Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2008 Issue 10
Methods of conception soft-and operation in cloud model
LIU Bing-xiang;LI Hai-lin;YANG Li-bin
..............page:2510-2512
Algorithm for learning centre of single class based on k-means and semi-supervised mechanism
LI Zhi-sheng;SUN Yue-heng;HE Pi-lian;HOU Yue-xian
..............page:2513-2516
Fast image segmentation algorithm based on region competition with level set
WANG Lin-juan;WANG Xi-li
..............page:2628-2632
Fast concave object extraction algorithm based on graph cuts and GVF Snake
TIAN Li-li;GUO Min;XU Qiu-ping
..............page:2633-2635
Efficient method for object contour extraction based on probability distribution image
LU Cheng;HE Dong-jian
..............page:2636-2638,2642
A new improved OPTA thinning algorithm
ZHAO Lei;CHEN Qiong;CHEN Zhong
..............page:2639-2642
An adaptive filter based on images'entropy
WANG Xue-zhong;XIAO Bin
..............page:2643-2644,2651
Ant colony algorithm in airline seat inventory optimization
ZHANG Wen;FAN Wei
..............page:2645-2647
Multi-objective optimization algorithm with combined strategy based on Pareto optimal and neural network
WANG Xiang-hui;ZHANG Guo-qiang;LIAN Zhi-chun
..............page:2517-2520
Improved discrete PSO algorithm and its application in winner determination problem
WANG Zhen;MA Fei-teng
..............page:2521-2524,2528
Adaptive interactive genetic algorithms with grey for fitness of evolutionary individuals
GUO Guang-song;CUI Jian-feng
..............page:2525-2528
Scoring matching approach:Learning high order Markov random fields
LU Xiao-lei;WANG Fu-rong;HUANG Ben-xiong
..............page:2529-2532,2540
A fast algorithm for mining frequent subgraphs
WU Jia;CHEN Ling
..............page:2533-2536,2557
Comparison of XML compression techniques
ZHANG Sheng;SHU Jian;BAO Xiao-ling
..............page:2537-2540
An efficient similarity search for multivariate time series
ZHOU Da-zhuo;WU Xiao-li;YAN Hong-can
..............page:2541-2543,2552
Synchronization and reolication model in mobile environment
CHEN Li-sheng;GUO Hai-bin;YE Fei-yue
..............page:2544-2547
Study of similar graph containment search and index
Lu Jin-tao;LI Xue-ming
..............page:2548-2552
Distributed query optimization model based on data grid
LUO Yong-hong;CHEN Te-fang;ZHANG You-sheng
..............page:2553-2557
A novel mapping method for image semantics and visual features
YANG Jun;WANG Ji-cheng;XING Dan-jun
..............page:2558-2560,2564
MSCR-tree:A spatial index for electronic map on mobile device
WANG Yuan-ji;CHEN Hong-zhong
..............page:2561-2564
High-dimensional indexing structure based on γ splitting strategy
WANG Shu-e;SUN Jin-guang
..............page:2565-2568
Overlay multicast routing algorithm with minimum overlay cost
LIN Long-xin;ZHOU Jie;ZHANG Ling;YE Zhao
..............page:2569-2572,2576
Survivability model for vehicular Ad-Hoc network based on Markov chain
XIE Bo;XIAO Xiao-qiang;XU Ming;LIU Zhi-qiang
..............page:2577-2579,2603
SCP2P:A self-adaptive peer-to-peer model based on peer characteristics
LI Jiang-feng;ZHANG Chen-xi;ZHOU Xing-ming
..............page:2580-2583
Table-based routing protocol in wireless sensor networks
TIAN Feng;QIU Qing-feng;SUN Xiao-ping;GAO Qian;BIAN Ting-ting
..............page:2584-2586
Study on the fast handover performance of MIPv6 in 802.11
LI Zhi-peng;LI Li-xin;HUANG Ping;JIANG Hua-lin
..............page:2587-2589,2593
Algorithm for detecting module structure in complex networks based on node type
SHI Wei;ZHAO Zheng;XUE Gui-xiang
..............page:2590-2593
Clustering hierarchy tree routing algorithm based on LEACH
SONG Chun-yan;ZHANG Hua-zhong;ZHANG Xiu-yang
..............page:2594-2596,2599
Research on improving TCP performance over wireless links by adaptive FEC
WANG Jian-zhong;TANG Hong
..............page:2597-2599
Search in social networks using MCMC algorithm
LI Kun-peng;ZHANG Ning
..............page:2600-2603
On-line algorithm of loose competitive caching
CAI Zhao-quan
..............page:2604-2607,2618
A program understanding approach for stripped binary code
LI Juan-ru;GU Da-Wu;LU Hai-ning
..............page:2608-2612
Research of data processing and filtration in RFID middleware
JIANG Shao-gang;TAN Jie
..............page:2613-2615
Mainframe application transition to SOA environment using J2CA
TANG Jian-feng;ZHANG Xia-ning;WANG Ji-cheng
..............page:2616-2618
Web application research based on extended Struts framework
LIU Bing;LI Zheng-fan
..............page:2619-2621,2632
Active contour model based on multi-swarm particle swarm optimization
LI Rui;GUO Yi-rong;HAO Yuan-hong;LI Ming
..............page:2622-2624,2627
Edge detection algorithm based on odd Gabor filter
GAO Xiao-xing;CAO Li;CHANG Gui-ran
..............page:2625-2627
Dynamic task assignment algorithm based on multi-criteria
GUO Xi-juan;LI Mo-hua
..............page:2507-2509,2512
Fault diagnosis for ship sewage treatment equipment based on clustering support vector machine
CAO Xiao-li;JIANG Chao-yuan;GAN Si-yuan
..............page:2648-2651
New heuristic algorithm for channel assignment in cellular mobile systems
TANG Yi;XIONG Hui
..............page:2655-2657
Cellular automaton model for mixing traffic in two-lane system with period boundary condition
WANG Shou-bao;QIAN Yong-sheng;KANG Hong-xia
..............page:2658-2660
Morphology measure and 3D reconstruction of corn leaf basea on machine vision
YANG Liang;GUO Xin-yu;ZHAO Chun-jiang;QIAO Xiao-jun;LU Sheng-lian
..............page:2661-2663,2682
Study on fisheye image correction based on cylinder model
ZHOU Hui;LUO Fei;LI Hui-juan;FENG Bing-shu
..............page:2664-2666
Off-line Chinese signature authentication based on integrated neural networks
ZHANG Lei;CHEN Xiao-rong;CHEN Xiao-zhu
..............page:2667-2669,2689
Application research of image fusion in ultrasonic tomography of concrete
HUANG Liang;HUANG Zheng-yu;WANG You
..............page:2670-2672,2675
Fabric defects detection based on frequency domain filtering
GUAN Sheng-qi;SHI Xiu-hua
..............page:2673-2675
Rough terrain identification based on random texture analysis
LIU Chun-fang;TANG Ke-hong;SHAO Cheng-hui
..............page:2676-2678,2685
New camera pose estimation method based on adaptive particle filter
LIU Wei;LI Li-jun;HAN Jun;GUAN Tao
..............page:2679-2682
Reversible data hiding based on fingerprint image characteristics
ZHANG Dan;TONG Xue-feng;XUAN Guo-rong
..............page:2683-2685
Architecture design of embedded operating system based on heterogeneous dual-core processor
JIANG Jian-chun;ZENG Su-hua;CEN Ming
..............page:2686-2689
Simulation research on LS RISC microprocessor
SHI Xiao-li;ZHANG Fa-cun
..............page:2690-2692,2695
Dual-core DMA communication between DSP and FPGA in panoramic imaging system based on reverse wave analysis
XIONG Zhi-hui;CHEN Li-dong;ZHANG Mao-jun;LI Le;BAO Wei-dong;TAN Shu-ren
..............page:2693-2695
High-throughput Reed-Solomon decoder
ZHANG Jie;JIANG Nan
..............page:2696-2700
Application of group and expansion code in test data compression
WANG Bao-qing;LIANG Hua-guo;ZHAN Wen-fa
..............page:2701-2703,2724
Design of feedback shift register based on chaos
MA Chao;LU Yu-zhen
..............page:2704-2706,2720
Design and implementation of keyboard input method for handwritten Chinese characters
WU Hai-hui;FAN Qing-lin;WU Jian-guo
..............page:2707-2710
Construct theory of hierarchical functional networks and its application in multiple numerical integral
WEI Xiu-xi;ZHOU Yong-quan;LI Tao-shen
..............page:2711-2714,2717
PPR based similarity search for gas monitoring data
LI Ai-guo;ZHAO Hua
..............page:2721-2724
gao yue
..............page:封2
Complex-exponential Fourier neuronal network and its hidden-neuron growing algorithm
ZHANG Yu-nong;ZENG Qing-dan;XIAO Xiu-chun;JIANG Xiao-hua;ZOU A-jin
..............page:2503-2506
Detection techniques of format-string vulnerabilities in binary files
ZHANG Long-jie;XIE Xiao-fang;YUAN Sheng-zhi;TANG Jiang
..............page:2495-2498
Program anomaly detecting approach based on behaviors analysis
LUO Ya-li;ZHOU An-min;WU Shao-hua;HU Yong;DING Yi
..............page:2492-2494
Curve watermarking technique for protecting copyright of digital maps
ZENG Hua-fei;HU Yong-jian;ZHOU Lu
..............page:2488-2491
Intrusion detection model for RFID system based on immune network
GUO Jian-hua;YANG Hai-dong;DENG Fei-qi
..............page:2481-2484
Improved key-management scheme for wireless sensor networks
CHEN Ni;YAO Jian-bo;WEN Guang-jun
..............page:2478-2480,2498
Trustworthiness of single hop link in wireless sensor network
XIONG Peng;ZHANG Wei;SHEN Fu-ke
..............page:2474-2477
Research on methods of network risk evaluation
SHI Zhi-cai
..............page:2471-2473,2477
Data-flow dependency-based trusted recovery method
BAO Bi-xian;ZENG Qing-kai
..............page:2467-2470
Authentication system scheme based on fingerprint
XIE Wei;GU Li-ze;NIU Xin-xin
..............page:2464-2466
P2P trust management language and certificate chain discovery algorithm
GAO Ying;ZHAN Jiang
..............page:2459-2463,2466
Grid trust model based on MADM theory
YU Yi-yu;TANG Jun-hua;WU Yue
..............page:2455-2458
Research of distributed and autonomous computer forensics system
YAN Xi-ai;YANG Jin-min;CHANG Wei-dong
..............page:2485-2487