Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2011 Issue 7
Research on canonical cover in partial order temporal scheme
WAN Jing;ZOU Ji-min
..............page:2473-2475
Top-k probabilistic mutual nearest neighbor query on uncertain data
LIANG Yu;ZHANG Yan;ZHOU Song;BAI Wen-yang
..............page:2485-2487,2491
Survey on network traffic camouflaging
ZHANG Lian-cheng;WANG Zhen-xing;MIAO Fu
..............page:2418-2423
Research of performance about pseudo-Bayesian stability of adjustment algorithm
FANG Fei;YU Wen-chun;MAO Yu-ming
..............page:2424-2426,2442
Spatio-temporal adaptive super-resolution reconstruction of video based on POCS frame
TIAN Jing-bei;HOU Tian-feng;LI Meng-he
..............page:2778-2781
Heuristic algorithm for consolidation problem of air cargo forwarders
GUI Yun-miao;GONG Ben-gang;CHENG You-ming
..............page:2446-2448,2451
Modeling evolution of complex networks based on spatial gravitation
LI Zhou-ping;HAN Jing-ti
..............page:2625-2627,2631
Novel cooperative spectrum sensing algorithm based on RMT and performance analysis
CAO Kai-tian;WANG Shang
..............page:2640-2642,2646
Artificial fish-swarm algorithm for nonlinear 0-1 programming problem
LIChun-mei;MA Liang
..............page:2449-2451
Data collection method for delay tolerant wireless sensor network by satellite communication
LUO Qing-chun;PENG Wei;LI Su-dan;WANG Yong
..............page:2651-2654,2657
Web service discovery approach based on functional semantic annotation
WEN Jun-hao;TU Li-yun;JIANG Zhuo;HE Panb
..............page:2546-2549,2557
All-to-all broadcasting algorithms on honeycomb tori
YIN Yu-ling
..............page:2492-2493,2496
Hybrid information retrieval model using domain ontology concept relation
XIONG Zhong-yang;LAI Su;ZHANG Yu-fang;LI Chun-ling
..............page:2482-2484,2501
Resilience framework of three-layer supercomputing environment
DAI Zhi-hui;XIAO Hai-li;CAO Rong-qiang;CHI Xue-bin;CAO Zong-yan
..............page:2576-2579
Medical integrated platform model study on common interface
ZHANG Lan-hua;XUE Shao-wei;LI Jian;TANG Yi-yuan
..............page:2558-2560,2568
Multi-objective quality model of SaaS using genetic algorithm optimization
MA Hong-jiang;ZHOU Xiang-bing;SHE Kun;XIE Cheng-jin
..............page:2534-2538,2542
Study on Internet of things technologies based on mobile sense
HE Xin;SONG Ya-lin;AN Jian;GUI Xiao-lin
..............page:2407-2410,2417
Detection model of normal and abnormal instances based on process-mining
XU Xiao-lei;ZHANG Li-qun;LIU Bin;LI Dong
..............page:2553-2557
Weak signals\' DOA estimation based on RBFNN
WU Jun-wei;ZHANG Min;ZHONG Zi-fa
..............page:2470-2472
Towards optimizing K2 tree for large-scale graph storage
SHI Quan;XIAO Yang-hua;LU Yi-qi;CHEN Yao-liang;WANG Heng-shan
..............page:2488-2491
Research on risk assessment model for malicious encryption script based on AHP
BI Shuo-ben;ZHU Bin;QIAO Wen-wen;XU Yin;WANG Qi-fu
..............page:2726-2728,2741
Research on decision-making mechanism of tactical action simulation based on layered agent
QIU Hang-ping;GUAN Liu;PAN Xiao-dong;YUAN Li-miao
..............page:2455-2457,2461
Research on formant synthesis and prosody adjustment-based speech validation codes
WANG Cheng-liang;ZHANG Yu-wei
..............page:2458-2461
Architecture of education resource sharing system based on HRN and its related strategies analysis
XING Chang-ming;HAN Qing-hua;HAN Yong
..............page:2635-2639
Optimal decision-making modelling for copper-matte converting process by data mining
SONG Yan-po;PENG Xiao-qi;HU Zhi-kun;LI Yong-zhou
..............page:2539-2542
Sequence-oriented AIO dynamic programming algorithm
JING Bo;LIU Ying;HUANG Bing
..............page:2528-2530
Self-organized key management based on zero knowledge proofs for Ad hoc networks
LIU Fang-bin;HE Jia-lang;ZHANG Kun;ZHANG Hong
..............page:2700-2702
P2P reputation model based on trust in mainstream view
XU Qin-gui;CAO Ke
..............page:2729-2733
Blind watermarking algorithm for color image guided by visual model
FANG Wang-sheng;Li Yu-nan;ZHANG Rong
..............page:2719-2722
Study on composing attribute-based access control policies in grid
HUANG Ting-sen;YE Chun-xiao;HU Hai-bo
..............page:2683-2686
Cryptanalysis of two certificateless partially blind signature schemes
HU Guo-zheng;HAN Lan-sheng;XIA Xiang-sheng;WANG Zhan-qing
..............page:2703-2704,2737
Image steganography using complexity analysis
PAN Feng;LI Jun;YANG Xiao-yuan;PENG Jian-yang
..............page:2712-2714
Multi-dimensional approximation algorithm for MPLS-TE
CAO Jian-qiu;ZHANG Jing-yu
..............page:2658-2660,2679
Network coding-based protocol for data broadcasting in wireless Ad hoc networks
ZHANG Rui;ZHAO Zeng-hua;ZHANG Ye-bin;SHU Yan-tai
..............page:2616-2620
Scalable framework and end-to-end QoS scheme for IP-oriented HAPS-GEO satellite networks
ZHANG Ying-xian;LIU Ai-jun;GUO Dao-sheng
..............page:2647-2650
Network coding scheme based on MAODV protocol
YAO Yu-kun;DING Dong;REN Zhi
..............page:2628-2631
3G location area optimization based on improved immune clone
YANG Ming-kui
..............page:2677-2679
Study on DOA estimation based on phase-angle of eigenvector using RBF neural networks
WENG Xiao-jun;ZHANG Min;LI Peng-fei
..............page:2655-2657
Dynamic power management predictive policy based on MA(q) model
BU Ai-guo;WANG Jiong
..............page:2516-2518
Classification of mandarin prosodic break based on hierarchical structure of prosodic break
NI Chong-jia;ZHANG Ai-ying;LIU Wen-ju;XU Bo
..............page:2452-2454,2511
Vector method for pose estimation with un-calibrated camera
ZHOU Wei;XU Hai-xia;ZHENG Jin-hua
..............page:2770-2773,2777
Color image steganography using discrete quaternion Fourier transforms
GAI Qi;QIAO Zhao-liang
..............page:2746-2749
Statistics based dynamic programming method for online handwritten character segmentation
YAO Zheng-bin;DING Xiao-qing;LIU Chang-song
..............page:2592-2594
Objects tracking algorithm for WMSN based on distributed data fusion
TIAN Hao;HAN Ping
..............page:2664-2666,2669
Immune danger theory based quantitative model for network security situation awareness
SUN Fei-xian;JIN Xiao-ting
..............page:2680-2682,2686
PCT-based evaluation for user interface
LI Qian;HUA Qing-yi;LI Zhen
..............page:2561-2564
Efficient identity-based proxy signcryption scheme
CHEN Shan-xue;ZHOU Shu-xian;YAO Xiao-feng;LI Fang-wei
..............page:2694-2696
Approach of real-time gesture recognition based on embedded system
XU Cheng;MA Yi-lun;LIU Yan
..............page:2782-2785
Research on mission control of multiple airborne early warning aircraft for intelligence cooperation
WANG Guo-shi;LI Qiang;YANG Zheng;CHEN Yong-chao;HU Ya-hui
..............page:2606-2609
Web semantic mining based product feature usability analysis
LIU Pan;WANG Li-ya
..............page:2580-2582,2585
Research of cloud-based spatial information service system
ZHOU Hong-wei;LI Qi
..............page:2586-2588
Research on digital image encryption algorithm based on fractional Fourier transform
WANG Ya-qing;ZHOU Shang-bo
..............page:2738-2741
On second order nonlinearity of cubic Bent functions
XU Yuan;CHONG Jin-feng;ZHUO Ze-peng
..............page:2687-2689,2718
Ontological trust model based on experience sharing for service-oriented systems
LIAO Jun;ZHANG Hong;JIANG Li-ming
..............page:2754-2757
Novel P2P protocol identification algorithm based on optimized SVM
MAO Ling;CHEN Xing-shu;WU Zhong-guang;TAN Jun;DU Min
..............page:2750-2753
Performance evaluation of packet capture methods based on multi-core platform
ZHANG Xian;LI Wen-wei
..............page:2632-2634,2639
Research on authenticated key agreement protocol in cross-domain two-party for mobile Ad hoc network
CHEN An-lin;PAN Jin;GUO Chao;LIU Xiao-qiong
..............page:2734-2737
Map matching algorithm based on shape descriptors using Zernike moments
CAO Wen;WAN Ming-ying;LI Run-sheng;YU Wen-jie
..............page:2786-2788,2792
New representation of adaptive multiresolution subdivision surfaces
SUN Li-Juan;JING Hong-yu;WANG Yue
..............page:2793-2796
Online select feature and occlusion processing target tracking
YANG Xin-li;YANG Hui-xian;LENG Ai-lian
..............page:2797-2800
Improved particle swarm optimization based on Brownian motion
XU Xing;WU Yu;LI Yuan-xiang
..............page:2439-2442
Sensitive and robust model of trust computation in trusted networks
FAN Yan-feng;YANG Zhi-xiao
..............page:2497-2501
Dynamic neighborhood particle swarm optimization for constrained optimization problems
PENG Hu;TIAN Jun-feng;DENG Chang-shou
..............page:2476-2478
Robust tracking control of omnidirectional lower limbs rehabilitation robot
JIANG Ying;BAI Bao-dong;WANG Shuo-yu;GUO Jin-yu
..............page:2502-2504
Quantum-behaved particle swarm optimization dynamic clustering algorithm
CHEN Wei;CHEN Jing;SUN Jun;XU Wen-bo
..............page:2432-2435
Face recognition based on fuzzy membership
LONG Ji-zhen;CHEN Yuan-tao;DENG Dong-mei
..............page:2789-2792
Rough sets and ant colony optimization based feature selection
WU Ke-shou;CHEN Yu-ming;XIE Rong-sheng;WANG Xiao-dong
..............page:2436-2438
Scheduling algorithm based on information flows for product development project
CHEN Dong-yu;WANG Lei;ZHANG Han-peng
..............page:2531-2533,2572
Multi-project collaborative plan of new product development based on generalized resource restrained
YANG Lian-xing;GUO Gang;DENG Xiao-gang
..............page:2602-2605
Two-stage outlier detection in multivariate time series
WANG Xin
..............page:2466-2469
New design for information hiding without capacity limit in PE files
LI Qian;FANG Yong;TAN Deng-long;ZHANG Chang-shan
..............page:2758-2760
Probability based data delivery scheme for mobile sensor network
LIU Jie-yan;LIU Ming;GONG Hai-gang;ZENG Jia-zhi
..............page:2610-2612,2620
Security scheme design on dynamic home agent address discovery
XING Hong-zhi;LUO Chang-yuan;HUO Shi-wei
..............page:2670-2673
Chaos genetic algorithm for solving 0-1 integer programming problem
SANG Xiao-dan;LUO Xing-guo;YU Chun-lai;CHEN Tao
..............page:2443-2445
Dynamic load-balancing algorithm for P2P MMOG
XIE Xiao-yong;LIU Xiao-dong;HU Lin-ling;LI Wei
..............page:2565-2568
Overview on vision-based 3D reconstruction
TONG Shuai;XU Xiao-gang;YI Cheng-tao;SHAO Cheng-yong
..............page:2411-2417
Local greedy strategy based on high-performance quorum generation algorithm
LI Mei-an;CHEN Zhi-dang;WANG Chun-shen;LIN Lan
..............page:2522-2524
New algorithm for H.264 de-blocking filter based on slice types and inter prediction
LI Kang-shun;JIN Jing;WANG Feng
..............page:2761-2764,2781
Low-power technology research of BIST based on folding rearrangement
TAN En-min;ZHAN Yan;LIU Jian-jun
..............page:2583-2585
Alogrithm for mining top-K frequent itemsets over sliding window in data streams
ZHANG Wen-yu;ZHOU Man-yuan
..............page:2519-2521
Cheater detectable visual cryptography scheme with third trusted party
MO Qing-ping;TAN Xiao-qing
..............page:2690-2693
Side constrained network traffic assignment and application
HE Sheng-xue;LI Qiu-man
..............page:2595-2598
Method of task assignment for optimization of automotive system reliability
LI Rui;LEI Qun-mi
..............page:2462-2465,2469
Research on malicious behavior of firmware based on hardware resources access control
ZHANG Cui-yan;ZHANG Ping;HU Gang;XUE Liang
..............page:2709-2711,2714
Multi-objective co-evolutionary algorithm based on culture
ZHAO Xue-chen;WANG Hong-guo;SHAO Zeng-zhen;MIAO Jin-feng
..............page:2494-2496
Reseach and implementation of universal zero-copy platform in Linux environment
SUN Jiang;LAN Ju-long;LI Gao-peng
..............page:2621-2624
CPF-EDAS:effective data aggregation scheme based on potential field of clustering in WSN
FENG Fang;CHENG Liang-lun
..............page:2613-2615,2624
Personalized tag recommendation system based on preferences
XU Di-hua;WANG Zhi-jian;LIN Qiao-min;HUANG Wei-dong
..............page:2573-2575,2579
Discrete time NHPP based software reliability growth model
HE Yan;ZHANG Lai-shun;LIU Wei;LI Zhong-wen
..............page:2569-2572
Design and implementation of network attack and defense simulation platform based on system-in-the-loop
KONG Hong-shan;TANG Jun;ZHANG Ming-qing
..............page:2715-2718
Defect-driven trustworthiness metrics model of Web services
XU Chuan-yun;YANG Dan;ZHANG Yang
..............page:2723-2725,2733
Computer intrusion forensic based on temporal logic of actions
LI Jun-tao;TANG Zheng-yi;LI Xiang
..............page:2742-2745
Spectrum allocation algorithm based on game theory in cognitive radio
TENG Zhi-jun;HAN Xue;YANG Xu
..............page:2661-2663
Research on trustworthy software analysis and testing
WANG Huan-huan;ZHAN Yong-zhao;CHEN Jin-fu
..............page:2401-2406,2423
Chinese time expression recognition based on semantic role
LIU Li;HE Zhong-shi;XING Xin-lai;MAO Xiao-li
..............page:2543-2545
Fast inter-frame prediction method using histogram of macro-block
LIU Peng-yu;JIA Ke-bin
..............page:2774-2777
Validation of simulation model based on posterior probability for support vector machine
WU Xiao-yan;WU Jing;TENG Jiang-chuan;CHEN Yong-xing
..............page:2550-2552,2564
Granular principle based multi-index synthetical Web user clustering algorithm
ZHAO Jie;DONG Zhen-ning;ZHANG Shá-qing;XIAO Nan-feng
..............page:2427-2431
Collaborative recommendation algorithm based on Web customer factor analysis
ZHAO Hong-xia;WANG Xin-hai;YANG Jiao-ping
..............page:2525-2527,2530