Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2014 Issue 9
Research and development of buffer overflow
CHEN Zhe;,LI Wen-ming;,LI Xu-rong;
..............page:2561-2566
Advances in research of cloud robotics
LIU Da-yong;,LIU Yan-li;,ZHANG Heng;
..............page:2567-2575
Survey of location privacy protection over road networks
LI Min;,QIN Zhi-guang;
..............page:2576-2580
Grey residual predicting model with period correction
fan wen hui ;, hou bao cun ;, jiang jia hui ;, liu bo yuan ;, qu hui yang ;
..............page:2581-2583,2591
Virtual machine resource allocation algorithm in cloud environment
CHEN Shi-ping;,CHEN Xiao-jiao;,FANG Fang;
..............page:2584-2587,2616
Cooperative quantum-behaved particle swarm optimization algorithm with learning behavior
DONG Hu-sheng;,GONG Sheng-rong;,LU Ping;
..............page:2588-2591
Improved clustering algorithm based on particle swarm optimization
LUO Ke;,YANG Zhi;
..............page:2597-2599,2605
Research on trend-based time series similarity measure and cluster
LIU Guo-hua;,XIAO Rui;
..............page:2600-2605
Subspace clustering algorithm for uncertain data stream
HU De-min;,YU Xing;
..............page:2606-2608,2612
Correlation label-based multi-label classification algorithm
CHEN Geng;,WANG Xiao;,ZHOU Li-wei;,ZHU Yu-quan;
..............page:2609-2612
Fractal analysis on behavior dynamic of large logistics system
YAO Can-zhong;,ZHENG Xu-zhou;
..............page:2613-2616
Improved SPEA2 based on local search
JI Zhuang-zhuang;,WANG An;,WENG Li-guo;,XIA Min;
..............page:2617-2619,2639
Approach to decision information fusion based on improved Bayesian rough set and evidence theory
CHEN Ke;,XU Xuan-hua;,ZHANG Xiao-qiang;
..............page:2625-2628
Conflict evidence combination method based on information entropy
HAO Yong-sheng;,WANG Jun-song;
..............page:2629-2631,2643
Research of new feature selection based massive Web text mining algorithm
QU Kai-she;,ZHANG Ren-shang;
..............page:2632-2634,2684
Optimal dynamic price adjustment for dedicated passenger railway line based on passengers' reservation prices
CHEN Chong-shuang;,LI Jing;,QIAN Bing-yi;,SHUAI Bin;
..............page:2635-2639
Best starting time for maintenance in high speed railway
LI Cheng-bing;,PENG Qi-yuan;,YANG Kui;
..............page:2644-2647
Learners' cognitive level estimation method based on fuzzy rule
CHEN Geng;,SUN Jia-zhen;,ZHOU Li-wei;,ZHU Yu-quan;
..............page:2652-2655
Iterative learning control of synchronization of Hodgkin-Huxley neurons
DENG Bin;,LI Hui-yan;,WANG Jiang;,WANG Xiao-jun;
..............page:2656-2660
Energy balanced ring routing algorithm based on mobile agent
CAO Kai-ying;,YANG Zheng-long;,ZHANG Sheng;
..............page:2661-2664
Study of far-end crosstalk between microstrip lines with electromagnetic simulation
FAN Zhe;,LIN Zhi-li;,OU Pan;,SUN Xu-yin;
..............page:2665-2667
Solving method based on IMOSFLA for weapon-target assignment in cooperative air combat of manned vehicle and unmanned vehicle
CHEN Song;,HE Jian-hua;,LIU Huai-yuan;,WANG An-long;
..............page:2668-2672,2695
Artificial food chain-based animal swarm optimization algorithm
HUANG Guang-qiu;,LU Qiu-qin;,SUN Si-ya;
..............page:2673-2680
Improved shuffled frog leaping algorithm based on pseudo-differential disturbance
HE Jian-hua;,WANG An-long;,YU Fang;,ZHANG Yue;
..............page:2681-2684
AR-Tri-training: Tri-training with assistant and rich information strategy
CUI Long-jie;,CUI Rong-yi;,WANG Hong-li;
..............page:2685-2687
Erasure codes-based data placement fault-tolerant algorithm
CHEN Zhi-lin;,FANG Yi-qiu;,GE Jun-wei;
..............page:2688-2691
Study on similarity matching of store procedure based on Zhang-Shasha algorithm
YANG He-biao;,ZHANG Ya-qin;
..............page:2692-2695
Research on protocol modelling method based on behavior trees and its application
bi jian gang ;, wang de wen ;, xiong hai jun ;, zhao jian li ;, zhu yong li ;
..............page:2696-2699,2710
Design of fire alarm dispatching system for oil tank zone based on WSN technology
CUI Wen;,JIN Shan;,JIN Zhi-gang;
..............page:2700-2704
Intelligent recognition system of fruit picking robot
CHEN Ren-wen;,XIA Hua-kang;,ZHANG Piao-yan;,ZHU Xia;
..............page:2711-2714
Weighted sequential pattern mining algorithm research based on well completion business process
CHEN Xiao-guo;,DU Rui-shan;,SHANG Fu-hua;,SUN Shu-ning;
..............page:2719-2723
Featured transition system based test method for software product line
YANG Hua-bei;,ZENG Hong-wei;
..............page:2724-2728
Trusted software reliability measures based on cloud model
CHEN Si;,SUN Jia-ze;,WANG Shu-yan;
..............page:2729-2731,2740
Software fault prediction based on quad tree K-means clustering algorithm
LIU Dong;,ZHANG Xiao-yun;
..............page:2732-2735
Data query optimization method under protection of real-time streaming data written
FANG Jun;,HOU Rong-jun;,ZHANG Jian-jing;
..............page:2736-2740
Authenticated key agreement protocol with hybrid security
shu jian ;
..............page:2745-2746,2775
Digital image watermarking algorithm resisting attacks based on improved ridgelet transform
GAO Hu-ming;,JIA Li-yuan;,LIU Mei-ling;
..............page:2750-2753
Unstructured data encryption using improved fine-grained method
MA Chun-guang;,QU Jia-xing;,WANG Xi-zhong;,ZHOU Chang-li;
..............page:2754-2758
Research on encrypted data identification in data link laver by randomness test
WANG Tao;,WU Yang;,XING Meng;
..............page:2759-2763,2768
Research on performance evaluation benchmark of formatted text watermarking
CHEN Qing;,XING Xiao-xi;
..............page:2764-2768
Research of covert channel based on micro-blog posting time
HONG Ying;,ZHOU Qing;
..............page:2769-2772
Disease spread model with variation of virus included
LAI Bing-bing;,LIU Ni;,ZHOU Hai-ping;
..............page:2773-2775
Improved role mining based on methods of partitioning and compression
LI Yan-ling;,SUN Wei;
..............page:2776-2780
Research of privacy-preserving model of office flowchart structure
LI Xiao-qing;,LIANG Dong;,TONG Yang;,ZHANG Feng-qin;,ZHANG Shui-ping;
..............page:2781-2783,2787
Research on weak key of NTRU encryption scheme
MU Ning-bo;
..............page:2784-2787
Optimal transmission scheduling on energy harvesting wireless sensor networks
AN Xin-sheng;,HUANG Meng;,LIU Li-ping;
..............page:2795-2797,2806
Evolutionary algorithm towards resource allocation of concurrent scheduling multiple DAGs in clouds
TIAN Guo-zhong;,XIAO Chuang-bai;,ZHAO Juan-juan;
..............page:2798-2802
DiffServ-based congestion control mechanism in IEEE 802.16 Mesh networks
BAI Guang-wei;,SHEN Hang;,YU Jun;
..............page:2811-2814
Mechanism of reducing inter-AS traffic load for content centric networking
CHEN Qiu-hong;,GUO Meng;
..............page:2815-2819,2823
Multi-dimensional traffic distributed algorithm for network cost optimization
JIN Zhao-yan;,XIAO Hui-jun;,YANG Jie;
..............page:2820-2823
Method on real-time video transmission based on intra-frame compression
TAN Li;,WANG Yun-hui;,WANG Zhen-hai;,YANG Ming-hua;
..............page:2824-2827,2831
Unsupervised feature selection based on local reconstruction
SHANG Peng;,TAN Tai-zhe;,YE Qing;
..............page:2828-2831
Saliency detection based on local contrast and global rarity
GAO Zhi-yong;,HE Liang-jie;,MA Hong;
..............page:2832-2835,2840
Video image defogging algorithm research under sea fog
LIANG Xiu-mei;,MA Zhong-li;,WEN Jie;
..............page:2836-2840
Neighborhood optimization algorithm based on compressive sensing
LIU De-shan;,LIU Sheng-lan;,LV Zhi-chao;,YAN De-qin;
..............page:2841-2845,2849
Sub-pixel stereo matching method based on variational principle
BIAN Ji-long;,LI Jin-feng;,LUO Si-qing;
..............page:2846-2849
Method of extracting consistent protein spot set from 2-DE images
LI Li-xin;,OU Qiao-feng;,XIONG Bang-shu;,ZHANG Hui-sheng;
..............page:2850-2852
MMDA with blocking clustering for face recognition
LI Wei-sheng;,WANG Li-yan;
..............page:2853-2855
Adaptively weighted SpPCA face recognition algorithm with one training image per person
CHEN Geng;,TANG Yu-jia;,ZHOU Li-wei;,ZHU Yu-quan;
..............page:2856-2858,2863
Fast algorithm of namecard character recognition
DAI Qun;,GANG Ya-zhou;,HUANG Yuan-yuan;
..............page:2859-2863
Intuitionistic fuzzy C-means clustering algorithm incorporating local information for image segmentation
FAN Jiu-lun;,LOU Hao;,WANG Zhao;,ZHAO Feng;
..............page:2864-2866,2872
Group sparse based feature selection for image retrieval
XU Jun;,ZHENG Qiu-zhong;
..............page:2867-2872
Image segmentation methods on implicit surfaces based on Potts model
DUAN Jin-ming;,PAN Zhen-kuan;,WANG Jing;,ZHENG Yong-guo;
..............page:2873-2877
Method for constructing brain functional sub-networks based on sparse representation
LU Jian-feng;,YANG Liang;
..............page:2878-2880