Application Research of Computers 2009 Issue 8 Measuring anonymous system with probabilistic Applied Pi calculus
Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2009 Issue 8
Measuring anonymous system with probabilistic Applied Pi calculus
XIE Si-min;CAI Xiao-juan
..............page:3000-3003
Efficient certificateless signature and blind signature schemes
CHEN Hu;SONG Ru-shun
..............page:3004-3007,3011
Research on hierarchical alarm processing model in intrusion detection system
XIAO Li-zhong;LIU Yun-xiang;DAI Meng
..............page:2995-2999
Cost-sensitive classification strategy for imbalanced datasets of intrusion detection
BIAN Jing;PENG Xin-guang
..............page:3036-3038,3043
Pattern matching algorithm of intrusion detection system
HAN Zhong-qiu;LIU Xiao-jie;LI Tao;LIANG Gang;GONG Xun;YAO Jun-xi
..............page:3033-3035
Audio information hiding method based on samples dots Inversion
WANG Jun-jie;MO Qian;MEI Dong-xia
..............page:3031-3032,3035
Gray image watermarking algorithm base on LWT and SVD
JIANG Hua;ZHANG Min
..............page:3028-3030
Efficient mobile micropayment and authentication protocol
XIAO Shan;LANG Wei-min;HU Dong-hua
..............page:2992-2994
Modeling text classification based on membership degree limiting characteristic VSM
ZHOU Jing;DAI Guan-zhong;ZHOU Ting-ting
..............page:2902-2904
Research and implementation of novel intelligent indoor light control system
ZHOU Xiao-wei;CAI Jian-ping;ZHENG Zeng-wei;YING Jing
..............page:2977-2981
Localization of mobile robot based on fuzzy-adapted Kalman filtering
XU Hai-wei;YIN Bo;XU Tao
..............page:2974-2976
Research of multidisciplinary model perception technology of collaborative design
HAO Li-nan;MO Rong;WAN Neng;YANG Hai-cheng
..............page:2971-2973
Research and implementation of intelligent virtual human model ased on fluent calculus
LIU Yi-song;WEN Zhan-chao
..............page:2968-2970,2976
Positioning model for urban microcell based on 3D ray-tracing method
YUAN Zheng-wu;JIANG Xiao-fan
..............page:2965-2967
Research on mobile assembly system for complicated product
GAO Bo;YANG Hai-cheng;SUN Hui-bin;LI Xiao-juan;SU Ting-ting
..............page:2962-2964,2967
Community mining approach based on local optimization
WU Long-ting;DAI Ru-wei;CUI Xia
..............page:2855-2857,2894
Contrast research of Chinese domain ontology concept hierarchy induction methods
WEN Chun;SHI Zhao-xiang;ZHANG Liang
..............page:2847-2850,2884
New topological parameter for recognition of essential node in protein networks
HUANG Hai-bin;WANG Jian-xin;SHAO Ping
..............page:2842-2846
Automatic detection of epileptiform wave in EEG by multi-resolution analysis
WANG Chun-mei;ZOU Jun-zhong;ZHANG Jian;ZHANG Zhi-suo
..............page:2959-2961
Towards cross docking system simulation optimization based on RSM
SHI Wen;XU Mao-zeng;LIU Zhi-xue
..............page:2956-2958,2961
Design and implementation of search engine system for digital library
LIN Qi-dong;CHEN Chuan-bo;ZHENG Le-dan;ZHANG Yi-man
..............page:2952-2955
Realization on Chinese coreference resolution system based on maximum entropy model
HU Nai-quan;KONG Fang;WANG Hai-dong;ZHOU Guo-dong;ZHU Qiao-ming
..............page:2948-2951,2955
Concept-based multimedia information semantic retrieval model
XIE Yu-xiang;LUAN Xi-dao;WU Ling-da;TAN Jie;CHEN Dan-wen
..............page:2945-2947
Adaptive audio watermarking algorithm in DCT domain
HUANG Xiong-hua;WANG Hong-xia
..............page:2989-2991
Research and realization of RFID campus telephone system
MENG Hang;CHEN De-ren
..............page:2985-2988
Study on fault diagnosis for CNC machine in flexible manufacturing system
LI Hui;CUI Cheng-ling;LI Xin-hong
..............page:2982-2984
Study of method of coordinating data and mining association rules in relation of quantitative attribute
DU Tao;QU Shou-ning;CUI Guang-qiang
..............page:2915-2917,2926
Reasoning by using boundary-based module in description logics
NIU Yue;LIU Qiu-rang;FANG Jun
..............page:2912-2914,2920
Research of trusted computing platform based on EFI
FANG Wei-wei;YANG Bing-ru;ZHOU Chang-sheng;YANG Jun
..............page:2813-2815
KPCA feature extraction based on CBPSO algorithm
ZHAO Min;YANG Hui-xian;OU Xun-yong
..............page:2908-2911
Improved polynomial SVM classifier for text categorization
XIONG Zhong-yang;JIANG Fan;ZHANG Yu-fang;LI Zhi-xing
..............page:2905-2907
Research on usage control enhanced dynamic access control model for Web services
SHANG Chao-wang;YANG Zong-kai;LIU Qing-tang;ZHAO Cheng-ling
..............page:3008-3011
Honeynet-based network security defense model
WANG Tie-fang;LI Yun-wen;YE Bao-sheng;YANG Yi;LV Yuan;ZHU Li-shang
..............page:3012-3014
Covert channel capacity analysis based on information entropy
CHEN Li;JU Shi-guang;ZHOU Cong-hua;FANG Fang;ZHANG Yi
..............page:3015-3018,3021
Forward secure certificateless proxy signature scheme
CHEN Hai-bin;YANG Xiao-yuan;LIANG Zhong-yin
..............page:3019-3021
Video steganalysis algorithm based on frame restructure
MENG Tie-dong;TANG Guang-ming
..............page:3022-3023,3027
Authenticated key agreement protocol with anonymity
HU Yan-zhi;MA Da-wei;TIAN Zeng-shan
..............page:3024-3027
Survey on discrete time neural networks
HUANG Song;YANG Xiao-fan
..............page:2810-2812
Survey on topology-matching techniques in structured P2P networks
LIAN Shu-juan;SUN Bo;WEI Yun-gang
..............page:2807-2809,2826
Survey on P2P video streaming systems
LI Zhen-zhen;ZHANG Zhi-bin;DU Yue-jin
..............page:2801-2806
Optical vector-matrix multiplication based on ternary optical processor
LI Mei;JIN Yi;HE Hua-can;TENG Liang
..............page:2839-2841
Multi-sensor asynchronous information fusion classification strategy based on coupled HMM
HE Jun;ZHANG Hua;LIU Ji-zhong
..............page:2836-2838,2873
Extended usage control model and its enforcement model
YU Ying-chao;XU Ning;LI Li-xin
..............page:3044-3046,3049
New method of detecting kernel-level Rootkit
LIANG Sheng-rong;FAN Ming-yu;WANG Guang-wei;ZHENG Xiu-lin
..............page:3047-3049
Dual digital watermarking algorithm for copyright protection and tamper authentication
YANG Fan;XUE Mo-gen;CUI Song;WANG Shuo
..............page:3050-3052
Abuse-free fair exchange protocol without TTP
LI Yun-feng;HE Da-ke;LU Xian-hui
..............page:3053-3055
Analysis and research on method of data dimensionality reduction
WU Xiao-ting;YAN De-qin
..............page:2832-2835
Survey on text information extraction from Web page
ZHANG Jun-ying;HU Xia;BU Jia-jun
..............page:2827-2831
Application layer multicast for video streaming
CHEN Ran;XING Wei;JIANG Xiao-qiang
..............page:2821-2826
Survey on grid workflow scheduling algorithm
LI Jin-zhong;XIA Jie-wu;ZENG Jin-tao;ZHU Bing;LIU Chang-xin
..............page:2816-2820
Novel exponential stability and periodicity of cellular neural networks
LIU Zi-xin;LV Shu;ZHONG Shou-ming;YE Mao
..............page:2879-2880,2911
Ambipolar pulse interval modulation for ultra-wideband communication
WANG Dong;XU Chang-biao
..............page:3092-3094
Revenue-aware dynamic call admission control algorithm in IEEE 802.16 systems
XU Xiao-xi;ZHU Xin-ning;XU Chun-xiu
..............page:3095-3097
Research channel estimation for IEEE 802.16d in mobile environment
HE Zhao-wang;CHEN Hui;YI Miao
..............page:3098-3099,3118
3D localization method based on multidimensional scaling in wireless sensor network
ZHANG Rong-lei;LIU Lin-lan;SHU Jian;ZHOU Zhi-ping
..............page:3100-3104
Training method of process neural networks based on hybrid quantum genetic algorithm
LIU Zhi-gang;XU Shao-hua
..............page:2898-2901
Finding motifs based on wavelet and dynamic time warping
SONG Xiao-yu;GUO Lu;SUN Huan-liang
..............page:2876-2878,2897
Producing branches method——novel algorithm for generating equivalence class
NONG Xiu-de;XU Zhang-yan;LIAO Hong-jian;PENG Zhan-sheng
..............page:2895-2897
Gene selection with MOEDA
YE Qi-ming;LUO Fei;LIU Juan
..............page:2891-2894
Optimization algorithm on simulating fisher\' fishing
WANG Yong;CHEN Jian-rong;PANG Xing
..............page:2888-2890,2907
Dealing with mixed type data by hierarchical clustering algorithm
WU Dong-lei;YU Hong;YANG Da-chun
..............page:2885-2887
Imbalance data classification algorithm based on support vector machines
LIU Hai-tao;HUANG Min;ZHU Qi-bing;WANG Cong
..............page:2874-2875,2901
Study of motion compensated temporal filtering
ZENG Wen-quan;ZHU Xiao-ping;WU Jiao-yu
..............page:2881-2884
Research on trust model of P2P electronic commerce
MENG Xian-fu;ZHANG Lei;WANG Xu
..............page:3067-3069
Novel group key management scheme based on IBE in WSNs
LIU Xiao-wen;WNAG Shu-han;WANG Zhen-hua;ZHAO Hai-deng
..............page:3070-3072,3076
Trust mode of MAS based on dynamic learning mechanism
JIA He-ping;SHI Hao-shan;WANG Xiao-ling;LI Shi
..............page:3073-3076
Multiple CFOs and CIRs jointly estimation algorithm research based on pilot
ZHENG Chun-lei;JIANG Jian;JIANG Hua;LIU Hai-tao
..............page:3077-3081
Simulated annealing-based maximum lifetime routing for wireless sensor networks
TANG Wei;GUO Wei
..............page:3082-3085,3108
Detecting kernel-level Rootkit based on filesystem anomalies
LIU Zhe-yuan;DAI Guan-zhong;WANG Xiao-ling
..............page:3056-3057,3062
Fuzzy model for network attack effect evaluation based on generalized operators
CAO Yan;ZHANG Li-juan;WU Hao
..............page:3058-3062
Multi-agent distributed intrusion detection system model based on evidence reasoning
YE Qing;WU Xiao-ping;ZHAI Ding-jun;FU Yu
..............page:3063-3066
Passive estimation of round-trip time in backbone network
HUANG Li-sheng;ZHOU Ming-tian;WANG Wen-yong
..............page:3086-3089
Applications of matrix analysis in birth and death model for Ad hoc
XIA Wen-jie;YAN Han;LIU Feng-yu
..............page:3090-3091,3094
Clustering approach of finding natural cluster
SUN Zhi-wei
..............page:2871-2873
RFID complex event processing optimization algorithm with memory constraint
YIN Fang-ming;KANG Mu-ning;CHEN Qun;MA Yan
..............page:2864-2867
New genetic algorithm based on drivenism school
HU Yang;GUI Wei-hua
..............page:2861-2863
Rapid spatial clustering algorithm
LI Zhong-zhi;WANG Xue-gang
..............page:2858-2860
Study on vicious cycle node checking algorithm for BOM based on search technology
HUANG Xue-wen;SONG Yu-bin;LIU Xiao-bing
..............page:2942-2944
Gene expression microarray data mining system
LI Rong
..............page:2938-2941
Research and implement real-time HCI system based on augmented reality and anomalous screens
CHEN Yi-min;CHEN Ming;XU Yong-shun;KE Shao-min;YAO Zheng-wei;LU Tao;HU Jun;LU Yi-jun
..............page:2934-2937
Focused crawling oriented intelligent tunneling algorithm research
HUANG Li;WANG Cheng-liang;YANG Zheng
..............page:2931-2933
Estimation of state of football based on ridge regression
WU Cai-yuan;YANG Yi-min
..............page:2924-2926
Sensor network model based on virtual pressure sensor compensation
CHEN De-min;ZHANG Yuan;TAO Chao
..............page:2918-2920
Knowledge reductions in generalized incomplete information systems
SHEN Jin-biao;LV Yue-jin
..............page:2868-2870
Enhanced fast handoff for hierarchical mobile IPv6 based on MPLS
WANG Qing-sheng;CHEN Xi-guang
..............page:3105-3108
Communication system of multi-mobile robots based on cluster structure
ZOU Lei;CAI Zi-xing;REN Xiao-ping
..............page:3109-3111,3114
Dynamic spectrum access based on evolutionary game in cognitive radio network
WANG Huan;TANG Lun;CHEN Qian-bin;LIU Guang-ming
..............page:3112-3114
Network-aware structured P2P overlay based on small world
REN Ping-fan;HUANG Dong-jun
..............page:3115-3118
Research of information and data modeling in OGSA grids
GAO Hong-qing;WANG Xin-fa;HUANG Zhong-zhou
..............page:3119-3124,3130
Research of grid workflow scheduling based on combination of DE and NSGA-Ⅱ algorithm
LI Jin-zhong;ZENG Jin-tao;XIA Jie-wu
..............page:3125-3127
Nonmetric weighted MDS localization algorithm based on virtual node in WSN
LI Nian-zan;LI Ren-fa;PENG Xin;HUANG Hao
..............page:3128-3130
New technique based on probabilistic model for facial features location
PENG Xiao-ning;ZOU Bei-ji;WANG Lei;LUO Ping
..............page:3152-3155
Fast image recognition method of high temperature object based on wavelet decomposition
PENG Xiao-qi;LI Yang-bao;SUN Yuan
..............page:3156-3158
Manifold ranking approach to region-based image retrieval
HU Xiao-hong;SHI Lei;QIAN Xu;WANG Ke
..............page:3159-3160
Super-resolution reconstruction of image sequence based on wavelet-HMT
ZHOU Wen-ting;WANG Qing
..............page:3134-3136
Radiographic image enhancement algorithm based on wavelet fusion
SHEN Kuan;CAI Yu-fang
..............page:3137-3139
Segmentation of high-resolution remote sensing image based on fuzzy morphological gradient
JIANG Sheng;WANG Min;ZHANG Xing-yue
..............page:3140-3142
3D face recognition based on scale-space analysis
ZUO Xu-hui;LEI Jin-e;ZHANG Shi-ling
..............page:3161-3162,3165
Markov network-based nonlinear algorithm of face image super-resolution
XIONG Yi;HUANG Dong-jun
..............page:3163-3165
Improved algorithm of watershed segmentation based on fusion and adaptive morphological filtering
XU Guo-bao;YIN Yi-xin;WANG Ji;SU Zhi-bin;XIE Shi-yi
..............page:3143-3145
Hole filling algorithm for view synthesis
LIU Ran;ZHU Qing-sheng;ZHANG Xiao-yun;XU Xiao-yan;HU Zhang-ping
..............page:3146-3148
Object-oriented change detection method based on features fusion for high-resolution remote sensing image
WANG Wen-jie;ZHAO Zhong-ming;ZHU Hai-qing
..............page:3149-3151
Balanced and imbalanced data sets classification based on sample projection distribution
WEN Chuan-jun;ZHAN Yong-zhao
..............page:3131-3133,3158
Adaptive image compression algorithm for voyage data recorders
LI Zhe-lin;SHENG Yu-zhu;JIANG Li-jun;WANG Hai-ping;XIONG Zhi-yong
..............page:3192-3194
Research on image transition region extraction and compression based on cross entropy
YUAN Sheng-zhi;LI Hong-zhou;YANG Li-bin
..............page:3195-3197
New feature point tracking algorithm based on Gabor wavelet transformation
YE Ya-lin;SHI Yi-kai;WANG Huan;ZHANG Qian
..............page:3198-3200
Information
..............page:2947
Off-line recognition method for freehand graphics primitives based on line segments tracing
ZHANG Zhen-guo;CUI Rong-yi
..............page:3186-3188,3200
New method of contour matching based on two dimensional fragments
JI Zhou-qiang;WANG Bing
..............page:3189-3191
Human body modeling and parameterization objecting to garment design
CHEN Long;WU En-qi;LU Guo-dong
..............page:3169-3171,3174
CT abdominal organ extraction using mathematical morphology
XIA Guo-qing;BAO Su-su;CHEN Hua-zhen;LI Sheng-wen
..............page:3172-3174
Segmentation of MELK images based on watershed algorithm
CAI Nian;TANG Xiao-yan;XU Shao-rui;LI Fang-zhen
..............page:3175-3176,3191
Algorithm of general polygon clipping against grid contour
CHEN Xue-gong;CAO Jian;LI Yuan;ZHANG Kun
..............page:3177-3178,3197
Generating algorithm of principle curvature isolines of free surface based on rectangle mesh tracking
ZHANG Li;WANG Jun-biao;ZHANG Xian-jie
..............page:3179-3181
Fingerprint classification method based on macro arc feature of thinning image
LIU Hua-xiang;WANG Ling
..............page:3182-3185