Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2012 Issue 16
Automatic Identification Method for the First and Second Heart Sound Based on Double-threshold
CHEN Jie;HOU Hai-liang;LUO Liang-cai;CHENG Yun
..............page:174-177,181
Uneven Clustering Algorithm Based on Load Balance for Wireless Sensor Network
KONG Fan-feng;CHEN Xi;OU Hong-yu;CAO Dun
..............page:100-103,107
BGPR Algorithm Based on Item Attribute and Item Degree
SUN Kai;AI Li-rong
..............page:267-269,274
Research and Development of Vehicle Unified Fault Diagnostic Protocol
LIU Li-li;XU Ai-dong;SONG Yan;ZHOU Ya
..............page:9-13
A Certificateless On-line/Off-line Blind Signature Scheme
JIANG Hua;HU Ran-dong
..............page:127-129
Research and Application on Securities Dealers' IT Monitoring System Based on SNMP
YU Feng;ZENG Hong-xiang;ZHAO Jia-bao;LIU Fu-hai
..............page:258-262
Anti-collision Algorithm with Random Grouping Based on Tree Framework
WANG Jie-qing;BAO Ke-jin
..............page:279-283
Data Synchronization Model with Identity Authentication and Disaster Backup Function
XU Jian-zhen;JIAO Yang;RAN Jiu-hong
..............page:74-76,80
Study on Data Access Technology of Hyperspectral Image Library
QIN Huan-hu;ZHANG Li-fu;LIU Kai
..............page:65-69
Flow Characteristic Selection Algorithm Based on Information Metric
GUO Lei;WANG Ya-di;CHEN Shu-qiao;ZHU Ke;HAN Ji-hong
..............page:96-99
Improved Access Control Model Based on T-RBAC
FENG Jun;WAGN Jian
..............page:138-141
Mesh Quality Maintenance Technology Based on Loose r-sample
ZHOU Zhe;LV Si-zhe;GU Li-xu
..............page:219-222
Design of HART Configuration Software Based on Windows
ZHANG Xia;WEI Wen-xiong;YU Miao;GUO Jiang-wei
..............page:241-244
Adaptive Dynamic Particle Swarm Algorithm with Diversity Preservation and Its Application
PANG Jin-mei;ZHENG Xiang-wei;WANG Zhi-hao
..............page:167-169,173
Simplification of Reversible Network Based on Positive/Negative Control Gate
CHENG Xue-yun;GUAN Zhi-jin;CHEN Lin-shan;YANG Ai-qin
..............page:287-290
Improved Fast Algorithm for Large Integer Multiplication
ZHOU Jian;LI Shun-dong;XUE Dan
..............page:121-123
Design and Optimization of 64-bit Booth Multiplier
HE Jun;ZHU Ying
..............page:253-254
Hardware Acceleration of FMM Algorithm Based on Mixed Architecture
CAO Min;LI Hai-qiang;CAO Zhen
..............page:275-278,283
Multi-modality Image Registration Algorithm Based on Weighted Mutual Information
ZHANG Jun-hao;SUN Yan;ZHAN Wei-wei
..............page:207-211
LabView Simulation of Dual Redundance Scheme for 1553B Bus Controller
LIANG Li-zhu;SHI Hua-jun;FU Shan
..............page:229-232
Linpack Parallel Performance Model and Its Prediction
WANG Shen;QI Feng-bin;GU Hong-feng;PAN Zhi
..............page:81-84
SAML Single Sign-on Protocol Based on Proxy Signature
WANG Xi;ZHANG Bin
..............page:130-133
Mutual-healing Key Distribution Scheme Based on Access Polynomial
XU Shuai-wen;WANG Xiao-ming
..............page:124-126
Design and Implementation of OSD for Video Surveillance Based on Nano-X
FEI Li-mei;CHEN Yao-wu;JIANG Rong-xin
..............page:245-248
SIFT Feature Detection and Matching Based on Salient Map
YIN Chun-xia;XU De;LI Cheng-rong;LUO Yang-yu
..............page:189-191,195
Carrier Tracking Algorithm Based on Adaptive Unscented Kalman Filter in High Dynamic
FENG Qiong-hua;WU Tie-jun;MA Long-hua
..............page:237-240,244
Human Body Part Recognition Based on Depth Image Learning
LIN Peng;ZHANG Chao;LI Zhu-liang;ZHAO Yu-ming
..............page:185-188
Particle Filtering Algorithm Based on Hybrid Proposal Distribution of Adaptive Optimization
YU Jin-xia;TANG Yong-li;XU Jing-min;ZHAO Qian
..............page:200-202
Efficient Energy Target Coverage Algorithm in Visual Sensor Networks
XIANG Hui;PENG Li;WEN Ji-wei
..............page:113-116
High Parallel Configurable Elliptic Curve Cryptographic Processor over GF(p) Field
ZHOU Fa-wang;SHI Zai-feng;GUO Wei;LIU Rui
..............page:142-144,148
Combined Index Techniques Based on Inverted Table and B+ Tree
LIU Gao-song;WAN Li-yong;LONG Jun
..............page:49-51,56
Design and Implementation of High Performance Subword-Parallel Arithmetic Units
DONG Mian;WU Dan;RAO Jin-li;HUANG Wei;DAI Kui;ZOU Xue-cheng
..............page:249-252
Modeling and Evaluation for Product Usability Based on Opinion Mining
YI Li;WANG Li-ya
..............page:270-274
Noisy Independent Component Analysis Method Based on Cross-cumulants
CAI Lian-fang;TIAN Xue-min
..............page:192-195
Certificate-based Proxy Ring Signature Scheme
CHEN Hui-yan;LI Wei;SU Yan-fang
..............page:149-152,156
Optimization for H.264 Based Real-time Screen Video Encoder
JIN Lei;XIE Wei-kai;LIN Yi;LU Chen-ping;SHEN Rui-min
..............page:18-22,26
H.264 Parallel Coding Algorithm Based on Heterogeneous Multi-core Processor
LV Ming-zhou;CHEN Yao-wu
..............page:35-39
P2P Traffic Identification Model Based on Traffic and Behavior Feature
WU Shu-yue;YU Jie;FAN Xiao-ping
..............page:182-184,188
Online Reviews Sentiment Analysis Model Based on Rough Sets
WANG Zu-hui;JIANG Wei
..............page:1-4
Virtual Machine Placement Strategy Based on Particle Swarm Optimization Algorithm
PEI Yang;WU Jie;WANG Xin
..............page:291-293
Research on File Carving Algorithm Based on Disk Fragment Entropy Value Feature
LI Bing-long;BAO Zhan-biao;WANG Lu;WANG Qing-xian
..............page:40-43,48
Study on Improved OVM Traffic Flow Model and Numerical Simulation
ZHANG Li-dong;JIA Lei;ZHU Wen-xing
..............page:161-163,166
Design of Toeplitz Structure Measurement Matrix Based on Image Blocking
QU Guang-cai;ZHANG Shu-fang;LV Wei;CHU Jing-hui
..............page:212-214,218
Influence Analysis of Down-sampling on Digital Images Forgery Detection
KANG Xiao-bing;ZHANG Er-hu;CHEN Ya-jun
..............page:215-218
Service Composition Algorithm Based on Service Quality Information
BAI Yu;ZHANG Yao-xue;ZHOU Yue-zhi
..............page:27-30,34
Invariance Evaluation for Biological Visual Model Based on Analysis of Textured Images
CHU Yu-tong;HUO Hong;QIAN Kang;ZHU Chen-yang;FANG Tao
..............page:23-26
Cisco IOS Vulnerability Exploiting Method Based on Fuzzing
SU Xiao-yan;WU Dong-ying;LIU Long;HAN Yu-xiang
..............page:117-120
Modeling and Analysis of Aspect-oriented NVP Based on HCPN
SUN Xiao-xing;YU Hui-qun
..............page:61-64
Integrated Traffic Classification Method Based on Bayes Learning
WANG Wei-han;TANG Xue-wen;DENG Yi-gui
..............page:164-166
Bagging Bayes Text Classification Based on Map Reduce
JI Su-qin;SHI Hong-bo;WEI Jie
..............page:203-206,211
tou gao xu zhi
..............page:封2
Multi-node Modulation Recognition Method Based on Wireless Sensor Network
DUAN Hao-yu;LI Ou;HU Yun-peng;LIU Yang
..............page:89-92
Content Adaptation Service Oriented to Multi-network and Multi-terminal Cooperation
YAN Huan-jie;XU Ming-hai;GU Hai
..............page:108-112
Verification of Database Interaction Behavior for Web Applications
SUN Mao-hua;MIAO Huai-kou;GAO Hong-hao
..............page:52-56
Attack and Improvement for Certificateless Signature Scheme
GUO Ling-ling;LIN Chang-lu;ZHANG Sheng-yuan
..............page:134-137,141
Detection of Image Region Duplication Forgery Based on LBP
OU Jia-jia;CAI Bi-ye;XIONG Bing;LI Feng
..............page:226-228,236
Abrupt Cut Detection and Key Frame Extration Based on Motion Information
WANG Si-wen;JIA Ke-bin;WANG Chun;LIU Wei
..............page:5-8
Extended Rational Secret Sharing Mechanism
LIN Dong-mei
..............page:153-156
Evolution Characteristic of Peer Production Based on Similarity Link Prediction
YAO Can-zhong;YANG Jian-mei
..............page:263-266
Multi-neural Network Ensemble Information Fusion Based on Fuzzy Integral
WANG Zheng-yu;XIAO Nan-feng
..............page:157-160
Automatic Extraction Algorithm Based on Anaphora Resolution and Text Structure Analysis
ZHENG Cheng;LIU Fu-jun;LI Qing
..............page:170-173
Multi-resolution Image Segmentation Algorithm Based on Markov Model
XIAO Ran;HOU Jin
..............page:223-225,232
Face Recognition Based on Discriminant Isometric Projection
SHAO Yan-ling;GE Bo;SONG Shu-zhong
..............page:14-17
RFID Security Protocol Based on Deformation Rabin Algorithm
MA Dan-dan;ZHANG Chao-qi
..............page:145-148
Distributed Data Stream Clustering Algorithm Based on Density Grid
LIN Xiu-dan;MAO Guo-jun
..............page:70-73
Application of Modified Differential Evolution Algorithm in Software/Hardware Partitioning
LI Jie;ZHU Wu-jie;HU Li-yuan
..............page:284-286,290
Integration Research of Multi-domain Collaborative Simulation Model Based on HLA
LAI Ming-zhu;DUAN Zhi-ming;LIU Su-yan;ZHANG Guo-yin
..............page:77-80
Pedestrian Detection Method in Intelligent Assistant Drive System
LIANG Zhi-gang;HENG Hao
..............page:196-199
Multi-cluster Feature Selection Based on Grassmann Manifold
LIN Guang-feng;ZHU Hong;FAN Cai-xia;ZHANG Er-hu;LUO Lei
..............page:178-181
Research and Implementation of Test System for Large Scale Chip
WANG Jun;FANG Yan-fei;LI Dai-feng;ZHENG Yan
..............page:233-236
Formalized Description of Reusable Test Case Based on Z Specification
ZHANG Juan;TONG Wei-qin;CAI Li-zhi
..............page:44-48
Research on Novel 3D Autonomous Chaotic System and Its Dynamics Character
LU Hui-bin;XIAO Xia
..............page:255-257