Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2014 Issue 1
Summarize of detection methods on hardware-based virtualization machine rootkit
JIN Cong-jun;,RONG Hong;,SHI Jiang-yong;,WANG Hui-mei;,XIAN Ming;
..............page:1-5,12
Review on superpixel segmentation algorithms
CHEN Jun-zhou;,LI Wei;,WANG Chun-yao;
..............page:6-12
Review on full reference image quality assessment algorithms
CHEN Qiang;,CHU Jiang;,YANG Xi-chen;
..............page:13-22
Survey of proxy re-signature technology
CHEN Liang;,CHEN Xing-yuan;,DU Xue-hui;,SUN Yi;
..............page:23-27,32
Application of social network analysis in research ofintergovernmental organizations
FENG Xiao-sheng;,HE Wan-hui;,LI Li-bo;,LIU Jian-sheng;
..............page:28-32
Balance-sampling based light-weighted advertisement CTR prediction method
GU Jin-ji;,SHI Meng-yuan;
..............page:33-36,39
Construction of clustering validity evaluation function based on noise suppression
LI Yan-lai;,PENG Ding-hong;,ZHAI Li-li;,ZHANG Xue;
..............page:37-39
Chinese word sense disambiguation based on parsing analysis
GAO Xue-yao;,LU Zhi-mao;,LUAN Bo;,ZHANG Chun-xiang;
..............page:40-42
Chinese word sense disambiguation based on parsing analysis
CHEN Yong;,REN Ya-jin;,YAN Guang-hui;,ZHAO Hong-yun;
..............page:43-46
Research on prediction of micro-blog information dissemination based on PA algorithm
LIU Chen;,SUI Yang;,TIAN Zhan-wei;,WANG Lei;
..............page:51-54
Consumers perceptual needs clustering based on DSM and GA
CHEN Deng-kai;,LI Bo;,QI Bin;,YANG Yan-pu;,YU Sui-huai;
..............page:55-58
Instance selection based on probabilistic neural network and K-L divergence
LI Chang;,LI Ta;,WANG Xi-zhao;,ZHAI Jun-hai;
..............page:63-65,69
Automatic repairing short-path violations FPGA routing algorithm
CAI Gang;,LIU Yang;,XU Wei-tao;,YANG Hai-gang;,YU Wei;
..............page:66-69
Synchronizing characteristics of neural network subject to external electric field
DENG Bin;,WANG Jiang;,WEI Xi-le;,YU Kai;
..............page:70-75,79
Optimized genetic algorithm for shortest-path problem in game engine
LI Zhong-wen;,NI Zhong-yu;,QIN Zhi-dong;,WANG Quan-yu;
..............page:76-79
Research of task scheduling algorithm on heterogeneous cluster
JIANG Ming-hua;,LIU Li;
..............page:80-84
Consumer satisfaction genetic algorithm in cloud computing
YU Jiong;,ZOU Wei-ming;
..............page:85-88
Research of segmented autocorrelation frequency estimation algorithm
LI Yang-yang;,MENG Fan-ming;,ZHANG Xiao-wei;
..............page:92-94
Performance analysis of FastICA and RobustICA on blind sources separation
PENG Hua;,WU Wei;,ZHANG Fan;
..............page:95-98,119
Neighborhood linear rival alignment dimensionality reduction algorithm
LIU Sheng-lan;,LV Zhi-chao;,YAN De-qin;
..............page:99-101
Methodology for session identification based on combination of referenced heuristic and URL-semantic
CHEN Xing-shu;,CUI Xiao-jing;,TONG Hao;,ZHANG Shuai;
..............page:102-105
Robust optimization method based on slope
DAI Guang-ming;,PENG Lei;,WANG Mao-cai;,YANG Zhao;
..............page:106-110
Decision-making method of computer generated forces based on fuzzy Petri-net
CHEN Jian;,LIAO Shou-yi;,YANG Yan-li;,ZHANG Jin-sheng;
..............page:111-114
New evidence fusion method based on average deviation
CAO Jie;,GUO Lei-lei;,LI Wei;,WU Di;
..............page:115-119
Research of training feedforward neural networks based on hybridchaos particle swarm optimization-back-propagation
DONG Chun-yan;,LIN Xiao-yong;,ZHU Qun-xiong;
..............page:120-123,127
Parameter estimation of nonlinear systems model based on improved differential evolution
CHEN Min-fang;,XIONG Wei-li;,XU Bao-guo;,ZHANG Qian;
..............page:124-127
Fault diagnosis for uneven-length batch processes based on statistic features
GUO Jin-yu;,LI Yuan;,ZHAO Lu-lu;
..............page:128-130
Centrality based microblog influence entity discovery
ZHU Jing-yi;
..............page:131-133
Spatial resource index and top-k query research
DENG Su;,HUANG Hong-bin;,YU Shi-long;
..............page:134-136
Design and implementation of multi-satellites ground systems based on OGC service standards
DENG Hong-shuai;,LEI Xing-song;,LI Guo-qing;,XIE Ji-bo;,YANG Zhong;,YU Wen-yang;
..............page:137-140,146
Load balancing composition model for military information service
LI Jian-hua;,SHEN Di;,ZHANG Qiang;,ZHU Rui;
..............page:147-151
Track patching method for incomplete track in track-oriented traffic survey and analysis
CHEN Hong;,DENG Ya-juan;,LI Yang;,WANG Long-fei;
..............page:162-165
Automated detection and optimization research on code defects and code smells
HU Zhi-gang;,LIU Hong-tao;,LIU Wei;
..............page:170-176
Method for repairing program automatically with mutation
LAI Wen-yu;,LIU Jie;,MA Chun-yan;
..............page:177-181
Speculative task scheduling algorithm based on locality of data in Hadoop
LIU Kui;,LIU Xiang-dong;,MA Bao-lai;,WANG Cui-rong;
..............page:182-187
Test data generation based on binary tree search space reduction
HUI Wen-tao;,QIAO Hui;,SHAO Nan;,ZHOU Yan-zhou;
..............page:188-191
Comparison between Follow and Retweet on Twitter
WU Yue;,ZENG Xue;
..............page:192-195
Lightweight and high security key management for wireless sensor networks
CHU Xu;,LIU Yu-xin;,YANG Ya-tao;,ZENG Ping;,ZHANG Li;
..............page:199-202,205
Application of weighted conditional entropy in anomaly detection
FAN Xiao-shi;,LI Cheng-hai;
..............page:203-205
Identify traceable threshold attribute-based signature scheme
HAN Yi-liang;,LU Wan-yi;,WEI Li-xian;,XING Han-rui;
..............page:206-209
Secure certificate-based encryption against entropy and key leakage
LI Ji-guo;,YU Qi-hong;
..............page:210-212
Deniable attribute-based designated confirmer signature
REN Yan;,TANG Chun-ming;
..............page:213-216
Technology research of attack path identification based on immune intrusion detection
SUN Gang;,ZHANG Bin;,ZHANG Feng-bin;
..............page:217-221,235
New construction methods for MDS matrices and involution MDS matrices
FU Zeng-qiang;,GUO Lei;,WANG Yue;,ZHENG Hao-ran;
..............page:222-225
Strong privacy protection scheme based on oblivious transfer and group signature in VANET
HOU Zheng-feng;,LU Yang;,ZHU Xiao-juan;,ZHU Xiao-ling;
..............page:226-230
Access control security model of virtual machines
CHEN Qi;,GUO Ai-wen;,LIANG Biao;,LV You;,QIANG Yong;,QIN Zhong-yuan;,SHEN Ri-sheng;
..............page:231-235
Level-based adaptive geo-routing for underwater sensor network
DU Xiu-juan;,FENG Zhen-xing;,LAN Sheng-lin;,LIU Fan;
..............page:236-238,242
Research of IPQAM resource management methodbased on optimal cache model
JU Zhao-ming;,LIU Lei;,WANG Ling-fang;
..............page:239-242
Improved distributed data aggregation scheduling algorithm in WSNs
FU Sha;,LIU Hong-bing;,LIU Wen-bin;,WEN Zhi-qiang;
..............page:243-247
Design of DTN routing algorithm based average delivery probability
LV Jie-lin;,ZHANG Shan-shan;
..............page:248-252
Routing decision algorithm based on limit arrangement
LV Jian-hui;,SHI Lan;
..............page:257-260
Nexthop-selectable aggregation based on suffix digest for forwarding information base
DU Chuan-zhen;,LAN Ju-long;,TIAN Ming;
..............page:261-265,268
Mobility management for 6LoWPAN wireless sensor networks
QIAN Huan-yan;,WANG Xiao-nan;
..............page:266-268
Nonlinear dimensionality reduction method by fusing LLE and ISOMAP
GONG Zhi-le;,LIAO Hai-bin;,ZHANG Shao-long;
..............page:277-280
Liver contour extraction based on priori knowledge model
FENG Jun;,HAN Xin;,LI Zhan;,LU Ding-guo;,WANG Xiao-dong;
..............page:281-284
Kinect-based depth image fusion method
GUO Wei;,HU Tao;,ZHU Xin-yan;
..............page:285-288
Interest point detection based on Gabor multiscale-space
CAI Zi-xing;,WANG Lu-cai;,XIE Jin;
..............page:289-291,310
Salient objects detection based on global color contrast
LIN Tu-sheng;,XIAO Ying-wang;,YANG Jun;
..............page:292-294,298
Image matching algorithm based on affine-invariant closed region and SURF
DU Jie;,LIU Ya-qiu;,SUN Yao;
..............page:295-298
Face recognition based on orthogonal SRDA and SRKDA
CHEN Da-yao;,CHEN Xiu-hong;,DONG Chang-jian;
..............page:299-303,320
Research on single image defogging algorithm based on dark primary colors
HE Xiao-jun;,QIAO Yin;
..............page:304-306
PERCLOS implementation computing method ofeye open degree based on finite state machine
GONG Xiao-qian;,PU Yi-fei;,YANG Zhi-yong;,ZHOU Ji-liu;
..............page:307-310
Research human action reconstruction based on LLE and KRR
GAO En-yang;,GONG Zhi-heng;,LIU Jian;,WU Cheng-dong;
..............page:311-315
MRI image segmentation method based on anisotropic diffusion and spatial FCM
CUI Xiao-kun;,HE Yong-jun;,ZENG Wen-quan;
..............page:316-320