Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2012 Issue 18
An Image Segmentation Algorithm Based on Graph Theory
ZHANG Qian;FENG Fu-jian;LIN Xin;WANG Lin
..............page:194-197
A Novel Filtering Algorithm of High Density Salt and Pepper Noise
ZHU Shi-hu;HUANG Zhi
..............page:207-210
Node Self-localization Algorithm for Sparse Wireless Sensor Network
LU Xu-yang;ZHANG Xiao-yi;LIU Guang-yi
..............page:83-86
SQL Injection Vulnerability Detection Based on Webpage DOM Tree Comparison
ZHANG Chen;WANG Yong-yi;WANG Xiong;SHI Fan
..............page:111-115
Paralleled Dynamic Multi-resolution Physical Simulation Model of Water Surface
WANG Hua-jiang;ZHOU Sheng-chuan;MA Chun-yong;CHEN Ge
..............page:286-290
An Analysis Method of Cisco IOS Communication Process
HAN Yu-xiang;LIU Sheng-li;LIU Long;SU Xiao-yan
..............page:282-285,290
Improved Particle Swarm Optimization Algorithm with Tabu Search
LIYong-gang;DENG Yan-qing
..............page:155-157
Moving Object Detection Algorithm Based on Improved Gaussian Mixture Model
SUN Yi-gang;LI Hong;ZHANG Hong-ying
..............page:166-170
Active Contour Model Based on Local and Global Fitting
SHI Hua-liang;LI Wei-guo
..............page:203-206,210
A Modified Algorithm for Perceptual Evaluation of Speech Quality
HUANG Shi-lei;LIU Yi;CHENG Gang
..............page:19-21,25
Creditability Evaluation of Battlefield Communication Network Simulation System
TAN Zhen;SHAN Hong;GUO Zhi-liang
..............page:68-72
A Low-complexity Secure Data Collection Algorithm
WANG Hai-yong;YANG Geng;XU Jian;YANG Zhen
..............page:123-125,129
Radar Tomography Detection for Abnormal Regions of Grain Storage Moisture Content
LIAN Fei-yu;LI Qing;OIN Yao
..............page:198-202
Communication Latency Avoidance Technique in SAR Imaging Parallel Simulation
DU Jing;AO Fu-jiang;WANG Hua-bing;WANG Lian-dong
..............page:241-244
Intelligent Log Generation System Based on Linux Kernel
LIU Hong-wu;LIANG Liang;YANG Guo-wei;SONG Gao-jun
..............page:255-257
Conflict Resolution of Non-functional Requirement for Networked Software
ZHAO Xin-hui;YUAN Kai-yin;WU Jin-zhao
..............page:37-41
Delay Stroke Processing Method in Online Uyghur Handwriting Recognition
PI Gui-lin;ZHAO Hui
..............page:147-150
A Cholesky Decomposition Overlapped Algorithm
ZHANG De-hao;LIU Qing-kun
..............page:262-264
Target Tracking Algorithm Based on Online Learning and Construction Constraint
WANG Shou-chao;LI Xiao-xia
..............page:140-143
Improvement and Simulation Analysis of SMR Routing Protocol
YANG Yin-jun;WANG Xue-ming
..............page:77-79
Program Malicious Behavior Recognizing Method Based on Model Checking
ZHANG Yi-chi;PANG Jian-min;FAN Xue-bin;YAO Xin-lei
..............page:107-110
Adaptive Robust Tracking Algorithm for Orbital Maneuvering Target Under Glint Noise
TU Wen-bin;YANG Yong-sheng;JING Zhong-liang
..............page:11-14,18
Virtual Display of Vehicle Braking Stability Based on Dynamic Model
LI Hong-bo;ZHANG Yin-qi;WU Yu;XUE Liang
..............page:273-276,281
An Image Feature Descriptor Based on Stable Region
GUAN Shi-yong;LU Li-zhong;YAN Bin;TONG Li
..............page:186-189
Laplacian Edge Detection Algorithm Based on CUDA
MENG Xiao-hua;LIU Jian-qiang;OU Ye-xiang;ZHANG Qing-feng
..............page:190-193
Research of Approximate Subgraph Matching in Large Scale Network
HUANG Yun;HONG Jia-ming;QIN Zun-yue
..............page:50-52,56
Research on Parallel Method of Solving Trajectory Missile Disturbing Gravity Using Gradient Method
XU Xiao-dong;ZHAO Jian-ting;XU Chun-lei
..............page:225-227,230
Spatial Clustering Algorithm Based on Multi-agent Technology and Mathematic Morphology
LU Hong;CHEN Li-chao;PAN Li-hu;YAN Hui-min;HUANG He-qing
..............page:158-161
Application of Symbolic Analysis Method in Analog Circuit Testability Computing
ZHENG Zhi-gang;WANG Xiao-qiang;HU Yun-an
..............page:234-237
Study on Multi-point Position Technology in Maritime Traffic Management System
WEI Mao-an;GE Chuan-ning;XING Yi-lan
..............page:218-220
Improved Algorithm of Pseudo-random Sequence Based on Feedback Shift Register
WU Pan-wang;ZHANG Shan-cong
..............page:265-267,272
Asynchronous Periodic Pattern Mining in Time Series Based on Sequitur
CHEN Yao;ZHU Yue-long;FENG Jun;LI Shi-jin
..............page:45-49
Research and Realization of Multiple Patterns Matching Algorithm Based on FPGA
LUO Xiao;GUO Jian;DENG Min;BAI Bin
..............page:231-233,237
An Extended Android Application Permission Management Model
BAO Ke-jin;PENG Zhao
..............page:57-60,64
Atom Graph Mining Technology in Concurrent Program
ZHU Yi-qing
..............page:30-33
A Low-cost GPS/DR Integrated Navigation System Design
JIN Liang-liang;HE Wen-tao;XU Jian-hua;YE Tian-chun;ZHAI Kun-peng;LIN Xiao-long
..............page:228-230
Humming Music Melody Extraction Based on Qualitative Mapping
FENG Jia-li;LIU Wen-juan
..............page:251-254
Iterative Majorization Anchor-free Localization Algorithm in WSN
GAO Dan-dan;WU Bao-ming;WANG Sheng-chao
..............page:80-82
Secret Sharing Scheme with Weighted Participants Based on Repeated Games
CAI Yong-quan;SUN Ke
..............page:120-122
Undetectable Steganographic Algorithm of Minimized Distortion
LIU Hua;TANG Guang-ming
..............page:97-99
tou gao xu zhi
..............page:封2
Improved Parallel BP Algorithm for Energy Consumption Data Analysis
ZHOU Yuan;SONG Hai-tao;JIANG Yan-Jun
..............page:171-173,177
Markov Logic Network and Its Applications in Information Extraction
TAN Yong-xing;LUO Jun-yong;YIN Mei-juan
..............page:162-165,170
Design of Gabor Filter for Fingerprint Image Enhancement
LIU Jun-bao;LI Yi;HAN Jun;ZENG Xiao-yang
..............page:130-132
A New Kind of Hierarchical Double-loop Network and Its Optimal Routing Algorithm
ZHONG Wei;CHEN Bao-xing;CHEN Yu
..............page:90-92,96
Improved Harmony Search Algorithm for Multi-objective
QIAO Ying;GAO Yue-lin;JIANG Qiao-yong
..............page:144-146
Three Dimensional Suffix Tree Full-text Index Model Based on Adjacent Character Pair
YAO Quan-zhu;ZHAO Kai;GUO Liang-tao
..............page:42-44,49
Metrics Algorithm of Product Shape Similarity Based on Complex Sphere Mapping
DAI Li-ling;XIE Li-hua;LU Zhang-ping;YUAN Hao
..............page:258-261
Intelligent Collision Detection Method Based on Line of Sight
WANG Xue-guang;FU Xin-liang
..............page:178-181,185
Skin Color Segmentation Based on CbCgCr Ellipsoid Likelihood Smoothness
YANG Qing-hua;LI Wei;LIU Wan-qian;LI Yan-mei;LUO Jian
..............page:151-154
Regular Expression Grouping Algorithm Based on Graph Partitioning
WEI Qiang;LI Yun-zhao;CHU Yan-jie
..............page:137-139
Behavior Trajectory Restoration Algorithm Based on Hidden Markov Models
FENG Tao;GUO Yun-fei;HUANG Kai-zhi;JI Jiang
..............page:1-5
A Transferable Off-line Electronic Cash Scheme
LIU Yi-chun;HU Yu-ping
..............page:116-119
Media Access Control Protocol Based on Voice Time Slot Mechanism in VANET
XIE Xu;LI Li-hua;FU Wei
..............page:87-89
Research on Personalized Page-display Optimization Technology in Mobile Terminal
SHI Jing;WU Qing-bo;YANG Sha-zhou
..............page:277-281
Ranging Scheduling Algorithm of Mine Localization System
WANG Han;QI Wang-dong;WANG Kun
..............page:238-240,244
A Hybrid Test Data Compression Method of Multiple Scan Chains
CAI Shuo;KUANG Ji-shun;LIU Tie-qiao
..............page:245-247
Research on RFID Reader Network Tracking Algorithm
LIU Kuai;JI Zhi-cheng
..............page:248-250
An Efficient Secure Elliptic Curve Scalar Multiplication Algorithm
CHEN Xi;ZHU Yue-fei
..............page:103-106
Study on Synchronization Techniques for Redundancy Architecture Based on Dual-port RAM
ZHANG Zun-wei;CAO Bao-xiang;NIE Sheng-wei
..............page:221-224
Research of Process Modeling Technology for Scientific Computing
YANG Qian-kun;GU Jian-hua;WANG Yun-lan
..............page:53-56
Code Stream Transmission Synchronization Optimization Scheme of Embedded VOD
QIAN Chen;CHEN Yao-wu
..............page:268-272
Heterogeneous Multiple Colonies Ant Colony Algorithm Based on Survival of Fittest Rules
ZHANG Peng;WEI Yun-Xia;XUE Hong-quan;WANG Yong-zhong
..............page:182-185
Distributed Data Stream Mining Based on Support Vector Data Description
CAI Guo-zhen;MAO Guo-jun
..............page:34-36
A Quantum-inspired Immune Clonal Algorithm Based on Real-encoding
WANG Juan;LI Fei
..............page:133-136
Image Restoration Based on Cross-correlative Blur Length Estimation
ZHANG Li-juan;YANG Jin-hua;JIANG Cheng-hao
..............page:211-214,217
RFID Secure Authentication Protocol Based on Stream Cipher
GONG Jie-zhong;CHEN Gong-liang;LI Lin-sen;LI Jian-hua
..............page:126-129
Edge Detection of Ochotona Curzoniae Image Based on Grayscale Morphology
CHEN Hai-yan;WANG Hui-qin;CAO Ming-hua;HU Jia-qi;HU Wen-tao
..............page:215-217
3D Space Handwriting Recognition Based on Time-frequency Fusion Feature
YAN Jun;CHEN Xiao-dan;SHEN Hai-bin
..............page:15-18
Tire Texture Extraction and Defect Detection Method
SONG Kai-yong;WANG Chuan-xu;DONG Xiang-peng
..............page:291-292,封3
Multi-skill Demand Field Product Service Scheduling Based on Genetic Algorithm
JIANG Jun-jie;WANG Li-ya
..............page:174-177
Optimum Curve Compression Algorithm in Wireless Sensor Network
HAN Li-hong;LIN Wei;BI Hai-nan;LI Bo
..............page:93-96
An Efficient Storage Scheme for Massive Data
WANG Bai;HU Gu-yu;LUO Jian-xin
..............page:65-67,72
Compressed Bitmap Index Technology in Column-oriented Database
WANG Mei;YANG Si-xiao;LE Jia-jin
..............page:26-29
Military Message Software Vulnerability Exploiting Technology Based on Fuzzing
WANG Hai-tao;LI Yun;QIN Xiao-yan;WANG Yu-mei
..............page:61-64
Uyghur Homograph Disambiguation Based on Classification and Optimal Mapping Pronunciation
Guljamal Mamateli;Askar Rozi;Gulnar Ali;Askar Hamdulla
..............page:22-25