Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2008 Issue 8
Research of semantic heterogeneity in information integration
ZHOU Jian-fang;XU Hai-yin;LU Zheng-ding
..............page:2349-2351
Efficient model for information retrieval
HUANG Ming-xuan;ZHANG Shi-chao
..............page:2345-2348
Collective behaviors and strategies analysis based on complex network and evolutionary game
TIAN Wei;DENG Gui-shi;WU Pei-jian
..............page:2352-2354,2376
Neural networks ensemble based on variable-window model
YANG Pei;TAN Qi
..............page:2355-2356,2361
Based on trust grid economic model scheduling algorithm
TANG Xiao-yong;LI Ken-li
..............page:2357-2361
Study on ontology learning for intelligent search engine
XIAO Ming;HU Jin-zhu;XIAO Yi
..............page:2362-2365
Research about time-serial prediction based on tight wavelet neural-net
LUO Hang;WANG Hou-jun;LONG Bing
..............page:2366-2368
Research of reconfigured embedded systems for environment
DU Cheng-lie;TAN Feng
..............page:2369-2370,2398
Key technology of plugin-based GIS software dynamic configuration
CHEN Zhan-long;WU Liang;WU Xin-cai
..............page:2371-2373
Case study on maintenance cost for regression test automation based on prototype
KAN Hong-xing;CHU Wei;HU Chun-ling
..............page:2374-2376
Approach to evaluating for complexity of software architecture
JIAO Feng;WANG Li-ping;HOU Jian-min
..............page:2377-2379,2449
Software architecture oriented approach to dynamic reconfiguration
ZHI Yong-feng;ZHANG Jun
..............page:2380-2383
Recognising and processing technology of on-line freehand concept sketch
LU Zhang-ping;TANG Lei;YUAN Hao;LI Ming-zhu
..............page:2384-2386
Interactive real-time water rendering
WU Lei;CHEN Lei-ting;HE Ming-yun
..............page:2387-2389,2440
Object detection and tracking method for intelligent surveillance
WANG Su-yu;SHEN Lan-sun;LI Xiao-guang
..............page:2393-2395
On theory and service model of digital rights
LI Dan;XU Hai-yin;LI Ting
..............page:2425-2426,2433
Design and implementation of multi-point disaster tolerant system
GU Qi-chao;LIU Xiao-jie;LI Tao;ZHAO Kui;HUANG Chao-chang;CHEN Qian
..............page:2427-2429
Research and design of secure mobile e-mail system based on CA
CHEN Liang-chen;SUN Gong-xing;YAN Xiao-fei;WU Huan
..............page:2430-2433
σ-LFSR based on SIMD technique
ZENG Guang;WANG Zheng;HAN Wen-bao
..............page:2434-2437,2443
Design and implementation of certificate issuance system based on Web services
HU Xiao-qin;LI Tao;ZHAO Kui;LU Zheng-tian;ZHAO Qing-hua
..............page:2438-2440
Sealed-bid electronic auction protocol based on ring signature
XIONG Hu;QIN Zhi-guang;LAN Tian
..............page:2441-2443
Design and implementation of disaster tolerant system guaranteeing service continuity
CHEN Qian;LIU Xiao-jie;LI Tao;ZHAO Kui;PI Lu-lin;GU Qi-chao
..............page:2444-2446
Prolog-based on-line automatic analysis for security protocols
CHEN Tie-ming;ZHANG Jie;CAI Jia-mei
..............page:2447-2449
Operating system simulation model for network attack and defense drilling
ZHAO Wei;WANG Hai-quan;XIA Chun-he
..............page:2450-2453,2456
Gene certificate-based method for user authentication
SUN Fei-xian;WANG Wen-qi;ZHENG Qiu-sheng;ZENG Jin-quan;XIA Bing
..............page:2454-2456
Identity-based end-to-end authentication and key agreement protocol in mobile communication
SHAO Lin;LI Hui;YANG Yi-xian
..............page:2457-2459,2487
Dynamics analysis of evolutionary game-based trust computing for P2P networks
LIU Feng-ming;DING Yong-sheng
..............page:2460-2462,2494
Dynamic game-based model for electronic payment system and self-interested property
SHI Wei-qi;CHANG Jie-ren;LIU Yun;ZHANG Bo-yun
..............page:2463-2468,2517
Content protection for MPEG-4 video based on non-uniform DCT
ZHAO Xian-feng;LI Ning;DENG Yi;XIA Bing-bing
..............page:2469-2473
New multiple patterns matching algorithm in intrusion detection
LI Geng;HAN Jin;XIE Li
..............page:2474-2476
Multilevel grey comprehensive evaluation for information system risk
HU Yong;WU Shao-hua;HU Chao-lang;REN De-bin;LI Huan-zhou
..............page:2477-2479
Cyberspace network data mining grid system
LIN Dong-dai;SHI Ming-ruo;SHEN Gui-cheng
..............page:2480-2483
Research on integration exchanging and sharing of 3D model among heterogeneous CAD systems
SUN Wei;MA Tie-qiang;GAO Tian-yi;HUANG Yu-jun;LI Tao
..............page:2342-2344,2348
Collaborative design framework upon heterogeneous CAD systems
SUN Li-juan;DING Bo
..............page:2339-2341
MD4:integrated approach of determining semantic similarity among entity between different ontologies
huang hong bin ; zhang wei ming ; deng ; su ; dong fa hua
..............page:2335-2338,2383
Internet traffic classification using decision tree
XU Peng;LIN Sen;LIU Qiong
..............page:2484-2487
Traffic classification based on support vector machine
LIN Sen;XU Peng;LIU Qiong
..............page:2488-2490,2498
Analysis of transmission range impact on throughput performance in multi-hop wireless networks
MAO Jian-bing;MAO Yu-ming;LENG Su-peng
..............page:2491-2494
Dynamic fast handover-based hierarchical mobile multicast protocol
WAN Zheng;YU Lan
..............page:2495-2498
D-Flooding: efficient search algorithm in unstructured P2P networks
DONG Xi-guang;ZHUANG Lei;CHANG Yu-cun
..............page:2499-2501,2523
Design and implementation of real-time and effective network emulator of Windows for IPv6 (WE6)
LI Xue-jie;JIN Zhi-gang;DAI Ju-feng
..............page:2502-2504
New algorithm for image enhancement and denoising based on shock filters and anisotropic diffusion
CHEN Guan-nan;YANG Kun-tao;CHEN Rong;XIE Zhi-ming
..............page:2396-2398
Gabor filter parameters design its use in iris recognition
YUAN Wei-qi;LIU Wang-lan;KE Li
..............page:2399-2401
Two dimension threshold image segmentation based on improved particle swarm algorithm
FENG Bin;WANG Zhang;SUN Jun
..............page:2402-2404
Rapid skew distortion rectification for vehicle licenses plate images based on vanished points
XU Xiao-wei;WANG Zhi-yan;CAO Xiao-ye;LIANG Ying-hong
..............page:2405-2406,2409
Fast inter prediction mode decision algorithm for AVS oriented to video surveillance
YANG Zhi-wei;LI Mei-yi;LIU Dong-hua
..............page:2407-2409
Classification of volume data based on entropy of histogram
LI Jin;ZHOU Lu-lu;YU Hong;LIANG Hong
..............page:2410-2412
Research and realization of recognition for shoe soles based on outline feature
GUAN Yan;LI Cun-hua;ZHONG Zhao-man
..............page:2413-2415
Clustering-based target fast detection for SAR imagery
PAN Zhuo;GAO Xin;WANG Yan-fei;Fan Li-jie
..............page:2416-2419
Computer network defense policy specification language
WEI Yu-di;XIA Chun-he;LI Xiao-jian;WANG Hai-quan;HE Wei
..............page:2420-2424
Functional model and simulation of IEEE 802.16 Mesh mode based on NS2
YOU LEI;WANG Yi-fan;ZHANG Yong;MAO An-feng;CAI Jie;SONG Jun-de
..............page:2505-2508
Three dimensional localization algorithm based on nectar source localization model in wireless sensor network
ZHENG Shi-jue;LI Kai;ZHENG Zhen-hua;SU Ying
..............page:2512-2513
New method for instantaneous frequency estimations of LFM signals
CUI Hua
..............page:2532-2533,2536
Dynamic fault-tolerance service framework for grid
JI Xiao-bo;CHEN Shu-yu;TIAN Dong;WANG Rong-bin
..............page:2534-2536
G2B business process design based on G2G information sharing demand identification
FAN Jing;ZHANG Peng-zhu;TANG Xie-ping
..............page:2541-2545
Research on application of Kriging in construction of three-dimensional property model about water content
YAO Ling-qing;PAN Mao;QU Hong-gang;LAN Xiang-rong;CONG Wei-qing;LIU Xue-qing;YU Chun-lin
..............page:2554-2556,2560
Spam filter for short message
HU Ri-le;CAI Jie;ZHONG Yi-xin
..............page:2557-2560
Algorithm for privacy-preserving classification mining with multivariate data
LI Xing-guo;ZHOU Zhi-chun;LIU Hui
..............page:2332-2334
Novel binary symbolic representation of time series for similarity
SUN Mei-yu;FANG Jian-an
..............page:2328-2331
Research on new mining algorithm of frequent itemset
WANG Jing-hong;LIU Li-na;GENG Zong-ke
..............page:2325-2327
Vector quantization approach to outlier detection
HU Yun;LI Cun-hua;SUN Zhi-hui
..............page:2322-2324,2334
OFFS:research on object-based flash file system
LIN Wei;ZHANG Yan-yuan;LI Zhan-huai;WANG Yan-long
..............page:2316-2318
Automatic modeling of novel gene expression programming based on statistical analysis and critical velocity
LI Kang-shun;PAN Wei-feng;ZHANG Wen-sheng;WANG Feng
..............page:2312-2315,2365
Customer ideas mining based on hybrid optimization algorithm of fuzzy matter-element PSO
YIN Yan-chao;SUN Lin-fu;GUO Cheng
..............page:2309-2311,2318
Information integrated solution and optimization technologies of steel and iron manufacturing
ZHONG Jin-hong;HUANG Ling;LI Xing-guo;YANG Shan-lin
..............page:2305-2308
Study on transformation method from MathML to SVG
MA Jun-ping;LIU Zhong-sheng;HU Wei-jun
..............page:2302-2304
Large-scale SVM classification algorithm based on granularity of quotient space theory
WEN Gui-hua;XIANG Jun;DING Yue-hua
..............page:2299-2301
Mutual-extraction between semantic relationships and lexical patterns in natural language processing
LIANG Na;GENG Guo-hua;ZHOU Ming-quan
..............page:2295-2298,2308
Method of feature reduction in text classification based on position and sort information
LIU Hai-feng;WANG Yuan-yuan;ZHANG Xue-ren;YAO Ze-qing
..............page:2292-2294
Construction mechanism of manufacturing grid based on ontology semantics
ZHANG Sha-qing;LIU Qiang;ZHANG Ping;CHEN Xin
..............page:2289-2291,2331
Summary of texture research
LIU Xiao-min
..............page:2284-2288
Summary and survey of endpoint detection algorithm for speech signals
LIU Hua-ping;LI Xin;XU Bo-ling;JIANG Ning
..............page:2278-2283
Research of image-based watermarking attack algorithms
WANG Ying;ZHENG Xue-feng;LIU Hai-yan
..............page:2274-2277,2283
Current research state and existing problems of software architectural style
MAO Fei-qiao;QI De-yu
..............page:2270-2273
Research on P2P database management system
SHEN Xin-peng;LI Zhan-huai
..............page:2514-2517
Research on architecture of educational resources grid and model of metadata
LIU Nai-wen;LIU Fang-ai
..............page:2518-2520,2553
Research and implementation of fractal dimension estimation
HE Tao;ZHOU Zhen-gou
..............page:2521-2523
Load balancing algorithm based on network positioning in structured P2P systems
LI Li-juan;SUN Jian-hua;CHEN Hao;CHEN Tie-qun;SHI Lin
..............page:2524-2527
Range-based and distributed node localization in wireless sensor networks
LIU Ai-ping;LIU Zhong;LIANG Yue;ZHOU Wei
..............page:2528-2531
Survey on hybrid system
LI Lang;LI Ren-fa;LI Ken-li;YAO Feng-juan
..............page:2255-2259,2288
Color correction methods and application in image processing
XU Xiao-zhao;SHEN Lan-sun;LIU Chang-jiang
..............page:2250-2254
Overview on lightweight static analyzer construction methods
GUO Rong-feng;JIN Mao-zhong;LIU Chao
..............page:2245-2249
Research on key theoretic problems of network coding
HUANG Jia-qing;TAO Shao-guo;XIONG Zhi-qiang;CHENG Wen-qing
..............page:2260-2264
Research on ontology-based information retrieval system models
ZHANG Yu-ming;NAN Kai;MA Yong-zheng
..............page:2241-2244,2249