Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2006 Issue 19
The Neural-Semantic Network:a New Structure to Represent Conceptual Knowledge and Support Dynamically Learning
Qin Zhongbao;He Weiping;Zhao Feng;Wang Youjun
..............page:29-31,34
Eye Tracking Based on Mean Shift Algorithm and Particle Filter
Shi Huawei;Xia Limin
..............page:26-28
Strategies of Video Transmission Based on 3G Wireless Network
Fan Xinnan;Xing Chao
..............page:132-135
Application of OE in IPSec
Li Xi;Liu Hong;Yao Qi;Yang Tao
..............page:136-139
A Distributed Intrusion Detection System Model Based on Mobile Agents
Xiang Mu;Yang Xiaoping
..............page:140-143
Automatic Recognition of Natural Language Based on Pattern Matching
Feng Chunsheng;Hao Aimin
..............page:144-146,166
A Theorem for Designing Local Maximum Detection CNN with Applications
Yang Huaiheng;Min Lequan
..............page:32-34
The Computation of Optical Flow for the Mobile Robot
Hu Tingbo;Wu Tao;He Hangen
..............page:35-37
A Wavelet Based ROI Progressive Image Transmission Algorithm
Ma Yide;Chen Xiaolei
..............page:38-40
New Method for Parabolic Equations with Rapidly Oscillating Coefficients
Wang Junhua;Gao Hongxing
..............page:41-43,114
A Compression Ratio Adaptive Algorithm for Vector Quantization
Zhang Yulun;Yu Ningmei;Wang Dongfang
..............page:44-46,118
Integration of Multiple Fingerprint Matching Algorithms
Wen Miaoli;Liang Yan;Pan Quan;Zhang Hongcai
..............page:47-48,60
Multiresolution Image Fusion Algorithm Based on Probabilistic Model
Guo Chao;Liu Rongli;Shi Junjie;Wen Chenglin
..............page:49-53,95
Normal Map Generation Method in DVE_Nowa System
Guo Li'e
..............page:57-60
A Digital Image Encryption Algorithm Based on Chaotic Sequences
Zhang Xuefeng;Luo Zujun;Gao Chuan
..............page:61-62,135
Implementing the Domain and Type Enforcement for Linux
Tu Bo;Zhang Yuqing
..............page:63-66
Algorithm and VLSI Implementation of AES S-Box
Zhang Zhifeng;Lin Zhenghao
..............page:67-68
The Design of 10G-linecard Software Based on VxWorks
Hu Hongchao;Yang Meiyue;Li Yuntao
..............page:69-72
Enable Lua to Support "Design by Contract"
Deng Jifeng;Zhang Guixu
..............page:73-76,107
Particle System Based on GPU
Xu Nan;Hao Aimin;Wang Lili
..............page:77-79,139
Research and Application of Augmented Reality Development Kit
Guan Tao;Li Lijun;Wang Cheng
..............page:84-86,89
Enhancement of MPE Graphics for MPI
Luo Qiuming;Wang Mei;Li Jing
..............page:87-89
Analysing and Optimizing of the Droptail and RED Router Algorithm
Liu Jiaqi;Chen Zhigang;Li Deng
..............page:90-92,173
Implementation Scenario of Parallel Switch Fabric over Terabit Router
Yang Meiyue;Hu Hongchao;Yi Peng
..............page:93-95
A Digital Watermarking Algorithm Based on Vector Quantization
Huang Song;Zhang Wei;Wei Pengcheng;Chen Jun
..............page:96-98
A Threshold Proxy Signature Scheme with Signers Privacy Protection
Li Liyuan;Xu Qiuliang
..............page:99-100
Model of Anomaly Detection of User Behaviors Based on Machine Learning
Tian Xinguang;Sun Chunlai;Duan Miyi;Qian Xiaojun;Qiu Zhiming
..............page:101-103,111
Network Traffic Modeling and Prediction Based on Fractional Differencing and Fuzzy-AR
Hu Shenmin;Xu Weisheng;Wang Zhongjie;Yu Youling
..............page:104-107
Study on Chaos Characteristics of the Internet Traffic and Discussion on Causes
Wu Wenqing;Zhao Liming;Liu Jiakun
..............page:108-111
An Improvement of ACJT Group Signature Scheme
Xu Xingzhong;Li Qiaoliang;Lou Jing
..............page:112-114
A Variability Metamodelling Method in MDA Context
Yin Jianfei;Lan Qingguo
..............page:23-25,72
A Model of P2P Resource Management and Task Scheduling Based on Info-Center Policy
Huo Ying;Li Deng;Chen Zhigang
..............page:119-122
A Fast Optimal Algorithm for QoS Multicast Routing with Multiple Constraints
Wang Lv;Hu Jinsong;Peng Hong;Li Jun
..............page:123-125,188
Improving the Performance of TCP in Wireless Links by SNOOP Protocol and its Improved Algorithm
Bai Yi;Wang Minbei;Ding Dazhao
..............page:126-128,211
The Location-based SIP PUSH Service Architecture
Zhou Yantao;Xiang Sheng;Wu Zhengguo
..............page:129-131,197
The Application in Classification among Fisher Discriminant Criterion K-L Conversion and SVM
Li Guoqi;Zhao Guangshe;Sun Zhaoying
..............page:147-150,157
The Estimation of the Number of Distinct Values over Data Streams Based on Circular Bloom-Filter
Ren Meirui;Guo Longjiang;Xuan Ping
..............page:151-154
Moving Object Segmentation Based on Low Bit Rate Video Sequences
Qin Xiaofang;Zhang Youzhi
..............page:155-157
Study of Web Information Retrieval Based on N-Level Vector Space Model
Fu Kezhi;Lin Hongfei
..............page:158-160,179
Recognition of Three-character Words with Suffix
Feng Minxuan;Fang Fang;Chen Xiaohe
..............page:161-163,169
Research and Design of the Digital Library Based on Web Service
Zhou Jin;Liu Yang;Zheng Yanwei
..............page:186-188
The Implementation of SMES Based on Web Service Technology
Ding Han;Liu Lianhao;Li Zhaohui;Tang Haihong
..............page:189-191,232
The Pitch-Roll Decoupling Control of Unmanned Helicopter
Zhang Yaou;Lv Tiansheng;Du Jianfu
..............page:192-193,221
Automatic Seal Identification Based on Multiscale Wavelet Analysis and SVM
Geng Jianling;Chen Chun;Chen Yaowu;Huang Yilun
..............page:194-197
Design of the Mobile Terminal of Vehicle Based on Embedded Linux and Xscale
Ding Hui;Li Dehua;Wang Songhong
..............page:198-200
A Surveillance System Aiming at MR Check-up Process
Wang Chao;Jiang Wei;Gao Zan;Tao Junwei
..............page:201-204
Analysis of the Efficiency and Accuracy for the Collision Detection Algorithms
Zhao Feng;He Weiping;Wen Conggang;Ji Feng
..............page:212-214
Particle Swarm Optimization Algorithm for Stochastic Loader Problem
Zhao Peixin;Wang Hong;Ma Jianhua
..............page:215-217,226
A Customer Classification Based Modified Fuzzy Neural Network
Cao Yukun;Li Yunfeng;Wang Chengliang;Zhou Mingqiang
..............page:218-221
An Aviation Images Based Parallel Plane Type Recognition Method
Shi Jinsheng;Zhang Yanning;Zhao Rongchun
..............page:222-223,228
Reconstruction of Shoe Last Based on Section Contours of Cloud Data
Ren Haiying;Yang Guang;Zhang Jingtao;Li Junjiang
..............page:224-226
Development of Time Control Method in Equipment Engineering Supervision
Peng Juguang;Pan Quan
..............page:227-228
A Kind of Effective Fingerprint Recognition Algorithm and Applicationin
Liu Wenzhou;Meng Xiangping;Wang Fengbin;Ren Shuxin
..............page:229-232
Joint Estimation of DOA,Range,Polarization and Frequency of Near-Field Sources
Huang Jiacai;Shi Yaowu;Tao Jianwu
..............page:17-19,83
Data Classification Modeling Based on Granular Computing
Gao Ping'an;Cai Zixing;Meng Zuqiang
..............page:14-16
Immune Digital Watermarking Technique
Peng Deyun;Wang Jiazhen;Wang Suzhen;Yang Sumin;Ming Liang
..............page:11-13,22
An Efficient Anonymous Authentication and Key Agreement Protocol
Feng Guozhu;Li Chao;Wu Yi
..............page:4-7
Sensor Fault-Diagnoses Based on One-Class SVM
Zhong Qingliu;Cai Zixing
..............page:1-3,7
The Research of Fuzzy Due Dates Penalty Problem Based on Particle Swarm Optimization
Lu Bingyuan;Gu Chunsheng;Gu Feng
..............page:8-10,16
Boosting Naive Bayes by Active Learning
Li Ling;Li Haijun;Wang Zhengxuan;Wang Limin
..............page:164-166
A Method of Video Scene Detection Based on Shots
Huang Shaonian;Zhao Yuelong;Qiu Jianxiong
..............page:170-173
A Dynamic Data Adjustment Method Based on Hot Contents
Cao Zhongsheng;Yang Liangcong;Tang Shuguang
..............page:174-176
LOB Data Exchange Based on Huffman Coding and XML
Jia Changyun;Zhu Yuelong;Zhu Min
..............page:177-179
A Text Filtering Method Based on Synonym Elimination
Hang Juan;Zhang Dongmo
..............page:180-182
Traffic Image Coding Method Based on Polynomial Approach
Cao Wenlun;Shi Zhongke;Feng Jianhu
..............page:183-185