Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2011 Issue 24
Research on Data Synchronization for Cross-domain Service Registry Center
WU Feng;GU Jian-hua;ZHAO Tian-hai
..............page:38-41
Common Model of Meteorological Data Loading Based on Intelligent Adapter
GAO Feng;FENG Ming-nong;WANG Peng;YU Wen
..............page:42-44,49
Design of Service-oriented Network Management System
XU Kun;XIAO Gang;DAI Hao
..............page:67-70
Fast Low-cost Algorithm of Delay-constrained Dynamic Multicast Routing
SUN Guang-ming;WANG Shuo;LI Xiao-wei;LI Wei-sheng
..............page:71-73
Access Control Model Based on Multidimensional Measurement and Context
LIU Fei;CHANG Chao-wen
..............page:129-131,135
Chinese Semantic Role Labeling Based on Phrase and Dependency Syntactic Structure
XU Jing;LI Jun-hui;ZHU Qiao-ming;LI Pei-feng
..............page:169-172
NSCT Domain Modulus Maximum Edge Detection in Side-scan Sonar Image
WANG Min;LI Qing-wu;CHENG Xiao-xuan
..............page:207-209
Anti-noise Sobel Edge Detection Algorithm and Its Hardware-accelerated Design
TANG Yong-he;HU Mou-fa;LU Huan-zhang
..............page:204-206
Research on Boundary Condition of Particle Swarm Optimization Algorithm
LI Jin-jin;TIAN Yu-bo
..............page:173-175,179
Heuristic Algorithm for Attribute Reduction Based on Dominance Relation
LIAO Fan;TENG Shu-hua;SHAO Shi-lei
..............page:52-54
Secure Model of Distributed Database Based on UCON
ZHAI Zhi-gang;WANG Jian-dong
..............page:50-51,54
Dynamic Subcarrier Allocation Algorithm for SC-FMDA
LI Yi-bing;ZHANG Xu;GAO Zhen-guo
..............page:74-76,80
Space Data Identification Method Based on Grammar Analysis
ZHENG Tian-ming;WANG Tao;LI Hua;PAN Yan-hui
..............page:88-90
Small Object Shape Description Algorithm in Satellite Remote Sensing Image
ZHANG Shou-juan;ZHOU Quan
..............page:213-215,218
Parallel Heuristic P-cycle Configuration Algorithm
LUO Li-xian;YANG Lin-feng;ZHANG Zhen-rong
..............page:55-57
Improved Efficient Identity-based Signcryption Scheme
XIAO Hong-fei;LIU Chang-jiang
..............page:126-128
Improved Key Management Scheme for Wireless Sensor Network
ZHOU Wen-can;ZHAO Yi-ming
..............page:123-125,128
Inter-cluster Routing Algorithm Based on Link Reliability in Hierarchical Network
WANG Zhen-chao;JING Xin;WANG Jing
..............page:94-96
Target Coverage Research in Directional Sensor Network Based on Immune Algorithm
BI Xiao-jun;DONG Chao;WANG Peng-yu
..............page:83-85
Dual-constraints Text Clustering AlgorithmBased on Non-negative Matrix Factorization
MA Hui-fang;ZHAO Wei-zhong;SHI Zhong-zhi
..............page:161-163
Connection Management Optimization Method Based on Network Dataflow Locality
XIONG Bing;LIAO Nian-dong;LI Feng;CHEN Xiao-su
..............page:86-87,90
Landmark Tracking Algorithm Based on Adaptive Feature
ZHOU Chao;HAN Bo;LI Ping;REN Qin-yuan
..............page:155-157
Local Linear Embedding Algorithm Based on Geometric Distance Perturbation
YANG An-ping;CHEN Song-qiao;HU Peng;MO Yu-jun
..............page:198-199,203
Super-resolution Reconstruction Algorithm Based on Kurtosis Image
QIAO Jian-ping
..............page:200-203
Application of Hybrid Ant Colony Algorithm in Vehicle Routing Problem
ZHANG Xiao;WANG Jiang-qing
..............page:190-192
Selection Algorithm of Web Service CombinationBased on Improved BPSO
HUANG Hai-fang;SUN Jian-hua
..............page:260-262
Improved Forward-security Ring Signature Scheme
HUANG Ming-jun;DU Wei-zhang
..............page:106-108
Face Recognition Algorithm of 2DPCA Nonparametric Subspace Analysis
WANG Mei;LIANG Jiu-zhen
..............page:187-189,192
Parzen Gaussian Kernel Quantum Hash Method Orienting to Audio Fingerprint
CHEN Hai-lang;OUYANG Jian-quan
..............page:281-283
Design of High Speed JTAG On-line Simulator
YU Jun;DANG Yun-fei
..............page:228-229
RFID Anti-collision Algorithm Based on Adaptive Splitting Tree
WEN Chao;OU Ruo-feng;LING Li
..............page:287-289
Design and Implementation of Framework in Secondary Development for SharpMap
ZHANG Sheng-mao;ZHOU Wei-feng;FAN Wei
..............page:254-256
Multilayer Detection Model for Network Fault Based on Immune Principle
TIAN Yu-ling;YUAN Xing-fang;ZHANGZhi-hui
..............page:263-265
Design and Implementation of Hash Interface Based on COS
ZHENG Bin;LI Zheng;WANG Rui-jiao
..............page:136-137,140
Improved Method of Image Color Transfer
ZHOU Juan-li;PENG Hai-ou2
..............page:219-221,224
Medium Access Control Protocol with Dynamic Duty Cycle in Wireless Sensor Network
WANG Xiao-dong;MIN Jie;ZHOU Yu;YE Qing-wei
..............page:97-99,102
Design and Implementation of 3D Strata Profile in Trailing Suction Dredger\'s Dredging
GU Wen-xiao;LI Feng;PAN Yu-qing
..............page:275-277
Template Matching Algorithm Based on Fast SIFT Feature Extraction
LI Zhong-hai;LI Shen;CUI Jian-guo;LIU Luo-man
..............page:222-224
Power Attack Analysis Based on Biometric Cryptosystem
YAO Jian-bo;ZHANG Tao
..............page:103-105
Development of RFID Middleware Based on Multilevel Data Processing
GAO Song;MA Lian-bo;HU Kun-yuan
..............page:272-274
Development and Application of Dynamic Look-up Table Fuzzy Controller
LIU Guang-lei;JIANG Tong;YANG Chun-hua;WU Tong-mao
..............page:230-232
Fingerprint Matching Based on Fast Genetic Algorithm
ZHANG Yuan-yuan;JING Xiao-jun
..............page:13-15
Face Recognition Based on Semi-active Appearance Model
YANG Zhan-dong;XIE Mei
..............page:150-151
Wavelet Fractionally Spaced Blind Equalization AlgorithmBased on QPSO
HU Ling-ling;GUO Ye-cai
..............page:195-197
Study on Multi-objective Decision of Aircraft Environmental Control System and Engine
LI Hong-bo;DONG Xin-min;LI Ting-ting;GUO Jun
..............page:257-259,262
High-dimensional Main-memory Reverse K Nearest Neighbor Query and Join
LIU Yan;HAO Zhong-xiao
..............page:22-24
Topic Thread Detection Algorithm in Dynamic Text Flow
CAO Yue-qin
..............page:45-49
ID-based Proxy Blind Signature Scheme
DING Sheng-long;ZHAO Yi-ming
..............page:114-116
Abandoned Object Detection Method Based on Double Layer Background
WANG Chen;GUO Ji-chang;FENG Xiao-min
..............page:167-168,172
Key Agreement Protocol in Satellite Network Based on Bilinear Pairings
JIAO Wen-cheng;WU Yang;PAN Yan-hui;LI Hua;ZHENG Tian-ming
..............page:132-135
Video ROI Extraction Algorithm Based on Reconstructed Encoding Information
LIU Peng-yu;JIA Ke-bin
..............page:278-280
Design of Vehicle Type Recognition Algorithm Based on Video Sequence
REN Jian-qiang
..............page:245-246,250
tou gao xu zhi
..............page:封3
Main Memory Performance Optimization of Phase Change RAM in Stream Processor
HAO Xiu-rui;AN Hong;LI Xiao-qiang;TANG Xu-long
..............page:251-253,256
LS-SVM Parameter Optimized Selection Based on TS-GA
ZHU Hong-qiu;XU Ke;YANG Chun-hua
..............page:266-268
PMCS Mechanism Implementation on Crossbow Platform
CHEN Qing-kui;FAN Xiong-nan;RAO Hong
..............page:225-227
Denoising Algorithm of Domain Replacement Based on HSI Color Space Model
DAI Yu;ZHOU Hai-feng;WANG Meng;ZHANG Sheng;JIN Wei
..............page:10-12,15
Dynamic Integrated Schedule Algorithm of Unicast and Multicast
REN Tao;LAN Ju-long;HU Hong-chao
..............page:4-6
Real-time Gesture Recognition Based on Haar Wavelet Decomposition
AN Tao;PENG Jin-ye;WU Jing
..............page:138-140
Texture Feature Classification Based on LMCP Method
CHEN Heng-xin;TANG Yuan-yan;FANG Bin;ZHANG Tai-ping
..............page:16-17,21
Certificateless Signature and Group Signature Schemes Based on Bilinear Pairings
LI Feng-yin;LIU Pei-yu;ZHU Zhen-fang
..............page:18-21
Malicious Behavior Detection MethodBased on Sequential Pattern Discovery
WANG Xin-zhi;SUN Le-chang;ZHANG Min;CHEN Tao
..............page:1-3
2D Adaptive Lifting Wavelet Transform Algorithm Based on AR Model
LV Qian;NI Lin;LIU Quan
..............page:216-218
Frequent Itemset Mining Algorithm Based on Multiple Minimum Support Degrees
CHEN Fu-ji;LI Fu-ping
..............page:36-37,41
Composite Forecasting Model of Sunspot Time Sequences Based on EMD
WANG Xi;BI Gui-hong;TANG Jing-rui
..............page:176-179
Image Fire Detection Algorithm Based on Amplitude Spectrum of Boundary Chain-code
LIAO Yong;WANG Hui-qin;XIAO Li-bo
..............page:210-212
Application of Markov Logic Network in Transfer Learning
XIONG Zhong-yang;SHU Fang-jun;ZHANG Yu-fang;KONG Run
..............page:158-160
Design of N-way Ordered Priority and Ordered Ring Arbiter
YANG Dong-qin;HUANG Hang;ZHANG Xiao-yan;YU Zhong-chen
..............page:236-238
Rate Adaptation Strategy Based on Threshold Adjustment in WLAN
CHENG Yan-hong;CHEN Liang-yin;ZHU Li
..............page:64-66
Dimensionality Reduction Algorithm Based on Pair-wise Constraints and Sparsity Preserving
WANG Ying-jing;WANG Zheng-qun;ZHANG Guo-qing;YU Zhen-zhou
..............page:193-194,197
Hybrid Cache Coherence Protocol Suitable for Multi-core Environment
LI Jing-mei;YANG Peng-fei;ZHANG Jian-pei;MEN Chao-guang;WU Yan-xia
..............page:284-286
Low-power ASIP Design Oriented to Security Domain
HUANG Wei;HAN Jun;WANG Shuai;ZENG Xiao-yang
..............page:120-122
Data Flow Clustering Detection Approach of Network Heartbeat Packet Sequence
YI Jun-kai;CHEN Li;SUN Jian-wei
..............page:61-63
Dynamic Multi-target Fast Track Based on Markov Chain
ZENG Xiao-shan;CAO Yah;CHEN Yu-ting
..............page:180-182,186
Robust NLOS Error Mitigation Algorithm Based on Neural Network
WANG Jian-hui;CUI Wei-jia;HU Han-ying
..............page:7-9
Face Recognition Method Based on Gabor Phase Texture Representation
YANG Hong-yu;YU Lei;WANG Sen
..............page:147-149
Energy and Environment Monitoring WebGIS Based on Linux
CHEN Fang-yuan;LI Zhi-hong;XIE Wen-ming;DAI Cheng-hua
..............page:247-250
Design of High Performance Embedded System Based on 88F6281
JIANG Cheng-ming;YU Hai-ying;WU Hong-bing
..............page:242-244
Networked Fault Diagnosis Method of Aircraft Power Supply Based on Dynamic Fault Tree
HUANG Zheng-ting;WANG Zhong-sheng
..............page:233-235,238
Algorithm Recognition Technology Based on Characteristic Expression
FANG Xia;LV Hong;YIN Qing;ZHANG Jie;WANG Li-na
..............page:32-35
Phase Compensation Optimization Based on Chirp Scaling Algorithm
SHI Chang-zhen;WANG Zhen-song
..............page:239-241,244
Application of Particle Swarm Optimization Algorithm in Subtask Allocation
CHEN Da-chuan;ZHANG Rong-guo;HUANG Fu-liang;LIU Kun
..............page:183-186
Improved Kerberos Single Sign-on Protocol
SHAO Ye-qin;CHEN Jian-ping;GU Xiang
..............page:109-111
Gesture Recognition Based on Three-axial Accelerometer
LIU Rong;LIU Ming
..............page:141-143
Image Encryption Algorithm Based on Chaotic Mappings
LU Hui-bin;XIAO Xia
..............page:117-119,122
GMM-based Application-layer Protocol Identification of ESP Traffic
WANG Qing-long;WANG Zhen-xing;ZHANG Lian-cheng;WANG Yu
..............page:91-93,96
Distributed Genetic Algorithm Based on RESTFUL Service
MA Qing-xia;SUN Mei
..............page:164-166
Supporting Framework of Hotspot Compiler System for XQuery
ZHANG Kai-lian;LIAO Hu-sheng;SU Hang
..............page:28-31
Secret Sharing Scheme for Fraud Prevention Based on Vector Space
LEI Juan;LI Zhi-hui;ZHANG Qian-qian
..............page:100-102
Adaptive Software Development for General Torpedo Simulator
YANG Zhan-long;CHEN Hang;YANG Hu
..............page:290-292
Research on Queue Shaping Schedule of AFDX Switch
GUO Li-feng;WANG Yong;ZHANG Lei;BAI Yan
..............page:58-60
Video Gradual Transition Shot Detection Based on Three Steps Filter
WANG Jian-feng;DU Kui-ran
..............page:269-271
Video Text Localization Method Based on LBP and FSVM
LI Li-jie;LI Jin;SONG Yang;WANG Lei
..............page:144-146
Closed Subtree Clustering Algorithm Supporting Real-time Incremental Update
HUANG Wei;GUO Xin;ZHOU Qing-ping
..............page:25-27