Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2011 Issue 20
Structured information hiding algorithm
TANG Mingwei;FAN Mingyu;ZHENG Xiulin
..............page:1-3
Chaining variable rotative Hash function construction
REN Jiaoxia;WANG Shangping;ZHANG Yaling;HAN Zhaoguo
..............page:53-55,61
Polynomial group key management for ad hoc networks
TU Shanshan;MA Chunbo;AO Fallang
..............page:77-80
Anomaly domain name detection method based on characteristics of name and resolution behavior
ZHOU Yonglin;YOU Linlin;ZHANG Yongzheng
..............page:50-52
Anti-assault and dynamic multi-secrets sharing scheme
LAI Hong;LI Zhihui;GUO Yujuan
..............page:68-70,76
Pw/GAKE:highly-efficient password-based authenticated group-key exchange protocol
TIAN Yuan;ZHANG Zhen;LI Jianbin
..............page:71-76
Protein secondary structure prediction based on radial basis neural network
WANG Feilu;SONG Yang
..............page:17-19,23
Threat evaluation model for large-scale network
CAI Jun;XU Xishan;YE Yun;CHENG Wencong
..............page:105-108
Storage and indexing of moving objects XML database
ZHENG Jiabin;JIANG Xiajun
..............page:138-143
Prognostics for aeronautic equipments based on Immune neural network
HU Leigang;XIAO Mingqing;XIE Lan
..............page:231-233,237
Image registration used in Chinese patch images processing
MA Lingfei;MENG Zhaopeng
..............page:155-158
Parallel computing method for groundwater flow simulation in porous media
CHENG Tangpei;WANG Qun;JI Xiaohui;HUANG Linxian;XU Teng
..............page:234-237
Research on evolution model of granular decision based on multiple time granularity
HU Yuwen;XU Jiucheng;ZHANG Qianqian
..............page:117-120
Nominal predicate identification for dependency-based Chinese semantic role labeling
WANG Hongling;YUAN Xiaohong;WANG Bukang;ZHOU Guodong
..............page:113-116
Judgement approach of best recovery strategy for mission-critical network system
LIANG Cunliang;YE Haizhi
..............page:96-98,120
AZM-LEACH: autonomous zone-based multi-hop routing protocol in WSNs
GU Yueyue;BAI Guangwei;TAO Jinjing
..............page:58-61
Improved scatter search algorithm for capacitated P-median problem
XU Xianrui;LI Xiang;LI Xiaojie
..............page:28-30,104
New method of similarity measures based on upholding coefficient between Vague(values) sets
PENG Fangming;XING Qinghua;WANG Santao
..............page:31-33,46
Study on ultra-wideband ground echo simulation
WANG Quanmin;GUO Gang;FU Hui;HUANG Kedi
..............page:129-131,158
Space small targets detection using moment invariants removing stars
ZHANG Yuye;WANG Chunxin;L1 Kaiduan
..............page:184-187
Communication signal detection based on data stream trend analysis algorithm
CHEN Ronghui;WANG Lunwen
..............page:132-134,143
Upgrade factorization of integers and impact on RSA cryptosystem
YAO Jinjiang;WU Chuankun
..............page:91-95
Learning ontology of maize pests and diseases from Chinese text
QI Hong;GUAN Yingying;LIU Yabo
..............page:206-209
Network traffic prediction based on wavelet analysis and AR-LSSVM
FENG Huali;LIU Yuan
..............page:88-90,162
Research on methodology of target-grouping in force aggregation
LONG Zhenzhen;ZHANG Ce
..............page:225-230
Real-time voice activity robust detection
WANG Jingfang
..............page:147-150,170
Camera calibration method based on modified by Moore-Penrose inversion
MAO Liang;XUE Yueju;ZOU Xiangjun;LIU Guoying;LU Qifu
..............page:194-196,248
Image interpolation via quadtree decomposition
DING Ximing;DUAN Hangen;FAN Yizheng
..............page:191-193
Moving objects detection based on Bayesian decision theory
WANG Xiaopeng;JIN Weidong;ZHAO Guohui;DONG Lifang
..............page:197-200,240
tou gao xu zhi
..............page:封2
Semi-supervised dimensionality reduction based on sparsity representation
ZHANG Chuntao;GUO Jiao;Xu Jialiang
..............page:181-183,187
Spatial structure recognition of protein based on gray texture analysis
SHI Jianyu;LEI Zhaoxia;FANG Zhiyu
..............page:151-154
Fuzzy identity based signature scheme without random oracle model
GAO Jianping;PENG Changgen;SHI Weimin;HONG Liu
..............page:65-67,80
Study on solar energy wafer counting based on morphology processing
FANG Chao;TAN Wei;DU Jianhong
..............page:178-180,217
Location and tracking algorithm based on BP neural network
MAO Yongyi;ZHOU Kanglei
..............page:238-240
Hybrid image encryption method based on hologram
ZHANG Yudong;WU Lenan;WANG Shuihua
..............page:201-205
Identification of PQD based on wavelet energy difference distribution and SVM
CHEN Zhenping;OUYANG Mingsan;LIU Huaixia
..............page:241-244
Segmentation method for proximal femur in CT Images of hip joint
LUO Sanding;QIN Ling
..............page:171-174
Simulation researches on tying up suture knots in virtual surgery
LIAO Zhifang;TU Shuai;YU Song;FAN Xiaoping
..............page:218-220,230
Efficient short texts keyword extraction method analysis
CHANG Peng;MA Hui
..............page:126-128,154
Hardware implementation of genetic algorithm based on FPGA
ZHOU Yancong;GU Junhua;DONG Yongfeng;LIU Enhai
..............page:9-13,16
Parallel cluster algorithm based on fuzzy systemic particle swarm optimization
WANG Ze;CAI Huanfu;GAO Ping\'an
..............page:41-43
Multi-stage secret sharing scheme among multiple organizations based on ECC
QIAO Xiaolin;ZHANG Jianzhong
..............page:56-57,193
Study of digital predistortion for Doherty power amplifier
ZHENG Xiaolin;YUAN Ling;HAO Luguo
..............page:144-146,209
Semi-decentralization based access control mechanism for social networks
CHEN Qingyu;LIU Jianwei;LIU Jing
..............page:85-87,95
Adaptive tracking rely on multi-feature
LV Bin;XIA Limin
..............page:167-170
Development and analysis of design cognition process
LI Faquan;XIONG Deguo;TANG Xinkui;XIONG Shiquan
..............page:24-27,37
Survey on algorithm of mining frequent itemsets from uncertain data
WANG Jinmiao;ZHANG Longbo;DENG Qizhi;WANG Fengying;WANG Yong
..............page:121-125
Algorithm on construct/on of ALM\'s tree based on balanced tree
YIN Ansheng
..............page:99-101,125
Research on visualization emergency scheme based on GIS system
TONG Qing;ZHANG Jingyi;CHEN Cheng
..............page:4-8
New method of road segmentation from high-resolution RS imagery
ZHOU Shaoguang;LIU Juanjuan;LI Hao;CHEN Renxi
..............page:159-162
P-integrals and its dynamic characteristics
YU Xiuqing
..............page:44-46
New nonlinear filtering algorithm for ballistic target tracking
WU Chunling;HAN Chongzhao
..............page:20-23
Efficient prediction method for all-zero blocks in H.264
XIANG Xiaoxuan;WANG Yan;XIANG Yangxia;CHEN Dazhi
..............page:175-177,224
QPSO-MGbest algorithm for parameter estimation in biochemical pathways
YU Yonghong;FENG Bin;SUN Jun
..............page:214-217
Study on key algorithm in large optical components topography measurementsystem
ZHANG Junnan;FAN Yong;CHEN Niannian;WANG Junbo;YUAN Xiaodong;CHENG Xiaofeng;XU Xu;LIU Nan
..............page:163-166
Improve of rough set model in incomplete information system
TAO Zhi;WANG Guibin
..............page:135-137,174
Ant colony optimization-based QoS routing in wireless sensor networks
LIU Guangcong;WU Huanhuan;ZHENG Huijun
..............page:102-104
Improved quantum particle swarm optimization algorithm and its application
XU Shaohua;WANG Hao;WANG Ying;LI Panchi
..............page:34-37
Efficient certificateless signcryption scheme
WANG Xing;QIAN Haifeng
..............page:62-64
Design of CAN bus application layer protocol for beam control system
WANG Bangji;LIU Qingxiang;LI Xiangqiang;ZHANG Jianqiong
..............page:14-16
Car plate detection based on new features
JIANG Linsheng;ZHU Xuefang
..............page:188-190