Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2013 Issue 5
Analysis of privacy-preserving data aggregation protocol in WSN
NIE Xu-yun;NI Wei-wei;WANG Rui-jin;ZHAO Yang;QIN Zhi-guang
..............page:1281-1284,1302
Voting immunization strategy on complex networks
ZHANG Hao;CAI Shan;XIE Fei;ZHANG Hui
..............page:1303-1305,1328
HotRank:heat-sensitive ranking algorithm for unstructured data search
HAN Jing;SONG Mei-na;E Hai-hong;SONG Jun-de
..............page:1306-1308
Hybrid top-N recommendation method based on social user tag
CAI Meng-song;LI Xue-ming;YIN Yan-teng
..............page:1309-1311,1344
Tag clustering research based on PLSI
WU Zhi-yuan;QIAN Xue-zhong
..............page:1316-1319
Bat algorithm with global convergence for solving large-scale optimization problem
HUANG Guang-qiu;ZHAO Wei-juan;LU Qiu-qin
..............page:1323-1328
Optimization strategy from nature:perceive as bat
LIU Chang-ping;YE Chun-ming;LIU Man-cheng
..............page:1320-1322,1356
New scheduling algorithm for real-time multiprocessor systems aimed to independent and periodic multi-tasks
LI Feng-bin;ZHU Yi-an;HUANG Shu-juan;TANG Yu-yi
..............page:1340-1344
Improved particle swarm optimization algorithm based mapping algorithm for 3D-Mesh CMP
YANG Wei;ZHANG Zhen;LIU Yi-jun
..............page:1345-1348
Fast convergent artificial bee colony algorithm based on full vector perturbation
XIANG Wan-li;MA Shou-feng
..............page:1329-1333
Research of performance evaluation technology in cloud storage
HE Qin-lu;LI Zhan-huai;ZHAO Xiao-nan;ZHANG Xiao
..............page:1357-1360,1364
Kind of dynamic weigh fusion algorithm based on track fuzzy membership
LI Yan-yan;ZHANG Wei;CHEN Ming-yan
..............page:1334-1336,1369
Algorithm for generating test sequences based on branch and bound in EFSM model
YOU Juan;LI Jun-quan;XIA Song
..............page:1349-1352
Nonlinearly assembling learning machine based on separating hyperplane
LIU Zhong-bao;ZHAO Wen-juan;SHI Zhi-bin
..............page:1361-1364
Design and implementation of parallel algorithm for global (z)bi-cubic numerical model
ZHAO Jun;WU Jian-ping;SONG Jun-qiang;ZHANG Lei
..............page:1337-1339
Flash memory wear-leveling algorithm based on group-erase circularly
WANG Hao;SHAO Gao-ping;HU Ze-ming
..............page:1353-1356
Outlier detection technique based on cluster analysis and spatial correlation in wireless sensor networks
ZHANG Peng;FENG Xin;ZHOU Jian-guo
..............page:1370-1372,1384
Nonlinear target tracking schedule based on dynamical consensus for WSN
LONG Hui;FAN Xiao-ping;LIU Shao-qiang
..............page:1365-1369
Reduction in variable precision rough set and its interpretation with logic
ZENG Zi-lin;ZHANG Hong-jun;ZHANG Rui;XING Ying
..............page:1385-1387
Compile-time optimization method for heterogeneous computing platforms
PEI Gen;ZHU Zhen-guo;KONG Ying
..............page:1402-1404,1409
Research on path planning for manipulator to avoid real-time obstacle based on genetic algorithms
HAN Tao;WU Huai-yu;DU Zhao-jun;ZHENG Xiu-juan
..............page:1373-1376
Sharing-based multi-query optimization approach using MapReduce
ZHAO Bao-xue;LI Zhan-huai;CHEN Qun;PAN Wei;JIANG Tao;JIN Jian
..............page:1405-1409
Research on population initialization for swarm intelligence optimization solving WTA
CHANG Tian-qing;BAI Fan;LI Yong;ZHANG Bo
..............page:1377-1380,1392
Robust H∞ fault-tolerant control based on T-S model of double time-varying delay uncertain system
SHAO Ke-yong;ZHANG Xiao-hua;LI Xin;CHEN Qiao-chen
..............page:1393-1396
Improved delay-scheduler algorithm in homogeneous Hadoop cluster
KE He-yang;YANG Qun;WANG Li-song;DUAN Xi
..............page:1397-1401
Analysis of similarity of DNA sequences based on information quantity
CHEN Xue-gang;ZHANG Jia-lu;CHENG Jie-ren
..............page:1381-1384
Research on energy consumption evaluation model of mass storage system
HE Qin-lu;LI Zhan-huai;YANG Lei;WANG Hui-feng;SUN Jian
..............page:1419-1422
User behavior classification and feature analysis in search advertising
WANG Hai-lei;He Yi-jun;YU Xue-ning;ZHANG Ming
..............page:1413-1418
Ontology model of goods and materials management based on descriptive logic
GE Shi-lun;JIANG Lu
..............page:1448-1451
New approach of passive testing on simulation system
ZHAO Yi-ding;LI Zhi-min;MIAO Feng-jun;ZHANG Xi-guang;CHU Ji-zheng
..............page:1435-1438
Research on software evolution process model based on Bigraph theory
LIU Pei-pei;ZHANG Yong;MO Qi;SHAO Zhen
..............page:1423-1426
Tracking algorithm for multiple spatial targets based on high order zero notch filter
YU Chen-long;WANG An-ding;CHU Jian
..............page:1452-1454,1463
Time limit emergency rescue assignment model of earthquake disaster based on rescue priority
ZHANG Lei;YUAN Chang-an;MA Lu
..............page:1439-1442,1447
Partial CSI based affinity propagation dynamic clustering algorithm
ZHANG Ru-yun;XU Ming-yan;JIANG Tao
..............page:1455-1457,1470
Coordination and differential price of closed-loop supply chain with risk aversion
GAO Pan;WANG Xu;JING Yi
..............page:1427-1431
Dynamic partition mechanism in sample space for sentiment recognition of Chinese texts
LIU Zhi;YANG Zong-kai;LIU San-ya;TIE Lu
..............page:1443-1447
Improved Web software non-functional requirements model
LUO Xin-xing;NING Shang-peng;ZHAO Yu-jie
..............page:1432-1434,1438
Combined node and link attributes of social network community detection algorithm
LI Xiao-wei;CHEN Fu-cai;LIU Li-xiong
..............page:1477-1480
Q-learning based channel selection algorithm for opportunistic spectrum access
ZHANG Kai;LI Ou;YANG Bai-wei
..............page:1467-1470
FIN multicast optimization algorithm in P2P communication
LIU Tian-shi;ZHANG Liu-mei;CHENG Guo-jian;LI Jiao;YANG Kun-yi
..............page:1464-1466,1491
Group discovery method in mobile communication network based on location information
LIU Fen;TANG Hong-bo;GE Guo-dong;YANG Sen
..............page:1471-1474
Ant colony algorithm in application of grid resource discovery
XU Yun-jie;RAN Xiao-min
..............page:1492-1494
Internet traffic classification based on AdaBoost-SVM
ZHANG Zhen;WANG Bin-qiang;LIANG Ning-ning;CHENG Guo-zhen
..............page:1481-1485
Security detection of virtual machine process in priyate cloud platform
CAO Li-ming;ZHAO Feng-yu
..............page:1495-1499
Research on worm propagation model based on diurnal pattern
FU Tao;MA Chun-guang;YAO Yu
..............page:1500-1503
Efficient certificate-based signature scheme without pairings
ZHOU Ping;HE Da-ke
..............page:1504-1507,1519
Comparison between Duffing oscillators and FRFT detector in Chirp typed watermarking detection
LI Dong-ming;WANG Guang-jun;SONG Mai-ling
..............page:1520-1522,1526
Network traffic anomaly detection based on local projection denoise and FSVDD
WEN Xiang-xi;MENG Xiang-ru;MA Zhi-qiang;KANG Qiao-yan
..............page:1523-1526
Loop vulnerability detection based on decompile
LI Yong-wei;YIN Qing;SHU Hui;LI Ji-zhong
..............page:1508-1510,1514
Generalized synchronization theorem-based chaotic pseudo-random number generator and performance analysis
HAN Shuang-shuang;MIN Le-quan;ZANG Hong-yan
..............page:1511-1514
Attack model based on both-branch fuzzy logic and fuzzy colored Petri nets
GAO Xiang;ZHU Yue-fei;LU Jin-jiang;LIU Long
..............page:1527-1529,1543
Improved fully homomorphic encryption over integers
LIN Ru-lei;WANG Jian;DU He
..............page:1515-1519
Improved BA network model with randomly growing edges
WANG Jin-long;LIU Fang-ai
..............page:1475-1476,1485
Secure certificateless signcryption scheme
LIU Zhi-yuan
..............page:1533-1535
Skew detection and correction of Uighur character scanned page
TANG Qun-qun;Halmurat · MAMAT;Arkin · SAYPIDIN
..............page:1551-1553,1557
AES intermediate variables vulnerability recognition based on side channel attacks
FANG Ming;XU Kai-yong;YANG Tian-chi;MENG Fan-wei;YU Cong
..............page:1536-1539
Fast 3D Lattice Boltzmann simulation of multiphase
LIU Huan;LIU Xue-mei;GUO Song
..............page:1564-1567
SAR and optical images fusion method based on NSCT
SHI Pi-li;GUO Lei;LI Hui-hui
..............page:1568-1570
Research on garment reusability based on layered adaptive deformation
WANG Jin-kui;HOU Jin;WANG Xian;ZHONG Wei
..............page:1558-1560
Geometrical modeling of plant leaf shape based on B-spline curves
WANG Jing-wen;LIU Hong
..............page:1571-1573
Computer vision based fast lane detection
JU Qian-ao;YING Ren-dong;JIANG Le-tian
..............page:1544-1546,1550
3D face recognition based on local feature of contour lines
ZOU Hong-yan;DA Fei-peng
..............page:1561-1563,1567
Binary image compression algorithm based on m-band reversible cellular automata
WU Hui-lin;ZHOU Ji-liu;GONG Xiao-gang
..............page:1547-1550
Weld pool edge extraction method based on passive light via coarse localization and component tree model
CHEN Dan;LI Jing;HUANG Yuan-yuan;XU Zhong-lu;ZHANG Tao
..............page:1574-1576
Object extraction algorithm based on multi-scale spectral and local spectral
WANG Yong-guo;PENG Guo-hua;WANG Xiao-long;TANG Meng
..............page:1577-1581,1585
High order smooth implicit surface reconstruction from scattered point cloud
YUAN Hong-xing;WU Shao-qun;ZHU Ren-xiang;ZHUGE Xia
..............page:1593-1595,1600
Image deblurring based on derivative compressive sensing
FENG Ying-ying;ZHOU Hong-zhi;DENG Ming
..............page:1582-1585
Noise suppression method for ultrasound strain imaging based on coded excitation
WANG Chun-guang;LIU Wen;LIU Dong-quan
..............page:1596-1600
Image registration based on SURF algorithm and SC-RANSAC algorithm
YANG Hai-yan;LUO Wen-chao;LIU Guo-dong
..............page:1586-1588
xin xi dong tai
..............page:封2
Laplacian mesh optimization algorithm based on STL file
XU Bin;LI Zhong-ke
..............page:1589-1592