Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2007 Issue 12
Optimization of delay in network time synchronization algorithm
ZHAO Bin;HE Peng;YI Na
..............page:3007-3008,3012
Time-slot scheduling algorithm based on weighted traffic load in wireless sensor networks
WU Yan-ping;LIU Ming;YE Juan
..............page:3004-3006
Semantic P2P protocol based on ants search algorithm
LIU Yu;LI Peng
..............page:3001-3003
Text feature word selection based on relationship between words
LIAO Hao;LI Zhi-shu;WANG Qiu-ye;ZHANG Yi
..............page:3009-3012
Merging term similarity and term correlativity in retrieval models
XU Jian-min;ZHU Song;CHEN Fu-jie
..............page:3013-3015
Design and realization of MDX compiler
LEI Gen-hua;ZHANG Ping-jian;XI Jian-qing
..............page:3035-3038
Community mining based on email classification
DUAN Dan;GUO Shao-zhong;LI Zhi-bo;LIU Sha
..............page:3039-3041,3044
Fast K-means algorithm based on influence factors
LENG Ming-wei;CHEN Xiao-yun;YAN Qing
..............page:3042-3044
Geometric rectification for camera-captured document images
TIAN Xue-dong;MA Xing-jie;HAN Lei;LIU Hai-bo
..............page:3045-3047
New rate control algorithm in MB layer
YIN Ming;LIU Chuan-qing
..............page:3048-3050,3054
Codebook design of image vector quantization based on particle swarm optimization
ZHANG Xu-bing;GUAN Ze-qun;XU Jing-zhong
..............page:3051-3054
4×4 intra prediction mode selection algorithm in H.264/AVC
DING Yuan-yuan;SI Yu-juan
..............page:3055-3057
Middle-view based FGS scalable scheme for multi-view stereo video
SONG Xiao-wei;YANG Lei
..............page:3058-3061
Candidate weight method for reassembling BMP image fragments
WANG Dong-ping;WANG Qing-xian;LUO Jun-yong;LI Bing-Long
..............page:3062-3065,3068
Non-self-overlapping structured grid generation by Gregory method
SUN Chun-hua;CHEN Xue-fang;JIANG Zuo;Hagiwara Ichiro
..............page:3066-3068
Fast mode decision used in video surveillance system
ZHU Xu-min;FANG Hou-hui
..............page:3069-3071,3074
AdaBoost evolutionary algorithm based on template match
CHEN Jia-hui;FU Zhong-liang;CHEN La-mei
..............page:3072-3074
Improved texture simulation method
DING Wan-ning;GU Yao-lin
..............page:3075-3077
Application of fuzzy edge detection to watermark blurring detection
WANG Jing-shuang;CHEN Bin;CHEN Jian
..............page:3078-3080,3107
Gait recognition research based on region variance feature and SVM
FENG Ming-cong;GE Hong-wei
..............page:3081-3083,3088
Two-phase framework of program model checking
MIAO Li;ZHANG Da-fang
..............page:3089-3091
New intelligent map-matching algorithm
MA Jian-jun;TANG Jin-jun;CAO Kai
..............page:3116-3118
Lower power test scheme based on folding test set
ZHU Shen-cai;JIANG Cui-yun;LIANG Hua-guo;YE Yi-qun;ZHANG Nian
..............page:3119-3121,3125
Study on critical path algorithm in multi-stage service model
WANG Jian;ZHOU Ming-tian;SHE Kun
..............page:3122-3125
Dynamic energy-efficiency algorithm for soft real-time multiprocessor system
LIU Xia;JIA Zhi-ping
..............page:3126-3128
Test data compression technique based on dimidiate partition
ZHANG Nian;LIANG Hua-guo;YI Mao-xiang
..............page:3129-3131,3135
Research and realization on fast collision detection algorithm in virtual assembly
ZHU Li-li;ZHUANG Yi;YE Yan-feng;GAN Chun-run
..............page:3132-3135
Network traffic prediction based on combination method
LIU Yuan;LI Xiao-hang;LIU Yuan-zhen
..............page:2976-2978,2981
Services selection based on commodity-market in grid workflow
NI Wan-cheng;LIU Lian-chen;WU Cheng
..............page:2973-2975
Application of Markov model in real-time evaluation of VoIP speech quality
WANG Wei;WANG Zhen-song
..............page:2969-2972
Communication-efficient key agreement protocol in Ad Hoc networks
LI Jing;DING Yue-wei;SHI Hong-song
..............page:2965-2968,2972
TOA estimation of UWB based on PCA
TANG Chun-ling;XIAO Guo-qiang;SUN Ming-gang
..............page:2998-3000
Design of real-time network topology discovery system based on OSPF and BGP
PAN Wen-xi;LIANG Wei;CHEN Mo;WU Yue
..............page:2995-2997,3000
Study on fairness for core-stateless fair queuing algorithm
ZHANG Hua;LIAO Ming-hua
..............page:2992-2994
Real-time aware on-demand distance vector protocol in Ad Hoc
ZHOU Li-wei;ZHOU Man-yuan
..............page:2989-2991
Time synchronization algorithm with synchronization precision stability for multi-hop wireless sensor networks
WANG Shi-jun;XU Chao-nong;XU Yong-jun;NIU Dou
..............page:2982-2985,2988
Learning algorithm for cascade RBF-LBF neural networks based on clustering
TANG Yong-zhi;GE Hong-wei
..............page:2916-2918
Shooting algorithm based on optimal search in robot soccer
PU Yong;ZHOU Xing-she;WANG Yu-ying
..............page:2913-2915
Wavelet chaotic neural network for function optimization
ZHOU Ting;JIA Zhen-hong;LIU Xiu-ling
..............page:2910-2912
Fuzzy constraint-based model for multiple concurrent bi-lateral negotiations
CEHN Lu;QIU Yu-hui;ZHANG Qian
..............page:2906-2909,2912
Research on task scheduling in concurrent product development
ZHOU Ruo-na;QIN Xian-sheng;GU Xue-ming
..............page:3139-3141
Test data compression and decompression based on group-frequency Golomb coding
YE Yi-qun;LIANG Hua-guo;ZHU Shen-cai;ZHANG Nian;ZHAN Kai-hua
..............page:3136-3138
Lateral control model of intelligent vehicle based on hierarchical fuzzy control
CAO Kai;YU Shao-wei;TANG Jin-jun
..............page:3112-3115
Designated-verifier proxy signature scheme using self-certified public key
ZUO Wei-ping;WANG Cai-fen;FAN Rui;LAN Cai-hui
..............page:2945-2946,2950
Group signature on conic curve over Zn and its applications
WANG Biao;LIN Hong-gang;LIN Song
..............page:2942-2944
Analysis of Blowfish cryptography
ZHONG Qian-chuan;ZHU Qing-xin
..............page:2940-2941,2944
Color visual multi-secret sharing scheme with dynamic and verifiable threshold
ZHANG Yan-shuo;LIU Zhuo-jun
..............page:2937-2939
Vector quantization watermarking based on improved ant colony algorithm
XING Gui-hua;YU Sheng-lin
..............page:2934-2936
SVD-based digital watermarking algorithm for 3D mesh models
AI Qing-song;ZHOU Zu-de;LIU Quan
..............page:2931-2933
Study on framework of authentication property design for security protocols
LIU Yi-jing;XIE Hong-bo;WU Yuan-chen
..............page:2928-2930,2933
Research of cross-certificate model based on Agent mechanism
JIA Wei;ZHANG Guo-yu
..............page:2925-2927
Feature selection based on immune particle swarm optimization
NI Lin;ZHENG Hong-ying
..............page:2922-2924
gao yue
..............page:封2
Application of neural network based on ant colony algorithm in credit rating
WANG Zheng-jiang;ZHANG Hong-wei;LEI Bin
..............page:3142-3144
Adaptive S plane control algorithm for underwater vehicles based on single neuron cell
TANG Xu-dong;PANG Yong-jie;WANG Jian-guo
..............page:2899-2901,2905
Revision method for imbalanced support vector machines
WANG Jin-yan;FENG Jian-wu;LIU Wan-li
..............page:2896-2898
Solving task assignment problem based on improved particle swarm optimization algorithm
TAN Wen-fang;ZHAO Qiang;YU Sheng-yang;XIAO Ren-bin
..............page:2892-2895
Community mining with heterogeneous relation
WANG Jin-long;XU Cong-fu;LUO Guo-jing
..............page:3016-3018
Extraction of Chinese term based on Chi-square test
HU Wen-min;HE Ting-ting;ZHANG Yong
..............page:3019-3020,3025
Improved query algorithm based on twig pattern for XML database
LI Su-qing;TAO Shi-qun
..............page:3021-3025
Algorithm based on perceptron for biomedical named entity boundary identification
HU Jun-feng;CHEN Hao;CHEN Rong;TAN Bin;YU Zhong-hua
..............page:3026-3028,3031
Improved cascade AdaBoost classifier
LIU Feng;ZHU Qing-sheng;YANG Shi-quan;ZHANG Min
..............page:3029-3031
Adaptive division particle swarm optimization for engineering constrained optimization problem
LU Jin;XIAO Ren-bin;Li Ting-ting
..............page:2888-2891,2895
Quantum-particle swarm algorithm for optimizing high-dimension functions
GAO Hao;XU Wen-bo;SUN Jun
..............page:2885-2887
Real-time scheduling of periodic messages for MVB
ZHU Qin-yue;XIE Wei-da;TAN Xi-tang;ZHAO Ya-hui
..............page:3108-3111,3115
Traffic incidents detection based on Boosting method and RBF neural network
DANG Chang-qing;ZHANG Jing-hui;SHEN Zhi-yuan
..............page:3105-3107
Mixed coordinate for point algorithms on elliptic curve over GF(2m)
YANG Xian-wen;LI Zheng
..............page:2962-2964
Proxy blind signature without using Hash and Redundancy functions
QIU Cheng-gang;LI Fang-wei
..............page:2960-2961,2964
Optimization implementation of high speed AES accelerator
QIU Xiao-qiang;CAI Jue-ping
..............page:2957-2959
Design and implementation of improved SSL VPN system based on L2 switching technology
MA Wei-na;ZHANG Yan-yuan
..............page:2954-2956,2959
Augment semantics SVO logic-based analysis of two-dimensional authentication protocol
HUANG Han-sheng;HE Qiang-hua;JIANG Jin
..............page:2951-2953
Modeling and quantitative analysis methods for network security management systems' survivability
CHEN Jia-qing;LIU Jun;ZHANG Da-fang
..............page:2947-2950
Improvement and optimization of embedded file system based on NAND Flash
YANG Chun-lin;LEI Hang
..............page:3102-3104
Research on restraining bullwhip effect based on demand forecast
LI Ye;SHANG Xiao-ling;CHEN Yan
..............page:3099-3101,3104
Rule-based scheduling method for sensors on early warning satellites basing on task analysis
FENG Ming-yue;LI Guo-hui;YI Xian-qing
..............page:3095-3098
Web application development approach supporting multi-target-frameworks
HUANG Guo-dong;WAN Jian-cheng;HOU Jin-kui;LI Ying
..............page:3092-3094,3098