[1] |
YANG Xiaowen, CAO Shanhai, HAN Xie.
Three-Dimensional Model Segmentation Based on Boundary Features
[J]. Computer Engineering and Applications, 2019, 55(4): 214-218.
|
[2] |
ZHONG Wei1,2, LIU Rihua3, CHEN Baoxing1,2.
Diameter Formula for a Special 3D Hexagonal Torus
[J]. Computer Engineering and Applications, 2019, 55(13): 119-122.
|
[3] |
ZHOU Houqing1,XU Youzhuan2.
Algebraic connectivity of trees based on network topology
[J]. Computer Engineering and Applications, 2017, 53(3): 106-109.
|
[4] |
XU Xiaosheng1, JIN Ping2, ZHENG Wen2.
Recognition of indoor chair wireframe
[J]. Computer Engineering and Applications, 2016, 52(23): 196-202.
|
[5] |
ZHONG Wei, CHEN Baoxing.
Fast algorithm of calculating diameter for Bi-Cayley graph with 4 degrees on cyclic group
[J]. Computer Engineering and Applications, 2015, 51(14): 67-71.
|
[6] |
FU Tianyu1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Lingling1,2.
Privacy preserving calculating intersection area of two polygons
[J]. Computer Engineering and Applications, 2014, 50(9): 37-40.
|
[7] |
WU Fen1, ZHONG Hong1,2, SHI Runhua1,2.
Privacy-preserving computation protocol for fermat problem’s extreme values
[J]. Computer Engineering and Applications, 2014, 50(4): 77-80.
|
[8] |
WEI Baoya1, LIU Rihua2, CHEN Baoxing1.
Diameter formula and optimal routing algorithm for double-loops Petersen networks
[J]. Computer Engineering and Applications, 2013, 49(5): 81-83.
|
[9] |
LV Jianhua, ZHOU Huachun, QIU Luwei, ZHANG Hongke.
Implementation of authentication and authorization of proxy mobile IPv6
[J]. Computer Engineering and Applications, 2012, 48(22): 109-116.
|
[10] |
YU Gang, LIU Gang.
Spatial fussy query on shape cognition of 2D objects
[J]. Computer Engineering and Applications, 2012, 48(16): 185-189.
|
[11] |
WANG San1,LIU Run-tao2,WANG Hong-yan1.
Algorithms for convex hull of union and intersection of two intersecting convex polygons
[J]. Computer Engineering and Applications, 2010, 46(5): 154-156.
|
[12] |
LIU Hui,FANG Mu-yun,HANG Ting-ting,HOU Hai-jin.
Research on construction of best bidirectional double-loop networks G(N;±1,±s)
[J]. Computer Engineering and Applications, 2010, 46(33): 88-90.
|
[13] |
FU Zu-feng1,LUO Wen-jun2,TONG Ling1.
Protocol for privacy-preserving intersect-determination of line segment and elliptical
[J]. Computer Engineering and Applications, 2010, 46(17): 77-80.
|
[14] |
ZHANG Cai-yun,LUO Yong-long,SHI Lei.
Security solution to points-range inclusion problem
[J]. Computer Engineering and Applications, 2010, 46(17): 107-109.
|
[15] |
WANG Hong-yan1,LIU Run-tao2,WANG San1.
New algorithm to calculate kernel of simple polygon
[J]. Computer Engineering and Applications, 2010, 46(17): 166-168.
|