Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2008 Issue 5
Variance minimization model for optimization decision-making of loan portfolio under chance constraints
NING Yu-fu;TANG Wan-sheng;YAN Wei-zhen
..............page:1325-1327,1340
Expressing genes without expression trees construction
LI Chuan;TANG Chang-jie;CHEN Yu;QIU Jiang-tao;LUO Qian;WU Jiang;JUN Zhu
..............page:1319-1321,1337
Model of cluster service manager based on mass data
LI Hui-yun;YIN Ren-kun;RAN Wang
..............page:1316-1318
Method of image quality assessment based on region of interest
YANG Wan;WU Le-hua;LI Shu-yun;FAN Ye
..............page:1310-1312
Research of QoS-driven dynamic web services pricing model
WU Jian-bin;WANG Xiao-hu
..............page:1307-1309
Research and application of predictable CER-real time Java developing model
JIN Yong-xian;LI Shu-yu
..............page:1303-1306
Approach of concurrent object-oriented program slicing based on LTL property
RONG Mei;HE Zhi-xue;ZHANG Guang-quan
..............page:1300-1302,1306
Formal semantics of XPDL specification in CSP process
GUO Li-hua;LV Zhao;GU Jun-zhong
..............page:1295-1299
Study on communications between MIs in migrating workflow system
WANG Meng;WANG Xiao-lin;ZENG Guang-zhou
..............page:1291-1294
Research of process model supporting for software requirements verification
RONG Hui-gui;LI Wei;GUO Wei-feng
..............page:1287-1290,1294
Design and implementation of TinyOS integrated developing environment
GUO Wen-sheng;LIU Kui-an;SANG Nan
..............page:1283-1286
Model of minimum cost heterogeneous sensor network
SUN Rui-hua;MA Chun-guang;ZHANG Guo-yin;SHANG Zhi-guo
..............page:1280-1282,1286
Illumination invariant face recognition algorithm based on local qualitative representation
ZHANG Yi;GUO Lin;ZHANG Gui-lin
..............page:1276-1279
Detection of human movement state based on power spectral density
LIN Guang-feng;ZHANG Er-hu;GU Huan;PAN Xiang-hui;FAN Yin-di
..............page:1269-1271
Adaptively weighted 2DPCA based on local feature for face recognition
XU Qian;DENG Wei
..............page:1267-1268,1271
Face recognition based on ASM and line Hausdorff distance
LI Song;LIU Dang-hui;SHEN Lan-sun
..............page:1217-1220
Adaptive image enhancement algorithm based on Bandelet transform
LONG Yi;LIU Ming-kun;YIN Zhong-ke;WANG Jian-ying
..............page:1221-1224
Mesh simplification algorithm based on screen resolution of mobile devices
CHEN Hua-hong;ZHOU Sha;CAO Shun-ting
..............page:1225-1228
Multilevel spectral clustering with ascertainable clustering number
JIN Hui-zhen;ZHAO Liao-ying
..............page:1229-1231
Algorithm of stable state spaces in reinforcement learning
ZHENG Yu;LUO Si-wei;LV Zi-ang
..............page:1328-1330,1343
GPU acceleration for octree volume rendering
SU Chao-shi;ZHAO Ming-chang;ZHANG Xiang-wen
..............page:1232-1235,1239
Research of CT image edge detection based on improved ant colony algorithm
ZHANG Jing-hu;GUO Min;WANG Ya-wen
..............page:1236-1239
Image segmentation based on improved Ant-Tree algorithm
FANG Xin;ZHAO Wei-dong;YANG Xiao-chun
..............page:1240-1243
Improved algorithm on fast multi-resolution motion estimation
ZHANG Su-wen;YANG Fu-sen;WANG Li-li
..............page:1244-1246
Color digital watermark based on amplitude modulation and SVR
BEI Yi-lin;YAN De-qin;LIANG Hong-xia;LI Ke-qiu
..............page:1247-1250,1254
Face recognition based on curvelet and PCA
ZHANG Jiu-long;ZHANG Zhi-yu;QU Xiao-e;ZHAO Yang;SHI Zheng-hao
..............page:1255-1256,1260
Research of target recognition algorithm from image with complex background
SHANG Chun-hong;ZHAO Ming-chang
..............page:1257-1260
Application of DNA algorithm to face recognition
SHEN Kai;TANG Pu-ying
..............page:1261-1262,1266
Novel face recognition method based on KPCA plus KDA
ZHOU Xiao-yan;ZHENG Wen-ming
..............page:1263-1266
ElGamal public-key cryptosystem based on integral quaternions
WANG Li;XING Wei;XU Guang-zhong
..............page:1156-1157
Research and defence of new vulnerability exploiting method
WANG Kai-jian;LUO Xiao-bo;ZHANG Tian-gang
..............page:1152-1155
Automatic breakline extraction from LIDAR point clouds
XU Jing-zhong;WAN You-chuan;ZHANG Sheng-wang
..............page:1214-1216
Watermarking algorithm of large capacity halftone image
XIE Jian-quan;YANG Chun-hua;HUANG Da-zu;XIE Qing
..............page:1211-1213
Blind source separation in noisy mixtures based on curvelet transform and independent component analysis
ZHANG Chao-zhu;ZHANG Jian-pei;SUN Xiao-dong
..............page:1208-1210,1216
Framework of biometric authentication applied in open network
FENG Quan;SU Fei;WEI Ji-wei
..............page:1149-1151
Research into unified authentication system of digital campus
LI Xiao-xue;WU Zhong-fu;ZHONG Jiang;LI Guo-zhu
..............page:1146-1148,1151
Cryptanalysis of proxy blind signature scheme
LEI Zhi-jun;LIU Wen-hua;YU Yong
..............page:1144-1145
Prediction calculation and self-adaptive algorithm for matching threshold in negative selection algorithm
YANG Dong-yong;CHEN Jin-yin;Naofumi Matsumoto
..............page:1140-1143,1145
Intrusion detection system with hybrid detector
WANG Da-wei;ZHANG Feng-bin;WANG Sheng-wen
..............page:1136-1139
Improved blind signature schemes based on XTR system
DING Xiu-huan;FU Zhi-guo;ZHANG Shu-gong
..............page:1133-1135,1139
Blind intrusion detection algorithm based on digital whiff
NIE Xiao-wen;LU Xian-liang;WANG Zheng
..............page:1130-1132
Traffic control based on IXP2400
XIE Xi;ZHANG Da-fang;XIE Kun;LIU Tian-ming
..............page:1107-1110
Ad Hoc energy constrained routing protocol
ZHENG Feng;LI La-yuan;LIAN Jin;GAO Ye-fang
..............page:1104-1106,1113
Application of evolutionary substructure discovery in study on regional economy
CHANG Xin-gong;KOU Ji-song;LI Min-qiang
..............page:1173-1176
Research of ontology uncertainty reasoning based on Bayesian network
YANG Xi-quan;CAO Xue-ya;GUO Di-na;ZHOU Jian-yuan
..............page:1170-1172
New dynamic password authentication based on smart card and fingerprint
CAI Jia-lun;LI Rong-yao
..............page:1167-1169
Key management scheme of wireless sensor networks
ZHANG Zhi-ming;WANG Zu-jian;PENG Ya-li;YU Min
..............page:1164-1166,1169
Research of hierarchical identity-based encryption for grid
HUANG Sheng;JIANG Wai-wen
..............page:1161-1163
Token ring-based secret share update scheme
HUANG He;WANG Ya-di;HAN Ji-hong;LI Shuai
..............page:1158-1160,1163
Optimal path algorithm with multi-constrained condition
ZOU Yong-gui;WEI Lai
..............page:1101-1103,1110
Research of parallel recommendation algorithm based on idiotypic artificial immune network
SU Yi-dan;WANG Yu-cai;GU Xin-yi
..............page:1098-1100
Fault diagnosis for Web service composition based on Bayesian network
FU Xiao-dong;ZOU Ping;SHANG Zhen-hong;JIANG Ying
..............page:1095-1097,1100
Classifier ensemble based on fuzzy clustering
FAN Ying;JI Hua;ZHANG Hua-xiang
..............page:1204-1207
Optimal control of traffic flow based on rough theory and fractal theory
WANG Jia-wei;HUANG Da-rong;LEI Ming
..............page:1200-1203
Fuzzy clustering algorithm based on genetic algorithm and its application
SONG Jiao;GE Lin-dong
..............page:1197-1199
Improved particle swarm optimization for class of nonlinear min-max problems
ZHANG Jian-ke;LI Li-feng;ZHOU Chang
..............page:1194-1196,1199
Highly effective fuzzy clustering algorithm based on improved network
CHEN Xiu-min;ZOU Kai-qin;YAN Zhong-wen;ZHU Mei-ning;FU Chang-qing;YANG Yan-ping;YAN Dan-dan
..............page:1190-1193
Trusted objects in trusted operating system
TAN Liang
..............page:1186-1189
Track methodology model for ontology building
LU Qiang;WANG Zhi-guang;CHEN Ming
..............page:1183-1185,1189
Improved identity-based key-insulation signature scheme
ZHU Jian-xin;LI Cheng-hua;ZHANG Xin-fang
..............page:1128-1129,1132
Formal analysis of IEEE 802.11i
WU Kai-gui;XU Cheng;LIAO Zhen-lan
..............page:1125-1127
Design and research of 4over6 extended mechanism
YU Yong;HUANG Mian;SONG Jian
..............page:1120-1122
Novel network protocol for WSN based on energy and distance
ZHANG Lei;CHEN Shu
..............page:1117-1119
Efficiency bottlenecks analysis and solution of Web crawler
YIN Jiang;YIN Zhi-ben;HUANG Hong
..............page:1114-1116,1119
Research of adaptive receivers for TH-UWB systems
SHI Xiao-lin
..............page:1111-1113
Extended fuzzy grouping queries in relational databases and derivation rules
CHEN Yi-fei;ZHANG Ying-chao;YE Xiao-ling
..............page:1177-1179,1193
Study of self-adaptable fault tolerance in storage network
HAN De-zhi;ZHONG Ming
..............page:1331-1334,1361
Electronic voting scheme based on OT protocol
GUO Dong-liang;QIN Jing;LI Peng-cheng
..............page:1335-1337
Control parameter tuning of magnetic bearing PID based on Matlab-Simulink-SISO and SRO
WANG Yi-ding;LI Zhi-shu;LIN Jian-hui;ZHAO Pei
..............page:1338-1340
Human motion data analysis and retrieval based on 3D feature extraction
XIANG Jian;ZHU Hong-li
..............page:1344-1346
Establishment of self-adaptation system based upon Bayesian network
XIAO Jian-qiong;FENG Qing-yu
..............page:1347-1349
CAVLC coding algorithm and FPGA realization of high-speed entropy encoder
LIU Xiao-ming;ZHANG Xu-ying;LI Fang;CHEN Guang-hong
..............page:1350-1354
Research on self-adaptive reconfigurable multi-DSP system in PXI platform
JIA Jie;QIN Yong-yuan;LUO Xu-tao
..............page:1355-1358
Official document classification using stochastic keyword generation
LIU Ying;HU Ming-han
..............page:1359-1361