Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2005 Issue 5
Central convergence and stability of BCF vector for Chinese text
ZHU Xu-ju;YANG Jian-gang
..............page:1039-1041
Application in automatic abstracting for text clustering
GUO Qing-lin;FAN Xiao-zhong;LIU Chang-an
..............page:1036-1038
Expansion of B-shell function
XIA Chuan-liang
..............page:1042-1044
Multi-agent cooperation based on organizational structure
FAN Wei;CHI Hong;JI Lei
..............page:1045-1048
Transplant and research of Direct3D based on component on embedded operating system
HU Dan-gui;ZHAO Yue-song;CHEN Rong
..............page:1049-1051
Implementation of automated function test for kernel network protocol stack
LIU Yuan;WANG Kai-yun;FAN Xiao-lan;JIANG Jian-guo
..............page:1052-1054
Research on transplant of uClinux in S698 microprocessor
ZHAN Wen-jing;ZHANG Kai
..............page:1055-1057
Implementation of Role object pattern with AOP
LI Wei-zhai;YING Shi;YE Yu
..............page:1061-1063
Fractal dimension fusion method based on image pyramid
SUN Yu-qiu;TIAN Jin-wen;LIU Jian
..............page:1064-1065,1075
Multiple description coding based on splitting coefficient
CAI Can-hui;CHEN Jing;DING Run-tao
..............page:1066-1068
Study on one scanning and high-efficient encoding algorithm based on JPEG 2000
ZHANG Hong-wei;LIU Zheng-guang;CHEN Hong-xin
..............page:1069-1071
Design and implementation of embedded MPEG-4 video server
LENG Jian-qing;WU Jin-yong;XU Jian-jian
..............page:1072-1075
IP core design of JPEG image compression algorithm
WANG Zhen-dao;CHEN Di-ping;WEN Kang-yi
..............page:1076-1077,1080
Progressive compression scheme based on normal meshes
LI Chang-he;DUAN De-quan;LI Fang
..............page:1081-1083
Modeling perspective image and its optimized segmentation
LIU Ping;CHEN Bin;FU Zhong-liang
..............page:1084-1086
Lung region segmentation algorithm based on active shape model
XU Yu-feng;ZHOU Xue-hai;XIE Xuan-yang
..............page:1087-1089
Improved fractal image coding based on quadtree partition
WU Hong-mei;CHEN Ji-rong
..............page:1090-1091,1095
Wavelet threshold denoising via non-Gaussian distribution and context model
YANG Li;ZHUANG Cheng-san
..............page:1096-1098,1101
Soft component of image processing based on strategy model
LI Li-juan;HE Ke-qing
..............page:1099-1101
S-LISSOM based approach for face recognition
YANG Zhi;WANG Tao
..............page:1102-1104
Image segmentation system for stone and mud mixture
WU Zhong-fu;PENG Yun-peng;YANG Qiang
..............page:1105-1107
Applications of apollonius fill in CAD
SONG Ju-long;LIN Zhen-xian;SONG Guo-xiang
..............page:1108-1109,1118
Dynamic self-adapting incorporative method for streaming media
ZHI Xi-hu;ZHANG Peng-xiang
..............page:1110-1111
Dynamic replication algorithm for CBR streaming media cache
MA Jie;FAN Jian-ping
..............page:1112-1115
Music style classification using mutual information
MA Guang-zhi;QIN Dan
..............page:1116-1118
Three dimensional wavelet transform based on dynamic group of frame
SHANG Ling;CHEN Feng;XU Wen-li
..............page:1119-1121
3D set partitioned embedded block (3D-SPECK) based video coder
ZHANG Yong-hua;ZHAO Zeng-hua;ZHAO Zheng
..............page:1122-1123,1127
Load-balancing algorithm for large-scale video-on-demand system
YIN Ping;LI Jun;LIU Zhen-an
..............page:1124-1127
Research of binary compression based on VRML file
ZHU Pan-rong;GUO Yang-ming;WANG Zhi-xu;ZHAI Zheng-jun
..............page:1128-1129,1132
Design and implementation of network security management platform based on XMLRPC
XUE Jing-feng;CAO Yuan-da
..............page:1130-1132
Key agreement protocol based on Chebyshev maps
ZHANG Li-hua;LIAO Xiao-feng;WANG Xue-bing
..............page:1133-1134,1137
New image watermark embedding algorithm based on fractal transformation contrast factor
CAO Hua;ZHOU Jing-li;HU Yu-ping
..............page:1135-1137
Novel adaptive information hiding algorithm for image
LI Chang-he;ZHANG Yong-qiang;WANG Jun
..............page:1138-1140,1144
Improving the performance of NIDS using symmetric multi-processor
LAI Hai-guang;HUANG Hao;XIE Jun-yuan
..............page:1141-1144
Enhanced strong authorization grid security architecture
HOU Meng-bo;XU Qiu-liang
..............page:1145-1147
Research on interoperability of DRM systems
XUE Mei;GU Hai;GU Jun-zhong
..............page:1148-1150,1157
Architecture of a simulator designed for multi-robot systems
LU Bo-bo;HUANG Hong
..............page:1029-1030
Rough set text classification rule extraction based on CHI value
WANG Ming-chun;WANG Zheng-ou;ZHANG Kai;HAO Xi-long
..............page:1026-1028,1033
Analysis of weight in case-based reasoning system
AI Fang-ju
..............page:1022-1025
Ant colony algorithm for floorplan
LU Qiang;CHEN Ming
..............page:1019-1021
Design and implementation of Data Analysis Assistant system based on EJB
CHEN Rong-xin;CHEN Wei-bin
..............page:1016-1018,1025
Personal recommendation algorithm based on Web mining and its application in Web based education
GAO Peng;GAO Ling;WANG Zheng;HU Qing-shan
..............page:1012-1015
Design of encryption software based on file system filter driver
SHAO Yu;XIAO Yun-shi
..............page:1151-1152
Immunity-based model for distributed intrusion detection
CHU Yun;DAI Ying-xia;WAN Guo-long
..............page:1153-1157
Analysis of SETBOC and improved scheme
CAI Yong-quan;WANG Jun
..............page:1158-1159,1169
File system security model based on lineage mechanism
ZHOU Jian-bo;DONG Hong-bin;LIANG Yi-wen
..............page:1160-1162
Research and design of a new mobile agent protection scheme
YANG Xin;SHEN Jian-jing;WANG Shi-jun
..............page:1163-1165
Design and implementation of user permission management component system based on software reuse
SUI Hong-wei;WANG Hua-yu;LIU Hong;WANG Rui-xia
..............page:1166-1169
Survey of time synchronization algorithms in wireless sensor network
YANG Zong-kai;ZHAO Da-sheng;WANG Yu-ming;CHENG Wen-qing;HE Jian-hua
..............page:1170-1172,1176
Application of wavelet neural network in the system identification for flight control systems
HUANG Yi-jun;ZHANG Wei-guo;LIU Xiao-xiong
..............page:1031-1033
Association rule mining based on simulated annealing genetic algorithm
WU Zhao-hui;ZHANG Gui-juan;LIU Xi-yu
..............page:1009-1011
Personal recommendation algorithm based on concept hierarchy
XIONG Xin;WANG Wei-ping;YE Yue-xiang
..............page:1006-1008,1015
Describing method of the distribution of data-sample based on Gain
SUN Wei-wei;LIU Cai-xing;TIAN Xu-hong
..............page:1004-1005,1011
Fast clustering algorithm based on Quad-tree
LUAN Li-hua;JI Gen-lin
..............page:1001-1003
Algorithm for mining maximum frequent itemsets based on FP-tree
LIU Nai-li;LI Yu-chen;MA Lei
..............page:998-1000
New search engine ranking algorithm based on categorization - CategoryRank
CHEN Wei-zhu;CHEN Ying;WU Yang
..............page:995-997,1003
Improved minimum distance classifier - weighted minimum distance classifier
REN Jing;LI Chun-ping
..............page:992-994
New algorithm of mining fuzzy similar association rules
GENG Xin-qing;WANG Zheng-ou
..............page:985-988
Research on decision-tree classification in component retrieval auxiliary decision support
XU Jian-min;SHAO Yan-hua;WANG Jing-hong;LIU Jin-po
..............page:982-984
Improvement of AprioriTid algorithm for mining association rules
PENG Yi-pu;XIONG Yong-jun
..............page:979-981
Recognition for pipe image of ground penetrating radar
YANG Shen;CHEN Shu-zhen;TANG Zhong-zhu
..............page:1209-1211,1218
Development of remote sensing image database based on COM and ArcSDE
LI Hang;YUE Li-hua
..............page:1212-1214
Vision based method for traffic flow surveillance on highway
TAN Xiao-jun;SHEN Wei;GUO Zhi-hao
..............page:1215-1218
Detection method of program buffer overflow based on Petri Net
HUANG Jin-zhi;HU Jian-sheng;LIAO Yun;CHAI Ren-wen
..............page:1219-1221,1224
Dynamic programming problem and its' solution for test-room planning
LI Jiong;WANG Wen-yong;MIAO Jing
..............page:1222-1224
Design and construction of data synchronization under redundant SCADA system
WANG Da-zong;MA Zeng-liang
..............page:1225-1226
Performance evaluation of Bluetooth Ad hoc network formation algorithms
HE Rong;FANG Xu-ming
..............page:1173-1176
Implementation of DiffServ classifier based on IXP2800 network processor
LU Dong-xin;LIU Li-na;XIONG Tao
..............page:1177-1178
Cross-layer method to improve TCP performance in Ad Hoc networks
XIAO Yong-kang;LI Meng;SHAN Xiu-ming;REN Yong
..............page:1179-1181,1189
Study of IP supporting network traffic of iPAS system
SU Guang-wen;GAO De-yuan;FAN Xiao-ya;YAN Han
..............page:1182-1184
Development and implementation of network sniffer based on data link layer
ZHANG Nan;LI Zhi-shu;ZHANG Jian-hua;LI Qi
..............page:1185-1186
Model to allocate network resources based on equilibrium
CHEN Zhi-qi;SU De-fu;HUO Lin
..............page:1187-1189
Scheduling algorithm based on modified Min-Min in grid
WEI Tian-yu;ZENG Wen-hua;HUANG Bao-bian
..............page:1190-1192,1195
Implementation of access control for MIPv6 AAA on Linux
FENG Hong-mei;GUO Qiao;LIU Ya-jing;LIAO Bin
..............page:1193-1195
Application of workflow technology in civil airport ELV system
OUYANG Yuan-xin;XIONG Zhang;FANG Yi
..............page:1198-1201
Cross-organizational workflow monitoring based on active workflow view
WANG Wei;CUI Li-zhen;WANG Hai-yang
..............page:1202-1204
RFID technology and its application in indoor positioning
SUN Yu;FAN Ping-zhi
..............page:1205-1208