Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2014 Issue 6
Survey on multi-label learning
LI Zhi-xin;,ZHANG Can-long;,ZHOU Sheng-ming;,ZHUO Ya-qi;
..............page:1601-1605
Research on testing technique of big data
CHEN Ting;,DAI Liang;,LIANG Dian-peng;,QIAN Chao;,XU Hong-ke;
..............page:1606-1611
Survey of big data
LIN Wei-wei;,LIU Bo;,TU Xin-li;
..............page:1612-1616,1623
Review on case studies of stochastic dynamic logistic system
LIU Zhi-xue;,NIU Yan-liang;,SHI Wen;
..............page:1617-1623
Survey on fully homomorphic encryption
CHEN Zhi-gang;,SONG Xin-xia;,WANG Jian;
..............page:1624-1631
Bee-swarm genetic algorithm for multiple-choice knapsack problem
LI Wei-ping;,WANG Chong;,WU Di;,YANG Xin-yu;
..............page:1632-1634
Local data access optimization in distributed file systems
SUN Ji-zhou;,XIAO Jian;,YU Ce;,YU Jun;
..............page:1635-1638
Hadoop job scheduling algorithm based on resource prefetching
DUAN Xi;,HUANG Meng-xing;,WAN Bing;
..............page:1639-1643
Optimal composition of supply chain node enterprise in cloud manufacturing
LI Fang;,WU Chao-ran;
..............page:1644-1647
Stochastic gradient matrix factorization based on social network recommender algorithm
LI Wei-ping;,YANG Jie;
..............page:1654-1656,1664
Analysis of attitude determination algorithm for moving objects based on inertial-magnetic units
MA Zheng-hua;,PENG Cui-yun;,RONG Hai-long;
..............page:1657-1660
Roulette selection self adaptive harmony search algorithm
LI Yong-lin;,LIU Chang-ping;,YE Chun-ming;
..............page:1665-1668
Research and application on multi-attribute comprehensive decision-making method based on two-tuple linguistic
LIAO Zhao-hui;,LIU Chun-long;,ZHENG Yi-ping;
..............page:1669-1672,1676
Path planning based on improved particle swarm optimization in dynamic and uncertain environment
CHEN Te-fang;,LIU Bin;,ZHANG Ren-jin;
..............page:1673-1676
Research on general multi-machine flow-shop scheduling problem with job-dependent learning effect
LI Yong-lin;,LIU Qin-ming;,YE Chun-ming;
..............page:1677-1680,1692
RANSAC algorithm of sparse component analysis
CAO Jie;,ZHANG Jian-jun;
..............page:1681-1683,1687
Fast query-by-example spoken term detection algorithm based on dynamic time warping
CHEN Qi;,FENG Zhi-yuan;,LI Bo-hao;,ZHANG Lian-hai;
..............page:1688-1692
Improvement of local outliers mining based on density
LIU Shu-zhi;,WANG Qian;
..............page:1693-1696,1701
Extension clustering algorithm based on relative grid density difference
HUANG Hong-wei;,HUANG Tian-min;
..............page:1702-1705
Algorithm for online data outlier detection of circuit breaker
LEI Chen-xi;,LI Shao-bo;,TANG Xiang-hong;
..............page:1706-1709
Research of autonomous behavior of agent chasing based on affective computing and Q-learning
LI Mu-jun;,LIN Jun-huan;,LIU Zhen;,YU Li-peng;
..............page:1710-1713,1718
Collaborative filtering recommendation model based on semantic Web and user trust network
LI Ning;,SHI Lin;,SUN De-chao;,XU Shou-kun;
..............page:1714-1718
Hazardous materials transportion network risk assessment of terrorist attack
CHONG Peng-yun;,HU Xiao-yi;,SHUAI Bin;
..............page:1723-1726
Study of knowledge graphical display based on semantic Web and genetic algorithm
HU Jian-yong;,HUANG Yan-hao;,ZHOU Xiao-xin;
..............page:1727-1730
Framework for partitioning and execution of data stream applications in mobile cloud computing
CHENG Liang-lun;,LUO Jian-ming;
..............page:1731-1735
Process quality predict method of multiple loading conditions based on local models
CHENG Wen-ming;,ZHANG Min;
..............page:1740-1743
Optimization method of cloud service composition in cloud manufacturing environment
FU Chao;,XIAO Ming;
..............page:1744-1747,1751
Damage assessment method of protective projects based on support vector machine
CHENG Kai;,JIN Da-wei;,RONG Quan-bing;,ZHANG Rui;
..............page:1748-1751
Research on optimization of logistics Web services based on genetic social cognitive optimization algorithm
FAN Xue-feng;,LIU Zhi-zhong;,XUE Xiao;,ZHANG Huan-huan;
..............page:1752-1755,1759
Design and implementation of sparse matrix vector multiplication on FPGA
CHEN Ke-song;,ZHANG He;
..............page:1756-1759
Building cloud P2P network with small routing delay
CHEN Shi-ping;,LI Jian-feng;,LI Yuan;
..............page:1760-1763,1767
Deadlock-free wormhole routing algorithm of exchanged hypercube
LIANG Jia-rong;,LIANG Jin-ye;,SU Shu-hai;
..............page:1764-1767
Synchronization controlling method of embedded streaming media real-time transmission
GUO Hai-tao;,LIU Gao-ming;,TAN Huai-liang;,ZHU Hui;
..............page:1768-1770,1778
Minimum channel assignment algorithm under physical interference model in multi-hops wireless sensor networks
LI Xiang-bao;,LIU Wen-bin;,WEN Zhi-qiang;,YANG Bo;
..............page:1771-1774
Cooperative spectrum sharing scheme for MIMO cognitive radio system
CHEN De-bao;,JIANG En-hua;,LI Su-wen;,ZHAO Qing-ping;
..............page:1775-1778
New algorithm jointed energy and angle for adaptive route repairment
YANG Le;,ZHU Quan-zheng;
..............page:1779-1782
Mean-OTDOA location algorithm in LTE system
CHEN Ya-jun;,HUANG Kai-zhi;,LUO Wen-yu;,PENG Jian-hua;
..............page:1783-1786
Research on link fault diagnosis of wireless sensor network based on DLP
LI Jun;,YAN Nan;,ZHOU Ming-zheng;
..............page:1787-1790,1798
Sparse representation and denoising method for UWB signal via dictionary learning
FAN Fu-hua;,YIN Xue-zhong;
..............page:1795-1798
Routing model of multi-forwarding based on relative position in VANET
HUANG Ji-hai;,WANG Wei;,ZHANG Wen;
..............page:1799-1803
Study on robust cooperative spectrum sensing algorithm based on enhanced reputation
BU Zhi-yong;,LU Yun-bo;,MA Cheng-ping;,TANG Liang;,YU Kai;
..............page:1804-1807,1815
Improved synchronization algorithm for OFDM based on training sequence
JI Yu-chu;,LENG Wen;,WANG An-guo;,ZHANG Shuang;
..............page:1808-1811
Efficient data forwarding mechanism in mobile opportunistic networks of selfish
GAO Yuan;,LIU Reng-yan;,LIU Ya-hong;,QIAO Jin-long;
..............page:1812-1815
Research on network flows classification based on graphlet patterns
CHEN Bo;,HU Guang-min;,SHI Liang-shan;,WANG Ming-da;,YANG Ji;
..............page:1816-1819
Method of WiFi indoor location based on SVM
SANG Nan;,YUAN Xing-zhong;,ZHOU Rui;
..............page:1820-1823
Dedicated path protection algorithm with power-aware strategy in WDM optical networks
LV Yi;,XIONG Yu;,YAO Hao;,ZHANG Chao;
..............page:1828-1832
Efficient evidence combination method of dispelling paradox
HUANG Jie;,LI Bi-cheng;,WANG Wan-qing;,ZHAO Yong-jun;
..............page:1833-1835,1845
TePA-based security analysis and research at Ethernet datalink layer
CHEN Wan-dong;,LONG Zhao-hua;,LUO Zhen-ying;
..............page:1836-1840
Token-based structured code matching homology detection technology
LIU Yun-long;
..............page:1841-1845
Anonymously verifiable hidden credentials and their applications
CHEN Zhen-hua;,LI Shun-dong;,WANG Dao-shun;,XU Yan-jiao;
..............page:1846-1851
Adaptive color image hiding algorithm of large capacity based on bit plane
CAI Wei;,HUANG Chen-rong;,LIU Ai-hua;,XU Meng-xi;
..............page:1852-1855
Multi-policy novel conspiracy attack immune interactive authentication scheme for virtual enterprises
LEI Ju-chao;,XU Ke;,ZHAO Jian-chao;
..............page:1856-1859,1873
Research of ABAC mechanism based on improved CP-ABE algorithm
GAO Yan;,ZHANG Yong-sheng;,ZOU Jia-shun;
..............page:1860-1862
Hierarchical identity-based encryption resilient to private key leakage
LI Ji-guo;,YU Qi-hong;
..............page:1863-1868
Network intrusion classification based on semi-supervised learning
ZHAO Jian-hua;
..............page:1874-1876
Formal modeling and model checking of SAV protocol in wireless mobile terminal
LONG Shi-gong;,XIE Guang-ying;,YANG Han-wen;
..............page:1877-1879,1882
Method to generate lattice in cryptanalysis based on lattice reduction
BAI Jian;,LI Zi-chen;,YANG Ya-tao;
..............page:1880-1882
Web security assessment model based on fuzzy theory
QI Fu-min;,XIE Xiao-yao;,XU Yang;
..............page:1883-1888
Airspace sector partitioning based on spectral clustering algorithm
WANG Chao;,WANG Fei;,WANG Xiao-ying;
..............page:1889-1893
Reconstruction algorithm of stratum surface based on constraints of fault surfaces
CHEN Hao-fan;,JIANG Xiao-lu;,LU Cai;,YAO Xing-miao;
..............page:1894-1897
Study on modified automatic target tracking and counting method
KANG Bao-sheng;,ZHANG Ming-jie;
..............page:1898-1900,1913
Image inpainting using anisotropic heat transfer model based on CUDA
CHEN Qing-kui;,ZHOU Bing-yuan;
..............page:1901-1905
Surface reconstruction of ethnic crafts based on triangular mesh
HUANG Hai-song;,LV Jian;,ZHANG Cui-cui;
..............page:1906-1908,1917
Monocular image based 3D-scene reconstruction method
HU Chun-yu;,LIU Hong;,LU Dian-jie;
..............page:1909-1913
Study on regional segmentation image fusion technique based on improved structure similarity
LI Ling-ling;,WANG Hui;,YAN Cheng-xin;
..............page:1914-1917
Source digital image identification combined wavelet and Markov features
FAN Xin-yue;,LI Yong-qiang;,ZHOU Fei;
..............page:1918-1920