Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2010 Issue 10
Study on GPS real-time data on-line filtration and complementation
GE Xiao-feng;CAO Bin;ZHENG Jing-jing;DENG Ming-rong;SHEN Zu-zhi
..............page:3651-3654
Urban short-term traffic flow forecasting studied by BNs-OLS-SARIMA model
ZHONG Bo;LIU Min
..............page:3655-3657,3661
Research of peer-to-peer botnets
RAN Hong-min;CHAI Sheng;FENG Tie;ZHANG Jia-chen
..............page:3628-3632
Plant growth simulation algorithm for permutation flow shop scheduling to minimize makespan
TANG Hai-bo;YE Chun-ming;ZHANG Xin-gong
..............page:3670-3672
Research on satisfiability threshold of class of Boolean equations
GUO Bing-hui;WEI Wei;ZHENG Zhi-ming
..............page:3666-3669
Performance test and comparative analysis for reinforcement learning algorithms
LI Zhao-bin;XU Xin;WU Jun;LIAN Chuan-qiang
..............page:3662-3665,3669
Overview of protecting user privacy in social networks
LUO Yi-jun;LIU Qiang;WANG Yu
..............page:3601-3604
Research advance of expert finding
WU Hao;WANG Mei-jiao;FENG Jia-ming;PEI Yi-jian
..............page:3633-3638
GA-Transmodeler based time-dependent origin-destination estimation
DIAO Yang;JUAN Zhi-cai;NI An-ning
..............page:3646-3650
Survey on self-adaptive evolution software
CHEN Hong-long;LI Ren-fa
..............page:3612-3616,3621
Summarization of research on morphological associative memories
FENG Nai-qin;AO Lian-hui;WANG Shan-xia;WANG Shuang-xi;ZHANG Xin-ming
..............page:3639-3643
Survey on congestion control for DTN
TAO Yong;GONG Zheng-hu
..............page:3605-3611
Service selection method assuring trustworthiness of QoS value
GONG Jia-wei;CHEN Jun;DENG Hao-jiang;WANG Jin-lin
..............page:3658-3661
Literature review on trustworthy software acquisition and analysis
LUO Xin-xing;ZHU Ming-xun;TANG Zhong-jun
..............page:3617-3621
Survey on Web services selection algorithms based on QoS
LI Jin-zhong;XIA Jie-wu;TANG Wei-dong;ZENG Jin-tao;WANG Xiang;WU Lan-ying
..............page:3622-3627,3638
Broadcast scheduling algorithm of multiple channels and data items based on request
WANG Ying-ying;XIONG Hai-ling
..............page:3923-3925
Approach for generating time series datasets based on symbolic representation of data and cloud model
XIA Jian-ming;YANG Jun-an;ZHANG Qiong
..............page:3691-3693,3697
New anonymous fair-exchange e-commerce protocol
LUO Dong-jun
..............page:3872-3875,3879
Stroke contour recovery based on statistical model for Chinese calligraphy
ZHAO Qi;XUE Huan-zhen;ZHANG Xian-jun
..............page:3977-3978,3984
SOA-based model driven rapid development architecture
SHENG Jin-fang;WEN Chun-yan;WANG Bin
..............page:3763-3766
New method for multi-objective optimization problem based on multi-ant-colony algorithm
LIU Dao-hua;LI Wei-hua;LI Xiang-ying
..............page:3705-3707,3717
Multi-directions algorithm of fuzzy mathematical morphology for color edge detection
WANG Zuo-cheng;TANG Su;XUE Li-xia;JI Zhi-min
..............page:3971-3973
New key agreement protocol based on passwords
ZHA Jun;SU Jin-hai;ZHANG Xue-run
..............page:3885-3888
Multi-nexthop routing algorithm based on spanning tree searching
LUO Wei;ZHU Xuan-yong;CHEN Shu-qiao
..............page:3942-3946
High speed multiplier algorithm based on four-tree structure
LIU Lei;YAN Xiao-lang;MENG Jian-yi;GE Hai-tong
..............page:3727-3730
Face recognition method based on quaternion wavelet magnitude/phase representation and block voting strategy
XU Yong-hong;ZHAO Yan-ru;HONG Wen-xue;GAO Zhi
..............page:3991-3994
Research on keyword retrieval based on perfect semantics
LI Fang-zheng;XIE Dong
..............page:3794-3797
Semantic data model for virtual geographic environment
SHEN Jing-wei;LV Guo-nian;WU Ming-guang;WEN Yong-ning;ZHANG Hong-ping
..............page:3819-3821
Scene matching navigation for UAV based on spatial relationship geometric constraints
LI Yao-jun;PAN Quan;ZHAO Chun-hui;ZHANG Shao-wu;LING Zhi-gang
..............page:3822-3825,3846
Analysis and construction of R-tree index for 3D geological model based on STR
WANG Zhan-gang;ZUO Jian-ping
..............page:3783-3785
Complex deposit 3D modeling and geology automatic plotting
LI Can-hui;PAN Yong;WU Qiang
..............page:3961-3963
Role-based modeling and analyzing of workflow for supply and demand network
he jian jia ; xu fu yuan ; zhang yan ;wang yu-xi; wang yu zuo ; he sheng xue
..............page:3813-3815
Solution and analysis for assembly quality defect sources entropy
GE Hong-yu;ZHANG Gen-bao
..............page:3807-3809
Packet scheduling algorithm on multi-core network processor towards streaming media
HE Peng-cheng;WANG Jin-lin;DENG Hao-jiang;ZHANG Wu
..............page:3911-3914
Stable generalized predictive control for nonlinear system
LI Gui-qiu;CHEN Zhi-wang
..............page:3744-3746
Research of ontology-based Web spatial decision support system
MAO Xi;LI Qi
..............page:3810-3812
Study on superposition model based on policy space of privacy preserving
LIU Zhao-bin;LIU Wen-zhi;GU Jun-zhong
..............page:3889-3892
Integrating secure database access control and privacy protection
YU Yong-hong;BAI Wen-yang
..............page:3876-3879
Automatic semantic Web service composition based on OWL-S
XU De-zhi;TANG Yi-hua
..............page:3767-3770
Research and implementation of authority control framework in EIS based on improved RBAC model
CHEN Chen;CHEN Xue-guang;WANG Yu;ZHANG Zhen-wen;HONG Liu
..............page:3855-3858
Key management scheme based on identity in cluster structure of MANET
ZHAO Ya-jun;WANG Guo-cai
..............page:3859-3861,3865
Simulation of adware market based on system dynamic
HOU Li-wen;XU Jian-ying
..............page:3786-3789,3793
Power allocation with DSTC for multi-user fairness in amplify-and-forward mode
XIAO Hong-xuan;CHEN Qian-bin;TANG Lun
..............page:3947-3949,3954
Stereo matching algorithm for 3D reconstruction based on uncalibrated images
HU Yan;GENG Guo-hua;WANG Xiao-feng;ZHAO Lu-lu
..............page:3964-3967
Research on fault modeling method based on E language
HUANG Fu-qun;LIU Bin;XU Ping;LI Hai-feng
..............page:3775-3778
SVM-based social spam detection model
QIN Xi;XIA Ning-xia;SU Yi-dan
..............page:3893-3895
Research of airport baggage handling system based on Internet of things and its application
ZHANG Feng;ZHANG Xiao-peng;WU Gao-cheng
..............page:3771-3774,3778
Supervised expression recognition algorithm based on Fisher criterion
ZHONG Ming;XUE Hui-feng;LV Zhen-zhong
..............page:3979-3981
Dynamic scheduling based self-learning mechanism in JSP
WANG Chao;GUO Jing;BAO Zhen-qiang
..............page:3834-3836,3840
Physical animation of trees in wind based on GPU
WANG Chun-hua;LI Liu-qing
..............page:3988-3990
Pest multiple dimension time series forecasting based on SVM
XIANG Chang-sheng;ZHOU Zi-ying
..............page:3694-3697
Blind combining weight estimation algorithm for antenna arraying
SHEN Cai-yao;YU Hong-yi;GU Yu-wei;YANG Ke
..............page:3747-3749
Research of underwater mobile sensor network algorithm based on water flow
ZENG Bin;ZHONG De-huan;YAO Lu
..............page:3926-3928,3931
Algorithm of image metamorphosis based on blending rational interpolation
LI Lu;LIU Hua-yong;ZHANG Da-ming
..............page:3998-4000
Secondary structure prediction by grayscale image of distance matrix
XIAO Xuan;XIAO Chun-cai;WANG Pu
..............page:3698-3700
Application of manifold on 3D facial feature dimension reduction
LIU Xiao-ning;GENG Guo-hua;WANG Xiao-feng
..............page:3982-3984
Congestion control mechanism of Push-Pull based on service level in DTN
XU Chang-biao;WANG Yu;QI Yan
..............page:3929-3931
Improved artificial fish school algorithm to solve traveling salesman problem
ZHU Ming-hao;SHE Xiang-yang
..............page:3734-3736
Modeling and statistical features of mobile delay tolerant sensor network coverage
ZHANG Wen-zhu;ZHANG Lin;YUAN Jian;SHAN Xiu-ming;WANG Yao-xi
..............page:3915-3918
Research on quality automated assessment of open source software based on opensource maturity model
XU Hong-bo;WANG Bai-ying;LIU Qing-jing
..............page:3790-3793
Research building integrated renewable energy platform based onenergy analysis model
TAN Li;CHEN Peng;YU Chong-chong
..............page:3816-3818,3821
Reverse-balanced aggregation tree-based TDMA scheduling algorithms for wireless sensor networks
DU Jian-yu;ZHANG Lin;SHAN Xiu-ming;WANG Yao-xi
..............page:3899-3901,3910
Luminance residual error threshold method oriented to fast global motion estimation
ZHENG Jia-li;QIN Tuan-fa;NI Guang-nan
..............page:3955-3957
Shortest backup path based multicast fast fault-recovery scheme
CHENG Dong-nian;WANG Xiao-nan;ZHANG Jian-hui
..............page:3950-3954
MOQ-QR:query processing research for CKNN based on QR-tree
ZOU Yong-gui;SONG Qiang;YANG Fu-ping
..............page:3676-3679
Research on fuzzy C-means clustering algorithm based on spatial weighted and its application
MENG Li-min;SONG Yu-qing;ZHU Feng
..............page:3968-3970,3973
Research on algorithm of Boolean operation and application in geological bodies modeling
WANG Hong-juan;ZHANG Xing-li;LU Xin-ming
..............page:3844-3846
Practical deniable encryption scheme and security proofs
SUN Long;WANG Cai-fen
..............page:3862-3865
Radial+Focus visualization for network information
WANG Gong-zheng;TENG Dong-xing;WANG Zi-lu;WANG Hong-an;DAI Guo-zhong
..............page:3750-3753,3766
Bus cycle optimization of FlexRay communication protocol
ZHAO Rui;QIN Gui-he;FAN Tie-hu
..............page:3847-3850
Reachability analysis of Petri nets based on minimal T-invariant adding
PENG Jian- bing;JIAO Li
..............page:3798-3802
Study on VSP with different constraints based on genetic algorithm
WANG Zhen-feng;WANG Xu;GE Xian-long
..............page:3673-3675
Vague topological space and Vague continuous mapping
WANG Chang;YUAN Min
..............page:3644-3645,3654
Algorithm for fast corner detection based on line feature
HE Peng;WANG Na;WANG Lian-peng
..............page:3995-3997
3D garment parameterized design supported by body model driving
CHEN Long;ZHONG Liang-wei;ZHU Wen-bo
..............page:3958-3960
Consistency verification for Web service business process
WU Ming-hui;XIONG Xiang-hui;YING Jing
..............page:3758-3762
Identity-based generalized signcryption in standard model
JI Hui-fang;HAN Wen-bao;ZHAO Long
..............page:3851-3854,3858
Research on algorithms of routing metric in multi-channel IEEE 802.11 WMN
HE Ping-shi;XU Zi-ping;YANG Xia
..............page:3938-3941
Evaluation of supply chain flexibility based on extension-matter model
WANG Gui-hua
..............page:3724-3726,3730
Comparison and evaluation of UDP-based transport protocol performance
LI Yi-ming;REN Yong-mao;LI Jun
..............page:3906-3910
Image hashing algorithm based on lifting wavelet transform and BP neural network
ZHANG Min;KANG Zhi-wei;CHEN Bu-zhen
..............page:3974-3976
Web services matchmaking approach based on semantic vector space model
MAO Xue;GUAN Ji-hong;ZHU Fu-bao
..............page:3754-3757,3770
New Linux memory swap model for Nandflash
LV Guang-feng;CHEN Shu-yu
..............page:3803-3806
Environment self-adaptive localization algorithm for wireless sensor networks
YI Xiao;LIU Yu;DENG Lu
..............page:3919-3922
Hybrid particle swarm optimization for fuzzy flexible job-shop scheduling problem
LU Bing-yuan;CHENG Ba-yi
..............page:3721-3723
Research and implementation of version management method for product structure information tree
LI Tao;LI Yan-zeng;SUN Wei;ZHAO Gang
..............page:3829-3833
Node split based on shortest spanning tree against attack
LIU Jian-qiang;LAN Ju-long
..............page:3935-3937
Block-adaptive data hiding algorithm for JPEG images
GONG Fa-gen;QIN Zheng
..............page:3883-3884,3888
MapReduce for astronomical cross-matching
SONG Xuan;HAN Ji-zhong;WANG Kai;GAO Jian
..............page:3740-3743
Image fire detection algorithm based on fast classification for support vector machine
MA Zong-fang;CHENG Yong-mei;PAN Quan;WANG Hui-qin;YANG Na-juan
..............page:3985-3987
Universally composable key exchange protocol for WLAN
ZHANG Hao-jun;QI Qing-lei
..............page:3869-3871
Novel QoS-aware Web service recommendation model
TAO Chun-hua;FENG Zhi-yong
..............page:3902-3905,3914
Cellular competitive decision algorithm for multi-objective 0-1 knapsack problem
XIONG Xiao-hua;NING Ai-bing;MA Liang
..............page:3680-3682,3700
Multi-objective particle swarm optimizer based on dynamic neighbor and mutation operator
LIU Yan-min;ZHAO Qing-zhen;NIU Ben;SHAO Zeng-zhen
..............page:3718-3720
Stego key estimation algorithm in spatial sequential image steganography
LIU Jing;TANG Guang-ming
..............page:3896-3898
Multiple description coding based model for application layer multicast
ZHANG You-wei;WU Li-bing;WU Chan-le
..............page:3932-3934