Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2009 Issue 14
Skeleton pruning algorithm based on weight
LI Xiao-yan;CHENG Xian-yi
..............page:3374-3376
Cascade software reliability model based on neural network
HE Zhi-yong;YIN Qian
..............page:3377-3379
Studies on turning angle to avoid collision between ships with PSO arithmetic
WANG De-yan;LIU Yian
..............page:3380-3382
Optimizing route of logistics based on hybrid ant colony algorithm
CHEN Wei-dong;WANG Jia
..............page:3383-3385,3388
Particle swarm optimization based on moving-weighted-average best position
ZHENG Ming;WEI Cheng-jian;WANG Da-jiang
..............page:3386-3388
Application of machine vision technology in design of chess playing intelligent robot
FENG Yuan-hua;WANG Si-hua;LIU Ning;WANG Gao
..............page:3371-3373,3379
Novel color image resizing based on Roberts gradient
HOU Fa-zhong;ZOU Bei-ji;LI Yue-qiang
..............page:3367-3370
Design and implementation of Chaotic system based on FPGA
WANG Zhong-lin;WANG Guang-yi
..............page:3365-3366,3370
Multiple description video coding research based on complementary segmentation in compressed domain
JIANG Yu-zhen;ZHU Ying-hui;OUYANG Chun-juan
..............page:3362-3364
Application of graphics processing unit in general purpose computation
ZHANG Jian;CHEN Rui
..............page:3359-3361
Method of moving targets detection based on ICA
KANG Feng;HUANG Wen-qing
..............page:3356-3358
Generating blending surfaces based on dynamic PDE
CHEN Ya-juan;LIU Xu-min;GUAN Yong
..............page:3352-3355
Narrow band level set method
LIU Zhou;LI Hong-wei
..............page:3348-3351
Dynamic workflow model based on OWL-S
WANG Liu-yang
..............page:3345-3347,3358
Research on component mechanical architecture and process control techniques
ZHANG Tao;YANG Xiao-hui;WANG Hai-wei
..............page:3341-3344,3361
Study and implementation of data synchronization based on SOA
HUANG Xu-xin;NIE Rui-hua;LUO Hui-qiong;LIN Huai-gong;MA Jiang
..............page:3338-3340,3435
Research on system model of government knowledge management based on multi-agent
XU Chun-jie;WANG Suo-zhu;SUN Ming-hui;DU Hua
..............page:3331-3334
Research of component technology on software support platform based on J2EE
TAO Yi-zheng;WU Zhi-jie;TANG Ding-yong;LI Ying-chun
..............page:3326-3330
Boolean expression simplification and parallel sort network validation
WANG De-cai;XU Jian-guo;WU Zhe-hui;LUO Yong-liang;WANG Chuan-min
..............page:3322-3325
Application of mining algorithm based on binary in mobile computing
LIU Yu-lu;FANG Gang
..............page:3319-3321,3325
Optimization for MASK algorithm in privacy preserving data mining
ZHANG Chang-xing;QIAN Xue-zhong
..............page:3316-3318,3401
FairWinWin: Approach for fair win-win requirements negotiation
ZHAO Yu-zhu;LI Juan
..............page:3310-3315,3457
Analysis of simulate test on simulation of S-Chord ring
WANG He-meng
..............page:3305-3309
Streaming service model based on BT protocol
SUN Gui-gang;QIN Shao-hua;WU Qi;CAO Jian
..............page:3301-3304
Research on resource scheduling in grid system of 3D reconstruction
KONG De-wei;CHEN Jing;WANG Xiao-dan
..............page:3298-3300,3304
Architecture design and performance analysis of video grid based on stream control
ZHAO Hong;LIU Xin-wen;YAO Zheng-liang;CAO Jie
..............page:3294-3297
Trust model-based secure application layer multicast protocol
XU Jian-zhen;YUE Jing;ZHOU Pei;LU Rui-ling
..............page:3291-3293,3351
Design of authentication schemes based on graphical password and analysis of its security
HU Wei;WU Xiao-ping;ZHANG Chang-hong;LIAO Wei
..............page:3284-3287
An immunology algorithm with variable threshold
YAN Jia-shang;DU Jiang
..............page:3281-3283,3287
Study on reliability of Torus based on recursive decomposition method
HUANG Yi-hai;WANG Gao-cai
..............page:3278-3280,3309
Research and implementation of new encrypting file system
GU Zheng-yi;HUANG Hao
..............page:3272-3277
Network monitoring method based on ARP protocol
ZENG Guang-yu;XUE Ying-ying;XU Bing;LI Qing-bao
..............page:3269-3271
Secure architecture for distributed intrusion detection system
CHEN Xue-bin;LIU Feng;ZHAO Zhi-hong;LUO Bin
..............page:3266-3268,3277
Design and implementation of database encryption middleware
AN Ran;CHEN Chi;XU Zhen
..............page:3261-3265
Document optimization distribution strategy based on ant colony algorithm for web server cluster
XIONG Zhi;XIONG Bu-yun;ZHOU Yin-dan
..............page:3389-3392,3395
Application of finite automaton in detection of composite event
YUAN Ai-ping;FU Ming
..............page:3393-3395
Improved face recognition method based on Gabor-LDA
LI Wei-sheng;CHENG Wan-li
..............page:3396-3398,3405
Part style developing model based on CHNN clustering algorithm
QIAN Su-qin
..............page:3399-3401
Facial illumination compensation based on wavelet quotient image
LIU Li-hua;WANG Ying-hui;DENG Fang-an
..............page:3402-3405
Method of correcting license plate tilt based on SOM
LEI Chao-yang;LIU Jun-hua;LI Qiao
..............page:3406-3408,3413
Research on context reasoning in pervasive computing environments
WANG Wei;QIAN Yi;TANG Shan-cheng
..............page:3409-3413
Algorithm of weighted fusion based on unbiased input
ZHANG Zai-li;QIN Chao-ying;DENG Kui-biao
..............page:3414-3415,3432
Research on control subsystem in simulation system of launcher rocket communication
DONG Fei;YANG Qing-wen;ZHENG Yi
..............page:3416-3418,3421
Analysis of self-propelled gun hydraulic pipe component's stress based on Matlab
YIN Jun-hui;ZHENG Jian;LIU Hong-wei
..............page:3419-3421
Survey of biography
YI Ping;LIU Zong-tian;ZHOU Wen
..............page:3426-3428
Flexible modeling of web-based workflow form
YIN Xu;LIAO Bin;WANG Xin-ping
..............page:3429-3432
Fabric texture defect for rapid detection method
GUAN Sheng-qi;SHI Xiu-hua
..............page:3433-3435
Control system design of mechanical tridimensional garage on distributed control theory
DUAN Wen-jun;LI Jian-feng;FENG Chun-zeng
..............page:3436-3440
Application of software reuse control technology in metro simulation system
GE Hui-na;ZHANG Yan-qing;WANG Zhi-yan
..............page:3441-3444,3447
Algorithm for deciding active XML document safe rewriting
ZHU Yan
..............page:3445-3447
Application of parallel GCR(k)algorithm to multi-scale prediction model
TIAN You-xian;ZHAO Li-bin
..............page:3448-3450,3454
Research and application of image color feature extraction technology
CHENG Lin;CHEN Jun-jie;XIANG Jie
..............page:3451-3454
Edge detection of ceramic substrate based on GA-BP algorithm
WANG Yuan-yu;LI Yuan-zong
..............page:3455-3457
Design of entrance guard for multimedia classroom
WU Zhi-ying;ZHANG Li-hui;LI Shu-fang;YU Qing-xu
..............page:3462-3465
Design of location and navigation system based on WLAN and video monitor technology
ZHANG Xu;WANG Yun;ZHANG Jie
..............page:3466-3468,3471
Application of wavelet transform in active power filter harmonic analysis
LIANG Dong-ying;MAO Wei
..............page:3472-3474,3477
Design of virtual reflection high energy electron diffraction experimental system
CUI Ying-shan;ZHANG Zheng-ping
..............page:3475-3477
Risk analysis of banker's credit based on dynamic clustering technic
XIANG Jian-ping;TANG Chang-jie;CHEN Yu;HU Jing-jun;ZUO Jie;YI Shu-hong
..............page:3478-3480,3481