Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2006 Issue 12
ROI decision algorithm based on advanced visual properties
LIAO Bin;XU Gang;LIU Chun-ying
..............page:2841-2842,2847
No-reference digital image quality evaluation based on perceptual masking
WANG Zheng-you;XIAO Wen
..............page:2838-2840
Research, improvement and implementation of RBAC model
LI Zhi-ying;HUANG Qiang;LOU Xin-yuan;RAN Ming
..............page:2945-2947
Parameter tuning of PID based on game theory fusion model
LIU Jie;DU Qing-dong;WANG Gang;ZHAO Hai
..............page:2948-2949,3014
Load balancing method based on render history in cluster rendering
SHEN Bing-hu;JIN Zhe-fan;PAN Rui-fang
..............page:2843-2847
Application of hierarchical multi-phase C-V method based on narrow band to MRI image segmentation
XUE Jun-tao;LIU Zheng-guang;ZHANG Hong-wei
..............page:2848-2850
Various pose face recognition with one front training sample
ZHANG Sheng-liang
..............page:2851-2853
Computing color histogram based on perceptual characteristics
HU Shan;GUO Lei;SHEN Yun-tao
..............page:2854-2855,2859
Study of virtual octree model for volume data
lv guang xian ; pan zuo ; wang zhan gang ; cong wei qing
..............page:2856-2859
Improved motion path editing
LIU Shuang;SUN Ji-zhou
..............page:2860-2862,2865
Steganalysis based on co-ocurrence matrix in DCT domain for JPEG images
HUANG Cong;XUAN Guo-rong;GAO Jian-jiong;SHI Yun-qing
..............page:2863-2865
New color transferring algorithm based on multi-dimensional eigenvector and ANN searching technology
TENG Xiu-hua;CHEN Zhao-jiong;YE Dong-yi
..............page:2866-2868
Scalable video coding with 5/3 motion-compensated temporal lifting
LIU Chun-bo;DING Jian-li;HAN Wei-huan
..............page:2869-2873
Fast inter-prediction mode decision for H. 264/AVC
LI Jun-jie;QI Hua;GUAN Li;FAN Yang-yu;HAO Chong-yang
..............page:2874-2876
3D face pose estimation based on affine transformation and linear regression
QIU Li-mei;HU Bu-fa
..............page:2877-2879,2883
Fast image interpolation algorithm based on edge-directed max-relativity
DANG Xiang-ying;WU Xi-sheng;ZHAO Yong
..............page:2880-2883
Algorithm for drawing the surface of equation
WANG Guo-hua;YU Jun-qing;LIAO Zhao-cun
..............page:2884-2886,2889
Blind watermarking algorithm based on wavelet tree and chaotic scrambling
MIAO Hai-yan;LI Yu;CHEN Zheng
..............page:2903-2905,2909
Design and analysis of secure payment protocol based on trusted third party
SUN Ling-fang;XU Jin-bo;ZU Yun
..............page:2910-2912
Logs auditing and analysis system based on virtual monitor
MENG Jiang-tao;LU Xian-liang;NIE Xiao-wen
..............page:2913-2915,2918
Study and implementation of the intrusion detection model based on measurement module
LIN Tao;HU Hua-ping;ZHANG Yi;LIU Bo
..............page:2916-2918
Reversible certificate state management model for mobile Ad hoc networks
MU Hai-bing;LIU Yun;ZHANG Chang-lun
..............page:2919-2921
Blind robust watermarking schemes based on 3D mesh object
LI Lin-guo;GU Yao-lin
..............page:2922-2923,2927
Digital rights management system with equity anonymity
CAI Wei-hong;DENG Yu-qiao
..............page:2924-2927
New faster software implementation method of RSA algorithm
HE Yi-chao;ZHANG Jian-xun;WANG Yan-qi;TIAN Jun-feng
..............page:2928-2930,2934
Research into Agent-oriented worm defense system
GUO Ye;ZHU Miao-liang
..............page:2931-2934
Application of trusted computing compliance in VPN
LIU Hong-wei;WEI Guo-bin
..............page:2935-2937
Universal designated verifier signature (proof) schemes without random oracles
HUANG Xiu-jie;LI Jin;WANG Yan-ming
..............page:2938-2940
Design and implementation of file watching system based on mandatory access control
WANG Lei;ZHUANG Yi;PAN Long-ping
..............page:2941-2944
Grey particle swarm algorithm for multi-objective optimization problems
YU Fan-hua;LIU Han-bing;DAI Jin-bo
..............page:2950-2952
Cluster analysis based on cultural algorithms
LIU Chun-qing;YANG Shenyuan;ZHANG Ying
..............page:2953-2955,2960
Multi-peaks function optimization using quantum-behaved particle swarm optimization
ZHAO Ji;SUN Jun;XU Wen-bo
..............page:2956-2960
Attribute reduction based on partition in information system
ZHANG Hai-yun;LIANG Ji-ye;QIAN Yu-hua
..............page:2961-2963,2966
Study on the application of context reasoning based persistent ontology
QU Jian-wei;MIAO Ke-jian;ZHANG Ji-min
..............page:2967-2970
Discovery of asynchronous periodic patterns with multiple granularities
XIA Zhuo-qun;CHENG Yu;LIANG Di-qing
..............page:2985-2987,2990
XML query solution based on editing distance
YANG Chang-hui;YUE You-you
..............page:2991-2993
Design and implementation of distributed file buffer system based on synchronization engine
TANG Dan;KUANG Xiao-hong;HU Zhi-gang
..............page:2994-2997
Detection of stego images using one-class support vector machines with multiple hyperspheres
TANG Yu-hua;YANG Xiao-yuan;ZHANG Min-qing;HAN Peng
..............page:2887-2889
Lossless data hiding using integer wavelet transform and threshold embedding technique
XUAN Guo-rong;YAO Qiu-ming;CHAI Pei-qi;JI Hong-fei;SHI Yun-qing
..............page:2890-2893
Authentication mechanism and improvement of IEEE 802.1x protocol
ZHOU Xian-wei;LIU Ning;QIN Bo-ping
..............page:2894-2896
Sybil attacks detecting in wireless sensor networks
YU Qun;ZHANG Jian-ming
..............page:2897-2899,2902
Trust-based hybrid P2P model
LI Ling-juan;JI Tong-liang;WANG Ru-chuan
..............page:2900-2902
DNA algorithm of graph vertex coloring problem based on sticker model
Ma Ji-lan;Yang Yu-xing
..............page:2998-3000
Independent tasks scheduling algorithm based on dynamic fit degree
WANG Xiu-li;NING Zheng-yuan
..............page:3001-3003
Mechanism of persistent naming topological entity supporting collaborative CAD
LI Wei-ping;GU Zheng-qi;DENG Biao
..............page:3004-3007
Raw material configuration by multi-agent negotiation
HAN Wei;WANG Yun;CHEN You-guang
..............page:3008-3011
Focused crawling method based on improved C4.5 exploiting anchor text
LIU Jin-hong;LU Yu-liang
..............page:3012-3014
Study on layout problem using quantum-behaved particle swarm optimization algorithm
HUANG Jian-jiang;XU Wen-bo;SUN Jun;DONG Hong-wei
..............page:3015-3018
Study on hash-tree searching anti-collision algorithm
HAN Lei;ZHANG Hong;MA Hai-bo
..............page:3019-3022
Research into the extensible expert control system based on VBA
LUO Jing;YANG Jing;ZHANG Bei-ke;WU Chong-guang
..............page:3043-3046
Approach to naming and identifying topological entities
MIAO Jin-fang;SUN Xue-bo
..............page:3047-3050
Research of simulating recognition of Chinese characters by Bidirectional SOFM
AI Yi-bo;MU Zhi-chun;CHEN Jing
..............page:2971-2973,2976
Survey on semantic cache in native XML databases
TA Na;FENG Jian-hua;LI Guo-liang
..............page:2977-2981
Dissimilarity measure based on parameter-free data mining
WEN Juan-juan;CHAI Yu-mei
..............page:2982-2984
Design of conformance testing system for ultra-lightweight IPv6 protocol stack
CHEN Xiao-hong;WANG Neng
..............page:2817-2819,2850
Location predictor for WLAN based on partial information
TIAN Ming;LIU Yan-heng;YU Xue-gang;GU Guang-ju;WANG Pin
..............page:2813-2816
Analysis and study on behaviors of P2P file sharing system
CHEN Bao-gang;ZHANG Ling;XU Yong;HU Jin-long
..............page:2809-2812
Flow and capacity distribution of computer communication networks based on multi-criteria satisfactory optimization
WEN Bi-li;TAN Xian-hai;SUN Hui-li;LI Yan-min
..............page:2806-2808,2812
Application of dominance rough set in seismology
ZHU Bing-bing;WU Shao-chun;WANG Wei
..............page:3023-3026
Research and application of data mining algorithm on technical-tactics analysis of volleyball matches
ZHANG Yu-jia;ZHAO Hui-qun;WU Jie-wei
..............page:3027-3029
Concept based algorithm of dealing near-replicas of documents on the Web
GUO Chen-juan;LI Zhan-huai
..............page:3030-3032
Research of dynamic workflow supporting multiple instances pattern
XU Dian;LI Jian-hua;LIU Xing-sha;XIA Yuan
..............page:3033-3036
New method of printing multitoning image with large format bilevel printer
LIU Xiao-dan;YANG Yan
..............page:3037-3038,3042
Field environment modeling and dynamic path planning
GONG Xu-sheng;SHI Mei-ping;LI Yan;HE Han-gen
..............page:3039-3042
Blink detection and eye tracking
LIU Rui-an;JIN Shi-jiu;ZHANG Xi-kun;SONG Wei;WU Xiao-rong
..............page:2835-2837
Reconstruction of support vector machines for non-uniform sampled curve
JIANG Li;HU Yong-xiang
..............page:2832-2834
Nonlinear filtering algorithm based on local texture direction probability statistic model
WANG Xuan;BI Xiu-li;MA Jian-feng;XIAO Bin
..............page:2829-2831,2834
Overlay network for DHT-based P2P resource locating service
XUE Ying;WANG Ling;LENG Hua
..............page:2826-2828,2876
Reference nets-based model for Web service composition
CHEN Hong
..............page:2823-2825,2873
Implementation of an improved Chord algorithm in the file sharing system
GAO Ji-rong;SU Zheng-lin
..............page:2803-2805
Using logic to optimise the semantic Web query language processing
CHEN Jia-qi;TAO Yuan
..............page:2800-2802
New method of L2-Trigger based on the Handoff of mobile communication systems
TANG Hong;TAO Jing-tao;WANG Bai-ding;WEI Quan;WU Zhong-fu
..............page:2796-2799
New blind channel estimation algorithm in orthogonal space-time block codes system
LIU Yi;WANG Ling;LIU Hui
..............page:2793-2795,2799
Service discovery based on process analysis
ZHANG Da-lu;ZHANG Jun-jie;JING Li-qiang
..............page:2789-2792