Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2007 Issue 29
Live-wire algorithm for medical image segmentation based on improved search strategy
WANG Yang-ping;DANG Jian-wu;LI Qiang;LI Sha
..............page:24-26
Study of novel flow sampling method based on SCBF
LIU Yuan;LIU Yuan-zhen;LI Xiao-hang
..............page:140-142
Cache management in code-on-demand workflow migration in wireless environment
WANG Hong;ZENG Guang-zhou
..............page:30-35
Shape control of rational quadratic interpolating curve
DENG Si-qing;FANG Kui;XIE Jin
..............page:40-42,62
Algorithm of TSP
ZHOU Kang;QIANG Xiao-li;TONG Xiao-jun;XU Jin
..............page:43-47,85
CAN-based approach to distributed credentials chain discovery
JIANG Zhi-hong;WANG Hui;SUN Xiao;TAO Jun
..............page:48-52,89
Image registration algorithm based on blocking-spatial clustering
GONG Yong-xi;LIU Yu;XIE Yu-bo;YANG Ping;WU Lun
..............page:53-55
Influence of gradient operators on inverse compositional gradient algorithm
ZHANG Pei;WU Ya-feng
..............page:56-58,73
Second fusion method of TM+SPOT images
DU Juan;LIU Bin
..............page:59-62
Semi-auto framework for module based ontology matching
WEN Dun-wei;FAN Xiao-hu
..............page:63-67
Texture analysis based on log polar frequency spectrum and Gabor
LIU Qiong;ZHOU Hui-can;WANG Yao-nan
..............page:68-70
Genetic programming based on non-dominated sorting
WU Yan-ling;LU Jian-gang
..............page:71-73
Postprocessing algorithm for DWT-based compressed image based on image restore theory
XIAO Zhi-yun;WEN Wei;PENG Si-long
..............page:74-77
New geometric feature shape descriptor
ZHANG Xian-quan;GUO Ming-ming;TANG Ying;JIANG Lian-yuan;ZHAO Ying-song
..............page:90-92
New algorithm to measure scrambling degree of scrambling images
FAN Yan-jun;SUN Xie-hua
..............page:93-94,97
XML-based publish subscribe system over P2P network
HU Xi-xiang
..............page:101-103,125
Design of CAN-ethernet embedded gateway based on VxWorks
JIANG Hai-feng;ZHANG Jian-ying;KONG Ming-kun
..............page:107-109
Grid-based distributed virtual environment simulation
LIU Xiao-hu;JIANG Cong-feng;WANG Cheng
..............page:110-112,142
Concurrent test generation method based on multiple faults model
OUYANG Yi-ming;LU Chuan-wu;LIANG Hua-guo
..............page:113-115
Design and simulation of improved NTP protocol
WANG Xiao-hua;ZHANG Lei;TIAN Chang
..............page:116-118,131
MANET clustering based on clonal selection algorithm
ZUO Rui-juan;WU Yong-hua
..............page:119-121,139
Congestion control algorithm of delay system based on prediction
XIAO Ping-ping;TIAN Yan-tao;AN Xiao-feng
..............page:122-125
On capacity optimization for correlated MIMO channels
HE Zhong-tang;XU Ran;XU Su-xiao
..............page:126-128
On scalability of flow-aware networking
QIU Gong-an;ZHANG Shun-yi
..............page:17-20
Embeddings of double-loop network into RP(k)
XIA Lei;LIU Fang-ai
..............page:129-131
GcChord:enhanced DHT networks based on group and cache
QU Guang-qiang;HU Yong;WANG Gui-zhu
..............page:132-134,139
Ethernet protocol identification algorithm based on pattern matching
LI Xiong-wei;WANG Xi-wu;WANG Pan-qing
..............page:143-145,188
Features analysis and detection of DDoS attack
XU Tu;HE Da-ke;DENG Zi-jian
..............page:146-149,171
Method of Web service composition partition based on data stream constrain
PENG Yang;CUI Shu-guang;GAO Chun-ming
..............page:150-153,164
Feedback control-based services composition execution engine design
CHEN Wei-an;GAO Chun-ming
..............page:154-158,206
Clustering algorithm for mobile Ad hoc networks
CHEN Zhi-jun;SHI Xing-rong
..............page:159-161,171
Research on TCP/IP feedback congestion control systems
DAI Hang;MU De-jun
..............page:162-164
Medical image segmentation based on Support Vector Machine approach
LIAO Guo-hong;QI Jun;HUANG Guang-lin
..............page:217-219
Research of coal and gas outburst prediction based on Bayesian network model
ZHANG Ke;WANG Yun-jia
..............page:220-221,248
Speaker verification based on Bayesian adaptation and Gaussian Mixture Model
HU Hai-bo;FU Li;XIANG Hong;ZHOU Yuan;LIU Xiao-yan
..............page:225-227
Auditory model based on phonetic scene analysis
HE Ying-xian;XU Gang
..............page:228-231,241
Formant extraction algorithm based on auditory perception wavelet transform
SHI Xiao-min;GU Ji-hua;TAO Zhi;ZHAO He-ming;ZHANG Xiao-jun
..............page:232-234
Modeling and simulation of aircraft maintenance support process based on HTCPN
WANG Yan-lei;CHEN Chun-liang;HAN Xin-feng;WANG Sen
..............page:235-238
Research of trust transfer of applications model
WANG Fei;LIU Wei-peng;SHEN Chang-xiang
..............page:1-3
Gabor filter enhancement algorithm based on binarization fingerprint image
CHEN Da-hai;GUO Lei;LI Hai
..............page:4-7,10
User-based LAST N Successors file prediction model
LIU Ai-gui;CHEN Gang
..............page:14-16,39
Partition-based algorithm for mining high utility long itemsets
YU Guang-zhu;LI Ke-qing;YI Xian-jun;SHAO Shi-huang
..............page:11-13,20
Dynamic secure secret sharing scheme among weighted participants to prevent cheating
ZHANG Yan-shuo;LIU Zhuo-jun;CHAI Feng-juan
..............page:8-10
RS and SVM-based partner selection research for customer collaborative innovation
WANG Wei-li;YANG Yu;WANG Ming-kai;SONG Li-jun
..............page:245-248
Speech enhancement algorithm based on AD neural networks in whispered Chinese
SUN Jing;TAO Zhi;GU Ji-hua;ZHAO He-ming
..............page:242-244
Method of nonlinear systems identification with fuzzy clustering based on Takagi-Sugeno model
LI Mu;LIU Zu-run;NIAN Xiao-hong;TAN Wen
..............page:239-241
Research on multi-scale prediction of time series based on wavelet and Support Vector Machines
QU Wen-long;LI Hai-yan;LIU Yong-wei;YANG Bing-ru
..............page:182-185
Informaiton sharing in information grid enviorment
AI Zhong-liang;YANG Yin-ling;HE Yong
..............page:192-195
Clustering method based on Constructive Neural Networks and quotient space granularity
XU Yin;ZHOU Wen-jiang;WANG Lun-wen
..............page:165-167,185
Ontology-based adjustable text clustering using abstract degree of concept
WANG Xiao-dong;GUO Lei;FANG Jun;YANG Ning;DENG Tao
..............page:172-175
LZ complexity similarity based spam detection
LI Bin;LI Yi-bing;HE Hong-bo
..............page:176-178
SVM research based on Hermite interpolation
FAN Yan-feng;ZHANG De-xian;HE Hua-can
..............page:179-181
Application of dynamic mesh technique to DNS of supersonic flow
YAN Ming;FAN Zheng-feng
..............page:204-206
Adaptive robust detection method for infrared ship target
WANG Xin-yu;XU Huo-sheng;LI Heng
..............page:207-209,244
Support vector machine based Chinese dialect identification
GU Ming-liang;XIA Yu-guo;ZHANG Chang-shui
..............page:210-213
Application of Credal network in safety assessment of harbor production
LI Yu-ling;WU Qi-zong;ZHENG Heng;LI Shuang;YUAN Rui-ping;WEI Jian
..............page:214-216,219