Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2008 Issue 11
Control system design for embedded numerical control marker based on ARM and MiniGUI
TAN Ping;LIANG Li;LIU Jian-xin
..............page:2791-2793,2805
Method of SoC-oriented parallel partitioning at system-level
XU Bao-yu;WU Yue;YANG Hong-bin
..............page:2788-2790
Fault diagnosis based on Fisher's discriminant analysis
LIANG Liang;YUAN Hong-fang;CAO Xi
..............page:2897-2900
Improved generalized principal component analysis and its application to face recognition
WANG Jian-guo;LIN Yu-sheng;LIU Suo-lan;YANG Jing-yu
..............page:2901-2902,2905
EPM model research based on intelligence decision tree and BPNN
NIU Wei-hua
..............page:2903-2905
Application of convenient genetic algorithm in SSFCTP
LIU Hong-li;GUO Qiang
..............page:2906-2907,2911
Path planning for mobile robot based on improved particle swarm optimization
ZHANG Qiao-rong;LI Shu-hong
..............page:2908-2911
Modeling and verification for equivalent NN of general two-dimensional fuzzy controller
DONG Chun;YANG Shao-rong;LI Tai-fu;SU Ying-ying
..............page:2912-2914,2917
Kernel clustering for categorical data based on mountain method
ZHU Ying-hui;YANG Sheng-yun;YUAN De-hui
..............page:2915-2917
Application of Diameter protocol in video monitoring system
MAO Ke;SHI Zhi-qiang;LIU Qiong
..............page:2920-2922,2935
Research on connection management model based on Netfilter framework
ZHAO Da-yong;DING Zhen-guo
..............page:2794-2797
Research on requirement-driven adaptive architecture based on services-oriented architecture
YANG Hong-qiao;WU Fei;GAN Ren-chu
..............page:2798-2801,2830
Fast-stepping algorithm of transporting balance optimization of neural networks in joint-part of logistics
BIE Wen-qun;WANG Su-sheng;MIAO Xing-feng
..............page:2802-2805
Model for solving numerical and symbolic coupling constraints
CHEN Yong-fu;HUANG Zheng-dong;CHEN Li-ping
..............page:2806-2808,2837
Research of feature modeling method
CAO Xiao-lan;PENG Jia-hong
..............page:2809-2813
Improved algorithm based on Apriori algorithm
GUO Jian-mei;SONG Shun-lin;LI Shi-song
..............page:2814-2815,2820
Design and application of quantum Haar wavelet transforms algorithm
ZHANG Cai-zhi;SUN Li
..............page:2816-2820
Analysis and application of Windows kernel model interrupt request level
WANG Lan-ying;JU Jin-wu
..............page:2824-2826
Study of misalignment on multilevel memory system
LIU Sheng;CHEN Shu-ming
..............page:2827-2830
Design of ALU of 32-bit simultaneous multithreading processor
LIU Quan-sheng;YANG Hong-bin;WU Yue
..............page:2831-2833
Research on image digital watermarking methods based on SVD
WANG Shu-mei;ZHAO Wei-dong;WANG Zhi-cheng
..............page:2834-2837
Research on virtual-real sense synthesis method based on computer vision
XIONG Yi;LI Li-jun
..............page:2838-2840
Improved median filtering algorithm based on two-stage noise detection
WANG Yi-yan;WANG Xuan
..............page:2841-2843
Application of Otsu'method in multi-threshold image segmentation
WANG Lei;DUAN Hui-chuan
..............page:2844-2845,2972
Image segmentation method based on pseudo-parallel immune genetic algorithm and rough set
ZHANG Yi-dong;WU Xi-sheng
..............page:2846-2847,2969
Complexity evaluation of audio watermarking algorithms
SUN Su-jing;GUAN Hui-sheng;WANG Yan-yan;JIANG Bao-cheng
..............page:2848-2850
Fractal image compression coding based on Mandelbrot collection and Logistic mapping
ZHAO De-ping;PENG Peng;ZHANG Dong-wei
..............page:2851-2852,2856
Algorithm of image registration based on EMD
QIAN Liang-yu;GAO Shi-wei;CHAI Zhu-li
..............page:2853-2856
Classification with support vector machines for P300 spelling experiments in brain-computer interface
GE Yu;LIU Yang;ZHOU Zong-tan;HU De-Wen
..............page:2859-2862
Improved bee evolutionary genetic algorithms
LIU Wei-li;YUAN Yi-rui;LAN Lu-kai;ZHU Jian-wei;ZHUO Xiao-lan;ZHANG Jun
..............page:2863-2867
IP core design of PCI-slave interface based on FPGA
JIANG Hao;XIAO Tie-jun
..............page:2785-2787,2790
Modeling and analysis of μC/OS-Ⅱ with UML
HU Yan-hua;YU Jian-xin
..............page:2781-2784
Office robot controlling based on fluent calculus and FLUX
WU Wei-hua;LIU Yi-song
..............page:2871-2874
Differential evolution algorithm for location management problem of mobile computing
WANG Wen-hong;PAN Quan-ke;WANG Feng-rui
..............page:2875-2878,2882
Solution to set partitioning problem based on genetic algorithm
BAO Jiang-hong;LI Jiong-cheng
..............page:2879-2882
Fuzzy K-Prototypes clustering based on particle swarm optimization
YIN Bo;HE Song-hua
..............page:2883-2885
Applications of event calculus in reasoning about actions
YANG Ai-qin;LIU Yi-song
..............page:2886-2887,2966
Agent planning based on genetic algorithm
YANG Yan-mei;ZHAO Feng-yu
..............page:2888-2889,2900
Integrative improved particle swarm optimization neural network arithmetic
HE Jia;CHEN Zhi-hui;YANG Ying-xin
..............page:2890-2892,2896
Modified particle swarm optimization algorithm
LIANG Jun;CHENG Can
..............page:2893-2896
Analysis and improvement of feature weighting method TF·IDF in text categorization
LIN Yong-min;L(U) Zheng-yu;ZHAO Shuang;ZHU Wei-dong
..............page:2923-2925,2929
3D object surface reconstruction using single camera
ZHANG Yong;JIN Xue-bo
..............page:2926-2929
Realization of car's control terminal based on GPS
ZHANG Jin-gai;XU Kai-hua;MA Xin-fang
..............page:2930-2931,2949
Research of immune image clustering algorithm based on space histogram
LI Hai-fang;WANG Li
..............page:2932-2935
Research of complex Chinese intelligent information retrieval system
LI Rui-min;DU Gen-yuan
..............page:2936-2938,2953
Study of semantic information retrieval model based on ontology
WANG Xiao-dong;ZHANG He;WANG Hong-tao
..............page:2939-2941
Application of BP artificial neural networks in forecasting catalyst activity
LIU Xin-ping;TANG Lei;DONG Zhan-yong
..............page:2942-2944
Research on information schema matching technology in cooperative plotting system
SUN Sh-eng;LIN Xiao-ping
..............page:2945-2949
Dynamic analysis of hobbing process by CAE technology
YUAN An-fu
..............page:2950-2953
Design of network visual laboratory based on role based access control
ZHAO Ying;SUN Qun;MENG Xiao-fen
..............page:2954-2955,2959
Design of logic model for flexible report system for information system
XU Yu-chen;SHEN Li-min
..............page:2956-2959
Design and implementation of update program based on transaction model
LI Li-ya;MU Jin-long;REN Zhong-bao
..............page:2960-2962
Design and implementation of user-defined report system based on component technology
SONG Xiao-yu;LIU Wei-ran;LIU Tian-bo
..............page:2963-2966
Research on constant temperature control system based on neural network
LI Quan-xi;GONG Qing-min;CHANG Bo
..............page:2967-2969
Software components assembly based on predictability
YU Fang;SHEN Gui-lan;HUANG Xie
..............page:2970-2972
Design and realization of map projection extension component in GIS
SUN Lian-san;ZHANG Xin-ying
..............page:2973-2975
Study of data inquiry efficiency optimized method based on XML
CAI Yong-ming;WU Xi-hon;ZHOU Yi
..............page:2976-2977,2986
Application on length measurement device of temperature scale system based on 89C52
SUN Xiang-rong;NIE Si-min
..............page:2978-2980
Data acquisition and network monitoring system based on C#
LIANG Guang-min
..............page:2981-2983
Way of IP multicast transmission based on C/S model
ZHANG Jing-feng;LI Jian-yi
..............page:2779-2780,2797
TPC-W benchmark evaluation based on web server
LIU Li;QU Pei
..............page:2769-2771,2775
Study on ultra-wideband wireless communication technology
WEI Wei-min;TANG Zhen-jun
..............page:2748-2750
Improvement of wireless LAN safety
YIN Jian-zhang
..............page:2745-2747
Study of signature scheme with message recovery and its application
WANG Zhi-Wen;CAI Qi-xian;LI Dao-feng
..............page:2742-2744
Research on web database security based on Java2 security architecture
DENG Jian-gao;PAN Jiang-bo
..............page:2739-2741
Research on intrusion detection system based on machine learning
LIU Ming-chuan;PENG Chang-sheng
..............page:2736-2738,2741
Queue model of rekey for secure group
TANG Yang;LIU Hui
..............page:2730-2732,2735
Research on access control methods based on USBKEY
WANG Quan;YANG Lin;LIU Wei;WANG Zhen-zhen
..............page:2727-2729
Analysis of P2P Botnet of two-tier structure
FANG Yuan;WU Hao;YANG Li-ming
..............page:2724-2726,2747
Cryptographic algorithm of message in storage area network based on selective
ZHONG Wei;JU Shi-guang;CAI Tao
..............page:2721-2723
Research and design of security architecture of grid service system
CHEN Hai-yong;QI Ning;LAN Ming-jing
..............page:2718-2720
Design and realization of manager supporting to SNMPv3
CHENG Yan
..............page:2766-2768,2874
Strategy for supporting streaming media service in core router
JIN Jing;LI Xin;TU Wen-wei
..............page:2763-2765
Simulation study of simplex wireless communication based on OPNET
TANG Tang;WU Bin;JING Xiao-pei
..............page:2761-2762,2850
Philosophical analysis based on Petri net
YUE Xiao-bo;WANG Zhong-hua;ZHANG Chun-li
..............page:2757-2760,2840
Analysis and improvement of GridRPC system based on Ninf-G
YAO Jin;LI Ji-gang;LU Ju-kang
..............page:2754-2756,2765
Automaton model's research in grid simulating environment for testing schedule
WU Lin;HUANG Yong-zhong;LAN Ming-jing
..............page:2751-2753
EAwLKHT:energy-aware multicast re-keying scheme in Ad Hoc networks
JIN Hui;LIU Luo-kun
..............page:2715-2717,2744
Detection method of Trojan horse based on attack tree
YANG Yan;HUANG Hao
..............page:2711-2714