Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2010 Issue 3
Sensor Optimal Placement Algorithm Based on Coverage Rate
zhu ji hua ; wu jun ; tao yang
..............page:94-96
Test Data Coding Method Based on Alternation and Run Length Code
xiang li ping ; liang hua guo ; liu jie ; zhang zhi gang
..............page:277-279
Wireless Data Acquisition System of Temperature and Humidity in Tobacco Drying Room
zhang wei ; ge zhen yang
..............page:240-242,245
Simulation of Dynamic Cloud Based on Cellular Automaton
sun tian zi ; liu hong
..............page:272-274
Nonlinear Learning Algorithm of Face Image Super Resolution
huang dong jun ; kao te si wei an ni ao gu si ting
..............page:203-205
Mobile Location Algorithm Based on Signal Attenuation and Outliers Detection
zhu jiang ; qi zheng wei
..............page:280-282,封3
Network Vulnerability Evaluation Based on Attack Graph and Security Metric
wang hang ; gao qiang ; mo zuo chang
..............page:128-130
Resource Constraints Algorithm for Traffic Measurement Based on Sliding Window
zhang zhen ; wang bin qiang ; chen shu zuo ; zhou jing di
..............page:122-124
Analysis of Proxy Blind Signature Scheme
wang guo zhan ; kang bao yuan ; cheng lin
..............page:134-135
Augmented Reality System Based on Panoramic Imaging
wang yu ; wang yong tian ; liu yue ; zhang zuo peng
..............page:16-18
Inference Method for Lossy Links Based on Prior Probability
zhao zuo ; cai wan dong
..............page:13-15,18
Analysis of Sub-protocol in Offline Fair Exchange Protocol
li xiang dong ; chen li ; wang qing xian
..............page:7-9,12
Clustering Algorithm Based on Web Pages Structure and Dominant Color
zhao zuo zuo ; chen jun jie ; li yuan jun
..............page:1-3
MANET Routing Algorithm Based on Spatial Information
zhu ben hao ; yao ming hai
..............page:115-117
Design and Implementation of IPv6 Access System for WSN
wen zhi ping ; li xun ; li hong jun
..............page:109-111,114
Research on Transformation Method from PIM to Relation PSM
he man ; liu xiang wei ; hao cheng min
..............page:58-60,63
System Dynamic Reliability Modeling and Analysis Based on SHCPN
lin chang chun ; luo chao ping ; chou yue ; zhang ming qing
..............page:34-36
Structural Join Algorithm for XML/GML Non-spatial Data Querying
chen jian hua ; wang hua jun ; miao fang ; wang wei hong
..............page:69-71,75
Mode Matching Algorithm for Web Query Interface Integration
he ling ling ; liu guo hua ; kong ling min
..............page:64-65,68
Simulation Metamodeling Approach Based on Relevance Vector Regression
wu bing ; cheng si wei ; zhang wen qiong ; liang jia hong
..............page:24-27
Noise Reduction Method for Flight Data Based on Singular Value Decomposition
lv yong le ; lang rong ling
..............page:260-262
Research and Application of Communication System Between Modules in MTM-Bus
lu shang ding ; lei jia ; huang xin ; li yan ping
..............page:254-256,259
Design and Implementation of PCI to RapidIO Bridge
nie xin yi ; sun ke ke ; ma ke jie
..............page:246-248,253
Rapid Parameter Updating Algorithm for Large Margin Gaussian Mixture Model
huang hao ; ha li dan
..............page:197-199
Application Design of IAM Function in ERP System
zhu shi sheng ; wang tao
..............page:184-185,188
Network Anomaly Detection Based on High-order AR Model
huang qiang sheng ; cheng jiu jun ; kang qin ma
..............page:174-176
Voting Mechanism Used for Node-attestation Protocol in WSN
fan chou ; tan jin
..............page:169-171
Adaptive Search Algorithm Based on Double-initial-cross Search Pattern
wang shuang shuang ; duan mu chun jiang ; zhou dong hui ; liu zuo
..............page:227-228,231
PMI Model Based on T-RBAC
liu xiao bing ; bai chao yang ; wang xiao ; li zhong kai
..............page:152-155
Semantic-Based Access Control Model and Its Reasoning Mechanism
shen hai bo
..............page:162-163,166
Research on IP Multicast Application in BitTorrent
long bai zuo ; zuo xi rong ; wang wen dong ; gong xiang yang
..............page:118-121,124
tou gao xu zhi
..............page:封2
Optimization of Network Performance Based on Linux Kernel
yang xiao qiang ; zhu ming ; yang jian
..............page:97-98
Approach of Aspect Mining Combining Fan-in Analysis and Clone Detection
gu hui ; liu si cong ; yang ji xu
..............page:66-68
VPN Test System Based on IPSec Network Protocol
lu min feng ; ping ling zuo ; li zhuo
..............page:156-158,161
MAC Protocol with Collision Avoidance for Dense WSN
shi wen bo ; wang ji chun ; li xiang
..............page:99-102,105
Method of Estimating Competition Stations Number in WLAN
jiang hong wei ; lu zuo
..............page:103-105
Temporal Ontology Model and Its Management Prototype System
tian xiao yun ; fang li ying ; zuo jian zhuo ; wang pu
..............page:41-43,50
Trust Management Model Based on Fuzzy Theory in P2P Networks
wu jian rong ; wang xiao ming
..............page:180-183
Key Management Protocol for WSN Based on ECC
zuo bo ; guo yong hui ; luo chang yuan ; li wei
..............page:142-144
Location Method of License Plate Based on Character Detection
jia feng ; chen ji rong
..............page:192-194
Wireless Distributed Monitoring System for Protected Environment
ding fei ; zhang xi liang ; song guang ming ; li jian qing ; song ai guo
..............page:234-236
Design and Application of Perceptual Weighting Filter Based on Pseudo-cepstrum
li feng lian ; zhang xue ying
..............page:275-276,279
Fast Subpixel Motion Estimation Algorithm for AVS
wei jian yun ; peng yu hua ; liu wei
..............page:229-231
Trust-oriented Single Sign-On in Open Network Environment
wan can jun ; li chang yun
..............page:148-151
PSO Algorithm for Solving Matrix Eigenvalues and Eigenvectors
wei xing qiong ; zhou yong quan
..............page:189-191
Research and Design of Self-securing Disk
zeng meng zuo ; gu da wu ; hou fang yong ; song ning zuo
..............page:139-141
Grid Task Schedule Based on Hybrid Ant Colony Algorithm
wei dong ; wu liang jie ; zuo dan ; liu gang
..............page:215-217
Research on Model Supporting Interface Automatic Generation
yang he biao ; hou ren gang ; tian qing hua
..............page:79-82
Search Algorithm for Unstructured P2P Networks
xu jing dong ; gao li jin ; liu zuo yao ; li zuo ; zhang jian zhong
..............page:86-88
Trust-Based Access Control in Web Service
ma xiao ning ; feng zhi yong ; xu chao
..............page:10-12
Distributed Routing Protocol Based on Cluster
feng jia zuo ; chen yong sheng ; yang ping
..............page:89-91
Redundant Cluster-head Mechanism in WIA-PA
zhang dan ; liu feng
..............page:257-259
Design and Analysis of Improved Arbiter PUF
zhang jun qin ; gu da wu ; hou fang yong
..............page:249-250,253
Industry Ethernet Data Gathering System Based on EtherCAT
li mu guo ; wang lei ; wang jing ; zhang qun
..............page:237-239
Integration Method and Its Realization of Distributed Process Real-time Data
xue yao yu ; wang jian lin ; zhao li qiang
..............page:55-57
Wireless Identity Authentication Method Based on Mobile Phone and 2D Barcode
feng lin ; sun zuo ; wu zuo ; yuan bin
..............page:167-168,171
DNS Spoofing Principle and Its Defense Scheme
kong zheng ; jiang xiu zhu
..............page:125-127
Interoperability Test Approach Based on ISM
zheng si zuo ; ping ling zuo ; chen xiao ping ; gu wen zuo
..............page:72-75
Hot Spot Information Auto-detection Method of Network Public Opinion
zheng kui ; shu xue ming ; yuan hong yong
..............page:4-6
Survey of Research on Collusion Attack in Ad Hoc Network
tan chang geng ; li zuo zuo
..............page:177-179,183
Rapid Background Extraction and Update Algorithm
li ming hui ; su hong ye ; dong li da
..............page:283-封3
Trust Schedule for Assured Constraint in Grid Environment
yao jun ; ma man fu
..............page:159-161
Low-rate Denial-Of-Service Detection and Defense for TCP Congestion Control
zhu li na ; zhu dong zhao
..............page:164-166
Implementation Algorithm of Pseudo Modular Inversion Secure Against Side Channel Attack
du zhi bo ; chen yun ; wu zhen ; chen jun ; zhou li sha
..............page:131-133
Study of Approximate Periodicity Mining with Multi-granularity Time
jiang hua ; meng zhi qing ; zhou ke jiang ; xiao jian hua
..............page:83-85,88
Rapidly Updating Algorithm of Primitive Root in Key Exchange Protocol
yan bo tao ; pan xiao zhong ; zhang zuo
..............page:186-188
Improvement of Target Identification Algorithm for Sequence Image
bi xiao jun ; lin hong zhang
..............page:206-208,212
Design and Realization of Data Processing Core in Network Processor
li miao ; wang ye hui ; zhou cai bao
..............page:243-245
OAI-PMH Service Provider Framework Based on FIHC
wang xin bo ; chen li chao ; xie bin hong ; xia mei
..............page:263-265
Design and Implementation of Portable Intelligent Tourist Guide System
shi jing cheng ; fang zhi gang ; tang yi jun
..............page:269-271
Dynamic-Greedy Schedule Algorithm for Grid Workflow
deng ding lan ; yu jiong ; tan ya li ; lv liang gan
..............page:31-33
Education Resource Retrieval System Based on Deep Web
zhang shi ming ; zuo zheng ; xu he xiang ; xia de yuan
..............page:76-78,82
Budget Constrained Optimal Time Schedule Algorithm in Grid Computing
lv zuo ; liu chuan ; huang sheng ; jiang qing
..............page:28-30
Picking Path Plan for Carousel Based on Ant Colony Optimization Algorithm
wang zuo ; feng yan jun
..............page:221-223
Implementation of Linux Checkpoint Mechanism Supporting File Migration
yang zuo ; chen zuo zhong
..............page:266-268
Application of Dynamic QoS Mechanism in MPLS VPN
hou jian feng ; ma ming kai ; li xiang hong
..............page:106-108
Community Structure Mining Method in Networked Command and Control
zhu tao ; chang guo zuo ; zhang shui ping ; guo rong zuo
..............page:19-21,27
Genetic Algorithm Selection and Parameter Setting Based on Rule Induction
li zuo ; cui du wu
..............page:218-220,223
Selection Mechanism of Ethnic Group Evolution Algorithm
chen zuo ; cui du wu
..............page:200-202
Information Hiding Capacity Model Based on Error-correcting Codes
zuo xue hu
..............page:172-173,176
Search Results Clustering Optimization Based on Association Rules
wang qiong ; zhang liang ; liu chuang
..............page:47-50
Application of Configuration Complexity Model in System Operation
han feng ; wang jian xin ; xiao gang ; li xiang hong
..............page:37-40
Cross-layer Research of Random Network Coding Based on WSN
qin jian ; yang bai zuo ; li ou
..............page:112-114
Anti-interference Moving Object Detection Algorithm
wang ming ji ; xiao gui dan
..............page:232-233,236
Relationship Between Precision and Recall for Web Prefetching Performance Indexes
han ying jie ; shi lei ; liu yang
..............page:61-63
Interactive Genetic Algorithm Based on Grey Model of Individual Fitness
guo guang song ; zhao shao gang
..............page:209-212
Improved Bayes Matting Algorithm
lv ju jian ; zhan yin wei
..............page:213-214,217
Research on Clustered Network Performance Based on DEANA Protocol
zhu jia qi ; hu gang ; chen shi zhi
..............page:92-93,96
Web User Clustering Method Based on Variable Precision Rough Set
ji zhou peng ; zhou jun ; he ming
..............page:44-46