Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Design
1000-7024
2016 Issue 10
Modified holistic approach for worst-case latency bound of rate-constrained flow in TTEthernet networks
LING Yue;HE Feng;LI Qiao;XIONG Hua-gang;College of Electronic and Information Engineering;Beihang University;
..............page:2581-2585
Compensated cross layer resource allocation algorithm in wireless multi hop network
XU Ning;CHUN Yan;SHEN Shu-tao;Tibetan Information Technology Research Center;Tibet University;
..............page:2586-2591
Data forwarding method based on group trust in opportunistic network
REN Qing-qing;ZHANG Zhen-yu;YANG Wen-zhong;WU Xiao-hong;School of Software;Xinjiang University;School of Information Science and Engineering;Xinjiang University;
..............page:2592-2596+2631
Optimal selection of forwarding node algorithm in participatory sensing networks
DU Jing-lin;HOU Da-jun;College of Electronic and Information Engineering;Nanjing University of Information Science and Technology;
..............page:2597-2601+2612
Broadcasting emergency message in VANETs
WEI Rui;LIU Shuan;School of Information Engineering;Huanghuai University;
..............page:2602-2607
Calculation method of network maximum flow based on discrete dropping queue
WEI Juan;ZHANG Li;ZHANG Hong;GUO Yang-yong;College of Computer Science;Chengdu Normal University;Institute of Intelligent Computing and Information Technology;Chengdu Normal University;Faculty of Computer Science;Sichuan TOP IT Vocational Institute;College of Computer;Chengdu University;
..............page:2608-2612
System safety requirement based on misuse case
HUO Fang-fang;YAO Shu-zhen;TAN Huo-bin;School of Computer Science and Engineering;Beihang University;School of Software;Beihang University;
..............page:2613-2616+2626
Methods of reconciling UC model and DDMP model
ZHANG Yu;JIAO Jian;Department of Aircraft Control;Aviation University of Air Force;95935 PLA Troops;
..............page:2617-2621
Selection strategy of plaintext pairs for side-channel collision attack
YAN Ying-jian;WANG Zhong;GUO Jian-fei;Information Engineering University;
..............page:2622-2626
Adaptive spatial steganography based on S-UNIWARD for digital images
LI Ning-bo;PAN Feng;LI Jun;LI Xiu-guang;Key Laboratory of CAPF for Cryptology and Information Security;Engineering University of Armed Police Force;
..............page:2627-2631
Research and application of mobile intelligent terminal data leakage prevention model
CHEN Chao-qun;LI Zhi-hua;YAN Cheng-yu;HU Zhen-yu;School of IOT Engineering;Jiangnan University;
..............page:2632-2638
Design and realization of two-way security authentication wireless system
WANG Jie-hua;LIU Hui-ping;SHAO Hao-ran;XIA Hai-yan;School of Computer Science and Technology;Nantong University;
..............page:2639-2643+2699
RTL level verification of Mickey 2.0 based on SystemVerilog-UVM
YANG Kun;XU Jin-fu;LI Wei;School of Cryptogram Engineering;Information Engineering University;
..............page:2644-2648
Research and design of N+n redundancy system
YANG Song;FAN Kai-cheng;DING Rui;Beijing Institute of Computer Technology and Application;China Jiliang University;
..............page:2649-2653+2669
Design and simulation of pipelining for reversible processor
ZHU Peng-cheng;GUAN Zhi-jin;WEI Li-hua;Department of Computer Science and Technology;Xinglin College;Nantong University;College of Computer Science and Technology;Nantong University;Department of Software Engineering;Nantong Institute of Technology;
..............page:2654-2660
MPICH segmented message queue mechanism with mapping-search
MIAO Cheng-yu;LEI Yong-mei;School of Computer Engineering and Science;Shanghai University;
..............page:2661-2669
Method for land vehicle GPS heading determination based on aid of inclinometer
CHEN Wan-tong;LI Xiao-qiang;School of Electronics and Information Engineering;Civil Aviation University of China;School of Electronics and Information Engineering;Beihang University;
..............page:2670-2674
Feature extraction algorithm based on improved 2D Gabor wavelet filter
YAN Jun-qiang;QIAO Zhi-wei;WANG Qiang;College of Computer and Control Engineering;North University of China;
..............page:2675-2678+2709
Design and implementation of focused crawler based on concept context graph
GUAN Wei-guo;LUO Yong-cheng;School of Computer Science and Technology;Donghua University;
..............page:2679-2684
Weak barrier coverage construction algorithm in directional sensor networks
WU Ju-ying;FENG Xiu-fang;College of Computer Science and Technology;Taiyuan University of Technology;
..............page:2685-2689
Research and implementation of matrix transpose based on SMP system
YUAN Yuan;CHEN Liang;North China Institute of Computing Technology;School of Information Science and Electronics;Beijing Institute of Technology;
..............page:2690-2694
Meeting summarization technology confused with SVM and MMR based on theme
MENG Ling-ge;MA Jian-fen;ZHANG Xue-ying;College of Computer Science and Technology;Taiyuan University of Technology;College of Information Engineering;Taiyuan University of Technology;
..............page:2695-2699
Efficient moving target detection method based on adaptive Gaussian model
WANG Hong-ru;TONG Wei;School of Mechanical Engineering;Jiangsu University of Science and Technology;
..............page:2700-2704
Design and implementation of geometric match method based on LabVIEW
LI Guang-ming;SUN Ying-shuang;DANG Xiao-juan;College of Electric and Information Engineering;Shaanxi University of Science and Technology;School of Information Engineering;Shaanxi Fashion Engineering University;
..............page:2705-2709
Group formation method in collaborative learning based on density-based clustering
ZHOU Meng-xiong;YE Yan-ming;REN Yi-zhi;XU Yue-shen;School of Information Engineering;Hangzhou Dianzi University;School of Computer Science and Technology;Zhejiang University;School of Computer Science and Technology;Hangzhou Dianzi University;
..............page:2710-2716
Application of improved flower pollination algorithm optimized support vector machine in short-term traffic flow
SUN Chao-dong;LIANG Xue-chun;College of Electrical Engineering and Control Science;Nanjing Tech University;
..............page:2717-2721
LDA based tag recommendation in social tagging system
ZHANG Bin-bin;LIN Pi-yuan;HUANG Pei-jie;College of Mathematics and Informatics;South China Agricultural University;
..............page:2722-2727
Multi-color information fusion based interest objects detection
XU Gang;YAN Xin;School of Electrical and Electronic Engineering;North China Electric Power University;State Grid Beijing Electric Power Company;
..............page:2728-2732+2758
Online advertising technique based on desired set of users via different paths in microblogs
HE Yong-qiang;QIN Qin;WANG Jun-peng;School of Computer;Henan Institute of Engineering;School of Computer Science and Technology;Beijing Institute of Technology;
..............page:2733-2737
Under closed class Apriori mining algorithm based on two stage high expectation weight
LI Hai-sheng;LI Chun-qing;LIANG Ting-ting;WANG Gao-cai;Department of Physics and Electronic Engineering;Guangxi Normal University for Nationalities;Department of Mathematics and Computer Science;Guangxi Normal University for Nationalities;School of Computer and Electronics Information;Guangxi University;
..............page:2738-2743+2768
Adaptive visual distance rendering and class vocabularies based 3D model retrieval
LIU Zhi-wen;WANG Yao-zhen;PANG Feng-qian;LI Heng;School of Information and Electronics;Beijing Institute of Technology;
..............page:2744-2749
Improved ICP algorithm based on spin-image feature descriptor
LANG Ping;GAO Yuan;QIN Pin-le;WANG Li-fang;School of Computer and Control Engineering;North University of China;
..............page:2750-2753+2774
Multi resolution based fast registration algorithm for emu axle images
LIU Zhi;ZHANG Ruo-chen;College of Electronic and Information Engineering;North China University of Technology;
..............page:2754-2758
Human gesture recognition based on dynamic path optimization
CHEN Fu-rong;TANG Di;WANG Lu-chen;WANG Yu-long;HAN Li;School of Computer and Information Technology;Liaoning Normal University;
..............page:2759-2763
Algorithm of side information generation based on mixed motion model
WANG Yan-ying;FENG Jin-mei;ZHANG Hong-quan;Electronic and Information Engineering College;Heilongjiang University of Science and Technology;
..............page:2764-2768
Improved face recognition algorithm based on Gabor feature and collaborative representation
MU Qi;WANG Tang-hong;LI Zhan-li;College of Computer Science and Technology;Xi’an University of Science and Technology;College of Mechanical;Xi’an University of Science and Technology;
..............page:2769-2774
Social network community discovery algorithm based on node benefit Nash equilibrium
FAN Hui;XIA Qing-guo;WU Wei;Department of Information and Engineering;Xijing University;College of Computer;Northwestern Polytechnical University;
..............page:2775-2779+2809
CT image reconstruction algorithm based on novel nonlocal means filter
HU Jie;CHEN Zi-jia;LUO Yi-bin;Guangzhou HuaDuan Technology Limited Company;School of Biomedical Engineering;Southern Medical University;
..............page:2780-2783+2788
Measurement matrix based on balance Gold pseudo random sequence
JIANG Xin-ling;XIE Zheng-guang;ZHANG Zheng;YANG San-jia;School of Electronic Information;Nantong University;
..............page:2784-2788
Collision detection of convex polyhedron based on mixed monkey algorithm
JIA Sai-sai;LIU Zhi-qin;YANG Lei;WU Jue;College of Computer Science and Technology;Southwest University of Science and Technology;
..............page:2789-2793
Supply chain demand collaborative prediction model based on Agent-Petri
XIANG Chang-sheng;ZHANG Lin-feng;Department of Computer and Communication;Hunan Institute of Engineering;Information Science and Technology Institute;Hunan Agricultural University;
..............page:2794-2797+2820
Integrating geometric ratios and wrinkles for human age group classification
HAO Ning-bo;WU Hai-tao;LIAO Hai-bin;School of Information Engineering;Wuhan University of Technology;School of International College;Huanghuai University;School of Computer Science and Technology;Hubei University of Science and Technology;
..............page:2798-2803
Single sample face recognition based on center-symmetric magnitude and phase binary pattern
YANG Hui-xian;LIU Yang;TAN Zheng-hua;HE Di-long;LIU Fan;School of Physics and Optoelectronics;Xiangtan University;College of Information Engineering;Xiangtan University;
..............page:2804-2809
Application of PCA in defect detection based on parallel computing
WANG Xin;GAO Wei-xin;WANG Zheng;YE Yun-zhou;College of Electronic Engineering;Xi’an Shiyou University;
..............page:2810-2815+2850
Multi-robot coverage control based on time-varying density functions
WANG Xue-rui;ZHOU Yan;College of Computer;Henan Institute of Engineering;
..............page:2816-2820
Data communication in photo-elastic modulation Fourier transform spectrometer
LI Shan;CHEN Yuan-yuan;WANG Zhi-bin;ZHANG Min-juan;WANG Li;TAN Xu-xiang;LI Ke-wu;Engineering Technology Research Center of Shanxi Province for Opto-Electronic Information and Instrument;North University of China;
..............page:2821-2825
Integrated system strategy of heterogeneous materials data
CAO Min;CHEN Pan-pan;School of Computer Engineer and Science;Shanghai University;
..............page:2826-2831+2843
Design and implementation of flight point position information dynamic update system in general aviation
WANG Peng;WANG Xiao-liang;ZHANG Zhe;WU Ren-biao;Tianjin Key Laboratory for Advanced Signal Processing;Civil Aviation University of China;
..............page:2832-2836+2856
Applying red-black tree in RFID tag file system
CHEN Yi-hui;LONG Zhao-hua;School of Computer Science and Technology;Chongqing University of Posts and Telecommunications;
..............page:2837-2843
Service adaption and integration based on message in legacy resources
ZHANG Yu;JIANG Hu;Science and Technology on Information Systems Engineering Laboratory;The 28th Research Institute of China Electronics Technology Group Corporation;
..............page:2844-2850
Online testing of fabric flaws based on machine vision
YU Zu-yao;WANG Hong-yuan;ZHANG Ji;School of Information and Mathematics;Changzhou University;
..............page:2851-2856
Effects of facilities deployment methods on subtasks scheduling in cloud manufacturing
LI Wen-xiang;WEI Xia;SHENG Yu-xia;School of Information Science and Engineering;Wuhan University of Science and Technology;Engineering Research Center of Metallurgical Automation and Detecting Technology of Ministry of Education;Wuhan University of Science and Technology;
..............page:2857-2861