Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2013 Issue 5
Research on peer-to-peer locating model based on extended chord
YU Wei-hua;WANG Jian
..............page:1542-1545
Statistical fusion algorithm based on relation matrix for active and passive sensor
CUI Bo;ZHANG Jia-shu;YANG Yu
..............page:1527-1531
Extension of AODV for integrated Internet-MANET
SUN Wei-zhen;ZHANG Qin-zhen;XIANG Yong
..............page:1521-1526
Routing algorithm based on mixture for dynamic multi-hop wireless network
PEI Yan-yan;WANG Li;GUO Lu;LIAN Biao
..............page:1546-1551
New design and implementation on rtl8139 NIC driver
LI Kun-lun
..............page:1532-1537,1573
Improved BF decoding algorithm of LDPC codes research based on probability
WEN Fu-peng;ZHANG Xu;XIAO Peng
..............page:1557-1562
Study of wireless routing protocol for network coding in Ad Hoc networks
WANG Chun-yu;ZHANG Xi-huang
..............page:1563-1567
Network clock synchronization based on real-time clock variance algorithm
LI Jun;SUN Shu-ying;LIU Jiang-yi;KONG Xiang-tong
..............page:1538-1541,1551
Design and implementation of CAN-Modbus/TCP protocol conversion
JING Bo-hao;SHEN Meng-liang;TANG Ye-jun
..............page:1552-1556
Information leakage defendable scheme based on crypto-isolation
WANG Hao;CHEN Ze-mao;HUANG Bi-yi;LI Zheng
..............page:1579-1583
Research on frequency-hopping communication network design method against track jamming
QUAN Hou-de;ZHANG Shi-jie;CUI Pei-zhang
..............page:1568-1573
Network security decision-making system based on credibility assessment
CHEN Jing;PENG Wu;WANG Dong-hai
..............page:1584-1588,1598
PMA-DCSK synchronization scheme based on sliding-correlation method
QI Quan;WANG Ke-ren;QIAN Feng
..............page:1574-1578
Research and design of SOAP multilevel security
HU Jie-qing;WANG Fu-xi;XU Dong-hua
..............page:1593-1598
Method for attack graph generation based on state reduction
LI Qing-peng;WANG Bu-hong;WANG Xiao-dong;LUO Xi
..............page:1589-1592,1634
Improved attack tree malicious code detection method
XIE Le-chuan;YUAN Ping
..............page:1599-1603,1608
Simple digital watermark scheme for continuous vector graphics
WANG Tao
..............page:1609-1614,1667
Efficient self-healing group key management protocol for wireless sensor networks
ZHANG Cai-xia;CHENG Liang-lun;WANG Xiao-yu;WANG Xiang-dong
..............page:1604-1608
Image encryption algorithm based on chaotic sequence transform
REN Hong-e;DAI Lin-lin;ZHANG Jian
..............page:1615-1619
Design and implementation of embedded system for cable pipeline inspection robot
PENG Yu-song;DIAN Song-yi;LIU Tao;WU Zhang;SONG Jun-lin
..............page:1630-1634
Implementation of whole network password scanner based on ARP spoofing
KOU Xiao-rui
..............page:1620-1623,1776
Design of system for rats behaviour analysis based on DM642
LEI Jun-jie;YUAN Ke-hong
..............page:1646-1650
Application and realization of FPGA in video mosaicing
PENG Bo;HE Bin
..............page:1635-1639
Research on resonance vibration in servo system based on notch filter
MA Yue;HUANG Bin;WANG Zhi-cheng
..............page:1624-1629
Algorithm of constrained association rules mining based on transaction ID set
ZHAO Jia-lu;YANG Jun;HAN Jing;E Hai-hong
..............page:1663-1667
Design and implementation of concentrator based on ARM9 in remote concentrated ammeter reading system
QIU Sen-hui;LUO Xiao-shu;BI Jin-jie
..............page:1640-1645,1724
Design and implementation of nodes for things of building equipments based on power line carrier technology
XIE Xiu-ying;PENG Wei;ZHANG Gui-qing;WANG Ming;LI Cheng-dong;LU Man
..............page:1651-1656
Reliability analysis of repairable distributed system based on middleware
SU Zhi-gang;HAO Jing-tang;QU Jing-yi;WU Ren-biao
..............page:1668-1672
Video surveillance integrated service platform based on cloud computing technologies
HAN Hai-wen;QI De-yu;FENG bin
..............page:1657-1662
Maximal frequent itemsets mining algorithm based on OWSFP-tree
ZHAO Zhi-gang;WANG Fang;WAN Jun
..............page:1687-1690,1807
Software testing evaluation function constructed and mounting method research
WANG Zhe-si;YE Dong-sheng;ZHANG Jian-wei
..............page:1673-1680
Improved k-means algorithm with meliorated initial centers
ZHANG Jing;DUAN Fu
..............page:1691-1694,1699
Optimization strategy of connection pool based on ADO
MENG Pei-chao;HU Sheng-bo;SHU Heng;YAN Fu-yu
..............page:1706-1710,1715
Automatic inheritance relationship recognition algorithm of database reverse engineering
ZHANG Wen-wen;ZHAO Wei-dong;BI Xiao-qing
..............page:1681-1686,1782
Research on page ranking algorithm based on K-means clustering algorithm and information entropy
HUANG Xian-ying;ZHANG Jin-peng;CHEN Wei-wei
..............page:1695-1699
Approach of scene roaming interactive technology for large-screen projection environment
XU Chun-yao;LI Chao;PAN Lin;YU Lun
..............page:1729-1734
Algorithms for graph similarity search
TAN Wei;YANG Shu-xin
..............page:1700-1705
Task scheduling in cloud computing based on improved ant colony optimization
ZHA Ying-hua;YANG Jing-li
..............page:1716-1719,1816
Live broadcast of P2P streaming media on campus network based on GCNET protocol
LI Qing-xia;WEI Wen-hong
..............page:1757-1761
Video vehicle detection research based on one-class SVM classification
GAO Hai-di;ZHAN Zhi-cai;SHEN Xiang-jun;ZENG Lan-ling
..............page:1735-1739
Improved mean shift segmentation algorithm based on color texture
MA Yu;LIANG Hui-lin;ZHANG Yan-ning;LI Yun;XU Shuang
..............page:1720-1724
Multi-objective decision approach for coal-bed methane gathering in emergency circumstance
LIU Zhen-yu;RUI Xiao-ping;HAN Zhi-heng;DING Zhen
..............page:1762-1766
Clustering algorithm based on improving b-coloring theory
FENG Shan-shan;ZHANG Yue-qin;GUO Xu-min
..............page:1740-1743
Study on multi-mode search of motion estimation
WANG Ye-hua;JIANG Bing;LI Guang-yun;MA Guo-yu
..............page:1725-1728,1751
Virtual scene browse based on OGRE engine
LUO hui-lan;HU si-wen
..............page:1744-1751
Chinese textual entailment recognition using statistical and lexical semantic features
LIU Mao-fu;LI Yan;GU Jin-guang
..............page:1777-1782
Design and realization of virtual hand with real-time interactive performance
ZHANG Xiao-long;TAO Hai-feng
..............page:1767-1771
Chebyshev kernel function for SVM in speech recognition application
LIU Xiao-feng;ZHANG Xue-ying;HE Yuan-yuan
..............page:1783-1786,1791
Block-DCT based homomorphic filtering algorithm for color image enhancement
ZHANG Ya-fei;XIE Ming-hong
..............page:1752-1756
Facial expression recognition based on LGBP features and sparse representation
YU Ming;HU Quan-sheng;YAN Gang;XUE Cui-hong;YU Yang
..............page:1787-1791
Based on improved K-means clustering cotton image segmentation algorithm
REN Lei;LAI Hui-cheng;CHEN Qin-zheng;WANG Xing
..............page:1772-1776
Leveled task allocation method for multiple agents
TAO Xue-li;ZHENG Yan-bin
..............page:1797-1801
Ontology based user activity recognition in smart space
SHI Lin;QI Jun;MA Wei;XU Shou-kun
..............page:1792-1796
Improved Chinese word segmentation method based on dictionary
MO Jian-wen;ZHENG Yang;SHOU Zhao-yu;ZHANG Shun-lan
..............page:1802-1807
Analysis and application of influences of AOP for software complexity
LUO Si-mao;ZHOU Xing-bin
..............page:1822-1825,1840
Application of improved templates matching method on license plate recognition
CHEN Wei;CAO Zhi-guang;LI Jian-ping
..............page:1808-1811
Design and implementation of paper quality assessment system based on CTT and IRT
WANG Hua;CHEN Jing;MA Cui-qin
..............page:1826-1830
Visualization model for transformer faults diagnosis
LU Guang-hui;JI Bo;GONG Dong-wu;ZHENG Kun;GUO Hong-yan
..............page:1841-1845
System of standard medication in common diseases based on cloud computing
ZHAO Wei;ZHOU Bing;LI Zhan-bo
..............page:1831-1835
Fast multi-projection image geometric calibration and edge blending method
ZENG Hong;ZHANG Jun-dong;MA Li-sheng;JIA Bao-zhu
..............page:1846-1850
Edge detection algorithm for point cloud based on rolling-circle
LI Bao-shun;CEN Hong-yan;BAO Ya-ping;LI Yi-feng
..............page:1836-1840
Color image binarization method based on the characteristics library
MING Jun;RUAN Jing;YANG Yang
..............page:1856-1859,1874
Research on security data dictionary based data integrating technique
ZHANG Wen-jiang;HE Zheng-wei;WU Shuang;LI Xuan-qiong
..............page:1851-1855
Mobile terminal application used in geological disaster monitoring
PENG Feng-ling;TUO Xian-guo;WANG Hong-hui;PU Jian-hua
..............page:1860-1864
Analysis of principle and practicality of hard disk system area virtualization technology
ZHANG Jing-sheng;HAN Jin-song
..............page:1865-1869
Metadata-driven middleware for customizable active SMS service
HU Zhi-nan;CHEN Wei-bin;WANG Jin-long
..............page:1875-1878,1895
Design of coal mine underground comprehensive voice alarm platform based on WT588D
LI Xin;ZHANG Quan-gui;WANG Pu
..............page:1870-1874
Spatial database of decision-making system for ecological restoration of artificial recharge rivers
HU Qian-qian;WANG Ming-yu;LI Zhi-yu;ZHAO Jian-hui;JIANG Ti-sheng
..............page:1879-1884
Multimode-fingerprint matching based indoor positioning system design and implementation
YANG Guang-long;KONG Yong-ping;ZHONG Zhi-min;ZHANG Yu-liang
..............page:1896-1900,封3
Application of MATLAB & C# integrated programming in predicting rolling force
YANG Kang;HUANG Chang-qing
..............page:1885-1888,1901