Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2012 Issue 10
Review on evaluation of node importance in public opinion
SUN Rui;LUO Wan-bo
..............page:3606-3608,3628
Survey on trustworthy software evaluation
ZHOU Jian;ZHANG Ming-xin
..............page:3609-3613
Research for logistics distribution center location-distributionproblem based on maximal covering in cloud logistics mode
BI Ya;LIANG Xiao-lei;ZHAO Wei;WANG Xun;LI Wen-feng
..............page:3640-3644
Adaptive bidirectional bacterial foraging optimization algorithm
HU Gui-wu;CHEN Jian-chao;DU Xiao-yong
..............page:3645-3647,3668
Heterogeneous multiprocessor task scheduling algorithm based on PSO
LI Jing-mei;ZHANG Bo;WANG Xue
..............page:3621-3624
Research of speech emotion recognition based on emotion features classification
ZHOU Xiao-feng;XIAO Nan-feng;WEN Han
..............page:3648-3650,3676
Multi-objective artificial bee colony algorithm applied in QoS-awareservice composition optimization
ZHOU Qing-lei;CHEN Ming-zhao;ZHANG Bing
..............page:3625-3628
Language recognition method based on hierarchical space analysis
CHANG Zhen-chao;LIU Bin;SHI Yuan-chao;ZHANG Xing-ming;YANG Zhen-xi;ZHANG Li
..............page:3651-3654
Searching low sidelobes maximal length sequence based on genetic algorithm
HE Fei;LIU Su;ZHANG Li-jun;LU Hui;ZHENG Zhan-qi;LIAO Xian-hua
..............page:3629-3631
Research of general contradiction matrix based on association rule
GUO Jian-wei;ZHANG Yu-chen;XIE Yong-hong;LIU Ying-hua;MA Nan
..............page:3655-3659
Research progresses of event-driven data gathering in WSN
LIANG Jun-bin;DENG Yu-rong;GUO Li-juan;LI Tao-shen
..............page:3601-3605
Research on adaptive supply chain and design of its recursive structure
MA Han-wu;ZHOU Yuan-min;WANG Yue;ZHANG Chao
..............page:3632-3635,3664
Collaborative filtering recommendation algorithm based onitem classification and cloud model
XIONG Zhong-yang;LIU Qin;ZHANG Yu-fang
..............page:3660-3664
Application and research of non-taxonomic relation extractionmethod based on NNV association rule
WANG Hong;GAO Si-ting;PAN Zhen-jie;XIAO Zhi-wei
..............page:3665-3668
Research of algorithm based on uncertain data for constrained frequent sets
LIU Wei-ming;YANG Jian;MAO yi-min
..............page:3669-3671,3680
Adaptive SVM decision tree classification algorithm based on bisecting K-means
QIU Guo-yong;ZHANG Jiao
..............page:3685-3687,3709
New coordinate descent algorithm for non-smooth losses
WU Wei-bang;ZHU Ye-lei;TAO Qing
..............page:3688-3692,3700
Closed sequential pattern mining algorithm with no candidate sequence based on two-level index structure
MIAO Yu-qing;WU Kong-ling;ZHU Xiao-yan;ZHANG Jin-xing
..............page:3672-3676
Novel FastSLAM algorithm based on square root unscented Kalman filter
LV Tai-zhi;ZHAO Chun-xia
..............page:3725-3727,3735
Improved iterative learning control method for mobile robot trajectory tracking
ZHANG Yang-ming;LIU Guo-rong;LAN Yong-hong
..............page:3728-3732
Plant growth simulation algorithm for multi-criteria travelling salesman
XI Ying;MA Liang;DAI Qiu-ping
..............page:3733-3735
Dynamic clustering algorithm for time series
XIE Fu-ding;ZHAO Xiao-hui;JI Min;PING Yu
..............page:3677-3680
Mesostructure reconstruction of random particulate composites using GA
ZHAO Jiu-ling;JIANG Yu-liang
..............page:3681-3684
Knowledge fusion model research based on granular computing theory
JIANG Li-li;LIANG Kun;YE Shuang
..............page:3697-3700
Monitoring system and recruitment mechanismdesign for social emergency resource
MENG Yan-ping;HUANG You-fang
..............page:3752-3756
Method to quickly formulate process time of product family based onextension transformation and time module
YANG Qing-qing;CHEN You-ling;LU Xiang-zhen
..............page:3701-3705
Research on scalable cluster-based cloud GIS platform
FAN Xie-yu;REN Ying-chao;YANG Chong-jun;TANG Jian-zhi;YI Xiong-ying
..............page:3736-3739
Fast channel zapping scheme for IPTV on ACR
XIAO Yi;LUO Jun-hai;XIAO Zhi-hui
..............page:3757-3760,3768
Optimization and performance analysis for code offinite volume lattice Boltzmann method
WU Pin;CAO Xiao-peng;SHANG Wei-lie;ZHENG De-qun;GAO Sheng
..............page:3706-3709
Cooperative collision warning based on Copula method
LIN Jing-li;YANG Wei-ming;YAN Gong-jun;Danda B. RAWAT;WANG Bang-ji
..............page:3761-3764
Genetic algorithm based NoC voltage-frequency island partition method
LIU Bin;CHANG Zhen-chao;ZHANG Xing-ming;YAN Jia-jia;YI Hong-bo
..............page:3740-3743
Particle swarm optimization algorithms with decreasinginertia weight based on Gaussian function
ZHANG Xun;WANG Ping;XING Jian-chun;YANG Qi-liang
..............page:3710-3712,3724
Logistics nodes decision based on interval iterative genetic algorithm
LI Li-hua;FU Zhuo;HU Zheng-dong;ZHOU He-ping
..............page:3713-3716,3732
Method of plan quality evaluation based on multi-goal metric function
LI Wei-sheng;XIAO Zu-ren
..............page:3717-3721
Research on alliance model for equipment supportsimulation training platform integration
LIAN Yun-feng;LU Yu;CHEN Li-yun
..............page:3748-3751
Gyro drift prediction based on reduced parameter second-order Volterra series
HU You-tao;HU Chang-hua;KONG Xiang-yu;HUANG Jin-feng
..............page:3722-3724
Secure network coding scheme of delay tolerant networks
GE Jun;WANG Zhi-chao
..............page:3815-3816,3841
Multi-objective optimization strategy of service pool to satisfy reliability constraint
CHEN Qiu-hong;JING Wei-na;WU Chang-ze
..............page:3791-3793
Study on component-based method of system-level modeling
FANG Lin-bo;YU Zhi-yong;WU Hong-xia;FU Guang-yuan;LUO Mei
..............page:3776-3779
Strong blind quantum signature protocol based on pure W-like state
NI Min;ZHA Xin-wei
..............page:3817-3819,3845
Key agreement scheme based on Chebyshev polynomials over finite fields
ZHAO Geng;SUN Jin-hui;ZHAO Fei
..............page:3794-3796
XOR-based (2,2,n) multi-secret visual cryptography
SHEN Gang;FU Zheng-xin;YU Bin
..............page:3797-3799,3808
Emergency logistics organizational ontology model and its application
DU Lei;ZHAO Rui;ZHENG Gui-xing;GAO Shan;ZHANG Xian-kun
..............page:3780-3782
Network security situation assessment model based on time parameter
MENG Jin;XU Jia;HE Jia-lang;ZHANG Hong
..............page:3820-3823
Authentication protocol based on signcryption for multi-domain in IPv6 network
ZHANG Long-jun;XIA Ang;MO Tian-qing;ZHAO Li-yi
..............page:3800-3804
Method for software reliability assessment based on fuzzy fault tree analysis
LIU Bo-ning;ZHANG Peng;ZHANG Jian-ye;MA Qiu-zhi
..............page:3783-3786
Network security situational awareness model based on set pair analysis
HAN Min-na;LIU Yuan;CHEN Ye
..............page:3824-3827
Video steganalysis method based on spatial-timeredundancy of statistics invisibility
ZHONG Wei-dong;WU Jun-qing;WU Geng-rui;YANG Hai-bin
..............page:3846-3849,3853
Improved multiple pattern matching algorithm in viruscharacteristic code detection
LUO Xi;LUO Hong;WANG Xiao-dong;LIU Hong-kun
..............page:3828-3830
Research on spam behavior recognition technology based on similarity of topology
ZHANG Xin-you;LI Xin-jie
..............page:3805-3808
New digital watermarking algorithm for audio authentication
SHEN Jun-wei;PAN Feng;ZHANG Ming-shu;XIAO Hai-yan
..............page:3850-3853
Anti-spam system design based on improved DMTP undercloud computing platform
LIU Hai-tao;YANG Jie
..............page:3809-3811,3823
Fairness marker algorithm based on dynamic thresholds for edge routers in DiffServ networks
YANG Xiao-ping;LI Shuai;LIU Xiao-jiao;CHEN Hong
..............page:3854-3856,3860
Research on cloud computing security authentication mechanism based on mobile agent
YANG Na-na;WANG Yang;CHEN Fu-long;HUANG Ya-kun;DENG Kun
..............page:3812-3814,3837
Location-based anonymous multiple routes protocol inAd hoc mobile network
ZHANG Yan-fen;LIU Wen-ju;WANG Ze;LIU Wei;PENG Song
..............page:3831-3834
Research on interference alignment for heterogeneous network
WANG Guo-wei;LI Hai-tao
..............page:3857-3860
Comparison of different integrated patterns of SINS/GPS system undercondition of GPS signal invalidation
XU Gang;HUANG Guo-rong;PENG Xing-zhao;XUE Dong;GAO Yuan
..............page:3888-3890,3896
Research on expert comprehensive evaluation for traitor tracing effectiveness
HAN Jin-sen;ZHANG Long-jun;ZOU Tao
..............page:3835-3837
Method to construct Overlay network with survivability
ZHAO Ji-hong;MA Wen-tao;WANG Li;TANG Rui
..............page:3861-3864
Address configuration for MANET based on clusters
WANG Xiao-nan;QIAN Huan-yan
..............page:3891-3893,3910
DVB-RCS timeslot scheduling research based on smoothed round robin
GAO Xin;WANG Zu-lin
..............page:3894-3896
Privacy-preserving model on data with conditional functional dependency
CHEN Wei-he;CHEN Lin
..............page:3838-3841
Detection of TD-SCDMA uplink burst signal based on sliding match and power spectrum analysis
ZHOU Sheng;ZHANG Tian-qi;CHEN Shi;YI Chen
..............page:3865-3869
Access control model based on weighted interval-valued fuzzy reasoning
WU Qian;YE Yong-sheng;LI Yuan-qing
..............page:3842-3845
Electroencephalograph analysis based on complex networks
HAO Chong-qing;WANG Jiang;DENG Bin;WEI Xi-le
..............page:3870-3872
Distributed compressed sensing based on differential signal sparse model
ZHANG Bo;LIU Yu-lin;ZHANG Jian-xin
..............page:3897-3899,3903
QPSO based actor optimal deployment in WSAN
YAN Xiao-ying;CHENG Guo-jian;ZHOU Guan-wu
..............page:3873-3875
Ad hoc tree structured time synchronization algorithm for wireless sensor networks
HU Wen;ZHENG Lin;QIU Hong-bing;QIN Xiu-ying
..............page:3876-3878
QoE evaluation method through generalized linear model
WU Ji-xiang;LI Fan;XIA Jing-bo;WANG Kai
..............page:3911-3913
Study on dynamic management mechanism onspace vector data in P2PGIS
WU Jia-gao;TIAN Yu-kun;ZHANG Xi;ZOU Zhi-qiang;HU Bin
..............page:3900-3903
Agent and entropy-weight based WSN data fusion
LIU Jia-jie;SUN Zi-wen
..............page:3879-3882
Resource migration scheme for reconfigurable service carrying network under dynamic topology condition
WANG Zhi-ming;WANG Bin-qiang;WANG Bao-jin
..............page:3883-3887
Research on grid resource scheduling for multi-QoS demands
MO Zan;XIE Na;JIA Gong-xiang;ZHAO Jie
..............page:3904-3907,3925
Research on QoS-aware cloud service optimal composition
LIU Zhi-zhong;LEI Guan-jun;XUE Xiao;LUO Jun-wei
..............page:3919-3921
Efficient boundary points extraction method for scattered point cloud of endocardium
ZHOU Xue-li;WAN Wang-gen
..............page:3942-3944,3996
Strategy of data grid replica creation based on content distribution
LI Fei;GUO Chang-song;ZHAO Bo-ting;ZENG Hui
..............page:3908-3910
Research on end-to-end thermal infrared remote sensing image simulation algorithms
KONG Xiang-hao;GU Xing-fa;YU Tao;HU Xin-li;LI Bin;LIN Ying-hao
..............page:3976-3979
Automatic matting based on fusion of blur estimation and saliency detection
PEI Xiao-kang;WANG Gui-jin;LIN Xing-gang
..............page:3945-3947,3955
Precise synchronization approach based on multi-rate interpolation and least squares method
WANG Xu-hua;BAI Peng;LI Huan-yu;PENG Wei-dong;LI Ming-yang
..............page:3922-3925
Research on impact of simple faults on H.264 encoder performance
ZHANG Hao;ZHAN Hai-yan;DENG Yue-tang
..............page:3948-3951
Dynamic available bandwidth allocation algorithm in multi-link based on delay optimization
LIANG Gen;LIANG Huo-min;QIN Yong
..............page:3926-3928
New algorithm for FRUC based on multi-frame motion estimation
YANG Ai-ping;DONG Cui-cui;HOU Zheng-xin;LI Na
..............page:3952-3955
Method of multi-protocol network log two-step clustering
YANG Jie
..............page:3929-3931
Video quality assessment based on content-partitioned approach and motion compensation
YAO Jie;TAN Jian-ming;CHEN Jing
..............page:3956-3959
Modulation classification algorithm of multinodes based on features fusion
DUAN Hao-yu;LI Ou;HU Yun-peng;LIU Yang
..............page:3935-3937
Approach to waymark detection based on visual attention mechanism
LIU Yi-jie;ZHANG Xiang-ping;TAN Shuang
..............page:3960-3963,3975
Road recognition in complex terrains
SONG Lei
..............page:3964-3967
Multi-scale sparse representation based scene categorization
DUAN Fei;ZHANG Yu-jin
..............page:3938-3941
Research on recognition method for shady and broken lane
FAN Chao;DI Shuai;HOU Li-long;XU Jing-bo
..............page:3968-3971,3989
New medical image registration method using hybrid QPSO
XIE Zhen-ping;SUN Jun
..............page:3972-3975
Method of realism emotion animation generation for virtual human
LEI Tao;LUO Wei-wei;WANG Yi
..............page:3983-3986,3992
Active contour model by kernel-induced distance fitting energy
ZHU Xiao-shu;SUN Quan-sen;XIA De-shen
..............page:3987-3989
Image segmentation approach by combining log-polartransformation and normalized cut
OU Suo-yang;FENG Qi;ZHANG Kun
..............page:3990-3992
Catmull-Rom image expansion based on Canny edge detection
CHEN Li-ping;LIU Wen-hua
..............page:3993-3996
Efficient developable strip surface design
CUI Xiao-kun;CHEN Ming
..............page:3997-4000