Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2011 Issue 2
Improved centroid algorithm of dynamic node
ZHANG Jun;WANG Qian-ping
..............page:446-449,538
Energy effective routing algorithm based on AODV
MU Qiang;YAO Dan-lin;YAO Zong-fu
..............page:389-392
Malicious node detecting model for P2P networks
HAN Lei-lei;CHEN Yue;YU Li-li
..............page:484-488
Steganography based on modified matrix encoding and iterative random blocking
LIU Jiu-fen;WANG Yong;ZHANG Wei-ming
..............page:457-459,480
Simplified routing simulation strategy for NS2
ZHANG Tian;MAO Li;ZHANG Zhao-xin;WANG Xiao-feng
..............page:386-388,400
Design of fast SPARC V7 instruction set simulator
GUAN Xiao-chuan;CHEN Zhao-hui;DANG Ji-hong
..............page:531-534
Construction of three-dimensional interactive virtual distillation lab based on Virtools
KANG Yi-you;ZHANG Yong-ce;FANG Li;MA Wei;LIU Zhi-guang
..............page:633-637
Research of congestion control performance based on TCP Reno and TCP Vegas
LIU Guo-zhu;GAO Wen-juan
..............page:434-437
Research and analysis of combinatorial relaxation algorithm
ZHANG Wei;RAO Kai;CAO Jian-wen
..............page:554-559,563
Campus network operation platform based on SOA
LIU Jian-feng;CHEN Zhi-bo
..............page:543-548
Research and design on comprehensive safety monitoring system for Qinghai-Tibet railway
YANG Ju-hua;GAI Yu-xian;CHEN Guang-wu
..............page:549-553
Research on encryption algorithm of non super-increasing sequence knapsack
LI Feng-yong;XU Jiang-feng
..............page:481-483,488
Protocol for dynamic component-property attestation in trusted computing
YAN Jian-hong;PENG Xin-guang
..............page:493-496
TCP Vegas-b: Enhanced TCP Vegas congestion control algorithm
WANG Bin;CHEN Yuan-yan;FENG Wei;HU Yu
..............page:438-441,445
IPv6 secure neighbor discovery protocol based on IPSec
LIU Hua-chun;DAI Qing-guang;JIANG Zhi-ping
..............page:513-516
Development of on-board system software on BM3803
CAO Dong-po;HU Xiao-hui;ZHAO Jun-suo;MAO Jing-song
..............page:524-526,530
Survey on image encryption based on chaos
ZHANG Yun-peng;ZUO Fei;ZHAI Zheng-jun
..............page:463-466
Design and realization of grid workflow engine
WANG Hong-xia
..............page:430-433
Improved ZigBee routing algorithm based on energy balance
LI Yu-dong;HUANG Hong-guang;XIANG Xi-xi
..............page:397-400
Concealing technology of Trojan horses and prevention
XU Ming;YANG Tong;ZHENG Lian-qing;ZHANG Chuan-rong
..............page:489-492,496
Rate control model for reverse link in EV-DO systems
GU Li-peng;CHAI Yuan-bo
..............page:405-408
Research on lightweight semantic web service matching model
HAO Shen-gang;ZHANG Li
..............page:450-452,456
Assessment model for network security risk based on immune
JI Yuan;JIANG Yu-ming;HU Da-sha;CHEN Rong
..............page:467-470,476
ZigBee wireless sensor network for intelligent monitor system of pump
YUAN Hong-fang;QI He;KE Xi-yong;WANG Hua-qing;HAN Hong-yu
..............page:535-538
RSSI localization algorithm based on distance and position correction
WANG Wei;CHEN Dai;ZHOU Yong
..............page:409-412,622
Research of federation access control profile model based on web services
ZHANG Wen-chao;LI Ya-fen
..............page:477-480
Real-time DDOS detection system based on one-class SVM
LIU Song;ZHOU Qing-lei
..............page:497-500,534
Improved visit statistical method and calculation in user\'s interest degree
ZHANG Zhu-yu;LIU Pei-yu;ZHU Zhen-fang;CHI Xue-zhi
..............page:424-426,627
Design and implementation of hardware platform for trusted computing
GUO Ling-er;JIANG Zhi-xiang
..............page:501-504
Fast similar case retrieval method for digital film distribution
SONG Shuang;WU Hong-tao;GAO Qiang;LIU Yi-guang
..............page:638-641
Building edge detection method using fuzzy SVM
AN Wen;WU Yun-dong;ZHANG Qiang;GENG Li-chuan
..............page:649-652
Generating half-dry stroke texture for cursive style calligraphy with Markov random field
YANG Ying;WANG Hong-man;ZHANG Jing
..............page:732-735
Digital fingerprint scheme for linear combination attack
WANG Wei;LI Qiao-liang;HU De-fa
..............page:505-508
Automatic generation of NC program for cylinder-type parts based on machining features
YANG Peng-yu;CAO Zhong-liang;ZHANG Nan;ZHANG Xu-tang
..............page:741-744
Method for finding fault tree\'s minimal cut sets using petri nets
CUI Huan-qing;ZHOU Chuan-ai
..............page:580-583
Usability study of fisheye menus
ZHANG Li-xia;LIANG Hua-kun;FU Yi;SONG Hong-zhi
..............page:706-710
Model of neural network based on POS with simulated annealing
ZHANG Kun;YU Yong
..............page:667-670
Design of file system with scalable size faced massstorage device
JIANG Yin-zhen;WANG Yi-huai
..............page:527-530
Application of QPSO in structural test data generation
LI Wen-rui;ZHANG Wei;REN Hong-li
..............page:584-586,591
Instant-open type of lottery issuing scheme based on WAP
SUN Jia-nan;WANG Cai-fen
..............page:753-756
Research on GIS-based video surveillance system
ZONG Wen-jie;YU Qing-song;ZHANG Min;HUANG Jun
..............page:745-748
Universal solution for disk array status real-time monitoring
ZHAO Lin-hai;LI Xiao-feng;TAN Hai-bo
..............page:517-519,523
Design and implementation of image gather and transfer system based on XScale
WANG Shi-di;PEI Hai-long
..............page:520-523
Tree growth simulation\'s integrated mechanical model
DONG Ge;LIU Xiao-dan;SUN Hong-yan
..............page:716-718,723
Design and implementation of visualization-oriented feature control engine
LIU Hai-hong;PAN Xiao-ming;ZHOU Cong-hui
..............page:757-760
Research and implementation of SAR imaging simulation system
CUI Yun-gang;ZHAO Huai-ci;HUA Hai-yang
..............page:619-622
Performance simulation and analysis of anti-jamming of chaotic sequences and Gold sequences
HE Shi-biao;GU Cheng;LUO Dong-mei
..............page:623-627
Research on highway vehicle detection algorithms based on video image
LUO Jin-man;ZHU Juan
..............page:642-645,675
Recall performance model of MAM based on propability
FENG Nai-qin;AO Lian-hui;LI Su-juan;ZHAO Yong-jin;DONG Ya-jie
..............page:676-680,684
Research on K-Means algorithm based on concept lattice
LI Yan-xia;SHI Yi-min;LI Guan-yu
..............page:656-658,662
Thin cloud removing approach of remote sensing image based on support vector machine
KONG Jie;HU Gen-sheng;LIANG Dong
..............page:599-602
Spatial domain method based on constraint of linear regression model
CHEN Lu;GENG Ze-xun;CHAI Wen-fu
..............page:603-606
Research on dynamic adjust of application-layer multicast
ZHANG Geng-xin;FAN Guo-chuang;MA Zhi-rou
..............page:381-385
Fast local adaptive interpolation filter
ZHU Jin-xiu;ZHAI Hui;CHEN Ling;SHAO Yong-qin
..............page:611-614
Bucket depth peeling based screen space ambient occlusion
HAO Xiao-guang;LIU Xue-hui;HUANG Meng-cheng;LIU Fang;WU En-hua
..............page:587-591
Design and implementation of speech recognition algorithm based on frequency range
YUAN Zheng-wu;XIAO Wang-hui
..............page:659-662
Study on hybrid algorithm based on particle swarm optimization and simulated annealing algorithm
LU Dan;TONG Chuang-ming;ZHONG Wei-jun
..............page:663-666
Particle swarm optimization based on wavelet mutation
SHI Yong-sheng;GAO Hao;CHEN Jia-qi
..............page:693-695,699
Clustering particle swarm optimization algorithm based on chaos
QIAN Wei-yi;NING Bi-feng
..............page:685-688,735
Research on request/server cooperation model of multi-agent based on fluent calculus
YANG Ai-qin;ZHU Ling-ling;CHENG Xue-yun
..............page:681-684
Research on service selection algorithm for dynamic web services composition
LI Na;FENG Bai-ming;WU Xiao-long
..............page:413-415,618
Base-band circuit of GPS software receiver
ZHANG Yi;WU Peng;ZHAO Heng-bin;MA Shuang
..............page:736-740,744
Study on database-structure-independent database backup storage
LIN Han-he;LIU Xiao-jie;GUO Dan;SHEN Fei
..............page:560-563
Palmprint extraction based on gray level difference analysis
CHEN Zi-yi;KANG Wen-xiong;DENG Fei-qi
..............page:653-655,670
Design and implementation of WebGIS application system based on Aspmap
WU Wei-wei;LI Yi-rui;YANG Jian-si;FAN Ling-chun
..............page:719-723
Access control model based on organization modeling for enterprise information systems
LU Shu-juan;XU Xin-yan;CHEN Xiao-yan
..............page:471-476
Priority of energy congestion relief scheme in wireless sensors networks
JIANG Xi;QI Jian-dong;CAO Yong-jie;ZHAO Yan-dong
..............page:416-419,423
Design and implementation of MIL-STD-1553B-based IP network
WANG Ruo-long;ZHANG Shan-cong
..............page:401-404,408
CBR-based digital design and research for precision planter
SONG Kai;ZHOU Jing;YANG Yu
..............page:646-648,652
Research of distributed network fault inspecting system based on P2P
TANG Jun;YANG An-qi;ZHANG Jun-ming
..............page:442-445
Improved CSO algorithm application in continuous optimization problem
CHENG Le;FENG Gang;XU Yi-han;QIAN Zhao-lou
..............page:689-692,731
Chaos-like characteristics of stock-index signal
HAN Gui-cheng;LI Feng
..............page:711-715
Study and implementation of steel slab ID automatic recognition system
YANG Liao;HU Xiao-dong;LUO Jian-cheng;WU Wei;CHENG Xi;SHEN Zhan-feng
..............page:696-699
Design and implementation of vertical search engine based on Nutch
SHAO Xiu-li;LIU Bin;ZHANG Tao
..............page:539-542,548
Fast-handoff method in high-speed railway mobile communication system based on mobile IPv6
MA Hong-feng;DANG Jian-wu;ZHOU Yue
..............page:393-396
Research and design of Qin and Han dynasties virtual museum based on VRML
YANG An-qi;QIAO Hai-chao;ZHANG Du-juan;JIA Wei-guang;WANG Zhong-fei
..............page:628-632
Object representation and detection method based on contour primitive
HUANG Wen-jing;PENG Qi-min
..............page:703-705,710
Study on MAS-based urban rail transport ridership forecast system
LIU Hai-mei;LIU Yi-song
..............page:671-675
Text similarity calculation based on potential feature words
YANG Yun;WU Ya-nan;LI Jian
..............page:572-575
Object-oriented segmentation of remote sensing image based on co-occurrence matrix
WU Wei;LI Yu-xia;TONG Ling;GU Xing-fa
..............page:596-598
Security risk assessment model in intranet
SHEN Rui-xue;YAO Guo-xiang;GUAN Quan-long
..............page:460-462,508
Improved mixture Gaussian algorithm
HUANG Wen-li;FAN Yong;LI Hui-zhuo;XUE Qin;TANG Zun-lie;LI Li
..............page:592-595
Faceback realtime data aggregation strategy in WSN
TANG Fei-yue;WU Wei;CHEN Ming-gang;YANG Ding-qiang
..............page:453-456
Session setup latency between sub-overlays research of P2PSIP system
TIAN Hui;ZHUANG Lei
..............page:420-423
System of line drawing for Yunnan heavy color painting
PU Yuan-yuan;SU Yi;WEI Xiao-min;WEI Hong;QIAN Wen-hua;XU Dan
..............page:607-610,614
Intergration and application of video surveillance and 3DGIS
HUANG Bing-hu;HAN Li-tao;CHEN Long
..............page:728-731
Rural new energy utilization decision-making system based on case based reasoning
YU Chong-chong;SUN Qiu-feng;TAN Li;TU Xu-yan
..............page:749-752,756