Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2008 Issue 9
Moving object segmentation technology based on DA-STMRF model
XIAO Chuan-min;SHI Ze-lin;QI Lin
..............page:2440-2442
Design and application of workflow modeling based on extended-directed graph
LI Lin;CHAI Zheng-yi;ZHANG Li
..............page:2437-2439
Design of software based on seamless tiling display system
YU Ling-yun;WANG Yi-gang;WANG Kang
..............page:2434-2436,2439
Two-dimensional canonical correlation analysis and its application to face recognition
SONG Dong-xing;LIU Yong-jun;CHEN Cai-kou
..............page:2430-2433
Text categorization based on genetic fuzzy classification and Boosting method
LUO Jun;KUANG Hang
..............page:2386-2388,2391
Soft-sensor modeling of quality control based on support vector machine
JIANG Xian-lin;GUO Xiu-qing
..............page:2382-2385
Study on virtual machine's live migration
JIANG Xue;LI Xiao-yong
..............page:2375-2377,2385
Solution of molecule scattering model based on parallel mode
HUANG Ren-dong;PENG Jian;FENG Hao
..............page:2371-2374
Improved SMO algorithm with different error costs
TIAN Da-dong;DENG Wei
..............page:2369-2370,2374
Cellular automaton model based on fuzzy control rule
GONG Yong-gang;CHEN Tao
..............page:2366-2368
Forecasting chaotic time series based on improved genetic WNN
WANG Yong-sheng;WANG Jie;LI Ze-hui;FAN Hong-da
..............page:2363-2365
Improved kernel-based fuzzy clustering algorithm
KONG Pan;DENG Hui-wen;JIANG Huan;HUANG Yan-yan
..............page:2338-2340
Improved FP-Growth algorithm and its applications in the business association
ZHAO Xiao-min;HE Song-hua;LI Xian-peng;YIN Bo
..............page:2341-2344,2348
Approach of feature dependency modeling for software product line
LUO Dai-zhong;ZHAO Wen-yun
..............page:2349-2352,2356
Research of mining meta-association rules for dynamic association rule based on model of Grey-Markov
LIU Jun;XIE Yan-feng;ZHANG Zhong-lin;JIA Li-min
..............page:2353-2356
Trust model in interdomain of grid
MA Man-fu;YAO Jun
..............page:2357-2359,2368
Time synchronization mechanism in Agent-based distributed simulation
LIAO Shou-yi;CHEN Jian;WANG Shi-cheng
..............page:2360-2362,2365
Blind digital watermarking method against geometric attack
ZHANG Jie-yong;LIU Shou-yi;YIN Zhong-hai
..............page:2249-2251
Research of Hibernate frame-based data persistence and its application
XIA Yun;LI Zhi-shu
..............page:2446-2448
Improvement and application of access control mode based on RBAC
LIU Jian-qi;ZENG Bi;ZHENG Xiu-zhang
..............page:2449-2451
Algorithm of weighting factors dynamic allocation in multi-radar track weighted fusion
HUANG You-peng;ZHOU Yong-feng;ZHANG Hai-bo;TANG Xiu-hu
..............page:2452-2454
gao yue
..............page:封2
Compression algorithm of text files based on LZSS
HE Dan;LI Zhi-shu
..............page:2335-2337,2340
New XML document coding scheme based on complete binary tree
ZHANG Peng;FENG Jian-hua;FANG Zhi-feng
..............page:2331-2334
Document clustering based on concept lattice
LI Jiang-hua;YANG Shu-xin;LIU Li-feng
..............page:2328-2330,2334
Data modeling and retrieval in semantic grid based on RDF
SHI Xue-lin;ZHAO Ying
..............page:2324-2327
Association rules mining method from XML based on Ontology
LIU Zao-xin
..............page:2318-2320
Algorithm of image inpainting based on texture orientation
WEI Lin;CHEN Xiu-hong
..............page:2315-2317
Extraction of minutiae and significant feature from fingerprint image
LIAO Kai-yang;ZHANG Xue-dong;ZHANG Ming-zhu;PAN Xiao-hong
..............page:2312-2314
Multi-resolution image segmentation based on Normalized Cut
WANG Zhen-liang;WANG Ji-cheng
..............page:2309-2311
Particle swarm optimization for image minimum error thresholding
LIU Jun;XU Yuan-yuan;ZHANG Yue-fei;Guo Jin
..............page:2306-2308,2311
Survey of software vulnerability taxonomies
LU Yi-sha;ZENG Qing-kai
..............page:2244-2248
Image-adaptive SVD watermarking algorithm based on wavelet perceptual model
GAO Shang-bing;YAN Yun-yang;BAO zheng;BAI Hua;ZHANG Jian-wei
..............page:2242-2243,2251
Mobile RFID security protocol and its GNY logic analysis
WANG Xin-feng;LIU Jian-guo;JIANG Xu;LIU Sheng-li
..............page:2239-2241
Shared-memory parallel multi-target tracking
WANG Xiao-gang;WU Xiao-juan;ZHOU Xin;ZHANG Xiao-yan
..............page:2303-2305
Application of clustering and improved C-V evolution equation in medical image segmentation
LUO Zhi-hong;FENG Guo-can;CHENG Qiu-sheng
..............page:2288-2291
Real-time unrolling catadioptric omni-directional images on DSP
CHENG Gang;XIONG Zhi-hui;CHEN Li-dong;WANG Bin;ZHANG Mao-jun
..............page:2285-2287,2291
Reconstruction of compressive sensing and semi-QR factorization
FU Ying-hua
..............page:2300-2302
Noise image compressed coding based on edge detection
TIAN Ying-hua;YANG Jing-song;TAO Yue
..............page:2297-2299,2305
Image retrieval based on spatail feature
SHI Ting-ting;LI Yan
..............page:2292-2296
Secure and efficient RFID mutual authentication protocol
WANG Li-bin;MA Chang-she;WANG Tao
..............page:2236-2238
Interval number approach for robot non-vision multi-sensor fusion
WAN Shu-ping
..............page:2420-2422
Region-of-interest coding based on rate-distortion optimization
HUANG Hui-xiong
..............page:2416-2419
D-S theory-based intrusion detection system
ZHAO Xiao-feng
..............page:2255-2258
ActiveX vulnerability exploiting technique based on Fuzzing
WU Yu-shu;ZHOU An-min;WU Shao-hua;HE Yong-qiang;XU Wei
..............page:2252-2254
Research of business activity driving system architecture execution
JIANG Jun;Lü Xiang;LUO Ai-min;LUO Xue-shan
..............page:2413-2415,2419
Scheduling model for flexible manufacturing system based on Petri net
HUANG Bo;ZHAO Chun-xia;ZHANG Pei-yun;SUN Ya-min
..............page:2410-2412
Multi-access control and multi-format document organizing and retrieving system based on Oracle
XIONG Zhi-hui;WANG De-xin;WANG Wei;ZHANG Mao-jun
..............page:2407-2409
Scene matching algorithm for SAR images based on SIFT features
YANG Zhao-hui;CHEN Ying;SHAO Yong-she;ZHANG Shao-ming
..............page:2404-2406
Service discovery improved model based on QoS
BIAN Xiao-fan;DAI Yan-hong
..............page:2398-2400,2412
Intuitionistic fuzzy integer programming based on improved particle swarm optimization
XU Xiao-lai;LEI Ying-jie;DAI Wen-yi
..............page:2395-2397
Off-line Chinese signature recognition system based on neural network
WANG Hong-chun;JIN Bin;FAN Xun-sheng;MA Shi-ming
..............page:2389-2391
Zero watermarking algorithm based on Zernike moments
WANG Zhong;SUN Yu
..............page:2233-2235
Communication traffic forecasting model based on multiple SVM regression functions
CHEN Rong;SONG Jun-de
..............page:2230-2232,2235
Efficient bidirectional anonymous routing protocol for wireless Ad Hoc networks
ZHANG Yi-hui;XU Li;CHEN Si-sheng
..............page:2220-2224
Novel OBS simulation platform and its testing results
ZHENG He-meng;LE Zi-chun;FU Ming-lei
..............page:2213-2215,2219
Improved dynamic source routing protocol for Ad Hoc network
TAO Yang;SUN Tao;WANG Jian
..............page:2210-2212
Technology for identifying VoIP traffic based on H.323 protocol
BI Xia-an;ZHANG Da-fang;XIE Kun;MU Xiao-ling
..............page:2204-2206
Framework of reservation and QoS monitoring of resource based on WS-Agreement
QI Chao;ZHANG Jing;QIANG Hong-fu
..............page:2199-2203
Load-leveling multi-groups hop count routing
WU Zhen-hua;SHU Jian
..............page:2195-2198
Adaptive PageRank algorithm search strategy for specific topics
PAN Hao;TAN Long-yuan
..............page:2192-2194
Research of spectrum resource allocation based on user requirement in cognitive radio network
CHEN Jie;LI Shao-qian;LIAO Chu-lin
..............page:2188-2191,2194
Improved algorithm of reducing delay in data aggregation
DENG Ya-ping;YUAN Kai
..............page:2185-2187
Overlay network-based least-cost scheduling strategies for NCS
WU Chun-xue;GUO Xian-hui
..............page:2181-2184,2187
Blind image deconvolution based on Gibbs distribution
LIU Rui-hua;BAO Zheng
..............page:2281-2284
Auxiliary contour algorithm for 3D reconstruction of medical slice images
LI Wei;HAN Li-hua;CHEN Jia-xin;JI Zhi-hang
..............page:2278-2280,2284
Background updating algorithm based on classification in complex scene
ZOU Cheng-ming;LI Wei
..............page:2274-2277
Line interpolation algorithm based on diagonal run-length
YE Xiao-tong;DENG Yun
..............page:2270-2273
Method of lossless removing to area and high-frequency noise in image
WANG Ping;CHENG Xiao-li;DONG Xiao-kai;JIA Hui-zhen
..............page:2267-2269,2277
Design of image group code based on chaotic systems
Lü Ning;SUN Guang-ming;ZHANG Yu
..............page:2263-2266
Trust model with high cooperative cheating resistance
ZHANG Gong;ZHANG Wei;XIONG Peng
..............page:2259-2262,2266