Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2010 Issue 5
Investigation and implementation of sketch based 3D modeling system
zhao na ; guo li ; qiao xu dong
..............page:1959-1961,1964
Color edge detector combining quaternion convolution and wavelet transform
xu jiang yan ; wang wei xing
..............page:1981-1983
Behavior-based Web user satisfaction model
zhang ling hua ; zhang li ;lew philip; wang shou xin
..............page:1802-1805,1812
Improved wireless sensor network key pre-configured scheme
tian feng ; li wei ; sun xiao ping ; liu hua yan
..............page:1856-1859
New RFID mutual authentication protocol for low-cost tags
zhao yue hua ; wang yi wei ; li xiao cong
..............page:1885-1888
Interaction gesture analysis and design based on multi-touch surface
zhang guo hua ; heng xiang an ; ling yun xiang ; lao song yang
..............page:1737-1739,1752
Attacks on two signature schemes based on bilinear pairings
du hong zhen
..............page:1879-1881
Research on reconfigurable bit permutation network configuration information extraction
gao fei ; li hong yan ; dai zi bin ; zhang yong fu
..............page:1867-1870
Study of urban traffic state judgment based on SFLA-FCM clustering
yang zu yuan ; xu zuo ; luo bing ; du chang hai
..............page:1743-1745
Two practical verifiable multi-secret sharing schemes
he jun ; li li juan ; li xi mei
..............page:1882-1884,1888
SVDD multiclass classification algorithm based on relative density in kernel space
liu zuo ; zhu yu quan ; sun jin jin
..............page:1694-1696
Construction and application of ontology in domain of electronic information products
jiang guo rui ; yuan tong
..............page:1777-1781
Tracking multiple objects in occlusions
ou yang ning ; you jin hai ; mo jian wen ; zhang tong
..............page:1984-1986
Verification of network security based on Petri net and logic circuits
bai xue ; wu chang jiang ; yang ; zhao bu hui
..............page:1908-1910
Survey on service composition approach considering trustworthiness of QoS data
ma jian wei ; shu zhen ; guo de ke ; chen hong hui
..............page:1840-1844
Shape distribution algorithm of enhancing 3D model detail retrieval
he ni ; zhou ming quan ; geng guo hua ; wang xiao feng
..............page:1941-1943
Blind signature without random oracles
wang jing ran ; qian hai feng
..............page:1837-1839,1844
Anomaly intrusion detection based on quotient space granularity clustering
wang li fang ; han zuo
..............page:1911-1913
Research of on-line handwriting signature verification algorithm based on information fusion
zhang wei long ; zheng jian bin ; zhan en qi
..............page:1889-1891
Scene adaptive frame-layer rate control algorithm for H.264
shi jiu gen ; xu lin ; zhang chao
..............page:1968-1969,1973
Research of subject trust comprehensive evaluation model based on fuzzy theory
li li miao ; chen zhi gang ; deng xiao heng ; gui jin song
..............page:1860-1862
Design of control module for VME bus fault injection system in BIT experiment
liu meng ; xu ping ; gao xiao peng ; liu bin
..............page:1785-1787
Analysis and research of topology discovery strategy for MANET
ye xia ; li jun shan ; zhang
..............page:1629-1632,1637
Function optimization problem based on genetic harmony algorithm
han hong yan ; pan quan ke ; ren wen juan ; zhang feng rong
..............page:1723-1725
Bicycle recognition and parameter fetch in multi-traffic scenes
sheng neng ; wang hui ; liu zuo
..............page:1974-1976
Research of embedded monitoring system based on layer architecture
chen yi hong ; feng quan yuan ; li gao ping ; cheng jiang
..............page:1749-1752
MPEG-2 to H.264 downscaling transcoding for mobile devices
xia ding yuan ; yuan wei jun
..............page:1991-1993
Shot segmentation algorithm for visual media retrieval
liu pei zhong ; wang shou jue
..............page:1935-1937
Cultural algorithm for solving constrained optimization problems
huang he ; wang bo ; fan xiao li
..............page:1643-1647
Multi-focus image fusion based on localized Gabor energy
lu zhen kun ; yu zhen ming
..............page:1944-1947,1951
New normalized fractal watermarking scheme based on pseudo-Zernike moments
zhang yu han ; miao xi kui ; sun jin guang
..............page:1863-1866
Research and application on similarity search algorithm in graph database
meng jun ping ; chen li ; ma wen ning ; li hua
..............page:1813-1815,1819
Survey of research on physical attack-resistant secure memory techniques
cheng tao ; gu da wu ; hou fang yong ; zhang zuo zuo
..............page:1601-1605
Multi-swarm and multi-hierarchy co-evolution algorithm forconstrained optimization problems and its application
zhang chuang ye ; he deng xu ; mo yuan bin
..............page:1638-1642,1647
Research for resisting buffer overflow attack technologies of Vista
wei li feng ; jiang rong ; zhao dong
..............page:1853-1855,1881
Analysis on multiuser diversity of MIMO MRC systems under imperfect channel state information
tang dong ; huang gao fei ; lv ming xia
..............page:1925-1927
Online segmenting time series stream:deterministic finite automata method
chen sheng li ; li jun kui ; liu xiao dong
..............page:1809-1812
Research and implementation of high performance and interoperable OGC WMS
zhang fan ; hu chun yang ; han jun
..............page:1732-1736
Face recognition based on confidence measure discriminative EHMM
zhang lian xing ; luo lie
..............page:1987-1990
Database backup method based on linear-chain Delta compression
wang can ; qin zhi guang ; wang juan ; feng chao sheng
..............page:1791-1795
Image denoising based on wave atoms and total variation
song yi mei ; lu cheng wu ; song guo xiang
..............page:1962-1964
Parallel algorithm for pair-wise sequence LCS problem on heterogeneous cluster computing systems
xu li li ; wei ying ; luo hai peng ; zhang lin cai
..............page:1669-1671,1682
New multi-objective particle swarm optimization based on extended individual memory
zhang guo an ; zhou chao ; zhou zuo
..............page:1665-1668
New target coverage algorithm in dynamic vision sensor networks
peng li ; wang mao hai ; zhao long
..............page:1708-1710
Face recognition method by fusion local singular value features
zhou de xiang ; gao shan ; tan yu bo ; liao hai bin
..............page:1952-1954,1958
AOA based trust evaluation scheme for Sybil attack detection in WSN
zhang yan ; fan ke feng ; zhang su bing ; mo zuo
..............page:1847-1849,1866
Research and improvement of fairness in temporal logic of actions
tang zheng zuo ; li jun tao ; li xiang
..............page:1788-1790
SOA-based application integration framework of gear enterprise
li ju bo ; deng xiao zhong ; xu ai jun ; li tian xing ; zhang hua
..............page:1760-1763
Simplified SIFT algorithm and application in trademark image retrieval
liu rui ; peng jin ye ; li zhan
..............page:1998-2000
Effective method for constructing const characteristic in 3D face modal
lin zeng gang ; zhang yan ning ; guo zhe
..............page:1938-1940,1943
Digital watermarking algorithm based on DWT and SVD
zhou peng ying ; shen lei ; tian xiao lin ; xia shao zuo
..............page:1896-1897,1910
Further feature based fuzzy classification for context change awareness in pervasive computing
qian peng jiang ; wang shi tong ; yan hui qin
..............page:1648-1652
Architecture description language of software oriented self-adaptive
gao jun ; shen cai liang ; zheng mei fang ; li chang yun
..............page:1796-1801
Web services selection algorithm with QoS global optimal
wang yang yang ; li jun ; chen zhi guo ; meng zuo ; ding hai yan
..............page:1659-1661
Fuzzy differential evolution identification method of flight control surface faults
gu wei ; li li li ; huang zhi yi ; zhang wei guo
..............page:1782-1784
Research overview of simulation of vehicular Ad hoc networks
huo mei mei ; zheng zeng wei ; zhou xiao wei
..............page:1614-1620
Web service composition path searching for optimizing virtual workflow of collaborative commerce
gu tie jun ; tang bing yong ; ma xi jun
..............page:1767-1770
Adaptive estimate method for multi-baseline InSAR phase
nie jun zuo ; yang min
..............page:1928-1930
(1+u+u2)-cyclic codes over F2+Uf2+U2f2
yu hai feng ; zhu shi xin
..............page:1845-1846,1859
Novel coding scheme for robust distributed data retrieval in storage grid
xu gong hua ; deng shan zheng ; yang jun
..............page:1717-1719
Intrusion detection for routing layer of MANET based on SVM
zhou yong hao ; li ou ; liu yang
..............page:1873-1875,1878
Shortest path selection approach based on dynamic traffic simulation models
yu yan fang ; lu jun
..............page:1662-1664
Scheduling scheme for tracking based on wireless sensor network
wang xin ; li xiao juan ; fang gui ming ; zhang wei gong
..............page:1740-1742,1766
Improved DCNON segmentation algorithm based on coupled potential diffract-detection
zuo yu tang ; hu hai ; wang zuo rong ; chen tian
..............page:1994-1997
Convergence proof for generic clonal selection algorithm
fang xian jin ; li long zuo
..............page:1683-1685,1689
Method of multi-agent based simulation modeling for military logistics
han ren dong ; liu ke cheng ; ju yan bing ; cui chun sheng
..............page:1756-1759
Research on metrics of network survivability
ming liang ; wang dong xia ; zhang lu feng ; wang chun lei
..............page:1850-1852
Survey of routing schemes in delay tolerant mobile sensor networks
li qiao qin ; liu ming ; zeng jia zhi
..............page:1611-1613,1620
BSS switch algorithm based on kurtosis and applications in blind separation of speech signal
liang shu fen ; jiang tai hui
..............page:1753-1755,1759
Non-blind watermarking based on on-line handwriting signature features
zuo zhi ; zheng jian bin ; zhan en qi
..............page:1905-1907
Similar curvature edge collapse simplification based on octree
zhang guo ; liu xu min
..............page:1955-1958
Method of reverse nearest neighbor queries using VARdnn-Tree
he yun bin ; hao zhong xiao
..............page:1816-1819
Survey on research of driver fatigue detection technology
yang hai yan ; jiang xin hua ; nie zuo xian
..............page:1621-1624
Grid workflow scheduling based on greedy algorithm
deng ding lan ; yu jiong ; liu jun xiang ; wang ming jun
..............page:1714-1716,1719
Extraction of thermodynamic quantities of MD simulation with GPU
liu dan ; zhao guang hui ; xia hong xia ; hu lei
..............page:1820-1822
Robust routing algorithm with unknown traffic matrices
wang yong guang ; wang zuo ; wang xiong
..............page:1921-1924,1930
Auto-study diagnosis method based on Bayesian fusion
zhou zhong bao ; ma chao qun ; dong dou dou ; zhou jing lun
..............page:1764-1766
Research of improved integrated optimization model for mode and route in multimodal transportation
kang kai ; niu hai zuo ; zhu yue jie ; zhang wei cun
..............page:1672-1675
Chinese text clustering algorithm using semantic list
ma su qin ; shi hua ji ; li xing yi
..............page:1697-1699,1707
Channel assignment strategy based on interference model in cognitive wireless Mesh networks
zhang guo an ; gu jin zuo ; cao lei
..............page:1914-1917
Iris recognition method based on maximal responding orientation of energy
yuan zuo zuo ; zhao yan ming ; zhang zhi jia
..............page:1977-1980
Task allocation and energy on heterogeneous multi-core processors
peng man man ; xu li chao ; wang ying
..............page:1729-1731,1736
Zero-forcing based coordinated multi-point transmission systems and power allocation
niu yan ping ; tang hong ; tang lun
..............page:1918-1920
Construction and application of eight principal syndrome differentiation knowledge base of tongue diagnosis based on ANN
zhou jin hai ; yang tao ; shen da qing ; wang xu dong
..............page:1771-1772,1790
New dynamic routing problem of logistics and distribution
zhang juan ; liu wan jun
..............page:1680-1682
Extended model and optimization for FOV of camera network
xu yi chun ; lei bang jun
..............page:1676-1679
Adaptive video watermarking based on variable bit planes
jiang hua ; sun zhi gang ; sun jin yong
..............page:1876-1878
Survey on enhancement methods for non-uniform illumination image
liang lin ; he wei ping ; lei lei ; zhang wei ; wang hong xiao
..............page:1625-1628
Research on cipher coprocessor instruction level parallelism compiler
gao fei ; li hong yan ; zhang yong fu
..............page:1633-1637
Virtual trustworthy service for QoS guarantee
yang xiao ning ; yang zhi yi ; sui yu lei ; yang gang
..............page:1823-1825,1829
Efficient algorithm of spatio-temporal join
zou yong gui ; xu hai bo ; liang xin fa ; yang fu ping
..............page:1690-1693,1696
Survey on intrusion detection techniques for high-speed networks
shi zhi cai ; xia yong xiang
..............page:1606-1610
Authenticated tripartite key agreement protocol based on certificateless cryptography
chen jia zuo ; feng jun ; hao zuo
..............page:1902-1904
ptimal models and scheduling algorithm of auto dealership
yang qin ; zhou guo hua ; li yan ru ; zhao zuo
..............page:1686-1689
Solving TSP based on adaptive polymorphic immune ant colony algorithm
wu jian hui ; zhang jing ; liu chao hua
..............page:1653-1658
Research on target localization based on particle swarm and Newton iterated algorithm
yao jin jie ; han zuo
..............page:1700-1701,1713
Pen-based interactive geometry teaching system prototype
xiao de zuo ; tang ning jiu ; huai yan ; li xu ling ; chen rui
..............page:1773-1776
New MAC protocol based on power control for wireless sensor networks
zeng bin jun ; fei yao ping ; li min ; tao zhi jian
..............page:1931-1934
Variable quantizing robust digital watermarking algorithm based on image content sensibility analysis
huang na ; hou gang ; wang guo xiang ; sun da zuo ; chen he xin
..............page:1898-1901
Matching 3D foot to shoe last based on axial deformation algorithm
feng liang cheng ; gao fei ; geng wei dong
..............page:1970-1973
Forward secure key agreement protocol based on signcryption
wei zuo ; zhang chuan rong ; zheng lian qing
..............page:1871-1872
Workload control in autonomic database based on replacement strategy
li hai fang ; li yan biao ; qiang yan
..............page:1830-1832
Understanding of phase congruence and two new phase congruence models
wang jian ming ; zuo ru zhen ; wang zhong wei ; zuo zhi jie
..............page:1948-1951