Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2013 Issue 9
Predict algorithm of micro-blog retweet scale based on SVM
LI Ying-le;YU Hong-tao;LIU Li-xiong
..............page:2594-2597
Multiple features and SVM combined SAR image segmentation
ZHONG Wei-yu;SHEN Ting
..............page:2846-2851
Research on trust model based on infinitely repeated games theory in P2P networks
WANG Bao-yu;GAO Cheng-shi;DAI Qing;CHEN Jing-lin;LIU Yang
..............page:2802-2804
Cloud computing key management scheme based on covert mapping combined public key
SONG Ning-ning;LIU Yun-luo;YAO Qian-yan;LIU Qian
..............page:2759-2762
Research on impact of clear channel assessment on coexistence of ZigBee and Wi-Fi
HUANG Ren;YAN Zheng-shuang
..............page:2843-2845
Locally ordinal classifier chains for multi-label learning
QIU JI-zhao;JI Hua;ZHANG Hua-xiang
..............page:2606-2609
Research on payload adaptive batch steganography
GAO Zhan-zhan;TANG Guang-ming;DAI Jia-ming
..............page:2780-2783
Categorical approach for making model of data model
MIAO De-cheng;XI Jian-qing;SU Jin-dian
..............page:2744-2747
Solving generalized Nash equilibrium problem based onimmune particle swarm algorithm
JIA Wen-sheng;XIANG Shu-wen;YANG Jian-feng;HE Ji-hao
..............page:2637-2640
Separate privilege virtual machine security model based on mutual trust
YU Cong;LI Li-xin;WANG Kui;YU Wen-tao
..............page:2784-2787
Improved scheme of quantum key distributionbased on BB84 protocol
LUAN Xin;GUO Yi-xi;SU Jin-hai;ZHAO Hong-tao
..............page:2807-2809
Recommendation list selection algorithm with diversity enhancement
LI Man-tian;WANG Jin-lin;DENG Hao-jiang
..............page:2591-2593,2609
Cooperative method of key derivation for LTE systems based on radio interface and core network
ZHANG Wen-jian;PENG Jian-hua;HUANG Kai-zhi
..............page:2755-2758,2771
Research on attach and strategy of CAPTCHA technology
WANG Bin-jun;WANG Jing-ya;DU Kai-xuan;HAN Yu
..............page:2776-2779
Method of real-time city-traffic monitoring based on simplifiedroad network model
ZHU Zheng-yu;LIU Lin;GUO Chong-xiao;CUI Ming
..............page:2715-2717
Petri net modeling and FPGA implementation of parallel computing
WAN Jun;ZHAO Bu-hui
..............page:2660-2663
Flicker detection algorithm based on FFT abouterror analysis and correction
WANG Xin-mei;JIANG Ya-qun;HUANG Chun;ZHANG Yan;HU Long
..............page:2664-2667
Dynamic compaction of multiple target test pattern based on SAT
ZHANG Shi-fang;LIU Bo-feng;ZHU Zhi-jie
..............page:2681-2683
Research on unified coding system for Internet of things
SUN Hong;ZHANG Jian-hong;QIN Shou-wen;TU Qian-wei;WANG Xiao-wan;WU Qian-zhong
..............page:2707-2710
Research of predicting insider threat based on Bayesian network
WANG Hui;YANG Guang-can;HAN Dong-mei
..............page:2767-2771
Aging effect on kinetic visual field
YU Xiao-ya;LV Sheng-fu;WU Jing-long;SHUHEI Miyamoto
..............page:2684-2688
Amelioration method of SNM based on flexible window and ranking adjusting
CHEN Shuang;DIAO Xing-chun;SONG Jin-yu;CAO Jian-jun;DING Chen-lu
..............page:2736-2739
Research on privacy preservation mechanism for DaaS
YANG Jin;WANG Liang-ming;YANG Ying-yi
..............page:2565-2569,2582
Chinese spam filtering based on graph regularized MNMF algorithm
LIU Zun-xiong;HUANG Zhi-qiang;ZHENG Shu-juan;SHI Fei
..............page:2672-2676
Discrete-time high-order distributed consensus algorithm
PENG Huan-xin;QI Guo-qing;SHENG An-dong
..............page:2700-2703
GPU-based parallel collaborative filtering algorithm
XU Jian;LIN Yong;QIN Yong;HUANG Han
..............page:2656-2659
IoT identifier resolver with intelligent predictive cache
DU Yuan-feng;KONG Ning;TIAN Ye;MAO Wei
..............page:2819-2822,2834
Implementation and evaluation of cross-layer cooperative routing in multi-hop wireless networks
FEI Ning;FENG Wei;CHEN Chun-lin;YANG Liang
..............page:2839-2842
Design and implementation of senior portal based on technology acceptance model
ZHENG Zhi-gang;LU Jie-hua
..............page:2718-2721
Based on concave point direction line adhesion drug image segmentation method
LI Hong-hui;HAO Ying-ming;WU Qing-xiao;DUAN Hong-xu;ZHOU Jing
..............page:2852-2854
UML sequence based interlocking test case generation
GAO Xue-juan;WU Xiao-chun
..............page:2740-2743
Research of text orientation in opinion leaders identification
FAN Xing-hua;WU Hao
..............page:2613-2615,2636
Wet-paper stego-coding based on cyclic-code
ZHANG Guang-bin;YUE Yun-tian;ZHANG Chuan-fu
..............page:2805-2806,2809
Single sign-on transparent integration technology for Web systems with HTTP authentication protocols
LONG Yi-hong;TANG Zhi-hong;WANG Ya-long;XIE Kun-xuan
..............page:2813-2818
Method of line target detection in 3D CT image
PEI Yu-dong;ZHOU Li-li;ZENG Lei;TONG Li;YAN Bin
..............page:2855-2857
New social similarities for collaborative filtering
LI Gai;LI Zhang-feng;LI Lei
..............page:2616-2618,2644
Research on multi-products delivery plan in B2C companies
XIAO Qing;WANG Dong
..............page:2619-2621,2676
Camera array-based HDR image synthesis method
ZHOU Ji-quan;WANG Qing
..............page:2858-2860,2864
Model and simulation on dynamic evolutionary betweenurban economy and transportation system
YU Hai-song;ZHANG Dian-ye;SHEN Li;ZHANG Dong-xu
..............page:2622-2624
Blending detailed color by registering line segments for image mosaic
YAN Wen-ting;LIU Yuan;ZHOU Peng;XIE Zhen-ping
..............page:2878-2880
Two-topology based high-level simulation platform for NoC performance evaluation
HU Jing-jin;PAN Yun;YAN Xiao-lang;MOTTEN Andy;CLAESEN Luc
..............page:2827-2830
Key pre-distribution scheme for wireless sensor network using matrix deployed knowledge
ZHENG Ya-hong;WANG Cai-fen;LI Xu;DU Qiu-ju
..............page:2799-2801
Authentication encryption scheme based on lattice
ZHANG Xiang-huo;YANG Xiao-yuan;WANG Xu-an
..............page:2788-2790,2794
Semantic understanding technology of sketch type-stroke in concept design
YUAN Hao;WANG Jun-wei;LU Zhang-ping;LI Ming-zhu
..............page:2875-2877,2880
Triangulation-based localization algorithm over complex 3D terrains
WANG Rui-jin;QIN Zhi-guang;BAO Hong-lai;WANG Cong
..............page:2823-2826,2830
Logic simulation of correspond with OSEK/VDX OS specification
JIANG Jian-chun;HUANG Wei;ZHU Wei-dong
..............page:2722-2725
Research on max entropy reordering in Uyghur-Chinese machinetranslation based on tackiness fuzzy rules
CHEN Ke-hai;ZHOU Xi;YANG Ya-ting;MI Cheng-gang
..............page:2587-2590,2605
Reliable guaranteed cost control for stochastic distribution system
QU Yi;GUO Bao-long;LI A-hong;HE Zheng-han;WANG Da-wei
..............page:2677-2680
Algorithm of image matching based on improved SIFT feature and graph transformation matching
ZHANG Guan-liang;ZOU Huan-xin;QIN Xian-xiang;LIN Xiao-ping
..............page:2861-2864
Method of getting circular reachability relation innon-determinate planning
HUANG Li-fang;WEN Zhong-hua;HU Yu-long;WU Zheng-cheng
..............page:2689-2693
Hot topics found on micro-blog based on speed growth
XUE Su-zhi;LU Ran;REN Yuan-yuan
..............page:2598-2601
Improved algorithm based on full reference blur ratio
CHEN Chao-juan;TIAN Ling;LIU Xiao;ZHOU Yi-min
..............page:2872-2874
Research of quantitative network security assessment based on Bayesian-attack graphs
FANG Yan;YIN Xiao-chuan;LI Jing-zhi
..............page:2763-2766
Cloud computing strategy of coordinated control inurban region traffic things networking
MA Qing-lu;SI Hai-lin;GUO Jian-wei
..............page:2711-2714
Probabilistic public-key cryptosystem based on Chebyshev
CHENG Xue-hai;XU Jiang-feng
..............page:2772-2775,2779
Survey of image segmentation methods based on Markov random fields
XU Sheng-jun;HAN Jiu-qiang;LIU Guang-hui
..............page:2576-2582
Low power listening MAC protocol with collision avoidance and traffic adaption
PENG Chang-rui;HUANG Hong-guang
..............page:2835-2838
Research of software defect prediction model based on LASSO-SVM
WU Xiao-ping;ZHAO Xue-jing;QIAO Hui;LIU Dong-mei;WANG Zhi
..............page:2748-2751,2754
Fruit fly optimization algorithm with adaptive mutation
HAN Jun-ying;LIU Cheng-zhong
..............page:2641-2644
Dynamic evolution of software architectures and realization based on incidence matrix
CHEN Li-ping;XU Hong-zhen
..............page:2726-2729
Dynamic symbolic execution based defect detection system for binary programs
HUANG Hui;LU Yu-liang;XIA Yang
..............page:2810-2812
Joint compression-encryption of block image based on context
GUAN Li-na;DENG Jia-xian
..............page:2795-2798
Research of project scheduling problems with disruption based onchaotic particle swarm algorithm
PAN Feng-shan;YE Chun-ming;YAO Yuan-yuan
..............page:2648-2655,2659
Application of grid workflow scheduling based on chaos-genetic algorithm
SU Xiang;LIU Yang-jun;YANG Jian;YAN Yuan-yuan
..............page:2645-2647
Graph matching algorithm based on edge map's connection
CAO Chun-ping;HE Jia
..............page:2697-2699,2703
Design and implementation of GPS location history datamining and anomalous detection system
XIONG Yan;LUO Ze;YAN Bao-ping
..............page:2704-2706,2710
Collaborative filtering algorithm based on two-step filling foralleviating data sparsity
ZHANG Yu-fang;DAI Jin-long;XIONG Zhong-yang
..............page:2602-2605
Evaluation method of software usability process based on fuzzy analytic hierarchy process
ZHAO Qian;ZHANG Xuan;WANG Li-xia;LIU Cong;YANG Shuai
..............page:2730-2735,2739
Frequent itemsets mining based on Apriori-bit
ZHANG Yue;WANG Hong-guo;SHAO Zeng-zhen;ZHAO Jian-xiu
..............page:2610-2612
Algorithm review of distributed clustering problem in distributed environments
HAI Mo;ZHANG Shu-yun;MA Yan-lin
..............page:2561-2564
Wolf colony search algorithm based on leader strategy
ZHOU Qiang;ZHOU Yong-quan
..............page:2629-2632
Volume rendering based on zero-cross points of boundary surface
XIA Bin;WANG Li-sheng
..............page:2865-2867,2871
Research progress on similarity locomotion of humanoid robot
KE Wen-de;PENG Zhi-ping;CAI Ze-su;CHEN Ke
..............page:2570-2575
Advances in research in Landweber iterate method for inverse problems and its application
WANG Bing-xian;HU Kang-xiu;WANG Ze-wen
..............page:2583-2586
Improved evidence combination approach
LIU Xi-liang;CHEN Gui-ming
..............page:2668-2671