Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 25
Ranking technology based on content and relation of Web page
li hui ; li cun hua ; wang xia
..............page:121-123,145
Page recommendation method for access sequential patterns
wang hai bo ; li peng xuan ; xu yi qiu
..............page:127-130
Improvement of Apriori algorithm based on Vague sets
shen xiao hu ; yu jian kun
..............page:131-133,141
Applications of machine learning methods in problem of precise train stopping
zhou zuo ; chen de wang
..............page:226-230
Algorithm for finding all minimum circles from single line drawings
zhao jun ; gao man tun ; wang san min
..............page:5-7,27
Traffic state information extraction methods for traffic guidance
zuo xiao feng ; huang yong zhong ; he zeng hui ; han chun hua
..............page:16-18,30
Discussion on Mantissa-multi-phase particle swarm optimization applied to large integer factorization problem
zhang shu mei ; song wei tang ; song wan li
..............page:105-108
Soft sensing modeling based on combined Boosting algorithm
hu yun ping ; zhao ying kai ; li li juan
..............page:235-237,241
Improved DTW algorithm on isolated-word speech recognition
ji qing bo ; lu zuo ; li kang
..............page:118-120
DNA sequence classification based on ant colony optimization clustering algorithm
liang bing ; chen de yun
..............page:124-126,130
Measurement and application of image\'s texture standard property
pan zuo zuo ; peng guo hua ; ye zheng zuo ; yan wei dong ; zheng hong zuo
..............page:23-27
Real time UAV path planning using modified probabilistic roadmap
wang zhen hua ; zhang wei guo
..............page:220-222
Multi-variable decision tree construction and research
chen guang hua ; wang zheng qun ; liu feng ; yu zhen zhou
..............page:217-219,230
Research on technology of image restoration
li dan ; qian jian sheng ; wang chao
..............page:174-177
Chaotic mutation differential evolution algorithm combined with niche
deng ze xi ; liu xiao ji
..............page:31-33
Improved 2DPCA method for face recognition
han xiao cui
..............page:185-187
3D underwater terrain simulation using fractional Brownian motion
wu wen ; zhou yun xuan ; li xing ; huang ying ; kuang run yuan
..............page:242-245
Application of projection pursuit evaluation in properties of high strength concrete after exposed to fire
fang chong ; yang lv feng ; liang han ji
..............page:199-202,230
Model of government ontology learning based on rough set and fuzzy clustering
zhang bin ; liu zeng liang ; yu da tai ; huang hong
..............page:19-22
Multi-dimensional data model design about dam safety monitoring system
zhao er feng ; jin zuo ; yang yang ; li jian jun
..............page:231-234,241
Flow performance analysis of LAN based on cross entropy
zhu zhi qiang ; xu guang yin ; wang xia
..............page:89-90,120
Team progress algorithm used in recognition of quick response code
bao zuo ; gao mei feng
..............page:171-173,187
Dynamic graph hybrid encoding scheme based on PPCT and radix-k
wang hui jiao ; sha zong lu ; xuan ai cheng
..............page:109-111
Forward secure threshold multi-proxy multi-signature scheme
wang jian dong ; zou hui
..............page:102-104,156
Improved hierarchical routing protocol based on clustering in wireless sensor networks
wang jia ying ; ma hong lian ; ding nan
..............page:91-93
Research on queuing network for pipeline modeling of SPARC simulator
zhou kuan jiu ; liu xiao yan ; qiu tie
..............page:68-71
Image de-noising model of combining Curvelet and LLT model
wang ling hua ; yang jia hong
..............page:168-170,177
Digital camera calibration based on non-linear optimal model
liu li hua
..............page:181-184
Spine OTSU segmentation algorithm based on Ncut method
huang ying ; xu ke
..............page:188-190
Variational noise removal method based on second-order and fourth-order PDEs
zhang jiu xing ; hei bao qin ; li sheng yang
..............page:153-156
Initialization independent spectral clustering algorithm
shi pei zuo ; guo yu tang ; hu yu juan ; yu jun
..............page:134-137
Improved algorithm based on OSH collision detection
hui wei hua ; he bin ; zhang quan hu ; pang zhen ; zuo guang xia
..............page:138-141
Semigroup of lattice-valued finite states automata
lei hong xuan
..............page:49-50
Luminance-chroma nonlinear recomposing of color image
li guan zhang ; lu qin ; luo wu sheng ; li pei
..............page:178-180,190
Detection to singularity spot of cancer gene expression signals based on wavelet analysis
chen jun ; wu ya zhou ; yi dong
..............page:211-213,222
Design of virtual disk service software framework
liu xiao jian ; ren zuo ; dai hua dong
..............page:28-30
Numerical schemes of MCM equation for removing impulse noise
du hong wei ; zhang yi
..............page:164-167,198
Research on non-line-of-sight nodes localization scheme for wireless sensor networks
he yuan hua ; li hong sheng
..............page:82-84,117
Implementation of ACIS based CAD/CAE data exchange interfaces
duan li ; zheng jian jing ; sun li sheng ; chen jian jun
..............page:72-74
Image denoising method with improved NeighLevel
shang zhao wei ; di zhen xing ; pang qing ; zhao zheng hui ; li jian ; yang jian wei
..............page:157-159,184
Format and test of Ontology based on quotient space model
wang xiao dong ; sun bin
..............page:44-46
Study on adaptive fuzzy support vector machine algorithm
chen jia de ; wu xiao jun
..............page:191-194,198
Model-free calibration method for omni-directional vision system
yang shao wu ; lu hui min ; zhang hui ; zheng zhi qiang
..............page:203-206
Scheduling algorithm supporting quality of service in IEEE 802.16 networks
gao sheng guo ; wang han xing
..............page:75-77
Application of multiple speech features to language identification
zeng xiu hua ; yang jian ; xu yong hua
..............page:146-148,152
Application of Bayes learning algorithm to classify network traffic
qiu mi ; yang ai min ; liu yong ding ; he zhen kai
..............page:78-81,96
Parallel adaptive dynamic clone selection algorithm
cheng xin wen
..............page:37-39,63
ID-based proxy signature scheme from bilinear pairings
li pei ; han song ; wang tian qin
..............page:97-101
Two-way coupled map lattice on image encryption method
a bu du re he man ka de er ; wang xing yuan ; zhao yu zhang
..............page:8-11,22
Method of compression of SOC test data based on alternative run-length encoding
xu chuan pei ; dong xiang jian
..............page:57-60
Proxy blind signature scheme based on DLP
liu ju xia ; su jing feng
..............page:94-96
Natural image matting based on RWR
zeng xiao ping ; li jin zhi ; liu guo jin
..............page:160-163
Design of weight failure detector in storage system
yang guang ; zhou jing li
..............page:12-15
Design and implementation of Turbo decoder based on frame splitting and trellis zero termination
su dong ; chen qing chun ; sun zuo
..............page:64-67,71
Anonymous proxy signature scheme based on NTRUSign signature
wang xiang ; bao wan su ; chen kai
..............page:112-114
Improved panoramic image mosaic algorithm
peng hong xing ; song hong zuo ; zou xiang jun ; xu dong feng
..............page:195-198
Research on representative algorithms of swarm intelligence
yu jian ping ; zhou xin min ; chen ming
..............page:1-4,74
Shared verification proxy signature scheme with message recovery
ma wei fang ; zhang jian zhong
..............page:115-117
Improved rough clustering method based on genetic algorithm
hong liang liang ; luo ke
..............page:142-145
Effective algorithm In parameters optimization of fuzzy Petri nets
luo xu ; le xiao bo ; zhou li juan
..............page:40-43