Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2009 Issue 3
Collaborative model research of multi-source personalized system based on middleware
ZHANG Fu-zhi;REN Zhi-gang;OUYANG Su-zhen
..............page:904-907
Research on flexibility oriented business object model
SHEN Li-min;WANG Xian-feng;CAI Cui-yan
..............page:908-910,916
Design of software fault-tolerant system based on RTEMS
LI Xiao-qun;ZHANG Wen-jun;PAN Yuan-ming;XIAO He;GUO Liang;JIANG Zhi-ying
..............page:911-913
Adaptive mechanism and strategy in embedded component
WAN Yun-qiang;CHEN Wen-yu;ZHANG Yan
..............page:914-916
Study on network-based innovation system of open source software production
XU Hao;ZHANG Zhen-gang;LAI Cong-cong;DING Zhuo
..............page:900-903
Grid load balancing scheduling algorithm based on statistics thinking
LU Bin;ZHANG Hong-bin
..............page:897-899
Algorithm of program slicing based on reverse program flow
BAI Wen-ke;YANG Xian-chun;XU Man-wu
..............page:920-922,926
Flexible e-business recommendation system
JIANG Guo-rui;QING Hai;HUANG Ti-yun
..............page:930-932,976
Filtering algorithm of junk SMS based on sample
ZHONG Yan-hui;FU Yan;CHEN An-long;GUAN Na
..............page:933-935
Development of HPI device driver under Windows CE.NET
LI Zheng-yi;TANG Xiao-qi
..............page:936-938
Distributed WebGIS model based on ArcSDE and SVG
YUAN Man;YU Chun-sheng;NIE Jing
..............page:939-941
Research and development of remote laboratory based on multi-agent system
TANG Hong-ru;SONG Ai-guo;ZHANG Li-hong;BAO Jia-tong;GUO Yan
..............page:942-945
E-commerce website structure optimization based on hidden Markov model
XI Dong-qin;LIN Wen-long;ZHU Jiong-lin
..............page:946-948
Moving vehicle detection algorithm based on improved dynamic threshold
LI Meng-xin;WU Cheng-dong
..............page:953-955
Design of coordinated multi-satellite reconnaissance mission planning system based on multi-agent technique
CHENG Si-wei;CHEN Ke-wei;ZHANG Hui;CHEN Jing
..............page:956-958
Research and design of remote logical volume replication system based on FreeBSD
ZHAN Wen-tao;LI Zhan-huai;WANG Chao;JIANG Nan
..............page:959-962
Solution of mobile GIS for Wuhan urban grid management system
GUO Wei;LIU Yi;ZHU Xin-yan
..............page:963-965
Research and practice of software test policies based on black box testing
LI Ning;LI Zhan-huai
..............page:923-926
Keyword driven automated testing framework
JIE Hui;LAN Yu-qing;LUO Pei
..............page:927-929
Purging algorithm of process change logs with complex changing transactions
XIE Yi;XIAO Wei-dong;XU Kun
..............page:893-896
Resource scheduling for distributed simulation application in grid environment
HONG Liu;WAN Hu;GONG Jing-wen;CHEN Xue-guang
..............page:890-892,896
Algorithm in clustering location data for uncertain data mining
LI Qing-feng;ZHOU Xian-cheng;WANG Li;ZHOU Wei-lin
..............page:887-889
Research and application of breadth-first reasoning method based on match degree
AN Li;WANG Jian-lin;BAI Yan-mei;MIAO Yan-rong
..............page:884-886
Completing data algorithms based on probability similarity
LI Ping;WU Qi-zong
..............page:881-883
Novel hybrid algorithm for clustering analysis
HE Deng-xu;QU Liang-dong
..............page:879-880
New similarity-based approach for ontology mapping
WU Ya-juan;CHEN Yao;SHANG Fu-hua
..............page:870-872
Resource allocation optimization model based on DCSP
XIAO Yu;XU Wei;CHENG Wen-qing
..............page:864-866
Novel particle dynamical evolutionary algorithm for spatial data clustering
HUANG Xue-yu;JI Bing-chuan;PAN Wei-feng;LIU Cong;XU Hong-wei
..............page:860-863
Research on collision detection methods based on Snake
LI Yan-bo;YIN Gui-sheng;ZHANG Jing
..............page:855-857
One-one mapping-based algorithm for attribute reduction of concept lattice
LV Yue-jin;LI Jin-hai
..............page:849-851
Design of mixed H2/H∞ control systems based on differential evolution algorithm and LMIs
LIU Shu-bo;ZHAO Ding-xuan;CUI Gong-jie
..............page:846-848
Context-aware active task discovery for pervasive computing
HUANG Run-cai;ZHOU Ji-liang;SUN Dao-qing;CAO Qi-ying
..............page:843-845,848
Visualized fault diagnosis method based on Radviz and its optimization
XU Yong-hong;HONG Wen-xue;CHEN Ming-ming
..............page:840-842
Travel behavior analysis using genetic clustering algorithm
XIANYU Jian-chuan;JUAN Zhi-cai
..............page:836-839
Bounds for two multicolor vertex Folkman numbers
SHAO Ze-hui;XU Xiao-dong;LUO Hai-peng
..............page:834-835
Protein secondary structure predict based on conditional random fields
LUO Liang;SHAO Ze-hui
..............page:832-833,839
Design of DNA algorithm to construct diagonal Ramsey graph
GENG Xiu-tang;CHEN Zhi-hua
..............page:827-831
Survey of problems and resolutions of Internet routing and addressing
LIU Xiao-dong;LI Qi;ZHENG Lian-wei;LIANG Hong-ying
..............page:823-826
Methods summary for performance evaluation of complex electronic information system
HU Yu-nong;XIA Zheng-hong;WANG Jun-feng;BAI Song-hao
..............page:819-822
Research and evaluation of scalable packet classification algorithms
ZHOU Jing-di;CHENG Dong-nian;LIU Qin-rang;CAO Min
..............page:814-818,826
Overviews on research of back-propagation algorithm based on derivative optimization
ZHANG Fang-fang;HE Juan;LI Ming-jun
..............page:809-813
Research of mobility model in Ad hoc network
XU Xin-xin;WANG Ling;ZHANG Heng-yang
..............page:804-808
Research for clustering tendency
CHU Na;MA Li-zhuang;WANG Yan
..............page:801-803,822
On-line measurement of lumber moisture content based on wavelet packet
SUN Li-ping;LIU De-sheng;CAO Jun
..............page:966-967
Study on model of multi-level cost management system for iron and steel enterprise group
LIU Xiao-bing;WANG Ya-jun;MENG Qiu-nan
..............page:968-970,983
UAV collaborative tracking system modeling based on object-oriented Petri net
TAN Shen-qiang;GONG Hua-jun;WANG Biao;YANG Zhong
..............page:971-973
Design and implementation of smart home embedded system
SONG Wei;DONG Yun-wei
..............page:974-976
Smart home inference system combining CBR and RBR
WU Xiao;CHONG Yu-zhen;NI Hong-bo;WANG Hai-peng
..............page:977-979
Research of policy based QoS two-level negotiation mechanism in mobile environment
LIU Xue-jie;LIU Yan-heng;LIU Lin;LI Yan
..............page:1013-1017
Fast digital video forensics method based on object detection
ZHOU Hong;WANG Guo-yin;CHEN Long;WANG Wei
..............page:1089-1091
Blind detection of digital forgery image based on distribution of noise
LI Zhe;ZHENG Jiang-bin
..............page:1092-1094
Method of establishing VPN security tunnel based on ECC
YU Xiao;LI Yun-xing;WANG Xin;SUI Yong-xin
..............page:1095-1097,1100
Extended access control approach based on role and group
XING Han-fa;XU Li-lin;LEI Ying
..............page:1098-1100
M2ASR: new multi-path mutual anonymous source routing protocol
DU Xiu-juan;JIN Zhi-gang
..............page:1018-1021
Fairness research of wireless Mesh networks based on deficit round robin
WEN Shi-qi;RONG Lu;ZHAO Xiao-qun;XU Shang-zhi
..............page:1022-1025
MAC protocol optimization algorithm of wireless Ad hoc networks
LV Na;XU De-min;ZOU Xiang-yi
..............page:1026-1028
Research of CSCW's application sharing mechanism based on Ad hoc networks
XUE Sheng-jun;ZHOU Heng
..............page:1029-1032
Rumor routing based on ant colony optimization for wireless sensor networks
CUI Yan-rong;CAO Jia-heng;HE Ning;ZHU Fan
..............page:1033-1035
Security protocol for ubiquitous computing network design by composition method
YANG Fan;LI Tong;CAO Qi-ying
..............page:1073-1075,1108
Data caching method for network backup system
KANG Shi-liang;ZHAO Kui;HU Xiao-qin;HUANG Cheng-ji;CHEN Dong-ping;LI Guo-feng
..............page:1076-1078
Intrusion detection framework based on network security knowledge databases
XIAO Yun;WANG Xuan-hong
..............page:1079-1081
Information hiding algorithm based on three-pixel block
YU Xiao-yang;HUANG Hai-xia;ZHANG Jian;NING Zi-yu;DONG Yan-bin
..............page:1082-1083,1103
Research on access control model based on post and role
WANG Tao;WANG Yan-zhang
..............page:1084-1085
New method of software vulnerability detection based on fuzzing
SHAO Lin;ZHANG Xiao-song;SU En-biao
..............page:1086-1088
Novelty detection based on Gaussian mixture models in ICA space
PEI Zhi-jun;TAO Jian-hua
..............page:1142-1145
Adaptive video text-size detection algorithm
XUE Wei;DU Si-dan;WU Shu-kai
..............page:1146-1147,1159
Ear recognition based on wavelet transform and orthogonal centroids algorithm
ZHAO Hai-long;MU Zhi-chun;ZHANG Xia
..............page:1148-1150
Analysis of AIMD algorithm to fairness convergence
DAI Hang;MU De-jun;ZHANG Hui-xiang
..............page:1063-1065
Research of image blur-invariants using discrete orthogonal moments
GAO Yue-fang;CHEN Guo-hua;WANG Min-qin;XIAO Su
..............page:1154-1156
Application of bio-vision bionics on computer vision
WANG Hong-mei;LI Yan-jun;ZHANG Ke
..............page:1157-1159
Research of perception fusion model of artificial fish in virtual environment
MENG Xian-yu;XUE Yan-rong;BAN Xiao-juan
..............page:1160-1162
Video hand tracking algorithm based on hybrid CamShift and Kalman filter
LUO Yuan;LI Ling;ZHANG Bai-sheng;YANG Hong-mei
..............page:1163-1165
False color fusion for multi-band SAR images based on nonsubsampled Contourlet
WANG Jin-long;SONG Jian-she;CAI Xing-fu
..............page:1166-1168
Quantitative method for analyzing public opinions on Internet
YANG Pin;LI Tao;ZHAO Kui
..............page:1066-1068,1078
Study of identity-based encryption and origin authentication for grid
WANG Bin;CHENG Ying
..............page:1069-1070,1094
Dynamic expression of digital rights by rewriting license
HAN Li-long;LIU Qing-tang;YANG Zong-kai
..............page:1071-1072,1111
New approach to splicing detection
ZHANG Zhen;BIAN Yu-kun;KANG Ji-quan;REN Yuan
..............page:1127-1130
Color edge detection based on CNN's block adaptive
JIANG Qing-ling;LIU Wan-jun;ZHANG Chuang
..............page:1131-1134
Image fusion based on nonsubsampled Contourlet transform and evaluation
LI Qi-shen;LI Jun-feng;JIANG Ze-tao
..............page:1138-1141,1150
Vehicle category recognition based on Log-Gabor wavelets transform and DS theory
LI Min;HUANG Xi-yue;SHEN Zhi-xi;LI Xiao-wei
..............page:1151-1153,1165
Secure authentication and application of UKey based on ECC algorithm
XU Xiang-yang;ZENG Hai-qun;SHAO Kai;WU Kun
..............page:1101-1103
Fast algorithm for scalar multiplication in elliptic curves cryptography
LIU Lian-hao;SHEN Yong
..............page:1104-1108
Anonymity model based on expectation of sensitive attribute value
WANG Qian;QU Sheng-zhi;SHI Xiang-ling
..............page:1109-1111
Dynamic mixed private key management strategy of clustering WSN
LI Lan-ying;HU Lei;JIANG Xiu-li
..............page:1112-1115,1118
Child-brother tree-based deleted file recovery algorithm on Windows FAT32
ZHANG Hua;LIU Nai-qi;GUO Jian-dong
..............page:1116-1118
Mining and taxonomy of network attack effects
HU Ying;ZHENG Kang-feng;YANG Yi-xian
..............page:1119-1122
Filter of erotic images based on IE
JIANG Li-ya;HUO Hong-tao
..............page:1180-1182
Learning manifold from dynamic video sequences
HU Zhao-hua;SONG Yao-liang
..............page:1183-1185
Application of dynamic perfusion imaging in computer aided diagnosis based on model for capillary exchange
FANG Chun-lan;CHEN Lei-ting;ZHENG Rui;LEI Yu
..............page:1189-1191
Electronic image stabilizing method research for developing image in omni-directional camera system
ZHU Qi-dan;MA Hong-ye;ZUO Xiao-xiang
..............page:1192-1194
New adaptive hybrid filter for image de-noising
DU Hai-shun;WANG Feng-quan
..............page:1195-1197,1200
Fuzzy detection and filtering of impulse noise for color images
MAN Li-hong;WANG Shi-tong
..............page:1198-1200
Auto-generation algorithm of outside cable match drawing based on cable route graph in railway signal engineering design
LV Xing-shou;WANG Xiao-ping;WANG An-rong;JIA Yi-mei
..............page:1169-1170,1179
Bayesian decision theory relevance feedback method based on minimum risk
WEN Chun-yong;ZHU Xin-zhong;XU Hui-ying;ZHAO Jian-min
..............page:1171-1173
Image match algorithm based on hue component of color image
LAN Hai-bin;WANG Ping;ZHAO Bao-jun
..............page:1174-1176,1188
Adaptive multi-directions algorithm of fuzzy mathematical morphology for edge detection
WANG Lin-lin;YANG Fan;WANG Zuo-cheng
..............page:1177-1179
Computing reliability of wireless sensor network
XU Ran;GAO Sui-xiang;DONG Ping;HUANG Fei
..............page:987-990,1004
Research on multiple QoS constrained routing mechanism based on wireless Mesh network
ZHANG Ke-fei;YANG Shou-bao;HU Yun;TENG Da
..............page:994-996,1028
Study on WSN's topology control based on TopDisc algorithm
ZHU Yong-li;CHEN Tao
..............page:1001-1004
MAC layer adaptive rate congestion control strategy in Ad hoc network
JIANG Dao-xia;PAN Shou-wei;XU Jia;LIU Feng-yu
..............page:1005-1009
Geographic routing algorithm in Ad hoc networks
YANG Jian-jun;MAO Yu-ming;SUN Jian
..............page:1010-1012
Reliability research of E-2DMesh network with node and link failures
XIAO Jie;HUANG Yi-hai;LIANG Jia-rong
..............page:1036-1038
Design and implementation of network multicast in streaming media direct broadcast system
WANG Shu-hui;LIN Yu-song;WANG Zong-min
..............page:1039-1041
PC cluster system build for parallel computing
LI Min;ZHANG Yi-sheng;LI De-qun
..............page:1042-1043,1062
Research and design of video surveillance system as service of mobile streaming media
GAO Song;ZHAO Fang;SONG Mao-qiang
..............page:1044-1046,1065
Crawling technology on eDonkey network and characteristics analysis
WU Qi;LIU Yi;CHEN Xing-shu;WANG Wen-xian;ZHENG Bing-lun
..............page:1047-1049
Optimization of topology for P2P networks based on efficient communication ratio of node
DENG Zhang-lin;TANG Da-quan;ZHANG Wei-ming
..............page:1050-1053
Virtual global database for P2P networks
MA Qin-yong;NIE Dong-dong;WANG Shen-kang
..............page:1054-1058
Improved algorithm of DVBMT problem
YANG Chun-de;YANG Xiao-tian
..............page:1059-1062