Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2010 Issue 31
Robust stabilization of singularly perturbed systems
LIU LI-li;WANG Kai-ming;PENG Ji-gen
..............page:246-248
Research on medical Image hybrid coding based on DPCM and EZW algorithm
ZHAI Guo;SONG Yu-qing;TAN Jia-ning;XU Qing
..............page:243-245
Automatic extraction and alignment of multiword expressions from English-Chinese comparable corpus
XIAO Jian;XU Jian;XU Xiao-lan;YUAN Qi
..............page:130-134,187
Reliable routing protocol for vehicular Ad hoc networks based on geographic location
HAO Kun;JIN Zhi-gang;YAN Ning-xiao
..............page:102-105
Modeling for hillside forest using remote scensing images
SHENG Qing-hong
..............page:172-174
Automatic test framework for embedded devices using Java ME test agent
ZHANG Xiao-guo;WANG Qing;GONG Fu-xiang;LI Chuan-jun
..............page:5-9,35
Road detection with re-classification on uncertain regions
DENG Qiang;GE Jun-feng;LUO Yu-pin
..............page:152-156
Multipath routing of ant colony system in Ad Hoc networks
WANG Zhen-chao;WANG Jing;WANG Yi-jin
..............page:91-94
Adaptive sliding-mode control for SISO nonlinear systems with input saturation
LI Yong-gang;LI Xing-ye
..............page:235-238
Improved CBV quantification in perfusion-weighted MRI
HU Xin-tao;LI Hui-hui;GUO Lei
..............page:25-27,31
Direct clustering method based on vague sets
YU Jian-kun;SHEN Xiao-hu
..............page:143-147
Trigonometric spline curves on five-points piecewise scheme
YAN Lan-lan;LIANG Jiong-feng
..............page:165-168
Cryptanalysis and improvement of threshold proxy signature scheme
SUN Mei;WEI Shi-min;ZHAO Bing
..............page:95-97,101
Design of even number rational symmetric compactly-supported biorthogonal wavelet filter
HAN Fang-fang;DUAN Fa-jie;ZHANG Bao-feng;DUAN Xiao-jie
..............page:10-13
Sample classification algorithm based on G-ICA
LIU Yun-ru;CAI Li-jun;YI Ye-qing
..............page:124-126,156
Application of ICA adaptive kernel estimation in multi-user detection
WAN Ming-gao;LI Xiao-hui
..............page:232-234
VHDL based design parameterization methodology
SUN Yan-teng;WU Yan-xia;GU Guo-chang
..............page:68-71
Improved forecasting model of software testing
XIE Min;REN Ping-an;MA Jian-feng
..............page:64-67
Adaptive high-resolution remote sensing image fusion algorithm based on HIS
WANG Wan-tong;LI Rui
..............page:22-24,56
Kazakh organization name recognition based on N-gram model
FENG Jing-hua;Guma·Altenbek;Mayra·Hapar
..............page:135-138
Application and improvement of local distinctive regions in retrieval of 3D model
LUO Dong;ZHOU Ming-quan;GENG Guo-hua
..............page:161-164,174
Com-WSN:A component-based testbed for wireless sensor network
WANG Jian-xin;ZHAO Peng-wei;WANG Wei-ping
..............page:111-114
Moving object detection and tracking in video surveillance
ZHENG Dan;XU Pei-xia;HE Jia
..............page:192-195
Applications of RS_SVM in equipment maintenance costs prediction
ZHOU Fu-jiang;TIAN Wei-feng;ZHU Xiao-dong
..............page:222-224
Interval valued fuzzy filters in fuzzy implication algebras
QIN Xue-cheng;LIU Chun-hui
..............page:39-42
2D vector graphics rendering algorithm with low hardware cost for supersampling antialiasing
SHEN Yong-luo;ZHANG Yuan;YANG Di-wei
..............page:19-21,42
Cluster analysis of software testing paths based on complex networks
ZHOU Kuan-jiu;FENG Jin-jin;LAN Wen-hui;CHI Zong-zheng
..............page:72-76
Digital watermarking of 3D model using normals of each patch
LIN Ke-zheng;BU Xue-na;TANG Yuan-xin
..............page:188-191
Max-sum decentralised coordination algorithm based on chaos
GENG Lei-lei;WEI Cheng-jian
..............page:57-60,120
Automatic string music vibrato detection based on vector quantization
SUN Rong-kun;HAN Ji-qing
..............page:199-201
Network attack planning model and its generating algorithm
GUO Chun-xia;LIU Zeng-liang;MIAO Qing
..............page:121-123
Method for solving minimum complete test set from first principles
LIU Jia;WANG Hong;YANG Shi-yuan;LV Zheng-liang
..............page:80-81,171
Web-based interactive visualization of PSE-Bio
MAO Guo-yong;ZHANG Xiao-bin;XIE Jiang
..............page:77-79
Common information guide heuristic clustering algorithm
JIN Ping;ZONG Yu;LI Ming-chu
..............page:50-53,71
Edge histogram-based image copy detection algorithm
LIU Wei;OUYANG Jian-quan;LI Ze-zhou;ZHANG Min
..............page:184-187
Mixed noise linear filter based on ROLD statistics
LUO Xiao-jun;WANG Shi-xiu;LI Bing;XU Jun-ling
..............page:175-177,191
Key theorem of learning theory on pan-space
GAO Lin-qing;LI Xin;BAI Yun-chao;HA Ming-hu
..............page:32-35
One new model of infinite valued for medium proposition logic and its meaning
ZHANG Sheng-li;PAN Zheng-hua
..............page:45-49,71
Implicative closure systems on complete residuated lattices
YU Hai;ZHAN Wan-rong
..............page:43-44
Distance and direction based routing scheme in wireless sensor net works
XIE Zhi-heng;ZHANG Xiang-li;HE Long;LI Yong
..............page:109-110,147
Analysis of destruction-resistant management policy in navigation constellation net work
LI Jian-jie;YI Xian-qing;TANG Shu
..............page:98-101
Composite method for image adaptive wiener faltering
ZHAO Shuang-ping;XING Jing-hong
..............page:169-171
Research and design of application of track moving objects system by intelligent robot
LIU Wei;WANG Jian-ping;ZHANG Chong-wei
..............page:239-242
Application of improved Ant Colony System for emotion recognition from Electrocardiogram signals
MA Chang-wei;LIU Guang-yuan;LU Shun
..............page:212-214,242
Propagation model of mobile phone virus on short-message network
JIN Song-lin;JIN Cong;HUANG Xiao-yan
..............page:118-120
Improved self-adaptive genetic algorithm based on elitist and immigration strategy
ZHANG Yi-chang;YANG Jia-ming;LU Yu-ming
..............page:36-38
Method of intersection-group dynamic division considering OD path in road network
HU Hua;GAO Yun-feng;YANG Xiao-guang
..............page:1-4,18
Two parameters extension of cubic Bezier curve and its applications
HANG Hou-jun;YU Jing;LI Wang-gen
..............page:178-180,205
Nonlinear model predictive control using dsDNA-MC optimization
WANG Jian-yu;CHEN Jun-wei;WANG Ning
..............page:225-227
An efficient and secure proxy signature scheme
LIN Qun;LI Jin
..............page:115-117,168
User oriented spatial topology association rules mining
FANG Gang;XIONG Jiang;YING Hong;TU Cheng-sheng
..............page:148-151,160
Soft body simulation based on pressure model
LI Jian;LI Peng-kun;DING Lu-lu
..............page:206-208,242
Deviation extraction of peak algorithm for QRS complex based on mathematical morphology
ZHENG Wei-qin;CHEN Hang;YE Shu-ming
..............page:127-129
Walsh spectrum distributing of a family of resilient Boolean functions
WANG Jia-yao;HU Bin
..............page:82-85
Modal truth degree of formulae in modal logic
LIU Hua-li
..............page:61-63,76
Parallel particles warm optimization algorithm based on Petri net model
ZHOU Hui;YUE Xiao-bo
..............page:54-56
Edge detection of image using empirical mode decomposition and morphology
CAI Jian-hua;HU Wei-wen;WANG Xian-chun
..............page:196-198