Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2010 Issue 9
DOA Estimation with 2D Subspace Fitting Based on SVD
zeng hao ; zhang ying hui ; yang shi zhong
..............page:288-290
Multiple Objects Video Segmentation with Recognition Information
huang ye zuo ; zuo yi ping
..............page:232-234,237
High-speed Multiplier of Optimizing Partial Products Constrictive Structure
dong shi hua ; qiao lu feng
..............page:252-254
Mixed-noise Removal for Color Images Based on Pulse Coupled Neural Network
he kai ; li shao fa ; wang cheng
..............page:214-216
Application-level Dual-management System Based on Detection Agent
zhou lu hua
..............page:277-278,281
MP3 Audio Decoding Optimization in Internal Memory Space
ren yan peng ; wang zhi jun ; liang li ping
..............page:222-223,226
Antibody Generation and Matching Algorithm in Artificial Immune System
xu jia ; zhang wei
..............page:181-183
Parallel Method for Selective Loop
wu yue ; lei chao fu ; yang hong bin
..............page:35-37,40
Incremental Computation of Max Data Cube in What-if Analysis
xiao yan qin ; li jun ; huang zuo
..............page:29-31
Modeling of UAV Search Strategy Based on Nearly Orthogonal Latin Hypercube Experiment
zhou xiao guang ; li wei min ; liu yi
..............page:1-3
Text Categorization Method Based on Features Vote
jiao qing zheng ; wei cheng jian
..............page:200-202
Fast Mode Selection Algorithm for Inter Frames Based on Block Residual
li na ; wang wei zhe
..............page:224-226
Credential Description Scheme for Automated Trust Negotiation Supporting Selective Attributes Disclosure
xiao shu zuo ; wu guo xin ; sun xiao yin
..............page:142-144
Evading Control Method for Flock of Aircraft Based on Dot-like β Agent
shen dong ; wei rui xuan ; hu ming lang
..............page:184-186
Multi-strategy Ontology Mapping Algorithm Based on Conceptual Similarity Computing
yu shu hao ; su shou bao ; liu ren jin
..............page:82-84
Malware Detection Based on Critical Application Programming Interface Graph
bai li li ; pang jian min ; zhang yi chi ; yue feng
..............page:139-141
Adaptive Distributed Key Generation Scheme
cha jun ; su jin hai ; zuo xiao fang ; zuo shao ge
..............page:161-162,170
Implementation of USB Camera Drive Under Embedded Linux
song li hua ; gao zuo
..............page:282-284
Simplification and Implementation of Embedded iSCSI Protocol
he zai hong ; zhang yan
..............page:279-281
Clustering Optimization Based on Ant Colony Algorithm
zhang li ; liu xi yu ; li zhang quan
..............page:190-191,194
Homing Missile Flight Control System Based on Creator/Vega
zhang fei yu ; zuo xiao yong
..............page:243-245
Conceptual Clustering Based on Data Streams
shi jin cheng ; hu xue gang
..............page:62-64
Design of Protective Relay Test Device Based on Double CPU
liu hong hai ; hou xiang hua ; jiang yun liang
..............page:257-259
Guess Attack on Trivium Based on Chosen Differential
sun guo ping ; hu yu zuo ; bai sheng jiang
..............page:129-130,133
3n Mirror Adaptive Random Testing Algorithm
nie jian ping ; qian yue ying ; chen run qiang
..............page:53-55
Automatic Partition Algorithm Based on Multi-region and Multi-code Problem
zhang juan ; lu lin sheng
..............page:73-76,79
Scalable Computing Acceleration Middleware for Desktop Problem Solving Environment
wang yan wu ; chen hu ; dai kui ; zuo jian qing
..............page:32-34,40
Improved Cross Search Algorithm Based on H.264
wu zuo zuo ; guo ying ; wang min ; han zuo
..............page:235-237
Wireless Network Planning Based on Hierarchical Multi-objective Optimization Algorithm
tang chao wei ; li xiao long ; shao yan qing ; liu peng jun ; guo chun wang
..............page:7-9,13
Assessment Model Based on Multivariate Data Fusion and Hierarchical Analysis
xia bing ; pan lei ; sun fei xian ; zheng qiu sheng ; pei zuo
..............page:153-155,158
Hardware Filtering System Based on UCL in Broadcast-storage Grid
sun yu bo ; ma jian guo ; zhu min
..............page:100-102
Improved Time Synchronization Algorithm Based on TPSN
zhang bai zuo
..............page:109-110
Key Technologies of Communication Receiver System Based on Cluster Computing
lu guang jun ; zhang li ; lu pei zhong
..............page:240-242
Research and Implementation of Design Pattern for Meteorological Software
wei jian guo ; wang jian lin ; zhuang li wei
..............page:59-61,64
Face Recognition with Single Sample Based on Three-layer Virtual Image Generation
zhang jian ming ; liu xiao ; fan li jing
..............page:187-189
Peer-to-Peer Video on Demand System with Partitioned Buffer-Scheduling Strategy
zeng wen feng ; xu zuo long
..............page:90-93,96
Discernibility Matrix and Its Computing Core Method
yang chuan jian ; ge hao ; li long zuo
..............page:87-89
Multiple Grade and Multi-proxy Signature Scheme Protecting Agent Identity
ren yan ; wang ji rong
..............page:145-146
Computer Simulation of Shepherd\'s Purse Root System
liu jing ; ge zhen yang ; lin wen ru ; kou guang tao ; guo hao
..............page:266-267,270
Simulation of Explosion Fragmentation Effect Based on Flow Field
chen chang bo ; xiong yue shan
..............page:271-273
Distributed Web Service Mining Technology Based on P2P
zhu hong kang ; yu xue li
..............page:23-25
Regional Slope Length and Slope Steepness Factor Extraction Algorithm Based on GIS
zhang hong ming ; yang qin ke ; liu qing rui ; guo wei ling ; wang chun mei
..............page:246-248
Research and Implementation of Cylindrical Panorama Generation Technology
peng hong xing ; song hong zuo ; zou xiang jun ; xu dong feng
..............page:208-211
Research and Implementation of Geographic Information Data Change Detection System
wan yuan ; li lin ; ying shen
..............page:4-6,13
Self-organizing Clustering P2P Semantic Routing Algorithm
xiang yong sheng ; zhang ying ; chen zuo
..............page:123-125
Density Clustering Algorithm Based on Subspace Dimensional Weighting
huang wang fei ; chen li fei ; jiang qing shan
..............page:65-67
Network Protocol Reverse Parsing Based on Dynamic Binary Analysis
he yong jun ; shu hui ; xiong xiao bing
..............page:268-270
SNMP-based RFID Information Network Monitoring System
liu wei ; chen xiao hui ; pan ke ; yuan wei
..............page:291-292,封3
Analysis and Implementation of RapidIO Subsystem for Linux
ding xing ; chen jie ; ni ming ; mao zuo
..............page:260-262,265
Research on Duplicate Removal for Network Video Based on File Title Features
guo mu zuo ; liu ping ; tan jian long ; guo li
..............page:227-229,237
tou gao xu zhi
..............page:封2
Implementation Mechanism of Multiple Home Agents for Mobile Multicast
wang jian sheng ; cao wen ye
..............page:103-105,108
Implementation of V850E/MS1 Embedded Processor
bai zuo feng ; zhang hui ; bo jia jun ; yang zhi
..............page:255-256,259
Twig Pattern Filtering Algorithm for XML Data Stream System
li yong feng
..............page:50-52
Fractal Encoding Compression Method Based on Detail Block of Image
tang wu jia ; wu xiao hong ; yu yan mei ; luo dai sheng
..............page:217-218,221
Research on Multinomial Relation Bias of Trivium
wang ming ; hu yu zuo ; xu yong ping
..............page:134-135,138
Application of MVC Pattern in Data Middleware
zhang li
..............page:70-72
UML-based Web Application Modeling and Test Method
li li ping ; zuo huai kou ; qian zhong sheng
..............page:26-28,31
Information Hiding Algorithm Based on PDF417 Barcode
zuo yu hai ; liu lian shan ; xue li qin ; zhang xiu juan ; wang liang ; wang zhi you
..............page:131-133
Study on Task Schedule in Intelligent Network Disk System
liu min na ; zhao yue long
..............page:41-43
Application of EEG Signal in Emotion Recognition
chen zeng ; liu guang yuan
..............page:168-170
New Particle Swarm Optimization Algorithm
dai jun ; li guo ; xu chen ; tao ai
..............page:192-194
B Code Demodulation Design Based on Nios Ⅱ Processor
li ling mei ; wu zhi yong ; cui ming
..............page:263-265
Method for Product Structure Similarity Measurement
qiu hong jun ; yu wen jing
..............page:274-276
Low-power Clustering-based Time Synchronization Mechanism for Multi-hop WSN
guan xin ping ; zhang xiao jing ; liu zhi xin
..............page:111-113
Application of Improved Detector Generation Algorithm in Intrusion Detection
yin shu feng ; zhao jun zhong ; guo yin zhang
..............page:156-158
Task-oriented Cooperative Programming Based on Ontology and Multi-Agent
fu ding ; huang han tang
..............page:47-49
Mold Monitoring System Based on Position Compensation Technique
yao jun feng ; zhan chang ming ;hung chih-cheng
..............page:238-239,242
Shot Boundary Detection Algorithm Based on Clustering
xu wen zhu ; xu li hong
..............page:230-231,237
Data Stream Classification Algorithm Based on Multiple Class-association Rules
zhao chuan shen ; he shun gang ; yang ji hong ; chen li xia
..............page:38-40
Joint Estimation Algorithm of Non-ideal Effects in Ultra-wide Band System
zhou jun ; liu liang ; ye fan ; li wei ; li ning ; ren jun yan
..............page:97-99,102
Prediction of Protein Tertiary Structure Based on Neural Network
cai na na ; chen yue hui ; li wei
..............page:176-177
P2P Traffic Control Based on Ternary Content Addressable Memory
lai hong hui ; wang ping yao
..............page:120-122,125
Serial/Parallel Algorithm for Region Labeling
hu tao ; guo bao ping ; guo xuan ; yang ou
..............page:17-19,22
Code Analysis of Modeling Execution Path as Process
lin jin bin ; jiang fan
..............page:68-69,72
Improved Algorithm of Concept Similarity Propagation
yin yan ; li peng
..............page:80-81,84
Intelligent Location Method of Typhoon Center Based on Infrared Cloud Image
niu hai jun ; yang zuo
..............page:195-196
Double Random Phase Encryption and Hiding Technique Based on Symmetric Image
fan jin ping ; zhang yong lin
..............page:136-138
Scratch Line Detection and Restoration Based on Spatial-temporal Features
zeng qing yue ; ding you dong
..............page:203-205
Model of Web Service Emergence Based on Immune-learning
tang xin ting ; zhang xiao feng ; yang hong yong
..............page:173-175
Note Recognition Method in Music Score Image
liu xiao xiang
..............page:163-167
Variation Level Set Segmentation Method
wen jing ; chen zhan wei
..............page:212-213,216
Intelligent Polling Strategy for Network Management System
yang zhi hui ; wang yong ; su rui
..............page:106-108
Trojan Communication Detection System Based on Network Drive Technology
zhong ming quan ; li huan zhou ; tang zhang guo ; zhang jian
..............page:150-152
Design of AES S-box Circuit with Anti-DPA Attack
zeng yong hong ; ye xu ming
..............page:20-22
Comprehensive Evaluation Model for Routing Protocol in Delay and Disruption Tolerant Networks
zhang long ; zhou xian wei ; wu qi wu
..............page:14-16
Temporal XML Index Based on CB+-tree
xu hai yan ; jiang xia jun
..............page:77-79
Secret Sharing Scheme Based on Commutative Encryption Function
he jun ; li li juan ; li xi mei
..............page:159-160
HIDA Algorithm Based on OLSR Routing Protocol
yao sheng ; leng peng
..............page:147-149
Reducing Test Data Volume Method Based on Tree Decompressor
yi dong yan ; you zhi qiang
..............page:249-251
Improved Node-Node-oriented Evolutionary Test Method
zhao qing lan ; dong chun sheng
..............page:56-58
Sectional Plane Reconstruction Method for Freehand 3D Ultrasound
wang qing hao ; sun feng rong ; wang li mei ; wang wen ming ; yao gui hua ; zhang yun
..............page:206-207,211
Estimation Algorithm for Non-Gaussian Acyclic Causal Model with Latent Variables
jiang feng ; zhu hui sheng ; wang wei
..............page:178-180
Improved Feature Weighting Algorithm for Text Categorization
tai de yi ; wang jun
..............page:197-199,202
High-efficiency and Non-permutated Image Secret Sharing Scheme
zhou qing lei ; guo rui
..............page:126-128
User Disk Space Allocation Policy in Distributed Storage System
tan zi jun ; he lian yue
..............page:44-46
Automatic Elastic Registration of Medical Images Based on Rényi Entropic Graph
su zhi xun ; wang wei ; liu xiu ping
..............page:219-221
Research on Web Forum Data Source Incremental Crawler
cai xin bao ; guo ruo fei ; zhao peng peng ; cui zhi ming
..............page:285-287
Mesh Quorum-based Location Service Model
lu zhen jun ; zhou ji peng
..............page:114-116
Research and Simulation of Vehicle Intelligent Crash-avoiding Self-adaptive Control
zhang xue jun ; zheng li ying
..............page:171-172,175