Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2008 Issue 9
Optimization of workflow process based on semantic
WU Tao;HUANG Ning
..............page:43-46
Real time GPU-based raycasting
HE Jing;CHEN Jia-xin;LI Wei
..............page:40-42
Algorithm for clustering gene expression data using connected components
ZHOU Hai-yan;YAN Yun-yang
..............page:152-155
Blog information extraction based on template
SHI Da-ming;LIN Hong-fei;ZHAO Jing
..............page:156-158,177
Random forest based shallow parser
WEI Song
..............page:159-161
OLAP patten matching method in P2P network
YANG Ke-hua;WEI Li
..............page:162-164
Research on spatial information hidden-search engine
ZHANG Jian-bing;LIU Dong-lin
..............page:165-167,189
Study on cognitive model for ecologicalized multi-agent system
ZHANG Hong;HE Hua-can
..............page:47-50
Improved niche Particle Swarm Optimizer in dynamic environment
LI Xiao-yuan;LI Mei-yi;SONG Ling
..............page:51-54
Theory of equivalence about bounded lattice of problems and kernel
LIU Xiao-jing;YANG Shu-qun;DENG Chang
..............page:55-57
Steganalysis method for ±1 steganngraphy
ZHANG Jun
..............page:58-60
Triple Ⅰ Method and α-Triple Ⅰ Method with Parametric IIP System
WANG Qing-ping;ZHENG Hong-xia;ZHANG Xing-fang
..............page:61-63,106
Modified artificial neural network model
ZHOU Xiao-zheng;LIN Xiao-zhu;CHEN Xing;LI Yu-long
..............page:64-66,69
BP networks training algorithm based on particle swarm optimization
PAN Hao;HAN Xiao-lei
..............page:67-69
Adaptive genetic algorithm with crossover-scale expansion
FENG Dong-qing;WANG Fei;MA Yan
..............page:73-75
Adaptive user interest model based on the implicit feedback
LI Feng;PEI Jun;YOU Zhi-yang
..............page:76-79,100
Modified particle swarm optimization
WANG De-qiang;LUO Qi;QI Jia
..............page:80-81,121
Theoretical foundations of statistical learning theory of complex quasirandom samples
ZHANG Zhi-ming;TIAN Jing-feng;HA Ming-hu
..............page:82-86,93
Evaluating to software quality and testing process based on Gompertz model
REN Wei-jun;HE Yu-yao;ZHANG Wei-gang
..............page:87-89
PD-LS algorithm for constructing product prototype based On location subdivision
WANG Wei;MENG Ying-jie;ZHANG Wen;GUO Xi-ping
..............page:90-93
Method and application of product configuration based on ant colony algorithm
LI Yi;WEI Xiao-peng;ZHAO Ting-ting
..............page:94-97,146
Lossless audio data hiding algorithm based on difference expansion
YAN Di-qun;WANG Rang-ding
..............page:98-100
Audio digital watermarking algorithm based on auditory frequency masking
SANG He-ping;ZHAO He-ming
..............page:101-103
Development of Word report generation function based on C#.net
YE Ming;ZHANG Zheng
..............page:104-106
Strong forward-secure digital signature scheme
Alimjan·Aysa;Kurban·Obul;Askar·Hamdulla;LIU Sheng-quan
..............page:107-108,128
Study On strategy of security about RFID tags
SONG He-ying;ZHAO Hui-qun
..............page:109-112,142
Survey in evaluation of intrusion detection system
TIAN Jun-feng;LIU Tao;CHEN Xiao-xiang
..............page:113-117
Effective bandwidth/buffer calculation method in wireless IP networks
TANG Zhi-jun;ZHAN Jie
..............page:118-121
Enhanced TCPW scheme in high bit error rate wireless networks
ZHANG Jun-zhou;CHEN Yuan-yan;LUO Xiao-shu;LI Yun
..............page:122-124,131
Study and discussion of groups-based anonymous communication protocol
JIANG Li;XU Hong-yun
..............page:125-128
Differentiated services mechanism for various traffic transmissions in wireless sensor networks
WANG Peng;SHAN Yu-feng;CHAI Qiao-lin
..............page:132-134
XML document clustering using frequent structure
FU Shan-shan;WU Yang-yang
..............page:135-138,171
Privacy preserving approach based on temporal and spatial constraints
LI Jun-huai;GAO Miao;CHEN Xiao-ming;LIU Hong-ying;LOU Wen-xiao
..............page:139-142
Block-based topic crawling
WU Xiao-ping;ZHANG Chang-li;ZHU Li-na
..............page:143-146
Relation matrix-based algorithm for reduction of attribute in information systems
LI Jin-hai;LV Yue-jin
..............page:147-149,189
Study of reduction algorithms based on discernibility matrix of length constraint
WANG Hao;HU Xue-gang
..............page:150-151,155
Array signal processing model and simulation based on MATLAB
ZENG Hao;PANG Yu;FENG Weng-jiang
..............page:168-171
Spherical triangle subdivision and analysis based on polyhedron
ZHANG Sheng-mao;WU Jian-ping;Zhou Ke-song
..............page:16-19
Analysis of energy efficiency based on ARQ protocols in wireless sensor networks
XU Jian-cheng;SHI Hao-shan;WANG Jie-tai
..............page:13-15,23
Condition of incremental software design approach
WANG Xiang-yun;CAI Kai-yuan;WANG San-min
..............page:10-12,60
Research on software project risk identification based on Genetic Algorithms
FENG Nan;LI Min-qiang;FANG De-ying
..............page:7-9
Reseach of denoising method based on wavelet threshold
ZHANG Lian;QIN Hua-feng;YU Cheng-bo
..............page:172-173,199
Application of high performance map algebra with IDL
BU Kun;ZHANG Shu-wen;ZHANG Yu-bo
..............page:174-177
Texture synthesis image completion based on PSO
ZHU Wei;LI Guo-hui;LAI Xu
..............page:178-180
Method based on quarter-tree decomposition of image compression
HE Xing-heng;CHEN Hui
..............page:181-183
Improved method for BSCB image inpainting
LI Wei;HE Jin-hai;QU Lei;LIANG Dong
..............page:184-186,196
Image fusion based on application of adaptive genetic search
GAO Ji-zhen;LIU Yian
..............page:193-196
Snake model in carcinoma cell image division application
ZHANG Zhen;ZHANG Peng;AN Jian-wei
..............page:197-199
Enhancement methods based on maximal fuzzy entropy for infrared images
TANG Liang-rui;SUN Dong-hua
..............page:200-201,222
Face recognition based OR SNPE and SVM
GUO Feng;LV Ning;CHEN Mian-shu;LIU Li-li
..............page:202-204,216
Research on model of industry system maintenance based on bayesian networks
XIAO Le;HE Xin;HAN Zhong
..............page:205-207,216
Design for detection to ship in inland based on Infrared image
ZHOU Hua;HUANG Xi-yue;LIU Jun;SHEN Zhi-xi;HE Nai-shuai
..............page:208-211
Objective evaluation system of garment seam based on supervised fuzzy clustering
PAN Yong-hui;BAO Fang;WANG Shi-tong
..............page:212-216
Application of RBF neural network based on mixture clustering in forecasting of athlete's sports state
ZHANG Le;WEI Zhen-gang;YAO Xiao-xiao;YANG Hong-yun
..............page:217-219
Design of cloud controller based on iterative learning and its application
HUI Li-chuan;LIN Hui
..............page:220-222
Research of metal fracture image classification based on GLCM
SU Jing;LI Ming
..............page:223-225,234
Defaults assessment of mortgage loan with RS and SVM
WANG Bo;LIU Yong-kui;HAO Yan-you
..............page:229-231,248
Application of covering algorithm to prediction of precipitation
ZHAO Yong;SHI Yao;YANG Xue-jie;ZHAO Shu;ZHANG Yan-ping
..............page:232-234
Symbiotic evolutionary algorithm for parallel job shop scheduling problem
SU Zhao-feng;QIU Hong-ze
..............page:235-238
Method research of infrared targets location
XI Run-ping;ZHANG Yan-ning;HU Fu-yuan
..............page:242-244
Research on multi-layered immune fault diagnosis model
TIAN Yu-ling
..............page:245-248
Improved heuristic crossover operator for TSP
ZHOU Cong;ZHENG Jin-hua
..............page:37-39,54
Equivalence between fuzzy recognizers and finite automata
TANG Heng-qi;DENG Pei-min;YI Zhong
..............page:33-36
Software project scheduling algorithm based on fuzzy theory
ZHANG Xiang;ZHOU Ming-quan;GENG Guo-hua;HE Xiao-yang
..............page:30-32
Multi-objective Genetic Algorithm based on preference
ZHU Bing-kun;XU Li-hong;CHEN Juan
..............page:24-26
Optimized local reputation system in mobile Ad hoc networks
TAN Chang-geng;CHEN Song-qiao;WANG Jian-xin
..............page:20-23