Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Engineering
1000-3428
2010 Issue 12
Design of Micro Controller for Video Decoding Based on Data Flow
ruan jian guo ; li lu jun
..............page:232-233,241
Assembly Design System Based on Collaborative Virtual Environment
hu yong ; wei nai zuo ; wu dian liang ; fan xiu min
..............page:13-16
P2P E-commerce Model Based on Punishment Mechanism
wang ke wen ; xie fu ding ; zhang yong
..............page:265-268,271
Competitive Self-adaptive Vegas Algorithm
qu jing yao ; liu feng
..............page:113-115,118
Dual Busy Tone Wireless MAC Protocols with Adjustable Power
liu ke ; leng peng
..............page:129-132
Intrusion Detection Model Based on Hybrid AIS/SOM
wang fei ; qian yu wen ; wang zhi zuo
..............page:164-166
Face Recognition Based on Complete 2D Symmetrical PCA
wang li hua ; qin zuo zuo ; xu hong bo
..............page:207-208,212
Low Cost Strap-down Inertial Navigation System Based on Real-time Operating System
du ji yong ; huang guo rong ; cheng hong bing ; liu hua wei
..............page:251-252,255
Design and Application of Disease Gene Prediction System Based on Function
yuan fang ; wang rui chun ; guan ming xiang ; zhou yan hong
..............page:259-261
Research on Integration of Middleware Architecture
wang qiong ; du cheng lie
..............page:279-281
tou gao xu zhi
..............page:封2
Study of Hot Spot for Hibernate-based Data Access Framework
luo peng fei ; wang ying hui
..............page:100-103,106
Intrusions Detection Method Based on Parameters of System Call
huang guo yan ; gao jian pei ; chang xu liang
..............page:153-155
Transplant Method of μC/OS-Ⅱ on XC164CS
li chang gang ; huang min jiang ; zhang zuo ; hu jun jie ; liu yu tian ; wang yong bin
..............page:242-244
Design and Implementation of Inter-module Communication Method in NC System
gao tian rong ; yu dong ; qin cheng gang ; hu yi ; yue dong feng
..............page:238-241
Video Object Tracking Algorithm for Augmented Reality
chen ming ; chen yi min ; huang shi hua ; yao zheng wei
..............page:229-231
Snort Rule Set Structure Method Based on Frequency
zhou yu ; tan xiao bin ; he xian zong ; zuo hong sheng
..............page:156-158,161
Real-time Sub-pixel Harris Corner Detection Based on Graphics Processing Unit
zhu zun shang ; liu xiao lin
..............page:213-215
Underdetermined Blind Separation Under Relaxed Sparsity Condition
xiao ming ; sun gong xian ; lv jun
..............page:274-276
Complex Chinese Document Layout Analysis Based on SVM Region Formation
dang xing ; gong sheng rong ; liu quan
..............page:200-203
Secure Revocation Scheme Based on Clustering in Ad Hoc Networks
mo jie ; wang xiao ming
..............page:179-181
Research of District Emergency Plan Based on Geographic Ontology
wang fang ; liu hou quan ; kong de xiang
..............page:288-290,封3
Study on Text Retrieval in Structured P2P Network
shi qing wei ; xu guang quan ; wang xin hai
..............page:43-45,51
Minimum Attribute Reduction Algorithm Based on Improved Attribute Union
ye ming quan ; wu chang rong
..............page:78-79
Indoor Assist System for Rescue Based on Wireless Sensor
wang xu ; sun feng chi ; pang cong ; huang sheng yu ; liu guang
..............page:248-250
Spatial Index Method Based on QCR-tree
gao yun ; hou gui bin ; zhang hui ; liu yong shan ; shi wei bo
..............page:80-82
Gateway Placement Algorithm Based on Transmission Success Rate in Wireless Mesh Network
zhou nan ; zeng zhi wen ; chen zhi gang ; wang da wei ; zeng feng
..............page:110-112
Cylindrical Calculation Research on Hyperbolic-Catadioptric Omni-directional Image
lin jin guo ; qian hou liang ; mei xue ; xu jun feng
..............page:204-206
Research on Web Service Matching Based on OWL-S
pan shan liang ; zhang ying xin ; yu xiao feng
..............page:48-51
Bi-directional Communication Scheme Between H-MVIP and ST-BUS
sun fu ming ; li li ; pan guang rong ; wang qin
..............page:245-247
Real-time Vehicle Velocity Estimation Method Based on Traffic Flow Attribute
cai ming ; yao lei ; li min
..............page:4-6
Deep Web Automatic Semantic Annotation Based on Wrapper
yang xiao qin ; ju shi guang ; cao qing huang ; wang xiu hong
..............page:52-54,57
Image Mosaicing Based on Binocular Cameras
wu jin jie ; liu xiao lin
..............page:209-212
Game Analysis of Incentive-cooperative Mechanism in Opportunistic Routing
long zuo ; chen zhi gang ; zhao ming ; li yang hui
..............page:126-128
Off-line E-Cash Scheme Based on Multi-level Proxy Blind Signature
wang bao wen ; he xin yu
..............page:187-189
Time Domain Error Concealment Algorithm for H.264 Based on Adaptive Overlapping
xiong chun bin ; zhang you zhi ; li qing tao ; han ya wei
..............page:236-237,247
Research on Image Mosaic Algorithm Based on Color Transfer
wu xu hong ; chen zhao jiong
..............page:219-220,223
Remote Sensing Image Registration Based on SURF Descriptor
lin xiao fan ; lin li wen ; deng tao
..............page:216-218
Analysis of Approximations Under Dominance Relation During Attribute Values Coarsening and Refining
ji xiao zuo ; li tian rui ; zou wei li ; chen hong mei
..............page:33-35,42
Clustering Algorithm Based on Energy Consumption Load Balance in Ad Hoc Network
wang xin sheng ; liu yang ; wang wei jie ; tian jie
..............page:136-137,140
Natural Language Digital Watermark Method on Paragraph Level
liu yu ling ; xin guo jiang
..............page:28-29,32
Modified Text Retrieval Based on Concept Similarity
lv gang ; zheng cheng
..............page:55-57
Least-Square-based Minimum Class Variance Support Vector Machines
wang xiao ming ; wang shi tong
..............page:19-21
Research of Same Origin Credited Approval Agreement
cai liang ; liu shi xian
..............page:184-186
Cryptanalysis of Designated Verifier Signature Schemes
du hong zhen ; wen qiao yan
..............page:144-145,148
Load Balance Middleware Model Based on Service Type
ma hui ; tao shao hua
..............page:277-278,281
Feature Selection Method for Text Category Based on Independence Theory
feng xia ; liu zhi hui ; tian ji cun
..............page:22-24,27
Dynamical Neighborhood Algorithm Based on Sampling Density and Manifold Curvature
gao xiao fang ; liang ji ye
..............page:17-18,21
Deep Web Data Source Classification Based on Query Interface Context
hua hui ; fu yu zuo ; zhou xiao ke
..............page:66-68
Comparison Research of Single Kernel and Multi-kernel Relevance Vector Machine
yang liu ; zhang lei ; zhang shao xun ; liu jian wei
..............page:195-197
Random Number Generator Based on Petri Nets Model
zou zuo ; le xiao bo ; liu shi jian
..............page:72-74
DDOS Attacks Defense Based on Deterministic Packet Marking
wang xiao jing ; xiao you lin
..............page:193-194,197
Trust-based Privacy Protecting Method in Pervasive Computing
xin yan ; luo chang yuan ; huo shi wei ; ying yi zhou
..............page:149-152
Analysis on Security Investment for Sensor Networks Based on Evolutionary Game
liu xue yan ; zhang qiang ; wang cai fen
..............page:190-192
Detection of Approximately Duplicated Records Based on Data Grouping Matching
zhou li juan ; xiao man sheng
..............page:104-106
Real Color Image Denoising and Enhancement Based on Wavelet Transform
han li na ; geng guo hua
..............page:224-225,228
Improved Image Registration Method of SIFT
zhao lei ; hou zhen jie
..............page:226-228
Design and Implementation of Oceanographic Buoy Management Information System
guo hong ; feng de xian ; gu xing fa ; yu tao ; li jia guo
..............page:256-258
Improvement of Isosurface Fast Generation Method
zhou bo ; shen xia jiong ; zheng feng bin ; qiao bao jun ; wang zuo ; wang pei pei
..............page:291-292,封3
Fast Algorithm for AVS-H.264 Video Transcoding
shang kai ; zhang wan xu
..............page:234-235,244
Spatial Index Method Based on R-tree
yu yan ; lin wei hua ; tan xiao jun
..............page:30-32
3D Model Retrieval Based on Shape Feature Description Operator
liao kai ning ; li zhi qiang ; sun jing
..............page:282-284
Directed Weighted Network Model Based on BBV
wang gui ying ; zhou jian ; xie zuo
..............page:141-143
FM0 Code Decoding on LabVIEW Platform
wu cong zi ; he zuo gang ; hou zhou guo ; li bing ; zuo kai ; zuo lei
..............page:272-273,276
Service Composition Model Based on Max Application Template
jiang jing ; pan zhen kuan ; yin xian zhen ; xia bai qiang
..............page:69-71
Fast Cube Computation Method on Compressed Data Set
zhang ying long ; sheng li zuo ; yang le
..............page:85-87
Interface Program Design of Circuit Simulation System Based on SPICE
hao yong sheng ; han lu jie ; wang guang long ; xie jian hua
..............page:253-255
Task Mapping Method for Parallel Performance Simulation Based on Trace
fang jian bin ; xu chuan fu ; che yong gang ; weng yu fen ; wang zheng hua
..............page:269-271
Software Development Methods in Multi-core Systems
bai jun feng ; deng zu pu
..............page:94-96,99
Extended Supervised Locality Preserving Projection Based on QR Decomposition
jiang yan xia ; liu zi long
..............page:198-199,203
Adaptive Size Estimation Method Based on Random-walk
ma xing kong ; wang yi jie ; zheng zhong
..............page:116-118
Performance Analysis of Satellite Network Using Three-layer Architecture
yin zhi zhong ; zhang long ; zhou xian wei ; liu tao ; zhang tao
..............page:10-12,16
Security Proof of Improved Certificateless Signature Scheme
zhang yu lei ; wang cai fen ; zhang yong jie ; han ya ning ; cheng wen hua
..............page:170-172
Clustering Algorithm Based on Dimension Reduction by Center Distance Order
xiang jian ping ; tang chang jie ; zheng zuo ling ; yi shu hong
..............page:58-60,63
Multi-secret Sharing Scheme Based on Bilinear Maps
chen qin ; chen da ; zhang ; xu kun
..............page:159-161
Buddy Optimized Algorithm Based on Agent On-demand Generation Mechanism
tao yang ; chen li yun
..............page:133-135
Self-adaptive Data Compression Method Based on Haar Wavelet
luo wen hua ; wang ji liang
..............page:138-140
Research on PE-CE Connection Simulation in MPLS VPN
hou jian feng ; ma ming kai
..............page:123-125
Efficient Extended Automaton Matching Perl-Compatible Regular Expressions
liu peng ; yao yuan ; zuo ming ; zhang zuo
..............page:39-42
Data Recovery Mechanism of Multi-strategies Based on Continuous Data Protection
yu cheng long ; li zhan huai ; hou li man ; huang ying
..............page:61-63
Mining Algorithm for Incontiguous Pattern of Workflow
zhou yan jun ; che jin hui ; wang xiao dong
..............page:88-89,93
Parallel Verification Strategy Based on Dependence Analysis
tao rong ; he zuo ; huang dao chang
..............page:64-65,68
Security Data Integration Model Using WEMLS
meng yu long ; yin gui sheng ; wang hui qiang
..............page:1-3
Vertical Search Research Based on Semantic Query Expansion
zhao jian wei ; zheng cheng ; wu yong jun
..............page:97-99
Fast Image Retrieval Based on Video Metadata Information
wei xiao li ; yang li dong ; zhong yan wen ; shen wei ming
..............page:7-9
Grid Task Scheduling Algorithm Based on Multi-dimensional Quality of Service Constraints
tan ya li ; yu jiong ; deng ding lan ; lv liang gan ; tian guo zhong
..............page:75-77
Dimensionality Reduction Algorithm Based on Manifold Learning
jiang wei ; yang bing ru
..............page:25-27
Remote Online Update Technology for Embedded Device
zhao jiong ; jia pei yuan ; li zhong shan ; lin wang cheng
..............page:262-264
Trusted Computing-based Authentication Scheme for Ad hoc Networks
hu rong lei ; li ran ; li zhao bin ; fang yong
..............page:146-148
Chaotic Synchronization Secure Communication Based on State Observer
qu shen ming ; zheng wen kui
..............page:182-183,186