuo yuan ; zhang yan
..............page:141-143,146
Security Mobile Payment Scheme Based on the Third-party
huang xiao fang ; zhou ya jian ; lai xin ; yang yi xian
..............page:158-159,162
Improved Scheme for Smart Card Password Authentication Based on Bilinear Pairings
deng li ; wang xiao feng
..............page:150-152
Analysis of Improved MFE Multivariate Public Key Scheme
tian li ; bao wan su
..............page:155-157
Research on Process Hiding Technology Based on Direct Kernel Object Manipulation
pan mao ru ; cao tian jie
..............page:138-140
Self-adaptive Cross-layer Scheduling Algorithm Based on Differentiated Services
shen jian fang ; cheng liang lun
..............page:115-117,120
Energy-aware WSN Routing Protocol
xu jing dong ; li zuo ; zhao wen yao ; lu hua jun
..............page:123-125
WSN Voice Communication System Based on Jennic Platform
yu ning ; hua zuo ; gong bin
..............page:126-128,131
Security Vulnerability Detection Method of Logic-unknown PLD
zhou li ; li qing bao ; fan min ; zhao yan
..............page:132-134
Performance Analysis of P2P VoIP Based on Two-hop-worst Lookup
wang bin ; shen qing guo ; wang wen hua ; zhong qin
..............page:109-111,114
Ad Hoc Networks Route Discovery Algorithm Based on Expanding Ring
li shi bao ; hong li
..............page:112-114
Design of Multi-channel Access Protocol for Low-speed Ad Hoc Networks
zhao zuo ; quan hou de
..............page:91-94
Remote Data Transmission Technology Based on Multi-priority Buffer Queue
li zhou zhi ; wang xiao dong ; wang zhen zhi ; feng zhi min ; zhou yu
..............page:105-108
Research on TCP Throughput Upper Bound About Wireless Ad Hoc Network
chen guo ; li qing hua
..............page:95-97,100
Clustering Routing Algorithm for Wireless Sensor Network Based on Ant Colony
wang gui feng ; wang yong ; tao xiao ling
..............page:73-75
Performance Test and Analysis Based on Chip Multithreading Processor
tang yi jian ; liao xiang ke ; shao li song
..............page:253-255
Research on RBAC Policy Conflict and Its Detection Algorithm
cheng xiang ran ; chen xing yuan ; zhang bin ; yang yan
..............page:135-137
Algorithm of Mining Frequent Closed Itemsets on Data Streams
tao ke ; wang yi jie
..............page:49-51
Recognition Method of Protein Interaction Sites Based on Maximum Entropy Model
du xiu quan ; cheng jia xing ; song jie
..............page:203-204,207
New Bionics Optimization Algorithm: Food Truck-Cockroach Swarm Optimization Algorithm
cheng le ; xu yi zuo ; zhang hong bin ; qian zhao lou ; feng gang
..............page:208-209,213
Quick Full-text Identification Algorithm for Document Set Plagiarism
hu ming xiao
..............page:197-199,202
Web Service Discovery Algorithm at Two-stages Based on Memory Model
yuan tie zhu ; wang lei
..............page:250-252
Trustworthy Credit Reputation Model Based on C2C
jia yan tao ; yu hui qun
..............page:256-258
Realization of Custom Data Backup Application in OPNET
ma lin ; huo hua ; li xiu zhi
..............page:276-278
Fast Peptide Identification Algorithm Based on Tandem Mass Spectrum
shao ming zhi ; xu yun ; wang ying ; li wen jun
..............page:214-216
Progressive Iris Image Quality Evaluation Model
lv lin tao ; shi fu xun
..............page:217-219
Analysis of RFID Reader\'s Transmitter Simulink Modeling
guo xiang rong ; wu yue shan
..............page:291-292,封3
Independent Component Analysis Based on Maximum Likelihood Parzen Window
gong dan dan ; liu guo qing
..............page:279-281,284
Design and Implementation of Remote Control System for Rat Stimulator
li jian hua ; wan hong
..............page:288-290
Data Synchronization Solution Based on Virtual Log Compression
zhang chun ling ; lv zhen yu ; liu zun feng
..............page:67-69
Face Recognition Based on FKPCA and Double Decision Subspace
zhang jian ming ; yang feng qing ; fang fang ; duan li
..............page:182-184
Study on Flexible Needle Insertion Simulation Based on Virtual Spring Model
gao de dong ; zheng hao jun ; yao wang ; he rui
..............page:273-275,278
Distribution Scheme of Self-certified Public Key Based on Threshold Secret Sharing
zuo xiao fang ; su jin hai
..............page:129-131
Gross Error Detection of Soft Sensing Data Based on Improved PCA
hu yun ping ; zhao ying kai ; li li juan
..............page:282-284
Traffic Prediction of GPRS Cells Based on Multiple Seasonal Model
zhou zuo ; zhang jin ; li guo ; zheng bo feng
..............page:76-78
Efficient Key Management Scheme for Heterogeneous Wireless Sensor Network
hu yun song ; dan hong
..............page:160-162
Multi-channel MAC Protocol Based on Node Cooperation in Ad hoc Network
fang li cai ; lei lei ; xu zong ze
..............page:98-100
Semantic Query Expansion Method for Tourism Domain
shi ya xian ; li zuo ; xiao bao ; wei zuo zuo ; jiang yun cheng
..............page:43-45
Application Component Configuration Based on AUTOSAR Methodology
xu zuo peng ; wang xiang ; lu jian hua ; xu jun ; zhang xiao xian
..............page:240-242
Hybrid Arithmetic Coding of Securities Trading Data Compression
cai zuo ; yang xiao hu
..............page:267-269,272
Multi-population Co-evolution Model Based on Dynamic Niche Sets
zuo wen ke ; yang jie ; han xiu ping
..............page:226-228
Improved Particle Filter Tracking Algorithm
bai ke jia
..............page:200-202
Fault Diagnosis Based on Extended Fuzzy Time Petri Net
wang yan ping ; ma liang li ; liu yong zuo
..............page:52-53,56
Control Strategy for Traffic Flow Congestion in Partial-shared Integrated Services Network
jiang hong yan ; lin ya ping ; hu yu peng
..............page:70-72
Cross-layer Routing Protocol for Ad Hoc Networks Based on Synthetical Metric
zhu ying feng ; lei lei ; xu zong ze
..............page:79-81
Distributed Data Compression Method in Wireless Sensor Networks
wang ying jie ; ju shi guang ; yin xiao jia
..............page:88-90,94
Research on Aggregate-based Congestion Control Mechanism and Its Improvement
wu dong ; chen yuan zuo ; wang wen juan
..............page:82-84,87
Fundus Vessel Edge Detection Method Based on Embedded Confidence
pan lin ; huang lin lin ; wei li fang ; yu lun
..............page:174-176,184
Novel Algorithm of Recovering Depth from Defocus Image
liu hong ; jia yu ; cheng hong ; wei sui
..............page:169-170,173
Attack and Defending Technology of shellcode
wang ying ; li xiang he ; guan long ; cui bao jiang
..............page:163-165,168
Fingerprint Image Thinning Algorithm Based on Improved PCNN
wang xiao tao ; xu da cheng
..............page:180-181,190
Hole Boundary Identification Algorithm for 3D Closed Triangle Mesh
kong ling xia ; yao yuan ; hu qing xi
..............page:177-179,187
Spam Filter Based on Multiple Classifier Combinational Model
liu ju xin ; xu cong fu
..............page:194-196
RBF Neural Network Prediction Model Based on Hidden Layer Optimization
wang chun zi ; zhang bin
..............page:191-193,196
Face Recognition Based on Classifiers Fusion Using Fuzzy Integral
gu xiao min ; lin jin guo ; mei xue
..............page:188-190
Two-scale Foreground-background Separation Model Based on Depth
pan jun lin ; shen yi fan ; chen wen bin
..............page:166-168
Speech Emotion Recognition of Multi-segment Fusion Based on D-S Evidence
lu jie rong ; zhan yong zhao ; mao qi rong
..............page:205-207
Face Gender Classification Method Based on Improved Eigenspace Separation Transform
gu cheng yang ; wu xiao jun
..............page:223-225
Research of High-dimensional Data Adaptive Classification
wu yong liang ; wan wang gen ; xu xue qiong
..............page:210-213
Immune Genetic Algorithm Based on Uniform Design Sampling for Solving Maximum Clique Problem
zhou ben da ; yue qin ; chen ming hua
..............page:229-231
Dynamics Visual Servo Method for Robot\'s Grasping Moving Object
zuo hong wu ; hao kuang rong ; ding yong sheng
..............page:232-234,237
Detection Resource Scheduling of Near Space Based on Differential Evolution
dai jing ; cheng jian ; song min
..............page:220-222
Modeling and Implementation Method for MIPS64 Instruction Set Simulator
cai qi xian ; liu ming ; yu zu feng
..............page:245-246,252
Design and Implementation of RapidIO-IP Based on VxWorks
huang zhen zhong ; ni ming ; chai xiao li
..............page:243-244,249
Analysis of Data Link Timeslot Requirement and Simulation
xia bai zuo ; tao xiao yu
..............page:259-261
Performance Test and Analysis Based on Chip Multithreading Processor
tang yi jian ; liao xiang ke ; shao li song
..............page:253-255
High-speed RapidIO Based on Multi-processor
zhang juan ; su hai bing ; wu qin zhang
..............page:238-239,242
Algorithm of Mining Frequent Closed Itemsets on Data Streams
tao ke ; wang yi jie
..............page:49-51
Recognition Method of Protein Interaction Sites Based on Maximum Entropy Model
du xiu quan ; cheng jia xing ; song jie
..............page:203-204,207
New Bionics Optimization Algorithm: Food Truck-Cockroach Swarm Optimization Algorithm
cheng le ; xu yi zuo ; zhang hong bin ; qian zhao lou ; feng gang
..............page:208-209,213
Quick Full-text Identification Algorithm for Document Set Plagiarism
hu ming xiao
..............page:197-199,202
Implementation of HLA/LAN-based Heterogeneous Simulation System
di ling xiao ; ma jie zhong ; lu yan hong ; di zheng jun
..............page:235-237
Web Service Discovery Algorithm at Two-stages Based on Memory Model
yuan tie zhu ; wang lei
..............page:250-252
Trustworthy Credit Reputation Model Based on C2C
jia yan tao ; yu hui qun
..............page:256-258
Grid Map Building Method Based on Ground Disparity Distribution
zhang hai qiang ; zuo li hua ; fang hao
..............page:247-249
Realization of Custom Data Backup Application in OPNET
ma lin ; huo hua ; li xiu zhi
..............page:276-278
Fast Peptide Identification Algorithm Based on Tandem Mass Spectrum
shao ming zhi ; xu yun ; wang ying ; li wen jun
..............page:214-216
Progressive Iris Image Quality Evaluation Model
lv lin tao ; shi fu xun
..............page:217-219
Analysis of RFID Reader\'s Transmitter Simulink Modeling
guo xiang rong ; wu yue shan
..............page:291-292,封3
tou gao xu zhi
..............page:封2
Independent Component Analysis Based on Maximum Likelihood Parzen Window
gong dan dan ; liu guo qing
..............page:279-281,284
Differentiated Services Mechanism Based on PDoSS in DCF
xu ying ; bai guang wei ; wang ming chao ; cao lei
..............page:285-287,290
Design and Implementation of Remote Control System for Rat Stimulator
li jian hua ; wan hong
..............page:288-290
Hybrid Arithmetic Coding of Securities Trading Data Compression
cai zuo ; yang xiao hu
..............page:267-269,272
Data Synchronization Solution Based on Virtual Log Compression
zhang chun ling ; lv zhen yu ; liu zun feng
..............page:67-69
Image Retrieval Method Based on Distinct Interest Points
cheng tao ; hou yu qing ; li ming li ; chang zhe
..............page:171-173
Improved Particle Filter Tracking Algorithm
bai ke jia
..............page:200-202
RFID Authentication Scheme Based on EPC-C1G2 Standard
wang yi wei ; zhao yue hua ; li xiao cong
..............page:153-154,157
Measurement and Management Research of Internet Socialization
du jian qing ; yang jia hai ; huang shao jun
..............page:262-263,266
Web Services Transaction Scheduling Algorithm Based on Cost of Failure Risk
li zhuang ; cao bao xiang ; xia xiao na
..............page:64-66
Improved Bi-group Evolutionary Programming Algorithm
zhao rui ; chen yun hua ; deng jiu ying
..............page:21-23
Module Automatically Loading Mechanism Based on VxWorks
yu kang ; ning hong ; deng sheng lan ; zhang yi
..............page:264-266
Distribution Scheme of Self-certified Public Key Based on Threshold Secret Sharing
zuo xiao fang ; su jin hai
..............page:129-131
Research on RBAC Policy Conflict and Its Detection Algorithm
cheng xiang ran ; chen xing yuan ; zhang bin ; yang yan
..............page:135-137
Task Allocation and Scheduling Algorithm Based on Fuzzy Theory
gong yue ; zhang zhen zhen ; zhang gang gang ; ma xiao hai ; bao jie
..............page:38-40
Gross Error Detection of Soft Sensing Data Based on Improved PCA
hu yun ping ; zhao ying kai ; li li juan
..............page:282-284
Face Recognition Based on FKPCA and Double Decision Subspace
zhang jian ming ; yang feng qing ; fang fang ; duan li
..............page:182-184
Traffic Prediction of GPRS Cells Based on Multiple Seasonal Model
zhou zuo ; zhang jin ; li guo ; zheng bo feng
..............page:76-78
Research on Multi-path Packet Redundancy Strategy Based on Wei Bull Transform
zhu cheng jian ; jiang bing ; zhao yue
..............page:118-120
Efficient Key Management Scheme for Heterogeneous Wireless Sensor Network
hu yun song ; dan hong
..............page:160-162
Revocation Self-healing Key Management Scheme in Wireless Sensor Network
xiong yan ; cai xiang ; miao fu you
..............page:144-146
Study on Flexible Needle Insertion Simulation Based on Virtual Spring Model
gao de dong ; zheng hao jun ; yao wang ; he rui
..............page:273-275,278
Multi-channel MAC Protocol Based on Node Cooperation in Ad hoc Network
fang li cai ; lei lei ; xu zong ze
..............page:98-100
Semantic Query Expansion Method for Tourism Domain
shi ya xian ; li zuo ; xiao bao ; wei zuo zuo ; jiang yun cheng
..............page:43-45
Application Component Configuration Based on AUTOSAR Methodology
xu zuo peng ; wang xiang ; lu jian hua ; xu jun ; zhang xiao xian
..............page:240-242
Multi-population Co-evolution Model Based on Dynamic Niche Sets
zuo wen ke ; yang jie ; han xiu ping
..............page:226-228