Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering and Applications
1002-8331
2011 Issue 28
Fuzzy logic for mining of temporal sequence evolution patterns
WANG Bingxue
..............page:128-130,231
Quick search algorithm for all Hamiltonian cycles based on k-combination
PAN Hexin;YI Chongxin;LI Man
..............page:45-47
T-fuzzy filters and T-fuzzy congruences of residuated lattices
LIU Yi;QIN Xiaoyan;XU Yang
..............page:24-27
New algorithm of AdaBoost for unbalanced datasets
WANG Canwei;YU Zhilou;ZHANG Huaxiang
..............page:169-172,175
Identified network coding signature scheme
YU Zhixuan;WANG Caifen;LUO Hai;FENG Fan
..............page:73-76
Study on problem of location and its ambulance distribution for first-aid center
LUO Fenglian;GUO Qiang
..............page:241-244,248
Text mining with application to Internet gambling case analysis
SHI Cunhui;LUO Wenhua;LIN Hongfei
..............page:113-116,248
.Breaking visual CAPTCHA of merged characters
WANG Lu;ZHANG Rong;YIN Dong;ZHAN Jinchun;WU Chenyang
..............page:150-153
Study on real-time medical image registration based on mutual information
DU Junli;GUO Qingyu
..............page:162-165
Color image iterative filtering algorithm
LI Yueyang;SUN Jun
..............page:12-16,51
Generative local metric learning in k nearest neighbors
ZHAO Chuangang
..............page:173-175
New method for region growing segmentation of plant root CT image sequences
CHEN Yugan;ZHOU Xuecheng;LE Kai
..............page:158-161
Using shuffled frog leaping algorithm to optimize the parameters of radial basis function neural network
XUE Shengxiang;JIA Zhenhong;YANG Jie;PANG Shaoning
..............page:59-61
Safe and effective proxy verifiably encrypted signature scheme.
LIU Shudong;LIANG Xiangqian;XU Jinfang
..............page:77-79,127
Characteristics acquisition of prescription samples of Chinese medicine and experiments on knowledge mining
GAO Quanquan;ZHANG Fan;LIU Xiaofeng;SUN Yan;REN Tingge;CHEN Yongyi
..............page:212-214
Fractional Brownian channel model considering statistical characters in OFDM
CAO Dun;HU Shuanghong
..............page:103-105
Model for predicting coal and gas outburst based on PCA and BP neural network
XU Xinzheng;DING Shifei;YANG Shengqiang;ZHAO Zuopeng;WU Xiang
..............page:219-222
Real time triangulation algorithm of large DEM based on ROAM
LIAO Ming;LV Guonian;ZHOU Liangchen;JIANG Xinsheng;FANG Husheng;CAO Yan
..............page:201-205,211
Improvement of electronic image stabilization algorithm based on bit-plane matching
SONG Wanli;ZHANG Zhuan;LIAN Mingchao
..............page:179-181
Studv on decision support model of railway container transfer
LIANG Jian;CHENG Wenming;AN Junying
..............page:245-248
Locality preserving projections based on adaptive nearest neighbor
YU Jun;LI Zhiyong;MENG Jintao
..............page:209-211
Entropy of intuitionistic fuzzy sets and its general forms
LV Yinchao;GUO Sizong
..............page:52-55
Dynamic evolution method for SMP2 simulation system under service oriented architecture
WANG Chao;YANG Feng;LI Qun;WANG Weiping
..............page:28-32
Feature selection combined category concentration with minimal set coyering
ZHANG Wenpeng;LI Hongchan;WANG Xing
..............page:124-127
MU Lingling.Rules of modality\'s usages for multi-corpus
ZHOU Yihui;ZAN Hongying;MU Lingling
..............page:135-138,142
Study on variable weight combined forecasting method of wear trend for aeroengine
JIANG Liying;WANG Lei;XI Jianhui
..............page:228-231
Adaptive regularized MAP of CT image reconstruction method
HE Lingjun;PAN Jinxiao;KONG Huihua
..............page:198-200
Research on evolutionary algorithm with noisy fitness based on Fourier space transform
NIE Jian;ZHENG Jinhua;XIE Zhunzhi;ZOU Juan
..............page:33-37
Dv-hop localization algorithm with average jump distance of multi-dimensional
HU Fengsong;MENG Xiangqin
..............page:42-44,68
Robust action classification approach
LIU Changhong;YANG Yang;CHEN Yong
..............page:182-184
Path planning of robot based on second division and improved genetic algorithm
CUI Jing;ZHU Qingbao;WANG Juan
..............page:232-236
SVM selection ensemble algorithm based on improved binary particle swarm optimization
MENG Changliang;LI Weizhong;LIAO Yong;HUA Jixue
..............page:166-168,231
Robust zero watermarking scheme for 3D point model
WANG Xinyu;ZHAN Yongzhao
..............page:7-11
Concept-features-based semantic text classification
LIN Wei;MENG Fanrong;WANG Zhixiao
..............page:139-142
Network intrusion detection method based on QPSO optimization projection pursuit algorithm
ZHU Lihua;LIU Yi\' an;WEI Min
..............page:80-82,134
Estimation algorithm for uncertain data in wireless senor networks
HE Lijuan;ZHOU Mingzheng;TAO Wan;JIANG Zibing
..............page:100-102,161
Improved DRR model and simulation in WSN
BAI Dongliang;WANG Xiaoming;WANG Dong;WU Sanbin
..............page:69-72,165
Improved KNN algorithm in classification of imbalanced data sets
SUN Xiaoyan;ZHANG Huaxiang;JI Hua
..............page:143-145,236
EMOP2PVC:evolution model oriented to P2P virtual community
WANG Yang;ZHU Xianyuan;YAN Yuanting;NAN Min;ZHAO Pengcheng;XU Yong
..............page:93-96
Analysis of conditional independence and applications based on Layer sorting in BNs
XIN Guofu;YANG Youlong;SHI Yiqing
..............page:56-58
Forming curves algorithm from many small strokes
XIE Hong;LIU Yuan
..............page:191-194,227
Studv on emergencv resources location and allocation assessment and adjustment
WEI Guoqiang;YANG Yongqing
..............page:215-218
Overview of termination verification methods for imperative programs
LI Reniian;WANG Zhaofei
..............page:1-6,105
Revised AODV routing protocol
LI Dongxia;FU Xinan
..............page:83-85
Hierarchical spatial clustering of buildings
DENG Min;SUN Qianhu;WEN Xiaoyue;XU Feng
..............page:120-123,208
Landsat ETM+ image land cover classification based on NSCT and LSSVM
SHI Hailiang;WANG Yuanzheng;XU Yajing;XIN Xiangjun
..............page:188-190,222
OMB biclustering algorithm for cancer gene expression data
WANG Changwu;LIU Nannan;JIA Yongwei;WANG Baowen;LIU Wenyuan
..............page:237-240
Parallel reduction on NTRU lattice.Computer Engineering and Applications
WU Liqiang;YANG Xiaoyuan;HAO Bin;LIU Zhen
..............page:62-64,88
Method of network traffic classification using improved LM algorithm
HU Ting;WANG Yong;TAO Xiaoling
..............page:65-68
Research on k-anonymity algorithm for privacy preservation
WANG Pingshui;MA Qinjuan
..............page:117-119,200
Ontology similarity computation based on spectral graph theory
LAN Meihui;XU Jian;SUN Yu
..............page:110-112,157
Research on solution of BGP routing conflicts
ZHANG Jianwei;WANG Lu;LIU Si
..............page:89-92
Microburst region feature extraction and recognition algorithm
ZHANG Gang;PAN Yunhong;LIU Chang
..............page:185-187,240
Combining wavelet transform and total variation for image denoising
ZHAO Donghong;ZHAO Xiangkui;WANG Laisheng
..............page:21-23
Particle filter target tracking algorithm combining artificial immune
CAO Weijie;TONG Mu;TANG Minghao
..............page:195-197,222
Study on method of obiect tracking based Markov random field
CHU Ying;FU Yang
..............page:176-178,227
Automatic acquisition and recognition of two word-collocation in treebank
XU Runhua;FENG Minxuan;CHEN Xiaohe
..............page:17-20
Assessment model of security situation introduced cross-validation mechanism
WU Zhigang;SU Anjie;WANG Wenqi
..............page:106-109
Novel adaptive de-noising method for strong Gaussian noise
GAO Chao;XU Wenbo;SUN Jun
..............page:154-157