Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2010 Issue 5
Research on mirror technology with offset-adjust for railway vehicles welding program
huang zhi hui ; wu xiu zuo ; wu xiang kui ; li gang qing
..............page:1052-1055
Method of insider threat detection based on hidden Markov model
huang tie ; zhang fen
..............page:965-968,1030
Shape matching technology based on character and it\'s algorithm implementation
zhu zuo tao ; zhang hong
..............page:1096-1099
Research for framework of subject deep web crawler
huang cong hui ; zhang shui ping ; hu yang
..............page:929-931,935
Classification algorithm of rule based on decision-tree
tan jun zuo ; wu jian hua
..............page:1017-1019
Dynamic optimizing distributed multicast routing algorithm
li yan long ; wang hua ; tong yong an
..............page:982-985,989
Feature selection based on term weight for text categorization
wang hai juan ; han li xin ; zhen zhi long
..............page:1149-1151
Research of synchronization structure in wireless Mesh network
wang han ; zuo chu ping ; han zhong hua ; wang chao xiang ; liu jing wei
..............page:995-998
Design and implementation of video conference system based on SIP
yu yi sheng
..............page:1137-1140,1143
Array of symbols M noodle structured light image decoding method of multiresolution
yu qing cang ; feng hai ming ; xu yu fang
..............page:1100-1103
Mapping technology from components-pixels to data-bits of ternary optical computer
li shuang feng ; jin zuo
..............page:1077-1080
Image threshold segmentation using Clonal selection genetic algorithm
wang jing ; bao wen xing
..............page:1070-1072
Improved reputation-based trust model in P2P environments
chen can ; hu feng song ; wang hui juan
..............page:999-1001,1034
Simulation of flaw defect based on qualitative vision features
zhan yin yan ; huang zuo ; ou yang zhao zuo ; xu guo qing
..............page:1085-1088
Research of web sequential pattern mining based on improved AprioriAll algorithm
wu hai yan ; zhu jing jun ; gao guo zhu ; cheng zhi rui
..............page:921-924,1034
Adaptive call centre
wu fei
..............page:1144-1148,1151
Ant colony algorithm based on initial path optimization and its application
xu shi jie ; liu hong
..............page:1031-1034
Design of master in Bigtable system for massive data distributed management
zhang xiao qing ; fei jiang tao ; pan qing
..............page:1141-1143
Research on network terminal security assessment index system
liao hui ; ling jie
..............page:961-964
Novel algorithm of sliding probability p_w for 802.11 DCF
wang ming chao ; bai guang wei ; xu ying
..............page:1002-1004,1008
Research of creditability based on fuzzy math for Ad Hoc network
chen tao ; zhou xue guang ; zhang huan guo
..............page:958-960,972
Web services composition optimization based on tabu search algorithm
dong zong ran ; li ying qiu ; chen ming hua
..............page:942-945
Tumor subtype recognition based on ensemble classifier
cheng hui jie ; zhang guo yin ; he ying
..............page:1063-1065,1069
Ontology-integration-based semantic annotation modeling
chang ping mei ; li guan yu ; zhang jun
..............page:1125-1129
Design and implementation of profit and loss planning system
wen gui hua ; zhu jin feng
..............page:1104-1107
Method of ontology similarity calculation based on weighted
lv gang ; zheng cheng
..............page:1093-1095,1103
Simulation and optimization of flame based on particle system
jin xiao jin ; ma yao hai
..............page:1118-1120,1124
Image segmentation method of surface defects of wood based on Gabor transform
wang lin ; bai xue bing
..............page:1066-1069
Generation algorithm of polygon for text block of PostScript file
wu yi min ; luo mian chuan ; zhu
..............page:1108-1110
Application of adaptive artificial immune network to collaborative filtering algorithm
zhang jian lin ; fu chun juan ; yu shu hua
..............page:1042-1044,1107
Improved concept similarity computation
hu zhe ; zheng cheng
..............page:1121-1124
Research on fuzzy PID active queue management based on smith prediction
zheng bo ; meng xiang ru ; li huan ; ma hai yuan
..............page:986-989
Study on key techniques for 3D laser scanning system
wang jian wen ; du chun mei
..............page:1089-1092
Iris recognition based on independent component analysis and core vector machines
cheng guo jian ; peng zhong ya ; wang ying
..............page:1060-1062,1092
Novel strategy to enhance location-privacy protection
zhuang zhi ; li jian wei
..............page:954-957
Research on method of diagnosing animal disease based on model of resemblance
xi jin ju ; li shu hong
..............page:1134-1136,1155
Oriented to massive data power forecast system based on SCADA system
yu zhuo huang ; lin hui ; liu jing
..............page:1114-1117
Application of data mining in university teaching and management
liu mei ling ; li zuo ; li yong sheng
..............page:1130-1133
Application research of concept lattice in intrusion detection
xie li ming ; li jian min
..............page:979-981,998
Remote virtual touch system based on infrared laser pointer
liu zheng zuo ; wu jian guo ; li zuo
..............page:1073-1076,1080
Study on methods of improving computer-network reliability
zhang xiao jie ; jiang tong min ; wang xiao feng
..............page:990-994
Research on multi-core processor threads scheduling based on PSO algorithm
yang hong bin ; chen wei ; wu yue
..............page:1045-1047
Collaborative filtering recommendation algorithm based on user clustering of item attributes
huang guo yan ; li you chao ; gao jian pei ; chang xu liang
..............page:1038-1041
Design and simulation of Ad Hoc network multicast protocol
ye xue ; le hong bing
..............page:1005-1008
Design of stepwise enumerative algorithm based on rule about Sudoku
xiao hua yong ; tian zuo ; ma lei
..............page:1035-1037,1113
Application of magnetic materials oriented knowledge management
jia liang ; wang hui zuo ; ren yuan hua ; zhao dong liang ; tong ruo feng
..............page:1048-1051,1099
Research on SQL injection attacks and guard method in web project
wang yun ; guo wai ping ; chen cheng huan
..............page:976-978,1016
Remarks on a kind of Hash functions
dai qi hua ; chen yong ming ; xie hai ying
..............page:1020-1022
Data auto-collecting technology based on messages and hooks
xu hai feng
..............page:1009-1012,1026
Design and implementation of data mining platform based on MVC structure
ye su nan ; peng hong ; zuo jiang wei
..............page:1013-1016
Improved HMM model using spatial correlation
su teng rong ; wu ji ; wang zuo ying ; lv ping
..............page:1023-1026
Method of session identification in web log mining
zhou ai wu ; cheng bo ; li sun chang ; xia song
..............page:936-938,964
Apparel presentation on Internet based on object panorama
li jian ; cui dong liang
..............page:1111-1113
Multi-Agent-based supply chain model and simulation
wang shi qing ; li chu bing
..............page:1081-1084
Certificateless multi-proxy signcryption scheme
yu hui fang ; wang cai fen ; wang zhi cang ; ye cheng xu
..............page:973-975