Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2011 Issue 18
Research on channel allocation in wireless mesh network
XIE Guifang;DUAN Sheng;LUO Yuling
..............page:85-87,90
Analysis and improvement of VoIP capacity in IEEE 802.11e WLAN
GE Lunyue;WU Qilin;TIAN Yiming;LU Yang
..............page:73-75
New similarity measures between vague sets (elements)
SHI Yuqiang;WANG Hongxu
..............page:48-49
Modification and application of SVM algorithm
PENG Guangjin;SI Haitao;YU Jihui;YANG Yunhua;LI Shimian;TAN Ke
..............page:218-221
Research on simulation of fuel inventory control strategy about air-force base
TIAN Feng;XING Qinghua;WANG Bin
..............page:231-233
Stochastic perturbation PSO algorithm for Toy model-based protein folding problem
ZHOU Hongbin;LV Qiang;WEN Wei
..............page:234-236,248
Virus spreading model based on adaptive complex network
ZHOU Haiping;CAI Shaohong
..............page:127-129
Orthogonal evolutionary algorithm and its application in relay volume optimization design
YAN Xuesong;ZENG Wencong;WANG Hanning;XIA Wen;LI Hui
..............page:215-217
Gradient features and region merging based vehicle license plate detection
PAN Wei;LIU Hongyu;AN Rong;YANG Nafei;HUANG Yijia
..............page:204-206,230
Novel coding scheme of protein secondary structure prediction
LI Wanggen;YE Xiaojiao;HUANG Yaoying
..............page:163-165
Novel dynamic and verifiable (t,n) threshold secret sharing scheme
LAI Hong;LI Zhihui;GUO Yujuan
..............page:106-108,159
One-time assignment algorithm to solve assignment problem
ZHOU Li;ZHANG Weihua;XU Shediao
..............page:135-138,152
Distributed anomaly detection based on ensemble learning
ZHOU Xuchuan;ZHONG Yong
..............page:9-12
T-S fuzzy control system for mobile manipulator
JIANG Wenping
..............page:222-225
Research on computer generated population in virtual global war space
YANG Zhimou;SI Guangya;LIU Desheng;SONG Yong
..............page:212-214,233
Method of retinal vessel segmentation based on Gabor wavelet
WANG Runmin;YAO Chang;LIU Jianxun
..............page:88-90
Near saturated scatternet formation method for Bluetooth wireless sensor networks
WU Chun;CHEN Xuedong;JIANG Hong;YIN Maowei
..............page:114-117
Medical image segmentation using Snake and multi-scale analysis algorithm
ZHANG Xiaojuan;LIU Ji;WANG Hao;LIU Lingling
..............page:207-209
Tracking algorithm for WSSUS fading channels
SHI Xiaolin
..............page:157-159
Practical and effective multi-channel assignment scheme for mesh network
YANG Wenzhong;ZHANG Zhenyu;WANG Bo
..............page:13-16,134
Two-dimensional DOA estimation of weak signals via block matrix
SU Chengxiao;LUO Jingqing;XIE Li
..............page:153-156
Parameterized generalization of quantum universal gates
WANG Xin;XI Zhengjun;LI Yongming;LI Xiaopeng
..............page:36-39
Using topic and sub-event discover to extract multi-document summarization
WANG Meng;LI Chungui;XU Chao;HE Tingting
..............page:130-134
Research on authentication model of resource discovery in military grid
LU Minglong;XU Kaiyong
..............page:103-105,156
Analysis on entity interaction vulnerability in large-scale distributed system
ZHAO Gang;ZHAO Jinjing;KUANG Xiaohui;ZHENG Weimin
..............page:98-102
Secret sharing among weighted participants in elliptic curve
LIU Ye;LI Zhihui;XUE Ting
..............page:112-113,156
Non-rigid cluster rewriting approach to solve systems of geometric constraints
SUN Lijuan;XING Liwei;ZHANG Hui
..............page:179-182
Novel hybrid shuffled frog leaping and differential evolution algorithm
HE Bing;CHE Linxian;LIU Chusheng
..............page:4-8
Research of chord recognition based on MPCP and CRFs
WANG Feng;ZHANG Xueying;LI Bingnan
..............page:198-200
Cryptanalysis of strong designated verifier signature scheme
DU Hongzhen
..............page:96-97,129
Theory of Γ-deduction truth degree in L* logic system
GUAN Xiaohong;ZHANG Haixia
..............page:62-63,72
Robocup vanguard\'s goal-scoring ability based on Q-learning
SHEN Xun;LIU Guodong
..............page:53-55
Multiple carrier frequency offset compensation in space-frequency code cooperative communications system
ZHU Binglian;ZHANG Song;LIU Haifeng;YANG Xiaofang
..............page:149-152
Research and development of mine ventilation automatic control system
MA Heng;ZHAO Dan;LIU Jian
..............page:241-244
Surface fairing based on energy optimization and nonuniform B-spline wavelets
WU Fuming;PAN Rijing
..............page:176-178,185
Simplified particle swarm optimization algorithm with adaptive extended operator
ZHAO Zhigang;ZHANG Zhenwen;ZHANG Fugang
..............page:45-47
Modified self-organizing migrating algorithm with linear-digress step
WENG Chunyi;LI Yuanxiang;WANG Lingling;LIN Zhiyi
..............page:26-28,111
Energy aware QoS routing mechanism for wireless multimedia sensor networks
LI Xue;HE Yuyao;WU Qisheng
..............page:76-79
Factors selection for prediction of carbon flux based on Genetic Algorithm-Neural Network
XUE Yueju;LIU Shuguang;HU Yueming;LIU Guoying;CHEN Qiang
..............page:237-240
Research on software reliability and fault diagnosis of AUV
ZHANG Rubo;SHI Changting;YANG Ting
..............page:226-230
Rectangle pattern extracting combined with Canny and distance transform
LI Huiping;LI Ying;ZHANG Xiuwei
..............page:166-169,182
Fuzzy filters and fuzzy ideals in poseudo-effect algebras
LIU Dongli
..............page:50-52
Chaotic particle swarm optimization of JSP based on Petri nets
AN Fengmei;YUE Xiaobo;ZHOU Kaiqing
..............page:29-31,44
P-sets and(F)-information camouflage-identification
LIU Baocang;LIU Ruohui;SHI Kaiquan
..............page:32-35
Face recognition based on local binary pattern feature
YAN Weihong;ZHAO Haifeng;LUO Bin
..............page:170-172
Research on text commendatory-derogatory orientation discrimination
LI Yinhua;WANG Suge
..............page:160-162,230
URL-filtering method for mobile terminals
LIU Xia;LIU Ping;LIU Yanbing;TAN Jianlong
..............page:68-72
Fast median filter algorithm based on multi-scale search table
ZIANG Xiaofeng;LIU Yu
..............page:210-211,221
Research on best location query algorithm in spatial database
XU Hongbo;HAN Qilong;PAN Haiwei
..............page:19-21
Research of top-down mining algorithm based on orientation subset
FANG Gang;TU Chengsheng;XIONG Jiang
..............page:142-145
Improved algorithm for DOA estimation of narrowband cyclostationary signals
LIU Chengcheng;ZHAO Yongjun;LI Donghai
..............page:139-141,225
Standardized design of security protocols
DENG Fan;DENG Shaofeng;ZHANG Wenzheng
..............page:122-126
Face recognition based on PCA
JIAO Binliang;CHEN Shuang
..............page:201-203
Adaptive subdivision research for triangular mesh
PAN Jiongbo
..............page:186-187,244
Filtering algorithm for salt and pepper nosie based on modified simplified PCNN model
JIANG Jiafu;SHEN Jing;ZHU Dezheng
..............page:191-194
Energy efficiency optimization for heterogeneous sensor network
TANG Wensheng;WANG Shengchun;XIAO Helong
..............page:91-95
Study of spectrum handover based on grading in cognitive radio systems
QIN Huazhong;XIAN Yongju;XU Changbiao
..............page:118-121
Research on equivalent network merging method for LAD conversion to STL
LIAO Yikui;LI Zhi;LI Weiming;WEI Weixing;CHEN Jun
..............page:64-67
Target detection using kernel density estimation and Gaussian model cascade mechanism
RUI Ting;ZHOU You;MA Guangyan;LIAO Ming
..............page:1-3
Oil spills identification in SAR image using Mahalanobis distance
ZHOU Hui;CHEN Peng
..............page:195-197,203
Verified code recognition algorithm based on SVM
YIN Guang;TAO Liang
..............page:188-190,194