Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2008 Issue 25
DNA computing model for shortest directed path problem based on sticker and delete system
MA Fang-fang;WANG Shu-dong;LI Han;XUE Sheng-wei
..............page:40-42
Discussion to definition of linear list of data structure.
ZHOU Hai-yan;KOU Hai-zhou;FENG Wan-li
..............page:38-39
One choosing method of decision tree based on fuzzy gain ratio
YAN Zhi-jia;JIN Lian-fu
..............page:146-148,154
Novel algorithm for clustering heterogeneous data stream based on dissimilarity matrix
WAN Ren-xia;CHEN Jing-chao;WANG Li-xin
..............page:149-151
Method of video retrieval based on analysis of motion vector
XUE Li-qin;ZHANG Xiu-juan
..............page:152-154
Parallel KNN algorithm for WEB document classification
ZHOU Pu-xiong
..............page:155-156
Multi-dimensional reduction technique research on case retrieval model in CBR
LI Hai-fang;WEI Xiao-yan;CHEN Jun-jie
..............page:157-160
Convex smoothing algorithm for delay look-up table
LIU Xue-xin;LU Wei-cheng
..............page:65-68,80
New digital method for linear frequency modulated signal generated
HUANG Hong-quan;FANG Fang;WAN Yong-lun;SU Zai-jian
..............page:69-71
Error analysis and inspection in integrated reverse engineering
TANG Hong-jiang;MA Shu-mei;LI Ai-ping
..............page:72-74,85
Research review of knowledge transfer in information systems development
HE Yong-gang;HUANG Li-hua
..............page:75-77,114
Application of ultrasonic flow measurement for small diameter pipe based on Neural Network
CHEN Ping;WANG Qiao;GENG Qing-jun
..............page:78-80
Research of text feature selection method based on quantum Genetic Algorithm
QIU Ye;LIU Pei-yu
..............page:140-142,154
Free text information extraction based on frame semantic tagging
NIU Zhi-xian;BAI Peng-zhou;DUAN Fu
..............page:143-145,151
Contour extraction research of image
ZOU Bai-xian;LIN Jing-rang
..............page:161-165
Improved steganalysis method using higher-order statistics for JPEG images
GUAN Chao;ZHOU Zhi-ping
..............page:193-195
Based on Bayesian theorem energy function for protein structure prediction
SHI Xiao-hong;XIAO Hong-bo;XIAO Jian-hua
..............page:196-198
MRF-MAP and fuzzy quality map based phase unwrapping algorithm
LI Ben-xing;MA Jian-hua;FENG Yan-qiu;CHEN Wu-fan
..............page:199-202,209
Bayesian visual classification method based on parallel coordinates
XU Yong-hong;HONG Wen-xue;GAO Zhi
..............page:166-169,188
Improved image edge detection algorithm based on Canny operator
HUANG Jian-ling;ZHENG Xue-mei
..............page:170-172
Real-time rendering arithmetic of two levels of detailed terrain
GUANG Li;ZHANG Sheng-chao;ZHU Bin;HAO Chong-yang
..............page:173-175,198
Image registration based on 3-parameter motion model
LI Jia-tai;ZHANG Ke;YU Rui-xing;LI Yan-jun
..............page:176-178
LDA/GE for face recognition
LI Zi-rong;DU Ming-hui
..............page:179-181,185
Feature extraction and classification study research of figure image
SU Jie;WANG Bing-qin;GUO Li
..............page:182-185
Sorted TDOA optimization based localization algorithm for wireless sensor network
TANG Tao;GUO Qing;PENG Bao
..............page:98-99,103
Virtual Internet offensive and defensive analysis model
GUO Chun-xia;LIU Zeng-liang;TAO Yuan;ZHANG Zhi-nan
..............page:100-103
Peer selection algorithm based on Traceroute
ZHANG Yu;GONG Xiang-yang;QUE Xi-rong;WANG Wen-dong
..............page:104-108,112
Web text trustworthiness classification method based On VSM
MAO Xue-yun;ZENG Guo-sun;WANG Wei
..............page:109-112
New public key traitor tracing scheme
TENG Ji-kai;SONG Zong-yu
..............page:113-114
New UWB pulse design method and performance analysis
HU Jiang;GUO Feng;WU Yao-hui
..............page:119-121,125
New truncated error estimate for fast gauss transform
JIANG Hong;ZHU Wen-qiu;HU Yong-xiang
..............page:35-37
Novel edge extraction algorithm based 011 MAS
GUO Lei;CHEN Liang;GAO Shi-wei;WANG Ya-ping
..............page:32-34,51
Reputation-based method to detect failed peers in P2P streaming media system
LU Yi-feng;FENG Zhen-tan;WANG Jin-lin
..............page:28-31
Ear recognition based On locally linear embedding and nearest feature line
XIE Zhao-xia;MU Zhi-chun;XIE Jian-jun
..............page:24-27,31
Improved indoor location system scheme for wireless sensor network
LIU Yu-hong;WANG Yao-kuan
..............page:203-205,248
Simulation model of integrated traffic guidance and ramp control on urban expressway network
XU Tian-dong;HAO Yuan;SUN Li-jun
..............page:13-15,71
Intelligent surveillant system based on video analysis
QIN Jian;ZENG Xiao-ping;LI Yong-ming;ZENG Hao
..............page:6-8,42
Accurate and automatic 3D segmentation of substantia nigra in human brain
LI Wei;CHENG Wu-fan
..............page:206-209
Constructive strategy of non-isomorphic case set based on pheromone theory of ant colony algorithm
JIA Shi-jie;HUANG Qing-song;LIU Li-jun
..............page:210-211,245
GA-based resource leveling optimization for engineering project
ZHAO Sheng-li;LIU Yan;DU Guang-qian
..............page:212-214
Fabric defect detection based On wavelet lifting scheme
GUAN Sheng-qi;SHI Xiu-hua
..............page:219-221,228
Research on decision tree algorithm based on rough set in medical system
HUANG Yu-ying;YANG Qing;ZHANG Lian-fa;LI Jun-wei
..............page:222-224
ESB principle, architecture, implementation and application
ZENG Wen-ying;ZHAO Yue-long;QI De-yu
..............page:225-228
Path optimization for PCB NC-drilling using Genetic Algorithm
WEI Wei;LI Jian-yong;WANG Heng
..............page:229-232
Synchronization control in crane lifter based on relative coupling strategy
CAO Ling-zhi;WANG Hong-wei;LI Chun-wen;CHEN Hua-ying;MIAO Wei-pu
..............page:233-235
Key techniques and implementation of electronic seal in Uyghur, Chinese and English
WANG Yi;ZHOU Jun-lin;Tayirl
..............page:239-241
Wavelet faltering and welding current signal processing based on LabVIEW
ZENG Song-sheng;SHI Yong-hua;WANG Guo-rong
..............page:242-245
Development of deformation measurement system in direct metal rapid prototyping
AIYITI Wurikaixi;ZHAO Wan-hua
..............page:246-248
Time-expanded network K shortest paths algorithm for over-loading transportations
HUANG Ze-han;TAN Yue-jin;DENG Hong-zhong
..............page:20-23
Survey of join load shedding in data stream system
CHEN Jun;ZHOU Ming-tian;YANG Xiao-yan
..............page:16-19
Heuristic algorithm for attribute reduction based OH condensing tree structure
ZHANG Zhong-ping;LIN Zhi-jie;LI Yan
..............page:122-125
Vocal discrimination in pop music based on SVM
SHI Zi-qiang;LI Hai-feng;SUN Jia-yin
..............page:126-128
Analytic continuation of similarity definition in time series
YIN Hong-sheng;LIU Xiu-tong;QIAN Jian-sheng;HUA Gang
..............page:129-131,209
Data mining expand model research based on probability measure
ZHANG Wen-yu
..............page:132-135
Non-commutative BR0-Algebra and Quantales on It
WANG Wei-hua;WU Hong-bo
..............page:43-45
Fast projection coefficient computation method in algebraic reconstruction technique
ZHOU Bin;WANG Lian-tang;WANG Jun-jie;ZHAI Liang-liang
..............page:46-47,64
Swarm-robots capturing algorithm based on virtual force
XIONG Ju-feng;TAN Guan-zheng;PI Jian
..............page:48-51
On consistency of covering rough approximation
HU Jun
..............page:52-54
New algorithm of culculating core attributes based On vector
XIE Lin-quan
..............page:55-57,64
Triple I constraint method with respect to FMT model under ramily of implication operator L-λ-Ro
KAN Ting;ZHANG Xing-fang;WANG Zuo-zhen
..............page:58-59,85
High precision phase-lock technology for UPS based on TMS320F2812
ZHONG Jing-gui;QIU Shui-sheng
..............page:86-87,135
Admission control and flow control of QoS flow in wireless Ad hoc networks
LIU Chun-gui;ZHANG Lian-fang;SHU Yan-tai;WU Xiao-jin;SHI Hong-yang
..............page:88-91,95
Expression and recognition of intrusion signature based on varieties of antigen & antibody
XU Hui;WANG Jie-hua;ZHANG Kun;LIU Feng-yu
..............page:92-95
Video watermarking algorithm based on skewness
ZHOU Zhi-yuan;LI Yue-qiang;SUN Xing-ming
..............page:96-97,195