Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2011 Issue 8
Wavelet texture analysis for recognition of visual quality of nonwovens
LIU Jian-li;ZUO Bao-qi;GAO Wei-dong
..............page:2836-2840,2856
Design of servo motion monitoring system based on EtherCAT field bus
LIANG Run-han;WANG Qing-li;LI Xin;GAO Mei;LIAO Min;ZHAO Fu
..............page:2660-2663,2751
Segmentation research between polygonal image and background
YANG Jie;YAN Qing-dong
..............page:2772-2775
Research and implementation on smooth-browser in multi-viewpoint VR environment
ZHANG Yu-wen;DAI Qing;SHAO Jing
..............page:2768-2771,2800
Improved dynamic PSO and its application in path planning of group animation
PANG Jin-mei;ZHENG Xiang-wei;LIU Hong
..............page:2809-2812
System design of high resolution aero image compression
CHEN Zhe;DUAN Zong-tao;CHEN Ling;SUN Chao-yun
..............page:2672-2674,2728
Research on P2P storage system based on balance architecture
HE Ya-nong;SONG Wei;ZHAO Yue-long
..............page:2611-2613,2630
Research and development of component integration support platform
CHANG Bing-guo;WANG Xiang-zong
..............page:2712-2715
Two-dimensional situation of space information battlefield
NIE Jun-lan;ZHAO Zong-jian;ZHAO Li-man
..............page:2792-2795
Clustering algorithm over distributed data stream
LIU Li-xiong;GUO Yun-fei;KANG Jing;MA Hong
..............page:2708-2711,2763
Implementation of web AutoCAD system based on SaaS
SHI Zhen;WENG Chu-liang;LI Ming-lu
..............page:2865-2869
Research of integrity for virtual private routed networks
ZHANG Xiao-bo;CHENG Liang-lun
..............page:2619-2622
Optimization hardware design and simulation of Kalman filter
BAI Xue;WANG De-ming;TU Jun-jun;ZHAO Bu-hui
..............page:2655-2659
Improvement and application of X test model
XIONG Zhi;LIU Li;LEI Yu-feng;CAI Wei-hong
..............page:2748-2751
Statistical model added linguistic rules for Mongolian lexical analysis
ZHANG Cong-pin;ZHAO Li-li
..............page:2861-2864
Improved dynamic source routing protocol for data link network
WANG Zhao-bo;ZHANG You-guang;TANG Ji-qiang
..............page:2623-2626
Study of distributed web proxy cluster using load balancing agents
ZENG Bin;YAO Lu;CHEN Zhi-cheng
..............page:2631-2635
Survey on techniques of blind digital image forensics
ZHAO Jun-hong
..............page:2756-2759
Fluid simulation of non-uniform particle
TAN Shi-han;DUAN Ming;YANG Hong-yu
..............page:2760-2763
Optimization to k-means initial cluster centers
TONG Xue-jiao;MENG Fan-rong;WANG Zhi-xiao
..............page:2721-2723,2788
Research and implementation of device virtualization
LIU Jing-bo;GUO Yu-dong;WANG Xiao-rui;LIU Yong
..............page:2874-2878
Improvement and formal analysis of mobile micro-payment protocol Payword
ZHOU Xuan;WANG Xue-ming
..............page:2572-2574,2579
Design of multiple security level supported file encryption tool
Hong-yin;HE Cheng-wan
..............page:2569-2571,2591
CPG control model of snake-like robot parameters of optimization based on PSO
WEI Wu;ZHU Hong-shan
..............page:2813-2816
Automated test data generation method based on classification-tree and greedy algorithm
LIU Long-xia;WU Jun-hua
..............page:2734-2736,2820
Availability-guaranteed model for service discovery
FENG Xiu-zhen;WU Gao-feng;JIN Yue-ping;WU Li-li
..............page:2692-2694,2699
Research on multidimensional attack effect evaluation method
ZHAO Bo-fu;YIN Xiao-chuan
..............page:2596-2599,2603
Concepts upgrading method of domain ontology based on semantic similarity
ZHOU Yun;LIU Dong
..............page:2833-2835,2869
Research on system dynamics model of Lanchester equations
KONG Hong-shan;ZHANG Ming-qing;TANG Jun
..............page:2789-2791,2816
Study of remote computer network fingerprint model
TANG Zhang-guo;LI Huan-zhou;ZHONG Ming-quan;ZHANG Jian
..............page:2592-2595,2607
Uneven clustering algorithm for WSN based on area division
LU Jian-gang;LE Hong-bing
..............page:2639-2642
Design and implementation of permission management and access control system
KUANG Hong;ZHAO En-lai;HAO Wen-ning;HUANG Ya;MU Xin-guo
..............page:2588-2591
Load balancing algorithm based on prediction for parallel intrusion detection system
YU Ying;YANG Pin;LIANG Gang
..............page:2565-2568
Design and implementation of VPN auto-deployment based on FSM
LIN Xiao-yong;MI Zheng-kun;CHEN Kui-cheng
..............page:2614-2618
Modeling of base station position and parameter deployment of WCDMA and evolutionary algorithm
WEN Jie-chang;LIU Hai-lin;LI Ming
..............page:2627-2630
IIR digital filter design based on improved PSO algorithm
ZHANG Xu-zhen;MA Hong-mei;XUE Peng-qian
..............page:2853-2856
Research on multimodal biometric authentication using feature level fusion
LIN Ling;ZHOU Xin-min;SHANG Lin;GAO Yang
..............page:2849-2852
Approach of QoS-oriented services run-time binding
ZHANG Zhong-yu;HUANG Guang-qi;CHANG Tao;ZHANG Pei
..............page:2700-2703
QoS-constrained multicast routing based on improved quantum ant colony algorithm
ZUO Jing-long;YU Gui-lan
..............page:2651-2654
P2P communication method based on network environment detection
HAN Xin-chao;MA Yong-qiang;ZHENG Qiu-sheng
..............page:2648-2650,2659
Automatic detection and elimination of specular reflection components in leaf images
FU Hui;HUANG Xin-yuan
..............page:2776-2779,2795
Adaptive algorithm for PVC recognition based on multiple template matching
ZHANG Ji-mo;ZHANG Yue;YANG Bo
..............page:2885-2888
Integrated modular avionics software testing environment
ZHENG Jun;LIU Chang;REN Zhan-yong
..............page:2737-2740
ji yu ling yu ben ti de xin xi jian suo you hua ce lue
xiong jing ; wang ai min ; xu jian liang
..............page:2695-2699
Study on radar equipment maintenance decision support system based on RCM
HUANG Jian-jun;YANG Jiang-ping;ZHANG Xin-sheng
..............page:2909-2913
yong dai ma fen xi ji shu jian ce ruan jian que xian
zhao guo liang ; jiang yong ; kong ling bing
..............page:2741-2744,2808
Fibonacci heap and its application in external memory algorithms
LI Peng;ZHANG Yuan-ping;LI Li
..............page:2745-2747
Agent-based scheduling system synchronization vacations simulation
LIU Wen-yuan;LI Ying-shuai;SUN De-jie;CHEN Zi-jun
..............page:2784-2788
Framework for service-oriented domain analysis and modeling
WU Ying-bo;WANG Xu;LIN Yun
..............page:2704-2707
Detection and tracking of moving objects based on OpenCV
YIN Jun-cha;LIU Zhi-fang
..............page:2817-2820
Software complexity analysis based on trace
GAO Chun-feng;ZHAO Jian-jun
..............page:2716-2720
Web services attribute access control model combined with trust
WANG Ying;ZHANG Yong-sheng;ZHANG Yong-qiang;YANG Jing;SUN Cui-cui
..............page:2575-2579
Research on dynamic form system for management of aero-engine assembly
WANG She-wei;YANG Hai-cheng;MO Rong
..............page:2689-2691,2733
Test case prioritization based on requirement
YANG Guang-hua;BAO Yang;LI Dong-hong;TANG Le-le
..............page:2724-2728
Application of RIA technology in information platform for marine environmental monitoring
SHI Quan;LU Chun-long;CHEN Jian-ping;DING Wei-ping
..............page:2684-2688
Real-time rendering method of Chinese fonts based on SDL and OpenGL
CHEN Fei;HUANG Hai-ming;YANG Meng;LIU Jin-gang
..............page:2764-2767,2783
Region-based stereo matching optimization method
LIN Chuan;PAN Sheng-hui;HAN Jun-feng;TAN Guang-xing;LI Meng-he
..............page:2780-2783
Application and research on regulation of parameters in support vector regression
WANG Zhi-chao;ZHANG Hua-xiang
..............page:2821-2824
Adaptive weighted fuzzy Petri net for FMS workflow fault diagnosis
PAN Hai-lan;JIANG Wen-rong;WU Jia-qi
..............page:2841-2844
Design and implementation of asynchronous message-driven secure communication module
QIU Jun-yuan;ZHANG Yue
..............page:2580-2583,2587
P2P global trust model based on fuzzy set
LU Hui-fang;LIU Wan-jun
..............page:2608-2610,2618
Design of portable scaler based on AVR SCM
JING Wei;FAN Wen-xia;GAO Li
..............page:2668-2671
Auto-detection technology of text divulgence based on natural language processing
WANG Li-xin;GENG Huan-tong;SUN Kai;ZHANG Qian
..............page:2600-2603
Semi-supervised LLE algorithm of face recognition
GOU Hong-yun;ZHOU Yong;ZHU Chang-cheng;ZHOU Hong-bing
..............page:2825-2828,2908
Study on storage technique of OWL ontology
CHANG Wan-jun;REN Guang-wei
..............page:2893-2896
Control model for grid access based on fuzzy trust
LIU Si-feng;XIE Shi-yi
..............page:2604-2607
Near-duplicate keyframe matching based on advanced bag-of-words model
CHEN Dan-wen;ZHANG Jun;HAN Bing;WU Ling-da
..............page:2752-2755,2844
Research on P2P data caching policy
SHEN Xin-peng;LI Zhan-huai;ZENG Lei-jie
..............page:2636-2638,2654
Efficient I/O characteristics collection method on cloud storage
SHI Yang-bin;WU Jie;LIANG Jin
..............page:2870-2873,2888
Research on decision support system of tour and monitor for Taibai mountain nature reserve area
JIANG Bing;LIU Jian-kang;HU Chong-de
..............page:2897-2900
Anomaly detection model of clinical behavior based on probility distribution
YANG He-biao;SHI Xiao-li
..............page:2857-2860
Research on intelligent vehicles based on servo information acquisition system
LI Deng-feng;SONG Guang-fa;ZHAO Cai-xia
..............page:2675-2678,2688
Research of microscopic pedestrian routing algorithm simulation in terminal
LIU Yi;FAN Wei-dong;SUN Li-guang;DUAN Cheng-hua
..............page:2805-2808
Application of machine vision in smartphone based on OpenCV
HE Peng;WANG Lian-peng;CHU Yan-hong
..............page:2901-2904
BIT design of motherboard based on CPCI and LPC bus
WANG Fan;HU Xiao-ji;WANG You-wei;ZHANG Lei
..............page:2905-2908
System of bridge structure health monitoring and state assessment based on RIA
TIAN Rui;TAN Li;SU Wei-jun;SHANG Li-li
..............page:2889-2892,2896
Research on C/C++ code static detection based on syntax tree
LIU Chun-yan;LAI Xiao-chen;ZHOU Kuan-jiu;ZHENG Hong-bo
..............page:2879-2884,2900
Research of deep web integrated system based on holistic schema matching
SHAO Xiu-li;SUN Jie;HOU Le-cai
..............page:2679-2683
Research on terminal software security management system based on CPK
XU Zhao-hui;LING Jie;YANG Zhao-xia
..............page:2584-2587