Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2009 Issue 6
Research of feature extraction and selection for spam image identification
CHENG Hong-rong;QIN Zhi-guang;WAN Ming-cheng;ZENG Zhi-hua
..............page:2001-2003
Overview of methods of fuzzy system identification on T-S model
JIANG Qiang;XIAO Jian;HE Du-yi;JIANG Wei;WANG Meng-ling
..............page:2008-2012
State-of-art on website structure optimization techniques
CHENG Shu-tong;XU Cong-fu
..............page:2013-2015,2019
New reconfigurable general platform for routing/switching nodes
LI Peng;LAN Ju-long
..............page:2016-2019
Review on GPU-based volume rendering
FEI Yao-ping;HU Hui-jun;CHEN Song-qiao;LI Min
..............page:2020-2022,2026
Research of trust SLP based on stochastic Petri net
LEI Wan-bao;ZHU Yi-an
..............page:2023-2026
ITK,VTK and their application of new progress
ZHOU Zhen-huan;XIAO Ru;WU Jian-hua;ZHAO Ming;XIAHOU Chun-hong
..............page:2027-2031
Overview of some optimization algorithm based on bionic theory
LI Xue-mei;ZHANG Su-qin
..............page:2032-2034
Anti-cheating on search engine optimization
WANG Li-gang;ZHAO Zheng-wen;ZHAO Xin-xin
..............page:2035-2037
Incremental clustering algorithm based on grid
YIN Gui-sheng;YU Xiang;NING Hui
..............page:2038-2040
Detecting community in complex networks using K-means cluster algorithm
ZHAO Feng-xia;XIE Fu-ding
..............page:2041-2043,2049
Application of improved support vector classifier in customer churn prediction
XIA Guo-en;SHAO Pei-ji
..............page:2044-2046,2052
Novel differential evolution algorithm for function optimization
DENG Chang-shou;LIANG Chang-yong
..............page:2047-2049
New approach for fuzzy critical path
ZHANG Hong-guo;CHEN Shao-wen
..............page:2050-2052
Recoverable implementation of K-means clustering algorithm
HUANG Zhi-hua;WEN Bu-ying;WANG Guo-qian
..............page:2053-2055,2069
Adaptive evolutionary strategy based on feedback and chaotic mutation
LI Guang-wen;JIA Qiu-ling;LIU Xiao-xiong;ZHANG Wei-guo
..............page:2056-2058,2061
Study and application of support vector machines and particle swarm algorithm in optimization design
XIANG Guo-qi;HUANG Da-gui;YAN Zhi-jian
..............page:2059-2061
Hybrid genetic algorithm for interval route optimization problem in multimodal transport
JING Xiang-he;SHANG Wen-zhong;HE Jing;YAN Zhen-ni
..............page:2062-2065
Shortest path algorithm under dynamic road network
SONG Xiao-yu;YU Lan-yang;SUN Huan-liang
..............page:2066-2069
Research of post logistic VRP with multi-objective based on PACA
LV Xiong-wei;ZHAO Da;LI Jun
..............page:2070-2073,2078
Double-classification strategy and its implementation algorithm
LING Ping;ZHOU Chun-guang
..............page:2074-2078
Uncertain resource-constrained project robust scheduling algorithm
ZHANG Hong-guo;XU Xiao-fei;ZHAN De-chen
..............page:2079-2082,2089
Research of composite thinking in product color intelligent design
KANG Wen-ke;ZHANG Quan;ZHANG Ding-hua
..............page:2083-2085,2100
Spectral-based weighted undirected graph partitioning algorithm
LENG Ming;SUN Ling-yu;YU Song-nian
..............page:2086-2089
Grid real-time scheduling algorithm based on neural network
LI Sheng-xin;DUAN Sheng
..............page:2095-2097,2103
New cloud classifier based on SVM weight vector
ZHU Jie;QIN Liang-xi;LONG Wei-zhe;SU Yong-xiu
..............page:2098-2100
Extension of rough set model in incomplete information system
SHEN Jin-biao
..............page:2101-2103
UAV path planning using improved multiobjective ant colony system
WANG Zhen-hua;ZHANG Wei-guo;LI Guang-wen
..............page:2104-2106,2109
Location privacy protect model for pervasive computing
LIU Heng;WANG Tie-jun;SHE Kun;ZHOU Ming-tian
..............page:2110-2112
Remote password recovery using set reconciliation
FU Bo;LI Jian-ping;WEN Xiao-yang
..............page:2113-2115,2121
Defending P2P from flooding-based DDoS
GENG Ji;MA Xin-xin
..............page:2116-2118
New improved compositive DDoS defence system
LI Yi-bing;HUANG Xu
..............page:2119-2121
Secure and robust image hashing scheme
ZOU Jian-cheng;ZHOU Hong-li;DENG Huan-jun
..............page:2122-2124
Improved forward secure multi-signature scheme
XIA Xiang-sheng;HONG Fan;CUI Guo-hua
..............page:2125-2127,2130
Research of semantic attribute-based access control in federated authentication and authorization
JIANG Hua;LI Xin-you;XIE Sheng-xian;CHEN Chen;LI Jun-qing;ZHANG Sha-sha
..............page:2128-2130
Risk assessment method for network security based on improved triangular fuzzy numbers
SUN Bing;ZHANG Ya-ping;DAI Yin-hua
..............page:2131-2135
High throughput and low lost AES coprocessor implementation
YI Li-hua;ZOU Xue-cheng;LIU Zheng-lin;DAN Yong-ping
..............page:2136-2137
New provably secure identification protocol in standard model
LI Yan-ping
..............page:2138-2140
Research and realization on adaptive framework for false alarms reduction
DUAN Xiang-wen
..............page:2141-2144,2147
Performance analysis of security certificate authority in P2P-based massive terrain navigation
PAN Shao-ming;YU Zhan-wu;LI Rui;WANG Hao
..............page:2145-2147
Evaluation model of multi-attribute comprehensive trust based on gray theory in grid
ZHANG Xu;GAO Cheng-shi;DAI Qing;YAO Hui
..............page:2148-2150
Novel DRM model for copyright tracking
LIU Xiu-fen;FAN Ke-feng;ZHANG Su-bing;MO Wei
..............page:2151-2153
Construct information flow graph based on PDG
ZENG Jian;JU Shi-guang;SONG Xiang-mei
..............page:2154-2157,2164
Certificateless universal designated multi-verifiers signature scheme
HAN Ya-ning;WANG Cai-fen
..............page:2158-2161
Key management scheme based on group-based mode for wireless sensor networks
LIU Hui-jing;LI La-yuan;WANG Guo-fang;LI Chun-lin
..............page:2162-2164
Improved feature selection algorithm in spam filtering based on TF*IDF
CHEN Qi;WU Zhao-hui;YAO Fang;SONG Xiu-rong;ZHANG Fu-zhi
..............page:2165-2167
Multiple images hiding scheme based on image share
LI Hong-an;LIU Xiao-xia;ZHU Ling-fang;JI Zhou-qiang
..............page:2170-2172
Short group signature with full anonymity for large groups
MA Hai-ying;WANG Zhan-jun;ZHANG Ya-juan
..............page:2173-2176
(p, a)-sensitive k-anonymity:privacy protection model
WANG Qian;ZENG Zi-ping
..............page:2177-2179,2183
Dynamic secure group key agreement based on n-ary trees
GAO Wei;HU Yu-pu;YANG Hong-mei
..............page:2180-2183
Research on routing robustness in wireless sensor networks
YAN Bin;ZHOU Xiao-jia;WANG Hou-jun;LANG Fang-nian
..............page:2184-2186,2204
Independent tasks scheduling algorithm of grid computing platforms on direct acyclic graph
QIAO Fu;ZHANG Guo-yin;LIU Zhong-yan
..............page:2187-2189,2194
Grid-based density control algorithm for sensor networks
YANG Si-qing;LIN Ya-ping;LI Xiao-long;YI Ye-qing
..............page:2190-2194
Efficient minimum unit disks set coverage algorithm in wireless sensor networks
ZHANG Jin;LIU Da-xin;XU Yue-zhu
..............page:2195-2198
Research of probability errors on wireless sensor networks time synchronization
TIAN Xian-zhong;CHEN Chang-jun;HU Tong-sen
..............page:2199-2201
MAC delay analysis and simulation of IEEE 802.11 DCF
LI Ben-liang;WANG Hou-jun;SHI Yi-bing;LI Li;YAN Bin
..............page:2202-2204
Study on V-BLAST OFDM systems with adaptive bit and power allocation
SHI Jun;CHI Lian-gang;SUN Song-lin;LIU Ze-min
..............page:2205-2207
MAC protocol based on smart antenna for QoS-guarenteed services in Ad hoc networks
ZHANG Ying-chao;GUAN Li-li;YE Xiao-ling
..............page:2208-2210,2213
Tracking effective length of channel impulse response in OFDM systems
ZHANG Jian-kang;MU Xiao-min;CHEN En-qing;YANG Shou-yi
..............page:2211-2213
Identification of P2P streaming traffic using application signatures
XU Zhou-li;JIANG Zhi-hong;MO Song-hai;FAN Peng-yi
..............page:2214-2216
Routing algorithm on honeycomb networks
YIN Yu-ling;YANG Xiao-fan
..............page:2217-2219,2223
Design and implementation of dynamic source routing protocol as NDIS intermediate driver
ZHANG Xiang;WANG Wen-yong;HUANG Li-sheng;HUANG Wai-liu
..............page:2220-2223
Algorithm of dynamically managing MPLS VPN path
LIANG Hai-ying;LI Shu-mei;LI Duo
..............page:2224-2228
Trust model based on beta distribution for sparse wireless sensor networks
XU Xiao-long;LIN Ya-ping;ZHOU Si-wang;ZHU Tie-jun
..............page:2232-2234
Geographic routing algorithm based on virtual force for WSN
YUAN Zheng-wu;LI Jun
..............page:2235-2237,2250
Practical congestion control algorithm for sensor networks
WANG Yan-mei;QIN Shao-hua;HUANG Yong-ping;CAO Jian
..............page:2238-2240
Distributed MCDS constructing algorithm in Ad hoc networks
WANG Ling-yan;ZHANG Qi;LIU Ai-min
..............page:2241-2243,2247
Random linear network coding approach to improve energy efficiency in wireless networks broadcasting
ZHANG Shuai;YANG Lu-ming;XIAO Xiao;PU Bao-xing
..............page:2244-2247
Research of location based on mixed algorithm of weighted centroid and DV-Hop in WSN
BAI Jin-jing;YAN Xin-ping;ZHANG Cun-bao;ZHOU Xin-cong;ZHOU Xian-ju
..............page:2248-2250
Energy-driven and low-latency parallel task allocation scheme
SONG Man;LI Chun-lin
..............page:2251-2253
Design and implementation of adaptive buffer for embedded protocol stack
WANG Pei-dong;WU Xian-wei
..............page:2254-2256,2262
Application research and simulation of RN-Tree in multi-cluster grid system
LI Xue-tao;GUAN Qun;TAN Shu-dan
..............page:2257-2259
Self-adaptive overload control mechanism for clusters with multi-tier architecture
ZHENG Rui-feng;FEI Yao-ping;LI Min
..............page:2260-2262
Phrase-based machine translation system from Arabic to Chinese
LI Kai;ZHENG Jie;JIANG Tong-hai
..............page:2306-2309
Study of directory services for itinerary dynamic adaptability of migrating instance
DU Xiao-hui;ZENG Guang-zhou;GUO Lei;GAO Lei
..............page:2303-2305
Web services clustering based on detecting community structure in complex network
OU You-yuan;ZHANG Hai-su;MENG Hui;LI De-yi
..............page:2299-2302
Research of Web QoS feedback control system based on adaptive content delivery
TANG Wen-zhong;WANG Pan
..............page:2295-2298,2313
Research of business rule system with consistency-maintaining function
WANG Cheng-liang;LI Jian-wei;CHEN Juan-juan
..............page:2291-2294
Study on generation and match of question answering ontology
SUN Xia;HONG Hua;WANG Xin
..............page:2288-2290,2318
Simulation system for multi-robots based on network reconfigurable
REN Xiao-ping;CAI Zi-xing;LU Wei-wei
..............page:2285-2287,2309
Application of vague set information fusion theory in mine safety monitoring
FU Hua;GAO Ting;YANG Xin
..............page:2282-2284
Parameter sensitivity analysis based on artificial neural network
YU Ji-hui;WEI Jun-tao;PENG Guang-jin;WANG Ying
..............page:2279-2281,2284
Immune-based adaptive evolutionary algorithm for logic circuit design
XU Hai-qin;DING Yong-sheng;HU Zhi-hua
..............page:2276-2278
Application of feedforward NN in design of vehicle suspension
REN Yuan;BAI Guang-chen
..............page:2273-2275
Research on ontology modeling of digital family photos management
CHAI Yan-mei;ZHU Xiao-yan
..............page:2270-2272,2305
Air quality model parallel computation optimized research using 64-bit Linux platform
ZHU Yun;LIN Che-jen;CHEN Chun-yi;JANG Carey;ZHONG Yi-long
..............page:2266-2269
Data transmission protocol based on MIMO scheme in wireless sensor networks
TANG Bo;WANG Yan-dong;ZHOU Ming-tian
..............page:2263-2265
Kind of analytical inverse kinematics method
WANG Yi-gang;WU Zi-zhao;CHEN Xiao-diao
..............page:2368-2369,2373
Kind of super-resolution method of CCD image based on wavelet and bicubic interpolation
ZHAO Xiu-ying;SU Yun;DONG Yan-qin;WANG Jing-mei;ZHAI Lin-pei
..............page:2365-2367
Research and improvement of role inheritance in RBAC model
ZHANG Shi-long;SHEN Yu-li
..............page:2362-2364
Recovery technique of n-conditional branch statements in IA-32 decompilation
ZHANG Long-jie;XIE Xiao-fang;YUAN Sheng-zhi;LI Hong-zhou
..............page:2359-2361,2364
Multi-pose ear recognition based on force field convergence feature
DONG Ji-yuan;MU Zhi-chun;WANG Yu
..............page:2370-2373
Research of image association rules mining
LEI Liang;WANG Tong-qing;YANG Bo
..............page:2374-2376
Algorithm of multi-transform domain HMT image denosing
WANG Wen-tao;WANG Guo-you;ZHANG Tian-xu
..............page:2377-2378,2382
Face recognition from single sample per class based on Gabor filtering
ZHUANG De-wen;ZHOU De-long;WANG Xian-bao
..............page:2379-2382
Adaptive edge-detection method based on Prewitt algorithm
KANG Mu;XU Qing-gong
..............page:2383-2386
Path finding in 3D game based on gray image edge detection
SHEN Lin;HE Ming-yun;CHEN Lei-ting
..............page:2387-2389
New technique of modeling and 3D visualization for complicated geologic body
ZHANG Min;YANG Wu-nian;LUO Zhi-yong;WU Xue-ming
..............page:2390-2392,2395
Study for packaged granary grain quantity intelligent reckoning based on image processing
LIN Ying;LIU Yong;SUN Yue-heng
..............page:2393-2395
Image segmentation by improved clustering of spatial patterns
ZHU Wei-peng;WANG Shi-tong
..............page:2396-2397,2400
Research of multi-scale iterative vegetation extraction model
LIU Wen;LUO Jian-cheng;SHEN Zhan-feng;ZHONG Qiu-hai;GAO Li-jing;ZHOU Gang;FEI Hong-tao
..............page:2398-2400
ILP approach of extending AL-log to mine log ontology
SUN Ming;CHEN Bo;LIU Dong;ZHOU Ming-tian
..............page:2328-2331
Event-driven enterprise service bus framework for data integration of die & mould enterprises
HU Sha;LI Jian-jun;LI Bei
..............page:2325-2327,2335
XML-based CAD customize function design system for die & mould
YANG Shuang-rong;ZHOU Sheng;HU Sha;LI Jian-jun
..............page:2322-2324,2339
Optimize frame-interpolation of AVS by linear assembly language
LI Xiao-yu;CHEN Lei-ting;LU Guang-hui;LUO Yan-qin
..............page:2319-2321
Learning controller design for class of two-wheeled mobile robots
ZHANG Hong-yu;XU Xin;ZHANG Peng-cheng;LIU Chun-ming;SONG Jin-ze
..............page:2310-2313
Computing model of general-purpose computation on GPU
WANG Lei;ZHANG Chun-yan
..............page:2356-2358
Overview on research of dynamic software architecture
LI Qiong;JIANG Ying
..............page:2352-2355
Approach of automated testing generation in regression testing
ZENG Qiang;HONG Mei;YANG Hao-su;LUO De-quan
..............page:2349-2351
Automated software test-data generation based on polymorphic ant colonies algorithm
CHEN Ming-shi;LIU Xiao-jie;LI Tao
..............page:2347-2348
Research of real-time test case generation method of trusted software
CAI Qiong;LI Xing-guo;DING Shuai
..............page:2344-2346,2348
Model for semantic architecture of scalable workflow
WU Yi-ming;YAO Shao-wen;LU Zhong-yu
..............page:2340-2343
Measurement of complexity of object-oriented polymorphism
ZENG Yi;LI Juan;GUO Ying-jun;WU Guang-jin
..............page:2336-2339
Observable coordination model based on service ontology
YUAN Yuan;WANG Guo-yin
..............page:2332-2335