[1] |
ZHENG Fengbin1, ZHU Qing1, 2, ZANG Wenqian2.
Concurrent data flow model for remote sensing product driven by XML files
[J]. Computer Engineering and Applications, 2018, 54(24): 266-270.
|
[2] |
ZHAO Feng1, WU Chengmao2.
High performance hyper-chaotic system constructed with sine function and its application in infrared image security protection
[J]. Computer Engineering and Applications, 2018, 54(11): 67-75.
|
[3] |
LI Meng, ZHAI Jiangtao, DAI Yuewei.
Steganalysis to multipath encoding based on conditional entropy
[J]. Computer Engineering and Applications, 2018, 54(1): 117-121.
|
[4] |
YU Lianchang, ZHU Shenglin, LI Xujun.
Design and implementation of genetic evaluation system for pigs based on XML
[J]. Computer Engineering and Applications, 2017, 53(14): 251-256.
|
[5] |
MEI Xue, LIU Yuan, WU Haotian.
Study on JPEG steganography based on syndrome-trellis codes and multi-band embedding
[J]. Computer Engineering and Applications, 2016, 52(20): 118-121.
|
[6] |
XU Peijuan, QI Fuhui, LI Zhuo, WANG Limin.
Research of XML document similarity based on edit graph
[J]. Computer Engineering and Applications, 2016, 52(2): 81-85.
|
[7] |
WANG Chengyong, DU Qingwei, SUN Jing, SUN Zhen.
Clustering XML documents based on feature order preference
[J]. Computer Engineering and Applications, 2016, 52(12): 64-68.
|
[8] |
HU Tiantian, CAO Min.
Research of OWL ontology storage and query based on BaseX
[J]. Computer Engineering and Applications, 2015, 51(24): 132-136.
|
[9] |
XIANG Lingyun, HU Yijun, WANG Weizheng.
Text steganographic algorithm based on prior substitution with low distortion
[J]. Computer Engineering and Applications, 2015, 51(15): 102-106.
|
[10] |
YI Qi,JIA Jing, LU Yang, ZHANG Yu, HU Huaixiang.
Research and realization of iSCSI protocol conformance testing
[J]. Computer Engineering and Applications, 2014, 50(6): 77-82.
|
[11] |
QIN Zunyue1, HUANG Yun1, LIANG Pingyuan2.
Labeling scheme for update on XML data
[J]. Computer Engineering and Applications, 2013, 49(3): 20-24.
|
[12] |
FENG Fan1,2, WANG Jianhua1, ZHANG Zhengbao2, WANG Huiping1, QI Hongjun1, ZHANG Hailong1.
Blind extraction algorithm of embedded messages based on CSR-ICA
[J]. Computer Engineering and Applications, 2013, 49(24): 70-73.
|
[13] |
LI Caiqiu, ZHOU Yajian, WEI Gengyu.
Information hiding methods research and improvement based on FTP protocol
[J]. Computer Engineering and Applications, 2013, 49(21): 111-113.
|
[14] |
LI Qiang, HUANG Chen, YAN Yi, WU Huifeng.
XML based description approach for graphical programming data in embedded heterogeneous domain
[J]. Computer Engineering and Applications, 2013, 49(15): 136-140.
|
[15] |
LI Juan, LI Ning, LI Meixiu.
Key issues and solutions in UOF-OOXML document format translation
[J]. Computer Engineering and Applications, 2013, 49(14): 138-143.
|