Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2010 Issue 12
Weighted K-means clustering algorithm based on Fisher\'s linear discriminant ratio
YANG He-biao;XUE Yan-feng;FENG Jin-lan;SHEN Xiang-jun;WU Jing-li
..............page:4439-4442
Cloud computing: an introduction
LI Li;LIAO Jian-wei;OU Ling
..............page:4419-4422,4426
Improved adaptive affinity propagation clustering based on semi-supervised learning
WANG Lei;WANG Xi-li;LIU Gao-xia;ZHAO Lin
..............page:4436-4438,4442
Review on generalized plans
JIANG Zhi-hua;RAO Dong-ning;JIANG Yun-fei
..............page:4414-4418
Research on application of evidence theory in uncertainty reasoning
ZHOU Di-min;DUAN Guo-yun
..............page:4433-4435
New outlier detection based on Z curve
TANG Zhi-gang;YANG Bing-ru;YANG Jun
..............page:4427-4429,4432
Survey of Web information extraction technologies
CHEN Zhao;ZHANG Dong-mei
..............page:4401-4405
Survey on ant colony optimization algorithms for stochastic combinatorial optimization
LI Kai-qi;DIAO Xing-chun;CAO Jian-jun
..............page:4406-4409
New acceleration algorithm of ray tracing based on history buffer
YUAN Zheng-wu;MU Wei;LI Yi-chao;LI Lin
..............page:4729-4731
Backoff algorithm of dynamic threshold and ridge function in Ad hoc networks
LIU Tao;LIU Yuan
..............page:4705-4707,4714
Bandwidth constraint based QoS routing protocol in wireless emergency communication networks
FENG Wen-jiang;CHEN Dong-cai;WANG Ru-ru
..............page:4690-4694
Cellular automata model for packet transmission on scale-free network
TANG Hong;LIAO Rong-nan;HU Rong
..............page:4686-4689
Attack strategy for uncertain topology of complex networks
CHEN Pan;WU Xiao-feng;LI Yi;YIN Zhi-wei
..............page:4622-4623,4629
Robust rotation invariant multi-view eye localization method
FU You-jia;HONG Xiong;LI Jian-wei
..............page:4794-4797
Grabbing control research of robot arm mounted intelligent wheelchair based on AdaBoost algorithm
LIN Hai-bo;WEI Xing;ZHANG Yi;LUO Yuan
..............page:4582-4583
Algorithm for probabilistic XML data tree simplifying
WANG Jian-wei;HAO Zhong-xiao
..............page:4541-4543,4547
Large social event oriented freeway network control strategy simulation evaluation approach
YANG Zhen-zhen;GAN Hong-cheng
..............page:4473-4475
SNMP-based broadcasting parallel polling algorithm for network management
CHENG Chun-ling;CUI Guo-liang;SUI Zong-jian
..............page:4711-4714
Effect of immune mechanism for emotion feature selection from GSR signal
WU Guang-hua;LIU Guang-yuan;LONG Zheng-ji
..............page:4558-4560,4564
Study of human identity recognition based on HMM and WNN
GUO Xing-ming;DUAN Yun;ZHONG Li-sha
..............page:4561-4564
Multiple paths test cases generator based on annealing genetic algorithm
ZHONG Xiao-min;WU Xiao-lin;ZHAO Xue-feng
..............page:4544-4547
Reliability allocation of BA system based on grey relative theory and AGREE
XIANG Yu;HUANG Da-rong;HUANG Li-fen
..............page:4489-4491
Research on k-paths creation based on ant colony optimization algorithm
FAN Ji-shan;XIONG Sheng-wu
..............page:4597-4599
Fast inter mode decision algorithm in multi-view video compression based on H.264
WANG Bao-liang;HOU Rui;HOU Chun-ping;JIN Wen-hu
..............page:4778-4780
Method of calculating primary quantization matrix of JPEG
TANG Ming-wei;FAN Ming-yu;WANG Guang-wei;ZHENG Xiu-lin
..............page:4654-4655,4661
Skeleton-based routing protocol in wireless sensor network
LIU Wen-ping;JIANG Hong-bo;LIU Bo
..............page:4670-4672
Phase encoded-based quantum ant colony algorithm with application to continuous optimization
LI Pan-chi;YANG Yu;ZHANG Qiao-cui
..............page:4450-4453
Analysis of identification distance of passive UHF RFID tag based on RCS
ZHOU Yu-shu;HE Yi-gang
..............page:4594-4596
New formal model for analysis of security certificate protocol
HU Xiao-hui;ZENG Xue-na;JIANG Hao
..............page:4667-4669
Modeling trust chain with stochastic process algebra
LIU Chang-ping;FAN Ming-yu;WANG Guang-wei
..............page:4650-4653
Customer churn prediction in class imbalance dataset
YANG Zhi;XIA Guo-en;JIN Wei-dong
..............page:4447-4449,4453
Research on particle swarm optimization algorithm for train operation adjustment
CHEN Shi-ming;LAI Yi-ping;JIANG Ji-hai
..............page:4460-4463
Kazakh basic noun phrase recognition based on rules
SUN Rui-na;GULILA·Altenbek
..............page:4511-4513,4516
Adaptive Markov model for channel path fading of near space UAV
LI Si-jia;MAO Yu-quan;YAO Xu
..............page:4584-4586,4621
Research on co-design of networked control system performance and network QoS
NIU Yun;WU Xu-guang
..............page:4738-4740,4746
Research of spectrum prediction mechanism based on gray-model in cognitive radio
XIAN Yong-ju;WU Dong-wei
..............page:4726-4728,4731
Moving object tracking algorithm based on motioning region detection
CHAI Yi;YANG Xiao-yan;YIN Hong-peng;KUANG Jin-jun
..............page:4787-4789,4793
Research on key technologies of ECG monitoring system based on Internet of things
LI Hong-qiang;MIAO Chang-yun;ZHANG Long-yu;TIAN Wen-tao;WANG Jia-qing
..............page:4600-4603
New improvement of ZG off-line TTP fair and non-repudiation protocol
YANG Shan-yuan;ZHU Jian-ming
..............page:4656-4658
Research on MDS-based visual clustering in patent texts
HAO Zhi-yong;HE Ming-ke;TAN Wen-tang;ZHANG Jian-dong
..............page:4608-4611
K-means algorithm based on data field
JIAN Yan;JIA Hong-yong
..............page:4498-4501
Object tracking algorithm based on self-adaptive selection of double histograms
SONG Hao;WANG Chao-ying;HOU Zhi-qiang;LIU Bin
..............page:4772-4774
Hierarchical self-destruction method and case study on distributed system
QIU Zhi-tao;WANG Hui-qiang;FENG Guang-sheng;LV Hong-wu;JIANG Dong
..............page:4662-4666
Invariance of mutual information gradient based nonlinear feature extraction
XU Hong-zhang;NIU Xiao-mei;LIAO Hai-bin
..............page:4495-4497,4501
Invariants based program repair evolutionary extended model
HE Jia-lang;ZHANG Kun;MENG Jin;ZHANG Hong
..............page:4533-4535,4540
Design of recommendation system architecture based on integrity
HUANG Hong-yin;XU De-hua
..............page:4591-4593,4596
Improved algorithm of CF broadcasting structure based on repeat hot data
SUN Jin-jin;ZHU Yu-quan;CHEN Geng
..............page:4698-4700,4704
Administrative hierarchical-user role-based access control model
REN Chuan-lun;LI Zhong-xian;NIU Xin-xin;YANG Yi-xian
..............page:4633-4637
Novel immune clone algorithm for optimizing bus frequencies
WANG Min
..............page:4483-4485
Research about fractal growth mechanism of Baidu Baike cooperation network
SU Dong-xu;YANG Jian-mei
..............page:4520-4522,4525
Internetware model based on possible worlds and research of creditability
LIU Chao;WANG Wen-jie
..............page:4604-4607,4611
Heart sound recognition based on wavelet transform and SampEn
GUO Xing-ming;TANG Li-ping
..............page:4555-4557
Improved GPC control application in multimedia networks
XIAO Lei
..............page:4747-4749,4754
Kinematics analysis and trajectory planning for arm equipped on intelligent wheelchair
ZHANG Yi;WU Yu-li;LUO Yuan
..............page:4578-4581
Adaptive Volterra prediction model for traffic flow based on chaos
ZHANG Yu-mei;QU Shi-ru
..............page:4486-4488
Multi-objective dynamic gait parameters optimization for biped robot based on constraint satisfaction
WANG Hao;NIAN Shi-rui;FANG Bao-fu;WANG Guo-qing;HAN Wu-yan
..............page:4507-4510
Effective algorithm for generation of complex geological profile
TAN Zheng-hua;WANG Li-guan;HUANG Jun-xin;CHEN Jian-hong;BI Lin
..............page:4784-4786
Risk decision approach to test allocation problem in partition testing
ZHANG De-ping;ZHA Ri-jun
..............page:4536-4540
Research on dynamic location model and algorithm of logistics distribution centers
SHUI Wen-bing;YE Huai-zhen;ZHANG Shi-bo
..............page:4476-4479,4491
Efficient K-medoids clustering algorithm
XIA Ning-xia;SU Yi-dan;QIN Xi
..............page:4517-4519
Heuristic routing algorithm based on GPS location information for Ad hoc networks
WANG An-bao;HU Xiao-ming
..............page:4708-4710
Content-filtering method for information push based on reformative PU-learning theory
SUI Fu-ning;YANG Qiang
..............page:4480-4482,4485
Enhanced discontinuous reception mechanism for power saving in TD-LTE
ZHANG Ya-qing;LI Fang-wei
..............page:4758-4760,4763
Improved adaptive integral control algorithm for nonlinear system
DUAN Qi-chang;ZENG Yong;DUAN Pan;LEI Lei
..............page:4492-4494
Method of paper information extraction based on HTML tree and template
LI Wen-li;WANG Le-chao;SONG Chun-lei
..............page:4615-4617
Spectrum access based on dynamic frequency hopping
TAO Nai-shun;XIAN Yong-ju;XU Chang-biao
..............page:4684-4685,4689
Signal enhancement method of embedded speech recognition in reverberation environment
GUO Wei;SHEN Li-min;TAN Yun-fu;TAO Feng-li
..............page:4565-4567,4581
Adaptive channel reservation admission control algorithm in IEEE 802.11e
WANG Zai-rong;LIU Cheng-xi
..............page:4761-4763
Grey particle swarm optimization based on TOPSIS for multi-objective optimization problems
GONG Sui-ping;REN Jun-hao;ZHANG Bao-lei
..............page:4457-4459,4472
Oriented multi-target tracking wireless sensor network task allocation
XU Xiao-ling;LIU Mei
..............page:4755-4757
New high efficient multiple target track algorithm
WEI Ying-ying;CHEN Shao-wei
..............page:4505-4506,4510
Multilevel spam filter based on correlation
XU Di-hua;WANG Zhi-jian;ZHANG Yan-li;XIN Li
..............page:4715-4717,4722
Dynamic spectrum allocation algorithm of joint power control in cognitive radio networks
FENG Wen-jiang;WANG Ru-ru;JIANG Wei-heng;WU Di
..............page:4680-4683
Methodology of modeling and formal verification based on extended Petri net
ZHANG Guo-yin;LIU Ming;YAO Ai-hong;MEN Chao-guang
..............page:4587-4590
Signal notch method based on Hankel matrix and SVD
WU Hao-hao;LUO Zhi-zeng
..............page:4514-4516
Study of reducing size of cascading failures in communication network of network centric warfare
REN Jun-liang;SHEN Mao-xing;TONG Rui;GAO Hong-xing
..............page:4741-4743
Extraction and logic description for structure trust pattern of information documents
CHEN Lu-yao;ZENG Guo-sun;WANG Wei
..............page:4624-4629
Protein classification based on optimization of discriminant model
WANG Dong;SUN Ji-zhou;BI Qing-sheng;SONG Ting
..............page:4467-4469
Group trust model in P2P network
KONG Jie;ZHANG Xin-you
..............page:4646-4649,4658
Anycast routing algorithm for networks load balance based on QoS
LI Kang-shun;ZHOU Xin-yu;ZHANG Wen-sheng
..............page:4718-4722
Ontology-based framework for trustworthy software evolution
LI Ji;LIU Chun-mei
..............page:4551-4554
Early termination algorithm based on distinguishing effective motion vector technology
HU Dong-qi;HUANG Kai;FENG Jiong;YAN Xiao-lang;GE Hai-tong
..............page:4764-4767,4771
Research on constrain and consistency of time for ontology
YIN Guo-cheng;SUN Mao-sheng
..............page:4548-4550,4554
Flexible flow-shop scheduling problems in supply chain environments
CHANG Gui-juan;XU Jun-qin
..............page:4571-4574
Improved algorithm for construction of essential graph
GAO Xiao-li;LI Bing-han;LIU San-yang
..............page:4530-4532
Research on data mining model for obtaining and representing fishery knowledge
YUAN Hong-chun;TANG Hong-yi;CHEN Xin-jun
..............page:4443-4446
Identification and evaluation of supply chain fault risk
LI Shou-ze;YU Jian-jun;SUN Shu-dong
..............page:4568-4570
Petri net-based analysis and verification of information flow security properties
CHEN Song;ZHOU Cong-hua;JU Shi-guang;WANG Ji
..............page:4638-4642
Delay tolerant routing protocol in social networks
LI Zhi;LIU Feng-yu;ZHANG Hong
..............page:4732-4734
Research on WSN routing policy in long-chain-type transmission circuitry monitoring system
ZHAI Xue-ming;QI Li-shuo;ZHU Yong-li;YU Yong-hua
..............page:4677-4679
Control strategy of minimal energy consumption based on multi-joint robot
DANG Pei;TAN Yun-fu;SHEN Li-min
..............page:4575-4577
Optimal selection algorithm of beacons in wireless sensor network
FU Qin;LIU Ke-zhong;CHEN Wei;ZHANG Jin-fen
..............page:4695-4697
Numerical analysis and circuit simulation of fractional-order chaotic system
XU Qiang;BAO Bo-cheng;HU Wen;YANG Xiao-yun
..............page:4612-4614
Minimizing makespan on parallel batching machines with non-identical job sizes using SAGA
SHU Feng;CHEN Hua-ping;DU Bing;LI Xiao-lin;CAO Zhang-jin
..............page:4526-4529
Research on approach of vulgar content analysis in green network
NING Kui;LONG Long;QIN Xiao;ZHONG Zhi;SU Yi-juan;CHEN Wan-lei;NING De-peng
..............page:4643-4645
New identity-based signcryption scheme
WANG Cai-fen;WANG Xiao-juan;HAO Zhan-jun
..............page:4630-4632,4637
Research on constraints resolving for freeform feature model
LIU Xian-guo;SUN Li-juan;DING Bo;WANG Li-hong
..............page:4781-4783
Coverage algorithm of probability model in wireless sensor networks
SUN Ze-yu;DING Guo-qiang;ZHANG Yong-sheng
..............page:4673-4676
New method of character string similarity compute based on fusing multiple edit distances
DIAO Xing-chun;TAN Ming-chao;CAO Jian-jun
..............page:4523-4525
Improved electronic cash scheme
CHEN Li;ZHU Bian
..............page:4659-4661