Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2009 Issue 2
Improving WAPI protocol based on dual strategy
LUO Zuo-min;QIN Yan;WANG Feng;ZHANG Ya-ling
..............page:347-349,352
VPN identity certification technology based on fingerprint identification
HAO Yu-jie;FENG Yin-fu;LAI Pan
..............page:350-352
Trademark image retrieval based on curvature and entropy-matrix feature
SU Jie;WANG Wei-xing
..............page:453-455
Hand-drawn shape recognition based on k-segment algorithm for principal curves
TU Hong-lei;HUANG Jing
..............page:456-458
Incremental delaunay algorithm based on signed volume
LIN Yi-xin;LIU Dong-feng
..............page:459-461,464
Laplace watershed segmentation based on minimum energy
FENG Hui-jun;CHEN Bin;ZHAO Xiang-hui;XIA Fan
..............page:462-464
A new color difference formula in RGB color space
YANG Zhen-ya;WANG Yong;YANG Zhen-dong;WANG Cheng-dao
..............page:465-467
Three dimensional surfaces reconstruction based on shape of adjacent layer contours
SU An;RAN Shu-yang;WU Zhang-wen;ZHANG Li;HUANG Liang
..............page:450-452
Stereo matching algorithm based on LBP/C texture analysis
GE Liang;ZHU Qing-sheng;FU Si-si
..............page:447-449
Audio watermarking scheme based on DWT and mean quantization
WANG Fei;TAN Jie-qing
..............page:444-446
Lane detection algorithm based on morphological structure-elements model
LEI Tao;FAN Yang-yu;WANG Xiao-peng;WANG Lü-cheng
..............page:440-443
Simple 3D reconstruction method from single 2D image of object
SUN Lin-li;LI Yan;ZHENG Jian-ming
..............page:433-435,443
A weighted robust estimating algorithm with high accuracy
YANG Dan;WANG Yu-chen;ZHANG Xiao-hong
..............page:427-428,439
An improved algorithm of Levenshtein Distance and its application in data processing
ZHAO Zuo-peng;YIN Zhi-min;WANG Qian-ping;XU Xin-zheng;JIANG Hai-feng
..............page:424-426
Handwritten Chinese character recognition based on double elastic mesh
CHEN Zhang-hui;HUANG Xiao-hui;CHEN Peng-fei;LI Wen-long;ZHU Si-yao
..............page:395-397
Study on audio classification based on 1-state HMM
ZHENG Ji-ming;LI Rui-xian;PU Xing-cheng
..............page:392-394
Using mixed window function and subband spectrum centroid in MFCC feature extraction process
ZHAO Huan;ZHANG Lin;CHEN Zhen-wen
..............page:389-391
Intelligent supervisory system based on gait recognition
WANG Ke-jun;LIU Li-li;BEN Xian-ye
..............page:386-388
Classifier fusion for speech emotion recognition based on improved queuing voting algorithm
FU Li-qin;MAO Xia;CHEN Li-jiang
..............page:381-385
Research of recognition on handwritten Chinese character based on procedure neural networks
WANG Jian-ping;JIN Tie-jiang;SHAO Wei
..............page:377-380
Scale extraction and pixel measurement in foot marker image
SHI An-sheng;Lü Dong-hui;ZHANG Hai-yan;YANG Yun-feng
..............page:468-469,473
A real time method of rendering fake soft shadows based on shadow map
LI Lian;LEI Hang
..............page:470-473
The best image scrambling degree of binary image based on Arnold transform
HUANG Liang-yong;XIAO De-gui
..............page:474-476,483
Novel adaptive image impulse-noise filter based on SVC and wavelet-transform
LU Li-ting;ZHU Jia-gang
..............page:477-479
Twice-weighted centroid localization algorithm based on distance geometry constraints
ZHU Jian-xin;GAO Lei-na;ZHANG Xin-fang
..............page:480-483
Combining scheduling and congestion control for fair resource allocation in WLAN
YU Li;SHI Zi-bo;SHU Yan-tai;MA Mao-de
..............page:487-490
Multi-path routing optimization for wireless sensor networks based on genetic algorithm
ZHOU Ji-liang;LI Cai-xia;CAO Qi-ying
..............page:521-524
ABC supporting QoS unicast routing scheme with particle swarm optimization
WANG Xing-wei;YANG Hai-quan;HUANG Min
..............page:525-528,534
Consistent varying-weight fuzzy Petri net attack model based on both-branch fuzzy set
HUANG Guang-qiu;WANG Jin-cheng
..............page:529-534
Feedback scheduling of computing resources based on support vector machines
XU Kun;WANG Wan-liang;LI Zu-xin
..............page:535-538,541
Information system based on dominance relations and formal concept analysis
WANG Jun-hong;LIANG Ji-ye;QU Kai-she
..............page:539-541
Attraction-repulsion mechanism-based particle swarm optimization algorithm
ZHAO Peng-jun;LIU San-yang;LI Chao
..............page:542-544,557
Cross layer link adaptation scheme in wireless local area network
HUANG Jing-lian
..............page:518-520,524
New chaotic Elman neural network and its application
YANG Ling;SONG Jun;JIN Qiang
..............page:549-553
Device driver development of high speed data capture based on PCI bus
FU Zhi-zhong;XIAN Hai-ying;CHEN You-lin
..............page:577-579
B2C e-commerce logistic distribution routing model and algorithm
DUAN Feng-hua;FU Zhuo
..............page:580-582,589
Context-aware approach for temperature monitoring and fire alarming
LU Yin;MIAO Ke-jian;HE Wei
..............page:583-585,594
Big vehicle classification features and their extraction method for multi-lanes roads
MO Shao-qing;LIU Zheng-guang
..............page:586-589
A metamodel approach on multiview consistency checking based on BCCS
CHEN Shu;WU Guo-qing;XIAO Jing
..............page:590-594
Improving kernel fisher discriminant analysis for fault diagnosis in chemical process
WU Hong-yan;HUANG Dao-ping
..............page:595-597,601
A genetic algorithm based on double linear-linked-list encoding
ZHAO Zhen;YAN Jun-wei;LIU Min;LIU Gang
..............page:554-557
Text clustering based on genetic fuzzy C-means algorithm
KUANG Hang;LUO Jun
..............page:558-560,564
Space self-adaptive immune clonal selection optimization algorithm
TANG Zheng;HU Min
..............page:561-564
Research on one-to-many negotiation model with two phases type based on Agent
ZHANG Rui-fen;HUANG Ti-yun;JIANG Guo-rui
..............page:565-567,573
Research of tissue deformation in virtual surgery simulation
YE Xiu-fen;QIAO Bing;GUO Shu-xiang;GUO Qing-chang
..............page:568-573
Query expansion model based on concept graph information retrieval
CHEN Rui;ZHANG Lei;LU Chun-jun;MOU Li-ke
..............page:545-548,553
Grid resource schedule optimizing based on buffer and preelection
MA Man-fu;DUAN Fu-hai;HUANG Zhi-yi;ZHANG Wei-guo
..............page:491-493
Research on node localization based on particle swarm optimization for WSNs
WANG Xiao-le;XU Jia-pin
..............page:494-495,499
Improved ZiCL algorithm based on ZigBee network
WANG Fang;CHAI Qiao-lin;BAN Yan-li
..............page:496-499
Analysis and optimization for RAID small data random access
LIU Dong;WANG Li-fang;JIAGN Ze-jun;LIU Zhi-qiang
..............page:421-423
Dissimilar attribute reductions based on hierarchical clustering method
TANG Zhou-wen;YE Dong-yi
..............page:419-420,423
Document classification algorithm based on KDA and SVM
WANG Zi-qiang;QIAN Xu
..............page:416-418
Research on multi-agent model based on track methodology of ontology building
LU Qiang;CHEN Ming;WANG Zhi-guang
..............page:412-415
An improved model of Snort system based on data mining
ZHANG Ya-ling;KANG Li-jin
..............page:409-411
Clustering arithmetic with obstacle constraints
WANG Xiao-le;LIU Qing-bao;LU Chang-hui;CHEN Wen-kai
..............page:406-408,411
New algorithm based on repeat sequence deletion
JIANG Hua;YIN Bo
..............page:403-405
Design and implementation of geometric knowledge base
WANG Dong-ming;HUANG Ying;CHEN Xiao-yu
..............page:398-402,405
An algorithm of packet classification based on binary search on levels
PAN Deng;ZHANG Da-fang;XIE Kun;ZHANG Ji
..............page:500-502,506
DrTrust: A trust model in unstructured P2P network
ZHANG Yun-chang;CHEN Jian-xin;CHEN Shan-shan
..............page:503-506
A new multicast routing protocol with QoS constraints
GAO Qian;WAN Xiao-yan
..............page:507-510
Design of a novel modular Network-on-Chip router
ZHANG Li-peng;GU Hua-xi;WANG Chang-shan
..............page:511-513,517
Chord routing algorithm based on limited multicasting
DUAN Shi-hui;WANG Jin-lin
..............page:514-517
Fault diagnosis method based on Ontology
DOU Dan-dan;XIE Qiang;DING Qiu-lin
..............page:574-576,579
Design and realization of spam filtering model based on CART algorithm
KONG Ying;QIU Bin-qiang;XU Cong-fu
..............page:374-376
Cloud method of multi-granularity network security situation analysis
LIU Dai-ping;DONG Xiao-hua;ZHANG Ming-wei;CHEN Jia
..............page:370-373
Identity-based fair multi-party exchange protocol
FAN Mei-mei;PENG Chang-gen
..............page:367-369
An improved directed anonymous attestation scheme
LI Jie;WU Zhen-qiang;YU Lu;SUN Peng;CHENG Yao
..............page:364-366,397
Clustering algorithm of image emotional characteristics based on ant colony
LI Hai-fang;WEN Xia;MEN Li-huan
..............page:360-363
An improved scheme based on fragment marking scheme
YUAN Zhi-yong;ZHOU Si-qing
..............page:357-359,391
Cryptanalysis and improvement of a proxy signature scheme
XIA Qi;XU Chun-xiang;GAO Jian-bin
..............page:353-354,385
Object's warning and forecast method based on voronoi k-order neighboring relations
SI Hai-tang;QIN Xiao-lin;HAO Xue-feng
..............page:598-601
Multi-unit continuous double auction for resource allocation on computational grid
ZHAO Xu;WEI Cheng-jian
..............page:602-605,610
Bayesian networks analysis for sequence flight delay and propagation
CAO Wei-dong;HE Guo-guang
..............page:606-610
Self-recovering controller based on TMR-token
SUN Ke;LIANG Hua-guo;HUANG Zheng-feng;WANG Wei
..............page:614-617
3-dimensional vector radix FFT algorithm
WU Yun-feng;XU Ni-ni;XIAO Zhi-tao;HOU Zheng-xin
..............page:618-621
Research and porting of JDK6 HotSpot virtual machine on Loongson-based platform
WU Shao-gang;LI Pan-pan
..............page:622-624