Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2010 Issue 3
Audio watermarking algorithm based on energy ratio in DWT domain
bao jin fei ; bai sen ; zhu gui bin ; bai yu bao
..............page:1035-1038
Optimization of access control list based on locator/identifier split
yao yu feng ; tu zuo
..............page:1145-1147,1150
Modeling and predicting total number of private cars based on GEP
zhu ming fang ; wang hong tao ; ren yan ling
..............page:958-960
Fusion method of remotely sensed image for retaining color
wu lian xi
..............page:1173-1175
Design and implementation of traffic information dissemination and query system
zhong zuo ; qin zhi guang ; yang lei
..............page:970-974
Research on credit assessment based on trade behavior for e-commerce
wang zhi bing ; li chang yun
..............page:945-947
Pattern-based opinion mining on figures comments in Chinese
li juan ; zhang quan ; jia ning ; zuo han fen
..............page:833-836
Cyclic spectrum analysis and parameters estimation of OFDM signals
jiang qing ping ; yang shi zhong ; zhang tian zuo
..............page:1133-1135
Fast algorithm for building CAN topology
dai chang hua ; zhang zuo
..............page:1154-1156
Fast 3D rigid medical image registration based on GPU
qin an ; xu jian ; feng qian jin ; meng xiao lin ; chen wu fan
..............page:1198-1200
2D Otsu algorithm improvement based on genetic algorithm
jiang yu sheng ; song xiang li ; ren jing jing
..............page:1189-1191
Multi-dimensional function optimization based on global-best harmony annealing algorithm
zhang feng rong ; pan quan ke ; pang rong bo ; li zuo
..............page:853-855,859
Handoff optimization for mobile IPv6 based on credible area
yang jun ; guo wei ; liu jun
..............page:1106-1109
Research and development on biomedical named entity recognition
zheng qiang ; liu qi jun ; wang zheng hua ; zhu yun ping
..............page:811-815,832
Research on task scheduling model in fault diagnosis grid
zhang jian jun ; feng jing ; zhang li ; xu juan
..............page:1002-1005
Design and implementation of softman admin system based on Linux LKM
wu tao ; yue yang ; zeng guang ping
..............page:948-950,954
Cryptanalysis of image encryption algorithm based on hyper-chaotic system
liu jin mei ; qiu shui sheng ; liu wei ping
..............page:1042-1044
Research of spectrum allocation based on bidding model in cognitive radio networks
liu zhen kun ; xian yong ju ; xu chang biao
..............page:1006-1008
Abnormal detection of processes based on improved rough set value reduction algorithm
wang hui ; liu feng ; zhao zhi hong ; luo bin
..............page:1064-1067
Research on links precompensation algorithm in sparse Ad hoc networks
chen chun mei ; jiang hong ; liu lei
..............page:1095-1098
Research of Chinese spectral clustering with LSA
xiong zhong yang ; bao zi qiang ; li zhi xing ; zhang yu fang
..............page:917-918
Research of two-dimensional orthogonal projection similarity-based 3D model retrieval
yang shao bo ; geng guo hua ; zhou ming quan
..............page:1187-1188,1191
Methods of spiral CT three-dimensional face parametric plane
mao xiao lin ; geng guo hua ; zhou ming quan
..............page:1195-1197,1200
Design and simulation of optimum service selection arithmetic in pervasive computing
liu wei ; zhu zhen min ; jiang fa qun ; ye jian ; su xiao li
..............page:899-903
Improved AODV routing algorithms based on neighbor survival ratio
liu jin ding ; yan han
..............page:1102-1105,1109
Survey on P2P overlay clustering technology research
zheng li ming ; li xiao dong ; li xiao yong ; sun wei dong
..............page:806-810,828
Provably secure signcryption scheme based on elliptic curves
wang tian qin
..............page:1055-1057
Secret sharing scheme based on bilinear pairings
bai qin zuo ; huang chong chao ; liu feng
..............page:1045-1046,1051
Reversible data hiding using prediction error difference expansion without location map
xiong zhi yong ; jiang tian fa
..............page:1015-1018,1028
Fuzzy direct generalized predictive control based on tracking error adjustment
li gui qiu ; chen zhi wang
..............page:1009-1011,1014
ASCM:SOA-based embedded adaptive safety critical middleware
zhang zuo ; cai wan dong
..............page:966-969
Semi-supervised learning based on K-means clustering algorithm
liu tao ; yin hong jian
..............page:913-916
New classification algorithm K-means clustering combined with SVDD
liu yan hong ; xue an rong ; shi xi yun
..............page:883-886
Genetic tabu algorithm for BP network intrusion detection
wang yan ping
..............page:1086-1088,1091
Reducing combinatorial test suite based on tree-model by using input parameters relationships
wang li xin ; yang jun ; wan ren xia ; wang ming jun
..............page:928-932,937
Crowd density estimation of wide scene based on fuzzy neural network
tang qing ; wang zhi yan ; yan he ping ; xu xiao wei
..............page:989-991,1008
Design of layered structure for fault management system
tian zuo ; liao xiang ke ; shao li song
..............page:961-965
Reliability computation of communication network with enhanced OBDD method
xiao yu feng ; li zuo ; li yu hong ; jiang hong
..............page:1114-1117
Research of services discovery based on co-clustering user and services
zhu hong kang ; yu xue li
..............page:986-988
Two step UWB TOA estimation method for WSN ranging
chen kui ; xu zuo
..............page:1126-1128,1132
High-efficient algorithm for normal form conversion of discernibility function
zhang de dong ; li ren zuo ; zhao yong sheng
..............page:879-882
Approach for detecting approximately duplicate records based on cluster of inner code\'s sequence value
lu jun yun ; li xing yi ; shi hua ji ; ma su qin
..............page:874-878
Node localization anomaly detection based on clustering in wireless sensor networks
zhang yu qin ; qin zheng
..............page:1139-1141,1153
Hybrid algorithm of particle swarm optimization and stimulated annealing for job-shop scheduling
cai bin ; mao fan ; fu zuo ; yang shi hai
..............page:856-859
Gossip-based update propagation scheme in peer-to-peer networks
zhou cui hong ; jia li zuo ; zuo wei ming ; qin zuo hua
..............page:1110-1113,1125
Identity-based authentication scheme for VANET
wang qiang ; chen ; mu de jun
..............page:1089-1091
Pre-disposal for handoff in wireless LAN
wang xin jian ; shi hua ji ; chen ji ming
..............page:1129-1132
Updating algorithm based on matrix for mining frequent item sets
xu jia li ; chen jia
..............page:837-840,863
Proxy mobile IPv6 based inter-domain mobility management approach and performance analysis
ren san yang ; chai rong ; tang lun ; chen qian bin
..............page:1118-1121
Deep-pipeline optimization for lifting architecture of 5/3 DWT
xu yong ; xu zhi yong ; zhang qi heng
..............page:975-976,985
Secure examination system based on rough set theory
zhang ping ; wang jian zhong ; wu zuo ; zou fan ; gao zuo
..............page:1012-1014
Similarity measurement method based on membership function and its application
li jun jun ; qi jin ; hu jie ; peng ying hong
..............page:891-893,903
Design and implementation of software testing tool based on super block dominator graph
xu xiao feng ; chen yan ; li yi zuo ; lin xiao peng ; guo dong hui
..............page:923-927
Research of image-adaptive watermarking algorithm based on wavelet transform
liu tao ; xiao han
..............page:1058-1060,1067
Novel optimal route algorithm for public transportation
cai nian ; cai cai yan
..............page:907-908
Secure two-party comparing protocol based on evaluation of encrypted functions
chen liang ; xu yong
..............page:1074-1082
Research on constructing of household holographic map for service robot
wu pei liang ; kong ling fu ; zhao feng da
..............page:981-985
Study of conceptional model validation method based on Petri net
fan hao ; huang shu cai
..............page:999-1001,1005
Survey on peer-to-peer key technologies
wang xue long ; zhang
..............page:801-805,823
High precision measurement method of parameters of plane circle based on stereo vision
lin guo yu ; chen xu ; zhang wei gong
..............page:1183-1186
Worm detection technology research of net-flow dynamic critical line established based on statistical analytic method
wang yong chao ; xie yong kai ; zhu zhi ping ; lin huai zhong
..............page:1032-1034
Adaptive cross-layer resource allocation scheme resisting delay sensibility
peng li ; jiang ming yan
..............page:1122-1125
Quantum-inspired evolutionary algorithm for multi-objective job-shop scheduling
zuo chao yong ; liu xiang ; zheng jian guo
..............page:849-852
Research of adaptive fault tolerant routing algorithm in hypercube networks
weng yi ; liang jia rong ; hua ren jie
..............page:1151-1153
Solving large scale location problem using affinity propagation clustering
tang dong ming ; zhu qing xin ; yang fan ; bai yong
..............page:841-844
New image scrambling evaluation method based on probability distance
liu jian hua ; han chun jie ; fan jiu lun ; yuan sui wei
..............page:1083-1085
Disjointed multi-path routing algorithm based on living time in Ad hoc networks
huang min ; liu qiong ; zuo jian qing
..............page:1157-1160
Survey on Fuzzing
wu zhi yong ; wang hong chuan ; sun le chang ; pan zu lie ; liu jing ju
..............page:829-832
Study of image data hiding method based on pixel-value differencing and LSB replacement
xu kai ping ; zheng hong yuan ; ding qiu lin
..............page:1068-1070,1082
Investigation on joint optimization of resource allocation and routing in wireless mesh networks
liu jing yong ; liao dan ; li le min
..............page:824-828
Research on mapping method from XML document to relational database
geng zuo ; song yu qing ; liang cheng quan ; chen jian mei
..............page:951-954
Power allocation for two kinds of multi-user MIMO linear precoding
zhu zuo ; hu han ying ; cui wei jia
..............page:1136-1138
Parallel generation for video panorama in mobile environment
han long ; guo li
..............page:1167-1169,1179
Mobile agent dynamitic migration algorithm in distributed information retrieval system based on ant colony algorithm
dang chen ; wang jia zuo ; liu ai zhen ; zhao xin qing
..............page:868-870,878
Kernel form of regularized FDA and comparison study with SVM
yu chun mei ; pan quan ; cheng yong mei ; zhang hong cai
..............page:897-898,906
Overview of multiple sink routing protocols in wireless sensor networks
xu chen ; cao lei ; zhang guo an ; gu jin zuo
..............page:816-823
Authentication extension model in networks based on fuzzy logic
li wei ; fan ming zuo
..............page:1026-1028
Robust watermarking scheme based on image normalization and pseudo-Zernike moments
miao xi kui ; sun jin guang ; zhang yu han
..............page:1052-1054
Research and implementation of security SSO authentication model based on SAML and XKMS
chen tian yu ; xie dong qing ; yang xiao hong ; yang hai tao
..............page:1019-1021,1025
Research of conceptual modeling of virtual environments
zhao xin can
..............page:995-998
Online select feature target tracking
yang hui xian ; yang xin li ; zeng jin fang ; yu hong
..............page:1180-1182
Identity-based ring signcryption scheme with constant size ciphertext
sun hua ; zheng xue feng ; yu yi ke ; han xiao guang
..............page:1022-1025
Editable method to 3D human skinned mesh animation synthesis
li lian dong ; fan yang yu ; lei tao ; lv guo yun
..............page:1176-1179
Edge key-based dynamic keying scheme for wireless sensor network
guo jiang hong ; li xing hua ; wu jian qiang
..............page:1029-1031
H-GRASP: advanced GRASP-based hybrid SAT solver
tang yu lan ; zhang hui guo ; yu zong guang ; chen jian hui
..............page:864-867
Text sentiment orientation identification based on semantic feature
he kun ; li wei sheng ; yang yong
..............page:992-994
Coding mechanism for topological entities in semantic feature modeling
gao xue yao ; sun li zuo
..............page:938-940,944
Hybrid improved ant algorithm for VRPSTWCUI
cui xue li ; ma liang
..............page:845-848,852