Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2007 Issue 3
Improved inverse compositional algorithm and operators comparison
ZHANG Pei;WU Ya-feng
..............page:669-672
A real-time video denoising method based on lifting scheme
DU Zhen-hua;ZHANG Yan-ning;ZHENG Jiang-bin;YUAN He-jin
..............page:666-668
Realization of hidden line removal in 3D dynamic geometry
GUO Hui;FU Hong-guang;LUO Dong-hui
..............page:663-665
Improved projection based M-estimators for fundamental matrix in stereovision
QIAN Jiang;TIAN Zheng;JU Yan-wei
..............page:659-662
Image registration algorithm based on motion vectors estimation
GAO Shi-wei;YAN Jun-fei;GUO Lei;CHEN Liang
..............page:677-679
Noise image edge detection based on lifting scheme and floating threshold
XIA Ping;XIANG Xue-jun;JI Pei-rong
..............page:680-682
3D reconstruction of knee joint based on 2D contour series
CHEN Xin;XIONG Yue-shan
..............page:683-685
Morphable model with shape-constrained 3D face components
XUE Feng;DING Xiao-qing
..............page:686-689
Online palmprint recognition using line edge map
JIE Biao;YANG Xiu-guo
..............page:690-692
Efficient local asymmetric region detection in medical images
ZHOU Yi-yan;DING Guang-tai;SONG An-ping;ZHANG Wu
..............page:693-695
Application of PCA in dimension reduction of image Zernike moments feature
LIU Mao-fu;HU Hui-jun;HE Yan-xiang
..............page:696-698,702
An improved real-time transmission method for remote screen images
LI Xiao-peng;LIU Lian-dong;LI Ya-min;YU Bin
..............page:703-705
Intellective PXI bus extended card design based on ARM microcontroller
ZHANG Xiao-ning;MIAO Ke-jian;GAO Zhi-qiang
..............page:709-711
Design of BSC function test system based on ACE reactor
XIE Lun-yi;WEN Jun;LUO Yong-he
..............page:712-714,720
Identification of tea taste signals based on fuzzy rule generation algorithm
MA Ming;ZHANG Li-biao
..............page:715-717,742
Study on flood spreading model of Hongze Lake based on cellular automata
LI Zong-hua;YE Zheng-wei
..............page:718-720
Rate control by fuzzy measurement for H.264/AVC
ZHONG Rui;HE Ming-yi;WU Dong-wei
..............page:746-748
Improvement research based on H.264 TM5 rate control algorithm
HUANG Li;FU Zhi-zhong
..............page:749-751
Research on product ontology construction in E-commerce environment
LIU Dan;XIE Qing-sheng;GU Xin-jian
..............page:752-755
An automatic generation algorithm of MPI communication code
DU Peng;ZHAO Rong-cai;DONG Cun-li
..............page:759-761
A heuristic activity-on-arrow network autogeneration algorithm
WANG Gang;SUN Ji-zhou;LI Wen
..............page:762-764,771
Design and implementation of case-based reasoning human-machine conversation system
YAO Lin;LIANG Chun-xia;ZHANG De-gan
..............page:765-768
Reuse technology and application of engineering account bill software
SONG Xiao-yu;HU Song-ling;WANG Yong-hui
..............page:769-771
An approach to extract answer in question answering based on FCA
TANG Juan;DU Ya-jun;WANG Ke-liang
..............page:653-655,682
Conflict detection algorithm in collaborative design
WANG Da-yong;JIN Wei-dong
..............page:650-652
Construction of a multilingual language Ontology framework
LI Pei-feng;ZHU Qiao-ming;QIAN Pei-de
..............page:646-649,652
Negotiation strategy based on similarity and issue dynamic property
WANG Li-ming;NIU Dong-sheng
..............page:642-645,676
Information hiding scheme based on PE file resources section
XU Xiao-jing;XU Xiang-yang;LIANG Hai-hua;HUANG You-rong
..............page:621-623
Research on secure authentication based on session initial protocol
JI Ning;LIN Xiao;PU Jie-xin
..............page:616-618,623
A proxy signatures scheme based on (t, n) threshold
HOU Zheng-feng;DUAN Xiao-yan;ANG Dong-yu
..............page:614-615,629
Heterogeneous data integration method based on Excel and DTS
LUO Zuo-min;LI Yue;SUN Shu-hai;ZHOU Hong-fang
..............page:574-576,579
Minimum error estimation using wavelet for time series similarity search
WANG Lu-shan;LIU Bing;LIU Yong
..............page:570-573
Pattern discovery of Web user access patterns based on maximal frequent path method
Lü Cheng;WEI Chu-yuan;ZHANG Han-tao
..............page:565-569
Mining fuzzy temporal association rules
CUI Xiao-jun;XUE Yong-sheng
..............page:561-564
An improved density-based outlier mining algorithm
CUI Guan-xun;ZHU Qing-sheng
..............page:559-560,573
Research on dynamic order insert crossover operator for travel salesman problem
SUN Hai-lei;LIU Qiong-sun;HU Shang-wei
..............page:633-634,662
Differential evolution algorithm with position-order encoding for solving traveling salesman problem
HE Yi-chao;KOU Ying-zhan;CHEN Zhi-ming
..............page:630-632,641
Negative-selection algorithm of mutation search in self space to train detector
ZHANG Qing-hua;QIAN Yu;XU Bu-gong;GAO Ting-yu;XIE Ke-ming
..............page:627-629
Application of file system filter driver in network secure terminal
QU Jin;LI Qing-bao;BAI Yan;WEI Min
..............page:624-626
Particle swarm optimization based on uniform design and its application in flight control systems
LI Guang-wen;ZHANG Wei-guo;LI Jian;LIU Xiao-xiong
..............page:727-729,768
Multi-velocity particle swarm optimization and its application in soft sensor
XU Wen-bo;DU Run-long
..............page:730-732,736
Research and implementation of media player based on digital television middleware
CAI Qian;GU Jian-hua;NI Hong-bo;WANG Gang
..............page:737-739,748
Representative excerpts extraction of music based on similarity and novelty
Lü Bo;LI Jian-bin;HE Su-ning;YAN Ji-kun
..............page:740-742
A rapid prediction mode decision algorithm for AVS-M intra video coding
SHEN Qing-ping;WANG Yi;LIU Dong-hua
..............page:743-745
A peer-to-peer incentive mechanism based on PKI
WEN Jian-hua;GAO Hai-feng
..............page:590-592
An authentication model of CDN system based on P2P - DPKI
YANG Yang;WANG Song;ZHU Ming
..............page:587-589,592
Design and realization of identity-based mobile payment system
YANG Xiao-dong;ZHANG Gui-cang;LU Hong-wen
..............page:584-586
A virus immunization model based on community in large scale networks
SUN Jian-hua;LI Li-juan;LI Ding-ding;QIANG Wei-zhong
..............page:580-583
Implemention of an intelligent meta-search engine based on fuzzy integral algorithms
CUI Shu-ning;ANG Zheng-quan;ZHU Dan-jun;FENG Bo-qin
..............page:577-579
Resource scheduling algorithm for computing grid based on utility optimization
YU Jian-jun;ZHENG Yue-zhai;YANG Ming-xia
..............page:541-542,549
Robust access control protocol of P2P network
ZHANG Yan-xia;WANG Jin-lin
..............page:538-540,545
Flow characteristics analysis based on P2P application
CHEN Bao-gang;ZHANG Ling;XU Yong;HU Jin-long;HUANG Song
..............page:531-533,537
A chord-based optimization method for distributed spatial data storage
XIE Wen-jun;XU Jing;WU Chen-han
..............page:528-530
Design and implementation of embedded VPN gateway system
SONG Jie;DAI Guan-zhong;LIU Hang
..............page:543-545
Blind scheme for channel estimation with high accuracy
LUO Ren-ze;HU Jing-feng;YANG Xiao-feng;ZHU Wei-le
..............page:525-527
Multi-path constraint-based load balancing methods for MPLS traffic engineering
JIA Yan-ping;MENG Xiang-ru;MA Hai-yuan;HAO Zhi-jian
..............page:522-524
An adaptive retransmission scheme over CDMA2000 wireless link layer
YANG Shuai;WANG Min-bei;QIN Liu;BAI Yi
..............page:519-521,530
A localization system based on DV-Hop localization algorithm and RSSI ranging technique
LIU Yan-wen;WANG Fu-bao;DUAN Wei-jun;YU Chao
..............page:516-518,527
Research on MIPv6 secure firewall system
Lü Bo;XIE Xiao-yao
..............page:608-610
A computational trust model based on MAS in E-commerce
WANG Ping;QIU Jin;QIU Yu-hui
..............page:601-604
An enhanced role-based access control model of database
XIA Peng-wan;CHEN Rong-guo;SUN Jian
..............page:597-600,607
A single sign-on scheme supporting double authentication method
YANG Zhi;CHEN Xing-yuan;ZHANG bin
..............page:595-596,613
Dynamic mining decision rules based on partial granulation
CHENG Xin;LIANG Ji-ye;QIAN Yu-hua
..............page:556-558
Algorithm for Sammon's nonlinear mapping based on fuzzy kernel learning vector quantization
JIN Liang-nian;OU Yang-shan;LI Min-zheng
..............page:553-555