Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2012 Issue 2
Fast outdoor image segmentation algorithm based on Mean-Shift
YANG Xiao;LU Hui-min;ZHANG Hui
..............page:793-796,800
New efficient blind signature scheme without trusted PKG
ZHOU Ping;HE Da-ke
..............page:626-629
Grey incidence analysis on influence factors of online auditing performance assessment
CHEN Wei;SMIELIAUSKAS Wally;LIU Si-feng
..............page:435-437
Dynamic load balancing algorithm design and application based on feedback
YU Dun-fu;LI Hong-jian;TANG Hong;DOU Yu-sheng
..............page:527-529
Improved differential evolution algorithm for mixed integer nonlinear programming problem
DENG Chang-shou;REN Hong-wei;PENG Hu
..............page:445-448
Method to detect buffer overflow in C programs
XU Chao;HE Yan-xiang;HU Ming-hao;WU Wei;CHEN Yong;LIU Jian-bo
..............page:617-620
Research on conditional privacy-preserving protocol in VANET
LIU Luo-xian;LIU Ming-yang;SHEN Xiao-lin
..............page:683-686
Overview on sparse image denoising
GUO De-quan;YANG Hong-yu;LIU Dong-quan;HE Wen-sen
..............page:406-413
Improved apriori mining frequent items algorithm
LIU Bu-zhong
..............page:475-477
Improved ant colony algorithm for task scheduling in grid
HUANG Yang;LI Ken-li;ZENG Wen
..............page:455-458,462
Square symmetric neighborhood based local outlier detection algorithm
JIE Cai-ming;LIU Hui-jun;ZHU Qing-sheng
..............page:472-474
Grid-based interactive visualization of computational process on computational chemistry
CHEN Jian-hua;DUAN Qi-zhi;JIN Zhong;LIU Qian;ZHANG Bao-hua;CHI Xue-bin
..............page:432-434,437
Summary of research on image processing using fractional calculus
HUANG Guo;XU Li;PU Yi-fei
..............page:414-420,426
Integrated research framework for mobile system usability
MIN Qing-fei;WANG Ju;LIU Zhen-hua
..............page:421-426
Dynamic linear temporal extensions of description logics
SUN Yong-xin;ZHAO Xi-shun;FU Zhi-qiang
..............page:536-541
Algorithm of attributes reduction based on multi-objective evolutionary and mutual information
FAN Hui-lian;ZHONG Yuan-chang
..............page:490-492,529
Adaptive focused crawling method based on information gain
XIONGZhong-yang;SHI Yan;ZHANG Yu-fang
..............page:501-503
Entity relation extraction based on feature selection
MAO Xiao-li;HE Zhong-shi;XING Xin-lai;LIU Li
..............page:530-532
Improved function optimization algorithm based on immune clonal
JIANG Jian;HE Yi
..............page:449-450,477
Method of infrared image enhancement based on regional histogram
LI Hui-zhuo;FAN Yong;TANG Jun;TANG Zun-lie;XIONG Ping;ZHOU Jian-yong
..............page:772-774
Adaptive algorithm of variable margin PID based on grey prediction
YIN Qi;YUAN Xiao-ping
..............page:711-713,721
Hierarchical metadata indexing algorithm of mass storage system
NIU De-jiao;CAI Tao;ZHAN Yong-zhao;JU Shi-guang
..............page:510-513,517
Research of fabric\'s authentication technologies based on visual cryptography and signature
SHEN Cai-liang;DU Huan-qiang;ZHANG Min-ming
..............page:767-768,792
Research on improved strategy for particle filter algorithm
YU Jin-xia;TANG Yong-li;XU Jing-min
..............page:459-462
Research of role-based network extended model in e-government
PENG You;WANG Yan-zhang;WANG Ning;YE Xin
..............page:569-571,574
Authentication scheme based on certificateless signcryption in proxy mobile IPv6 network
ZHANG Long-jun;MO Tian-qing;ZHAO Li-yi
..............page:640-643
Efficient certificateless multi-signature scheme
FENG Lei;PENG Chang-gen;PENG Yan-guo
..............page:644-645,649
Peer-to-peer traffic identification using active learning
DAI Lei;WANG Yuan;LIU Ke-ke
..............page:717-721
Incremental localization algorithm based on meshing
HE Xiao-min;XIONG Qing-yu;SHI Wei-ren;GAO Peng
..............page:687-689
Secure identity-based encryption scheme without random oracles
WANG Tian-qin
..............page:633-636
Approach of selecting service based on QoS attributes and domain ontology
DU Yan-ming;GAO Jun;LI Chang-yun;HAN Bing
..............page:609-613
Partial correlation analysis for software defect prediction
MA Ying;LUO Guang-chun;LI Jiong;CHEN Ai-guo
..............page:594-596,613
Study on method of parallel computing in match field localization
DONG Shu-min;LIU Hong-bo;ZHAO Bo;LIANG Guo-long
..............page:514-517
Robust method of detecting OFDM signals based on cyclic autocorrelation
LI Guo-han;WANG Ke-ren;JIN Hu
..............page:714-716,738
Adaptive-selection filtering strategy algorithm on noise density detection
SHEN De-hai;LIU Da-cheng;XING Tao
..............page:761-763
Evaluation and analysis of feature selection methods for e-mail filtering
ZHAO Jing;LIU Pei-yu;XU Ming-ying
..............page:693-697
Survey on automatic test case generation algorithms for software testing
NIE Peng;GENG Ji;QIN Zhi-guang
..............page:401-405,413
Context-aware system modeling and simulation based on Petri net
BAO Jie;LU Tao
..............page:621-625
Mass data processing system based on large-scale low-cost computing platform
XU Xiao-long;WU Jia-xing;YANG Geng;CHENG Chun-ling;WANG Ru-chuan
..............page:582-585
Establishment and application of matrix method to test homology
WU Yan;ZHU Ping
..............page:542-545,560
Blind signal extraction algorithm based on bacterial foraging optimization
CHEN Lei;ZHANG Li-yi;GUO Yan-ju;LIU Ting;LI Qiang
..............page:451-454
Fast algorithm for YCbCr to HSV conversion based on fix-point DSP
LIU Yi-fang;LIU Zhao-guang;WANG Ya-fang;HE Chen;YANG Yang
..............page:741-743,760
Software dependability evaluation based on cloud model
ZHOU Yong;GU Cong-yue;CHENG Chun-tian
..............page:597-600,605
Combining strong and week state in MANET location service protocol
ZONG Ming;WANG Xiao-dong;ZHOU Xing-ming
..............page:734-738
Comparative research on different grain-based tag recommendation algorithm
JIN Yan-an;LI Yu-hua;LIU Xing-jun
..............page:504-509
New method of hybrid intelligent text clustering based on semantic similarity
TAO Hong;ZHOU Yong-mei;GAO Shang
..............page:482-484,532
Relational database watermarking algorithm based on chaos and DCT
ZHOU Fei;ZHAO Huai-xun
..............page:786-788
Research on preservation of proximity privacy of numerical sensitive data
CHEN Wei-he;Qu Hong-xue;QIU Dao-long
..............page:650-654,657
Approach of vertical and horizontal verification in internetware architecture
CHEN Xuan;GAO Jun;LI Chang-yun
..............page:601-605
Trust management model based on radial projection algorithm
LI Zheng;GUO Yu-cui;ZHOU Ya-jian
..............page:672-675
Certificateless threshold partially blind signature scheme
SONG Cheng-yuan;ZHANG Chuan-rong;CAO Shuai
..............page:630-632,636
New three-dimensional expression synthesis based on facial feature constraints points
HU Yong;WANG Guo-yin;YANG Yong
..............page:754-756
Multifocus image fusion scheme based on features contrast of lifting stationary wavelet
DONG Hong-xia;YI Zheng-jun;YE Xiao-bin
..............page:757-760
Air-conditioning fault diagnosis system and methods based on Internet of things and data fusion
XIE Xiu-ying;SHAO Zhu-h0ng;ZHANG Gui-qing;WANG Ming;LI Cheng-dong
..............page:565-568
Research on module relation tree similarity algorithm in social networks
YUAN Fu-yong;HAN Li;ZHAO Ying-mei
..............page:698-700
Improved Sort-Merge-Join algorithm for flash memory database systems
XING Yu-gang;WANG Han-hu;MA Dan;CHEN Mei
..............page:614-616,620
Research on mobility handover for IPv6-based VANET
WANG Xiao-nan
..............page:701-702,710
New defending RFID authentication protocol against DoS attacks
HU Wei;LI Yong-zhong;LI Zheng-jie
..............page:676-678,682
On algebraic immunity of a class of special Boolean functions
OU Hai-wen;ZHANG Yu-juan
..............page:637-639,643
Evaluation method of domain name credit based on machine learning
CHEN Wei;WANG Li-ming;GENG Guang-gang;MAO Wei;LI Xiao-dong
..............page:690-692,697
Research on combination evaluation method based on criteria of minimum loss of opportunity
LI Zhu-rui;CHEN Hai-han;HE Yao-yao
..............page:518-521
Network measurement and analysis architecture of cloud service
ZHANG Xiao-dan;LI Jun
..............page:725-729,733
Novel particle swarm optimization algorithm based on complex method
ZHANG Min-hui
..............page:463-464,468
Differential analysis on dynamic binary and its application in malicious code analysis
SUN Ming;GU Da-wu;LI Juan-ru;LUO Yu-hao
..............page:658-660,663
Improved algorithm of collaborative filtering based on item classification
XIONG Zhong-yang;LIU Qin;ZHANG Yu-fang;LI Wen-tian
..............page:493-496
Improved fast medical image segmentation method
LI Kang-shun;WANG Chao-liang;WANG Feng
..............page:764-766,774
MFA-DMFS: new multi-classifier fusion method and its application
LIANG Jun;CHEN Long;WANG Ruo-chen;XU Zheng-chuan;XU Du-jie
..............page:522-526
Abnormal behavior detection in elevator car based on corner kinetic energy model
JIN Hai-yan;XIONG Qing-yu;SHI Xin;SHI Wei-ren
..............page:775-778
Clustering-based algorithm for data sensitive attributes anonymous protection
LI Shan-shan;ZHU Yu-quan;CHEN Geng
..............page:469-471
Novel method of frequent item filtering mechanism in privacy-preserving
WU Hong-run;QIN jun
..............page:679-682
Adaptive CV model using convex optimization
ZHU Xiao-shu;SUN Quan-sen;XIA De-shen
..............page:779-781
Cloud mapping and membership cloud of mapping
YANG Zhi-xiao;FAN Yan-feng
..............page:553-556
Research on user interest modeling in mobile ad recommendation
GU Qi-wei;GUO Peng;PAN Feng
..............page:579-581,585
Trustworthy pointer analysis for software reliability
YAO Yu-feng
..............page:427-431
Novel algorithm for CABAC based on motion vector difference
LI Kang-shun;JIN Jing;WANG Feng
..............page:744-748
Bandwidth scheduling scheme based on IEEE 802.16j network
HU Zhi yuan;CHANG Ying-hua
..............page:706-710
Optimal sub-population genetic algorithm for flexible flow shop scheduling problem
WANG Jin-peng;ZHU Hong-jun;ZHOU Jun
..............page:442-444,526
Parallel massive mining of sequential patterns based on multi-core processors
YU Dong-jin;ZHENG Su-hang;LI Wan-qing
..............page:478-481,521
Low complexity MIMO iterative detection algorithm
XU Lin;WU Yu-cheng;LI Jiang-wen
..............page:739-740,753
Angiogram images enhancement method based on GPU
WANG Ning;FENG Qian-jin;CHEN Wu-fan;LIU Guo-qing
..............page:782-785
Finite precision of Logistic mapping sensitive values
ZHU Gui-liang;ZHU Hong-fei;ZHANG Xiao-qiang
..............page:664-666,671
Multimodal function optimization basedon modified niching particle swarm optimization
SHI Zhe-wen;BAI Xue-shi;GUO He
..............page:465-468
New model method for ancient Chinese architecture with L system
GUO Wu;GUAN Jing-hua
..............page:789-792
Adaptive steganographic algorithm on pixel-value differencing
PAN Feng;LIU Yuan;WANG Shi-feng
..............page:655-657
Research of user model based on domain ontology
JIANG Xiu-lin;XIE Qiang;DING Qiu-lin
..............page:606-608
Research on efficient cooperative spectrum sensing algorithm in cognitive radio
ZHANG Jun;ZHU Jun;LI Xia-lin;XIANGBing-bing
..............page:730-733
Optimization algorithm research of multi-view stereo video decoder based on H.264
HAN Jing-jing;LI Su-mei;WANG Bao-liang;GAO De-xin
..............page:749-753