Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2009 Issue 16
Research on architecture analysis and design language
WANG Han-bo;ZHOU Xing-she;DONG Yun-wei;TANG Lei
..............page:1-4
Research on lifecycle of service composition
DU Zong-xia
..............page:5-8
Novel MAC protocol for Ad hoc with topology control
LIN Hui-min;CHEN Wen-bin;LI Xiao-hong;ZHANG Da-fang
..............page:123-125
Novel secret communication model using information hiding
HAN Li-li
..............page:114-116
AES implementation based on instruction extension and randomized scheduling
SUN Ying-hong;TONG Yuan-man;WANG Zhi-ying
..............page:106-110
Approach to calculate parameter ranges of semantic feature modelling
SUN Li-quan;XIE Li-qiang;LIU Rui-long
..............page:83-86
Improved LFSR cryptographic algorithm and FPGA implementation
LIANG Wei;XU Jian-bo;TANG Ming-dong;LIU Hui-ya
..............page:80-82,179
Research of file-backed Xen storage virtualization
TANG Quan;LI Xiao-yong
..............page:77-79
Phylogenetic tree constructing algorithm based on genetic algorithm
GUO Jing;WANG Chao;CHEN Ling
..............page:72-76
Stochastic crossover Particle Swarm Optimization
WANG Lian-guo;HONG Yi
..............page:69-71
Lower approximation reduction in inconsistent information systems based on dominance relations
XU Wei-hua;ZHANG Xiao-yan;ZHANG Wen-xiu
..............page:66-68,76
Automization of multi-scheme comparing batch simulations in GloMoSim
GAO Zhen-guo;LI Xiang;MA Qian-li;LIU Sheng
..............page:36-39
Application of parametric embedding algorithm to text classifier visualization
ZHANG Ying;WANG Yao-nan;WAN Qin
..............page:31-35
New construction approach of decision tree
GAO Jing;SONG Wei;YANG Bing-ru;XU Zhang-yan
..............page:28-30
Survey for COA ontological technologies in military planning ystem
QIAN Meng;LIU Zhong;YAO Li;ZHANG Wei-ming
..............page:18-23,35
Research of fault-service-effects model for network management
JI Zhi-hui;NI Hong
..............page:13-17
Implementation of accelerating linear Twig queries in DM XML
XU Xiao-shuang;FENG Yu-cai;ZHOU Ying-biao
..............page:9-12,17
Improvement of multiple source network tomography identifiability
FEI Gao-lei;HU Guang-min
..............page:126-129,168
Variational level set method based on geodesic active contour
ZHANG Ling-yan;YAN Li;CHEN Ying;ZHANG Huan
..............page:188-189,231
New lifting wavelet method and application in image fusion
HE Wei;LIU Bin
..............page:190-192
Face liveness verification using estimation of face pose variation
REN Yong;ZHANG Nan;MOU Xuan-qin
..............page:193-196
Access-driven Cache attack method against AES on the first two rounds
ZHAO Xin-jie;MI Dong;WANG Tao;ZHENG Yuan-yuan;CHEN Cai-sen;ZHENG Wei
..............page:130-133,210
Method for evaluating usability of large-scale corpus
LI Yan-hong;ZHENG Jia-heng
..............page:134-137
Application of rough set and decision tree in e-mail classification and filtering
DENG Chun-yan;TAO Duo-xiu;LV Yue-jin
..............page:138-140,184
Application of gray association degree clustering algorithm in image retrieval
CHEN Xiang-tao;WANG Ai-yun;XIE Wei-ping
..............page:146-148
Improved hyper-sphere Support Vector Machine
LIU Shuang;CHEN Peng
..............page:149-151
Mining meta-association rules for association rule based on Markov model
LIU Jun;YAN Shi-qi;LI Lu-jun
..............page:152-154
Multiagent Q-learning based on ant colony algorithm and roulette algorithm
MENG Xiang-ping;WANG Sheng-bin;WANG Xin-xin
..............page:60-62
PageRank algorithm optimization and improvement
WU Jia-qi;TAN Yong-ji
..............page:56-59
Sustaining degree and Triple Ⅰ sustaining method based on family G-λ-0 of implication operators
ZHANG An-ying;ZHANG Xing-fang;LI Cheng-yun
..............page:53-55
Prediction of protein interaction sites using multi-feature amalgamation
CHENG Jia-xing;DU Xin-quan;WANG Chi-she
..............page:50-52,59
New NSGA-Ⅱ on Multi-Objective Minimum Spanning Tree problem
YU Rong-zu;WANG Wei-liang;CHEN Bing
..............page:48-49,65
Logic meaning of kinship relations and kindred automatic reasoning
CHEN Zhen-yu;YUAN Yu-lin;ZHANG Xiu-song;ZHOU Qiang
..............page:43-47
Identifying cross-clause arguments based on statistics and rules
CHEN Li-jiang;CHEN Xiao-he
..............page:40-42
Image retrieval algorithm based on support vector machine and rough set theory
ZHANG Wen-jiao;YAN De-qin;SANG Yu
..............page:176-179
Improved imagesegmentation method based on immune genetic algorithm and rough set
ZHANG Yi-dong;WU Xi-sheng
..............page:180-181,218
Adaptive Gaussian smoothing filter for image denoising
XIE Qin-lan
..............page:182-184
Medical image segmentation based on biomimetic pattern recognition
WU Hai-zhen;HE Wei;JIANG Jia-fu;QI Qi
..............page:185-187,192
Image feature extraction based on BEMD and gray level co-occurrence matrix
LONG Peng-fei;HE Liang;LV Hui;ZHANG Chun
..............page:201-203,214
Cooperative petition processing system based on extensible workflow model
HAN Jian-hua;LI Li;YANG An-chen;ZHAO Rui
..............page:219-221,224
Anti-collision algorithm based on neural network graph coloring
BAI Yu;ZHANG Li-yi;TENG Jian-fu
..............page:222-224
Research on application of word correlation in Naive Bayes text classification
ZHANG Shun-zhong;WANG Shu-mei;HUANG He-yan;CHEN Zhao-xiong
..............page:159-161
Temporal XML index method
DENG Li;WANG Xin-jun;GU Meng-meng
..............page:162-164
Evolutionary game analysis of information-sharing mechanism in network organization
WU Hui-xin;DONG Hai-xiang;ZHANG Qiang
..............page:232-234
Evaluation of building indoor air quality based on RS-LS-SVM
YU Jun-qi;WANG Jia
..............page:235-237,241
Application of Agent technology in traffic management and travel services
ZHANG Jian-qin;LU Feng;WANG Gang;DU Yong
..............page:238-241
Research on detecting abnormality in smart monitoring system for empty nest elder
YANG Lei;YANG Lu-ming;MAN Jun-feng;LIU Guang-bin
..............page:242-245
Multi-layered Bayesian network model for information retrieval
BAI Yan-xia;YUN Cai-xia;LI Shan;ZHANG Qiu-ju;YANG Peng
..............page:165-168
Simulation system of jaw motion based on mixed reality interface
JI Lian-en;LU You;ZHANG Feng-jun
..............page:169-171,200
Hybrid reconstruction method from uncalibrated image sequences
LIU Shuai;ZHAO Ling-li;MA Li
..............page:172-175
Improved complete fragile authentication watermarking of chaotic theory
HUANG Liang-yong
..............page:103-105,110
Proactive secure multi-secret sharing scheme with double renewing
ZOU Hui;WANG Jian-dong;LU Feng-jia
..............page:101-102,151
Traitor tracing scheme against anonymous
ZHAO Lin-sen
..............page:99-100,207
Artificial neural network based semi-fragile zero-watermark scheme
SANG Jun;ZHANG Zhi-gang;XIANG Hong
..............page:93-95,164
New method of reducing real-time kernel latency for real-time task
ZHENG Xiao-xi;ZHANG Hu;BAO Song-tang
..............page:90-92,196
Optimal design for two-degree-of-freedom PID regulator based on Particle Swarm Optimization algorithm
WANG Hai-wen;ZHANG Jing-gang;QU Jun-hai
..............page:87-89,196