Application Research of Computers 2008 Issue 4 Two improved image restoration methods applied in COSM
Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2008 Issue 4
Two improved image restoration methods applied in COSM
ZHAO Yuan-hao;HE Xiao-hai;TAO Qing-chuan;YU Yan-mei
..............page:1081-1083
Novel fast algorithm about multiple face detection
LUO San-ding;ZHOU Lei;SHA Sha
..............page:1079-1080,1083
Load balancing algorithm for heterogeneous P2P systems based on limited transmission
YAO Lei;DAI Guan-zhong;ZHANG Hui-xiang;PAN Wen-ping
..............page:1181-1182,1256
Research on architecture of integrated network management in NGN
JIN Wen-bo;ZHENG Gang
..............page:1183-1185,1221
Novel approach to VoIP traffic identification
ZHANG Guang-xing;CHEN Min;XIE Gao-gang;ZHANG Da-fang
..............page:1186-1188
Multi-constrained QoS-based dynamic multicast routing protocol
GE Le;XUE Xiao-ping;TAO Dan-he
..............page:1189-1192
Directional routing protocol for mobile Ad hoc networks
ZHOU He;CHEN Ji-wei;SHU Yan-tai;LEE Yeng-zhong;GERLA Mario
..............page:1193-1195
Video segmentation method based on block affine classification and Hausdorff tracking
ZHANG Xiao-bo;LIU Wen-yao
..............page:1084-1086,1126
Biarc approach for approximating quadratic uniform B-spline curve
WANG Guo-bing;HOU Zeng-xuan;LU Jian-biao;WU Jun-sheng
..............page:1087-1089
Human motion tracking based on statistical model and genetic particle filter
SHI Hua-wei;XIA Li-min
..............page:1090-1092,1099
Reusable use-oriented access control method
MA Yong-jie;YANG Zhi-min
..............page:1108-1110
Optimization storage and transmission design of management information
LIN Li-xin;JIANG Xin-hua;SHI Rong-hua
..............page:1111-1113
Design of gigabit network monitoring system based on content auditing
JIANG Zhuo-ming;ZHAI Wei-bin;ZHOU Zhen-liu;XU Rong-sheng
..............page:1114-1116
Framework of forensic system against intrusion
ZHOU Bo-wen;DING Li-ping;WANG Yong-ji
..............page:1117-1119
Improvement on one-off public key based on identity
LU Rong-bo;HE Da-ke;WANG Chang-ji
..............page:1139-1141
Multi-proxy multi-signature scheme based on elliptic curve
SHI Rong-hua;WANG Qiu-guo;JIANG Ling
..............page:1142-1143,1146
Image spatial domain watermark algorithm based on general Arnold mapping and neural network
HUANG Da-zu;CHEN Zhi-gang;ZHU Cong-xu
..............page:1144-1146
New Bayes e-mail filtering model based on risk minimization
WANG Tao;QIU Guoyong;HE Ju-hou
..............page:1147-1148,1153
Twodimensional cellular automata based bidirectional toggle parallel encryption model
XIAO Jia;HU Gu-yu;ZHAO Xue-long;CHEN Ning-jun
..............page:1149-1153
Research of trust valuation model in grid environment
LU Feng;WU Hui-zhong
..............page:1157-1159,1170
Mobile agent based application follow-me mobility in pervasive computing
YU Ping;MA Xiao-xing;ZHOU Yu;TAO Xian-ping;LV Jian
..............page:1160-1163,1177
Research on spatial multiplexing in wireless sensor networks
SUN Pei-gang;CHEN Yan;ZHAO Hai;SU Wei-ji;ZHANG Xi-yuan;ZHOU Jian;WU Jing-po
..............page:1164-1166
Design and implementation of SRP-based IB-SAN
JIANG Zhi-ying;HAN Ji-zhong;WANG Xi-gui
..............page:1167-1170
E-mail mining algorithm based on structure: EHITS
XIONG Jin;LIU Yue;BAI Shuo
..............page:1171-1174
Analysis of stability of slotted ALOHA system
WANG Yong;HU Yi-hua
..............page:1175-1177
Research of novel packet fair scheduling algorithm
ZHONG Lin-hua;WU Zhi-mei;ZHENG Zhong;WANG Xian-lei;JIANG He
..............page:1178-1180,1195
Adpative load-balancing schedule scheme for network processor
WANG Jing;ZHANG Sheng-bing;ZHANG Meng;WANG Hai
..............page:1196-1198
One method of IPv6 going through CDMA network
WEI Da;LIU Yan-heng;WANG Jian;TIAN Da-xin
..............page:1199-1200,1203
Energy-efficient data collection protocol in wireless sensor networks
LU Ke-zhong;LIN Xiao-hui;LIU Ying-ling;WANG Hui
..............page:1201-1203
Research on ECA-based dynamic data exchange in Internet supported collaborative design
ZHOU Wei;CHEN Xiao-an;HE Ye;LUO Tian-hong
..............page:1204-1206
Study on band selection algorithms of hyperspectral image data
SU Hong-jun;DU Pei-jun;SHENG Ye-hua
..............page:1093-1096
Multilevel minimum cross entropy threshold selection based on quantum particle swarm optimization
ZHAO Yong;FANG Zong-de;PANG Hui;WANG Kan-wei
..............page:1097-1099
Brain MR image segmentation based on improved Snake model
FU Yi-li;LI Xiao-bo;GAO Wen-peng;WANG Shu-guo
..............page:1100-1102
Bayesian image denoising using HMT models in complex Daubechies wavelet domain
CHU Biao;LI Xin;ZHU Gong-qin;WANG Jin-ju
..............page:1103-1104,1110
Pseudo-spectra image compression based on singular value decomposition
XU Fa-qiang;WAN Xiao-xia
..............page:1105-1107
Research on log-system based on connect tracing model for storage optimize
LI Ning-bo;ZHU Yan
..............page:1120-1122,1141
New fast re-authentication scheme in 3G-WLAN interworking
HE Qing-lin;WU Chuan-kun
..............page:1123-1126
Application of agent in distributed intrusion detection system
MA Zhan-fei;ZHENG Xue-feng
..............page:1127-1129
Remark on provable security of public key cryptographic schemes
REN Yan-li;GU Da-wu
..............page:1130-1133
Statistical testing of component reuse using Markov chain usage model
MA Chun-yan;HU Fei;ZHANG Yun-peng
..............page:1051-1053,1056
Survey on stability and fairness research of congestion control algorithms for Internet
ZENG Zhen-ping;WANG Bin-wen;DAI Zhi-cheng
..............page:1046-1050,1068
MacWilliams identities of linear codes over ring F2+vF2
SHI Min-jia;ZHU Shi-xin;LI Ping
..............page:1134-1135,1174
Cloud decision in artificial immune system
SUN Hong;LIANG Yi-wen;LIU Chang
..............page:1136-1138
Key issues of digital library distributed search based on P2P technology
PAN Wei;GUO Xi-juan
..............page:1240-1242,1274
Web Spam detection based on structural and temporal information
WU Lei;GAO Bin;LI Jing
..............page:1243-1246
Study of closed-loop decision support system based on telecommunication field
WANG Xiao-hong;WANG Guo-ren;YU Yong-qian;HONG Yang
..............page:1247-1249,1253
IPv6 supporting multi-view video on demand system
CHU Yu-zhi;SUN Li-feng;ZHONG Yu-zhuo;XIE Jian
..............page:1250-1253
Embedded system design for biochip scanner
HU Xiang-yu;TANG Xiao-ping;YAN Wei;LUO Zheng-quan
..............page:1254-1256
Classified method of disposing library function in binary translation
XIE Hai-bin;ZHANG Zhao-qing;WU Cheng-gang;FENG Xiao-bing
..............page:1057-1059,1064
Blind extraction algorithm of nonstationary source based on second-order statistics
WANG Wei-hua;HUANG Feng-gang
..............page:1054-1056
Analysis and design of X86 instruction compatible 32bit multiplier
WANG De-li;GAO De-yuan;YANG Lei
..............page:1264-1267
Design and implementation of multi configuration terminal module in RAID systems
TAN Zhi-hu;WAN Ji-guang;HE Li
..............page:1268-1270
Research and implementation of model based business process modeling platform
CHEN Jian-hui;XIA Yong-lin;WEI Jun
..............page:1271-1274
Research on on-line fuzzy rule self-adjusting algorithm and its simulation
ZHANG Da-bin;LI Yuan-xiang;XIA Xue-wen
..............page:1025-1027
Automated text labeling in computer aided drawing
LIU Yan-hua;YE Guo-hua
..............page:1023-1024,1032
Design simulation platform for multi-robot path planning
ZHANG Han-dong;ZHANG Yong-qiang
..............page:1020-1022
Design and implementation of RModeler based on role modeling
WEN Bin;MAO Xiao-guang
..............page:1257-1260
Designing and applying of data acquisition system of bill characteristic based on embedded system
XU Peng-cheng;HE Jian-biao;HE Qing
..............page:1261-1263
Survey on techniques of integrated instruction scheduling and register allocation
HUANG Lei;FENG Xiao-bing
..............page:979-982
Research progress on hierarchical reinforcement learning
PENG Zhi-ping;LI Shao-ping
..............page:974-978
Review for strategic perspectives of flexibility in environmental uncertainty
ZHANG Yi-bin;CHEN Jie
..............page:970-973,985
Survey of detection on DDoS attack
YAN Fen;WANG Jia-jia;ZHAO Jin-feng;YIN Xin-chun
..............page:966-969
Survey on human eyes detection in images
TANG Jin;XU Hai-zhu;WANG Li
..............page:961-965
Genetic algorithm based on predatory search strategy
ZHANG Ding-xue;GUAN Zhi-hong;LIU Xin-zhi
..............page:1006-1007,1012
New algorithm for mining sequential patterns
HU Xue-gang;ZHANG Yuan-yuan
..............page:1003-1005
Study and implementation of map search engine model based on Lucene combined with GML/SVG
HU Zheng-guang;CHI Tian-he;BI Jian-tao
..............page:1275-1277,1280
Improved WfMS for ERP
ZHANG Zhao-hui;LIU Da-you
..............page:1278-1280
Implementation of automatic fire detection in video sequences
YAN Yun-yang;GAO Shang-bing;GUO Zhi-bo;SHENG Ming-chao
..............page:1075-1078
Component service-pattern specification
TANG Long-ye;WANG Zhi-jian;CHENG Yong-shang
..............page:1073-1074,1078
Research and application of middleware-based software framework for industrial robot
SONG Hong-jun;LI Yi-bin;ZHOU Feng-yu;JIA Lei
..............page:1069-1072
Integration of CAX/PDM/ERP based on SOA
CAI Li-gang;ZHANG Ying;ZHANG Jian-she;HONG Tao;ZHANG Zheng-yi
..............page:1065-1068
Robust coding scheme for H.264 video transmission over wireless network
LI Ping;TANG Kun;LI Cheng-jie
..............page:1207-1210
Experimental study on locality-aware application layer multicast
WU Wei-yu;CHEN Yang;DENG Bei-xing;LI Xing
..............page:1211-1213
Anonymous on-demand multicast routing protocol in wireless Ad hoc networks
WANG Wei-ping;ZOU Xiao-dong
..............page:1214-1217
Constructing method of large scale ubiquitous RFID network
XUE Xiao-ping;ZHANG Si-dong;WANG Xiao-ping;LI Hong-jie
..............page:1218-1221
Architecture of distributed and collaborative scheduling system based on workflow
YU Xiao-yi;SUN Shu-dong;SI Shu-bin;CHU Wei
..............page:1060-1064
Study of self-evolutionary method of e-service composition based on bio-network
SUN Hong-bin;DING Yong-sheng
..............page:999-1002
Implementation and research of component retrieval algorithm based on XML and tree relaxation matching
YAO Quan-zhu;DING Xin-cun;RAN Zhan-jun
..............page:1013-1015,1019
Applicationofmixedintelligencealgorithminmulti-constrainedoptimizationproblem
ZHU Yu-ping;YE Da-zhen;WANG Suo-ping;WU Xin-yu
..............page:1039-1042,1045
Individual variation ant colony optimization algorithm and its application
PEI Zhi-li;WANG Jian;SHI Xiao-hu;LIANG Yan-chun;KONG Ying
..............page:1036-1038
Improving frequent pattern clustering arithmetic-oriented website structure optimization
CHENG Shu-tong;XU Cong-fu;DAN Hong-wei
..............page:1222-1223,1236
P2P traffic measurement system based on Netfilter
YUE Yan-hui;LI Zhi-tang;LIU Bin
..............page:1224-1226
Hybrid cluster-head selected algorithm for wireless sensor networks
YANG Bin;YANG Jian-hong;XU Jin-wu;YANG De-bin
..............page:1227-1229,1260
File replication strategy based on supermarket model
SHEN Wei;ZHOU Yu;LIU Fang-ai
..............page:1230-1232
Integrated handover framework for heterogeneous wireless networks in MIPv6
WEI Wei;LOU Yi-hua;WANG Jian-bai
..............page:1233-1236
Multi-path routing algorithm for real-time monitoring oriented hybrid wireless sensor network
YANG Xi;LIU Shao-qiang;FAN Xiao-ping;QU Zhi-hua
..............page:1237-1239
Quantum signal processing
WANG Peng;LI Jian-ping
..............page:1033-1035,1038
Multi-round algorithm for scheduling divisible workloads on heterogeneous cluster computing systems
LI Xian-ning;ZHONG Cheng;YANG Feng
..............page:1028-1032
Algorithm of BN structural learning based on quantum genetic
LI Xian-jie;ZHANG You-sheng;LI Jian-fei
..............page:996-998,1002
Performance evaluation of service-oriented business process based on AHP and system-simulation
ZENG Sen;HUANG Shuang-xi;FAN Yu-shun
..............page:991-995
Study on wetland information extraction of remote sensing images based on support vector machine
YAO Yun-jun;ZHANG Ze-xun;QIN Qi-ming;QIU Yun-feng
..............page:989-990,995
Research on text clustering algorithm based on association rule
QU Shou-ning;WANG Qin;ZOU Yan;ZHU Qiang
..............page:986-988