Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2011 Issue 19
Research on Gate-level Online Self-repairing Technology for Embedded System
MAN Meng-hua;YUAN Liang;JU Zheng-quan;XIE Shuang-jian;CHU Jiea
..............page:9-11,16
WSN Routing Protocol Based on Cluster Heads Selection in Regions
CHEN Bin-bing;SHI Ye-ling
..............page:96-98
Database Clustering Algorithm Based on Similarity in Data Integration Environment
ZHENG Kai;LIANG Zhuo-ming;ZHENG Wen-dong
..............page:71-72,75
User Quantity Computation Model of Web Topic
ZHU Guang-li;ZHANG Shun-xiang
..............page:79-81
Dynamic Modeling and Change Detection Technology of Social Network
LIU Lian;LUO Jun-yong;LIU Yan
..............page:47-49
Rule-based Service Recommendation in Multi-Chord Environment
CUI Tao;ZHANG Kang-kang;YANG Feng
..............page:32-34,37
Association Rule Pruning Algorithm Guided by Positive Correlation
ZHANG Bin;ZHANG Jing;SHI Li-jun;HU Xue-gang
..............page:1-4
Design and Implementation of Data Access Mechanism in Combat System
LI Yan-yan;YAN Xue-feng
..............page:230-232
GMM Learning Method Based on CSMDEM Algorithm
JIA Ke-xin;HE Zi-shu
..............page:153-156
Real-time Update Algorithm for Nearest Neighbor Query of Moving Object
ZHOU Zong-yi;DU Zhong-jun
..............page:76-78
Grid-based Predistribution Secret Key Mechanism for Wireless Sensor Network
LI Ming;XIONG Yan;MIAO Fu-you
..............page:107-110
Clustering Method for Multiple Attributes Range Query
MA Hui;WU Ling-kun
..............page:41-43,46
Data Filling Method Based on New Relationship Matrix
JIN Cheng-mei;E Xu;MU Hai-jun;LI Yan
..............page:28-31
Review of Multi-source Remote Sensing Image Registration Techniques
WANG Han-yun;WANG Cheng;LI Peng;QIAN Zhi-ming;HAO Sheng-yong
..............page:17-21,25
Design and Implementation of ARCE Risk Treatment Plan Measurement Model
LIU Qi;ZHUJin-e;XIE Zong-xiao;KONG Jin-sheng
..............page:277-279
Application of Operate-response Model in Virtual Maintenance Prototype
ZHU Dong-fang;SU Qun-xing;LIU Peng-yuan;TONG De-fei
..............page:243-245,260
Code Distribution Model in DT-MSN with Variable Contact Rate
HUANG Yu-fei;LIN Feng;ZHENG Liang;ZHOU Ji-liu
..............page:101-103
WSN Multicast Routing Protocol for Region-specific
GAO De-min;QIAN Huan-yan;CHEN Ji-guang;WANG Xiao-nan
..............page:88-90
Identity-based Cryptosystem Electronic Bidding Scheme
YAN Shi-jia;LIU Xiao-jie
..............page:114-116
DHT Secure Routing Based on Route Convergence Detection
WANG Feng;CUI Zhong-yuan;ZHOU Jia-jun;LI Xiao-jian
..............page:117-119
Maximum Utility Spectrum Allocation Algorithm Based on Graph Coloring Theory
HE Li;ZH ENG Xiang-yu;LIU Zhen-kun
..............page:93-95
Design of Three-phase Electrical Parameters Acquisition System Based on SOPC
XU Zhi-jian;LUO Qi-wu;LUO Zhi-kun;LI Fu-hai
..............page:224-226
Parallel Algorithm Research on Pre-stack Depth Reverse Time Migration Imaging
ZHANG Xiao-dan;KE Xi-zheng;ZHANG Zhi-yu
..............page:249-251
Accuracy Analysis of Binocular Stereo Vision System
LIU Feng-cai;XIE Ming-hong;YAN Guo-lin
..............page:280-282,285
Sensitive Information Protection Method for Clustering Mining Based on Isometric Transformation
GONG Xiao-jing;ZHONG Cheng;HUA Bei
..............page:122-125
Area Density Coverage Algorithm Based on Virtual Square
N1U Zhi-xian;LI Xia;FENG Xiu-fang;LI Wu-peng
..............page:99-100,103
Neutrosophic Image Segmentation Approach Based on Thermal Balance
ZHAO Xina;WANG Shi-tong;WU Jun
..............page:210-212,220
Image Fast Reconstruction Method Based on Compressive Sensing
HOU Jin-man;HE Ning;LV Ke
..............page:215-217,226
AEP Noise Removal Method Based on Hilbert-Huang Transform
ZHANG Ai-tao;LI Bin;WANG Tao
..............page:163-165
Image Fire Detection Method Based on Feature Fusion
WANG Yuan-bin;MA Xian-min
..............page:166-167,176
Ranks of Restaurant Reviews Based on LDA Model
LV Shao-hua;YANG Liang;LIN Hong-fei
..............page:62-64,67
Key Visualization Simulation Technology Based on STKX Component
CHEN Bo;ZHANG Gang;WANG Na;ZHANG Yang
..............page:261-263
Adaptive Tracking Algorithm for Motive Objects Under Video Dynamic Scenes
CHENG Le-kai;ZHAI Su-lan;TU Zheng-zheng;LUO Bin
..............page:22-25
Gravity and Magnetic Data Interpretation System Based on MAPGIS
CHEN Ding-kai;CHEN Jun;ZHONG Qing-hua
..............page:273-276,279
Fast Adaptive Image Fuzzy Enhancement Algorithm
JIANG Tao;ZHAO Chun-jiang;CHEN Ming;YANG Xin-ting;SUN Chuan-heng
..............page:213-214,223
Segmentation and Implementation of Mice Tongue Slice Image Based on Morphology
WANG Qi-wen;ZHENG Li-min;MEI Shu-li
..............page:5-8
Cooperative Spectrum Sensing of Cognitive Network Based on Rician Channel
TAN Xiao-heng;CHENG Jin-bo;LIAO Yong
..............page:91-92,95
Pseudo Random of New Class Generalized Self-shrinking Sequence on GF(3)
WANG Jin-ling;CUI Xue-qing
..............page:133-134,140
Detection of SYN Flooding Attack Based on Semi-connected List
TANG Huan-rong;ZENG Yi-jing
..............page:135-137,144
XML Document Classification Based on Extreme Learning Machine
CHEN Sheng-shuang
..............page:177-178,182
Visual Words Ambiguity Analysis in BOW Model
LIU Yang-wen;HUO Hong;FANG Tao
..............page:204-206,209
Multicast Routing Algorithm in Ad Hoc Networks Based on Chaos Genetic
LIU Ze-hua;ZOU En;FANG Shi-yong;XIN Jian-tao;LIN Jin-qian
..............page:183-185,193
tou gao xu zhi
..............page:封2
Low-cost RFID Secure Protocol Based on Agent Random Number
FAN Jun-di;LI Min-bo;CHEN Guang-yu
..............page:129-132
Army Combat Maneuvering Strategy Under Uncertain Environment
YANG Zheng-lei;SONG Jian-she;YE Qing;GU Xi-rui
..............page:252-254
Multi-role Decision Support System for Sintering Ore Blending Based on Expert System
ZHANG Rui-jun;HUANG Yan
..............page:233-235,238
Concepts Similarity Algorithm Based on Google and KL Distance
LIAN Yu;PENG Jin-ye;XIE Hong-mei;FENG Xiao-yi
..............page:291-292,封3
Foreground Detection Based on Improved Gaussian Mixture Model
FENG hua-wen;GONG Sheng-rong;LIU Chun-ping
..............page:179-182
Design and Implementation of Perf on Loongson 2F
XU Heng-yang;AN Hong;LIU Yu;ZHOU Wei
..............page:236-238
TD-LTE Terminal Performance Optimization
LIU Fei;SHANG Qun-feng;HUANG Lin-peng;RAO Wei-xiong
..............page:255-257
Feature Extraction Algorithm of Face Eigenfeature Space
ZENG Yue;FENG Da-zheng
..............page:148-149,152
Continuous Nearest Neighbor Queries in Dynamic Weight Road Networks
LV Wei-feng;WANG Fei;JIANG Xin-xin;ZHU Tong-yu
..............page:157-159
Simulated Annealing Algorithm for Solving Circular Packing Problem
LIU Zhao-xia;LIU Jing-fa
..............page:141-144
Hybrid Architecture IPTV System Scheme
YU Hong-jin;GAN Lu;LIU Xin;YE De-jian
..............page:270-272
Multi-label Classification for Song Emotion Combined with TF-IDF
SUN Xiang-kun;DENG Wei
..............page:189-190,197
Design of μ-Generator in Decimal Sample Rate Conversion
ZHOU Jin-yuan;WANG Lin-kai;WANG Wen-yi;ZHOU Xiao-fang
..............page:218-220
Particle Swarm Optimization Algorithm with Dynamic Learning Objects
CAO Zhi-fang;WANG Guo-yin;SHEN Yuan-xia
..............page:171-173
Edge-preserved Kernel Regression Image Interpolation Method
ZHANG Zheng-rong;LIU Hong-yi;WEI Zhi-huib
..............page:194-197
Remote Sensing Image Fusion Method Based on Regional Wavelet Statistical Features
ZENG Yu-yan;HE Jian-nong
..............page:198-200
Computation Method of Human Body Three-dimensional Reeb Graph
GUAN Hua;GUO Li;LI Wen;WEI Yi-fang
..............page:207-209
Optimized Algorithm of Extended Subgraph Isomorphism Problem
XU Kai-xuan;Rudolf Fleischer
..............page:38-40
Collaborative Filtering Recommendation Algorithm Based on Single-class Classification
YANG Shuai;XUE Wen;XIEYong-hong;WANG Xiao-yu;ZHU Xiao-jie
..............page:59-61
Improved Mining Algorithm for Frequent Closed Itemsets over Data Stream
LI Guo-dong;HU Jian-ping
..............page:68-70
Information Forensics Method for Tacit Keyword
SUN Yan;ZHOU Xue-guang;CHEN Tao
..............page:266-269
Extended Role Graph Model Based on Hybrid Hierarchy Relation
LI Xiang-yun;FENG Xiao-sheng;Yan Xin-le
..............page:104-106,110
Technology of Radar Data Distribution on Demand Based on Clustering
WANG Xiang-ping;YANG Rui-juan;HUANG Mei-rong;LUO Jing
..............page:289-290
Pre-merger Method of Chinese Online Handwritten Text Based on Classification
YAO Zheng-bin;DING Xiao-qing;LIU Chang-song
..............page:138-140
Design of Video Monitoring System Terminal Based on Power Line Communication
CHEN Cheng;TIAN Feng-chun;LI De-li
..............page:246-248,251
Proxy Signcryption System Based on Identity
WANG Qin
..............page:120-121,125
Electronic Image Stabilization Algorithm for Objects in Different Depths of Field
HUANG Chen;HUANG Ying-qing;JIANG Xiao-yu;ZENG Ling-wei;WANG Xi
..............page:201-203
Human Footstep Signal Identification Algorithm Based on Hilbert-Huang Transform
WU Zhen-fei;YU Zhi-jun;LIU Hai-tao
..............page:168-170,173
Study and Application of Software Defect Management Method in Scrum
WEN Jun-hao;TIAN Qing;LI Peng
..............page:35-37
Estimating Method of Maxima Vector Average Number
YANG Yong-tao;WANG Yi-jie
..............page:56-58
Design of Service Wrapper Environment for Web Legacy System
ZHOU Jia-jing;ZOU Xiang;SHEN Bei-jun;HU Shan-xue
..............page:73-75
Application of UF Using Delayed Observations in SINS
ZHANG Lin;WU Xue-dong
..............page:174-176
Design and Implementation of Reconfigurational Data Simulator
LI Wen-xin;LEI Zhi-guang;MU De-jun
..............page:227-229
Multi-dimensional Visualized Analysis Framework for Supporting Large Scale Data
YOU Jin-guo;YANG Zhuo-luo;HU Jian-hua;XI Jian-qing
..............page:26-27,31
Visualization Expression of OWL 2 Ontology Based on Object Role Modeling
PAN Wen-lin;LIU Da-xin
..............page:50-52
Security Analysis of PCI Device
SHEN Yong-jun;ZHU Yue-fei;ZHANG Chang-he
..............page:111-113
Face Recognition Method of Multiple Features Local and Global Fusion
SHU Chang;DING Xiao-qing;FANG Chi
..............page:145-147,156
Construction Algorithm of Application Layer Multicast Tree with High Stability
LI Wu-yang;GAO De-yuan;HE Ying;GAO Xiang
..............page:85-87
Ontology Evolution Approach Based on Context Window
WANG Xiao-man;YAN Jing-jing;LI Xiao-yang
..............page:53-55,58
Two-stage Specific Audio Retrieval Method Based on K-L Distance
QI Xiao-qian;CHEN Hong-chang;HUANG Hai
..............page:160-162
Chinese Translation of English Verb Based on Semantic Pattern
ZHANG Yao;HUANG De-gen
..............page:150-152
Phishing Detection System Based on SVM Active Learning Algorithm
HE Gao-hui;ZOU Fu-tai;TAN Da-li;WANG Ming-zheng
..............page:126-128
Research on H.264 Motion Estimation Algorithm
ZHU Kai-di;CHEN Yi-min;TAN Zhi-peng;HUANG Chen;XU Sheng
..............page:286-288
Lagrangian Relaxation Strategy for Aerospace TT&C Schedule
KANG Ning;WU Xiao-yue;CHEN Yang
..............page:283-285
Solving Method of Grid Granularity in Spatial Data Clustering
CHEN Xi;MA Yi-feng
..............page:65-67
JPEG Image Quality Assessment Based on Visual Sensitivity
ZHANG You-sai;CHEN Zhong-jun
..............page:191-193
Fuzzy Association Rule Mining Based on Rival Penalized Competitive Learning
XIE Huang;ZHANG Ping-wei;LUO Sheng
..............page:44-46
Implementation of Self-adaptive System Based on CORBA
ZHENG Shang-shu;SHEN Li-wei;PENG Xin;ZHAO Wen-yun
..............page:239-242,257
Research on Lyapunov Exponent of Cascade Chaos System
JIN Jian-guo;WEI Ming-jun;DI Zhi-gang;XU Guang-li;JIA Chun-rong;ZHAO Hong-wei
..............page:12-16
Fast and Accurate KVM Remote Mouse Synchronization Method
WANG Yan;ZHANG Lei
..............page:258-260