Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2009 Issue 9
Research and application of Hilbert packed R-tree in ATC GIS display
YANG Xuan;LIU Yi-guang;TANG Zhen-ying;LIU Hao
..............page:2589-2592
Novel method of space horizontal line localization based on single catadioptric omnidirectional image
LOU Jing-tao;WANG Wei;ZHANG Mao-jun;CHEN Wang
..............page:2593-2595
Latent semantic information measurement of corpus orientation
JIANG Kai-zhong;LI Lu;WANG Zhao-zong
..............page:2450-2453,2467
Design and implementation of partially decentralized P2P Botnet control server
HUANG Ping;TAN Liang
..............page:2446-2449
Technology of spots advertising in P2P streaming media player system
FAN Heng-long;JIN Lian-fu
..............page:2442-2445
Garment modeling technology based on section
XU Wen-peng;QIANG Xiao-huan;HOU Shou-ming
..............page:2586-2588,2592
Multimodulus blind equalization algorithm for cross quadrature amplitude modulation signals
HUO Ya-juan;GE Lin-dong;WANG Bin
..............page:2578-2580,2585
Binary subdivision scheme with three parameters
DUAN Jian-wei;PENG Guo-hua;HU Mei-gui
..............page:2575-2577,2595
Multi-source remote sensing image fusion based on improved wavelet transform method
XUE Dong-jian;HE Zheng-wei;ZHOU You;QIU Wen-xia
..............page:2568-2570,2574
Cloud computing and its key techniques
CHEN Quan;DENG Qian-ni
..............page:2562-2567
Design and implementation of file monitoring system of Windows Mobile
XIE Ze-ke;HU Jing-song
..............page:2534-2536
xin xi
..............page:封2-封4
New LOD method based on adaptive quad-tree for terrain visualization
zhang xiao hu ; shao yong she ; ye ; qin
..............page:2596-2598
Color image denoising based on noise characteristic and vector median filtering
HAN Jin-yu;WANG Shou-zhi
..............page:2418-2419,2423
Image segmentation method using binary level set based on regional GAC model
YANG Yong;XU Chun;PAN Wei-min
..............page:2414-2417
Object extraction algorithm combining boundary information and region information
WANG Jian-qing;GUO Min;XU Qiu-ping
..............page:2411-2413
Edge detection in SAR images of transform domain
MEI Zhen;LIN Wei;WANG Rui-xia
..............page:2402-2405
Face recognition under illumination invariance using multiresulotion analysis
JIANG Lin;FANG Bin;ZHANG Tai-ping;TANG Yuan-yan;YAO Tong-qing
..............page:2395-2397
Region-based image annotation of graph learning approach
HU Xiao-hong;QIAN Xu;WANG Ke
..............page:2393-2394,2397
Extraction method of standing faces of high building based on perceptual organization
GUO Hai-tao;WANG Xin;XU Qing;ZHANG Bao-ming
..............page:2389-2392
Evaluation and improvement of SOAP performance for real-time Web service
DENG Tie-shan;WANG Xiao-dong;ZHAO Xiang-hui;JIAN Xiao-peng;LU Yan-ru
..............page:2439-2441,2445
Novel rapid acquisition method for ultra-wide band system
WANG Xiu-zhen;ZHENG Zheng-qi;JIN Ying-ni;ZHANG Yan-bo
..............page:2435-2436,2463
Epistemic Cord logic: verifying anonymous routing protocols in Ad Hoc network
LI Qin;ZENG Qing-kai
..............page:2432-2434
Reliable multicast architecture based on multicast gateway
JIANG La-lin;XU Wei-hong;YU Feng;FAN Jun-qing
..............page:2428-2431
Resource analysis method for multi-service network based on queuing network
ZHANG Ying;ZHAO Li-ru;GU Xin-liang
..............page:2424-2427,2431
Novel algorithm for improving comprehensive energy-saving performance of mobile station and its performance analysis
TANG Chao-wei;SHAO Yan-qing;CHEN Hong-dan;LIU Peng-jun;GUO Chun-wang
..............page:2420-2423
Sound source localization based on audio-video system of mobile robot
CHEN Tao;ZHANG Ming-lu;FU Ling-li
..............page:2471-2472,2480
Accurate allocation model of system reliability based on converse thinking
ZHANG Hong-bin;JIA Zhi-xin
..............page:2468-2470
Design and realization of Agent-based modeling and simulation system on energy infrastructures
SUN Lin;HU Xiao-feng;LI Zhi-qiang;Lü Ling-bao
..............page:2537-2540
Hot spot implementation method of three-layer software framework
HAO Wen;AI Ling-mei;WANG Ying-hui
..............page:2541-2545
New peak searching method in subspace spectrum
ZENG Hao;ZHANG Ying-hui;Feng Wen-jiang
..............page:2546-2547,2567
Analysis of random-like property of discrete chaotic system with symbol entropy
FENG Ming-ku;LIU Chi-hui;LIU Xiong-ying
..............page:2548-2549,2553
PCB defect detection based on run-lengthen encoding
GUO Shi-gang
..............page:2554-2555
Model and design of adaptive mobile middleware supporting scalability
ZENG Xian-quan;PEI Hong-wen
..............page:2559-2561
Multiple kernel discriminant analysis with optimized weight
LIU Xiao-zhang;FENG Guo-can
..............page:2473-2476
Research of foe intention recognition method based on intuitionistic fuzzy Petri net
ZHOU Chuang-ming;SHEN Xiao-yong;LEI Ying-jie
..............page:2464-2467
One-class intrusion detection system based on KPCA space-similarity
XU Jing;TAO Xin-min
..............page:2459-2463
Improved kNN algorithm based on Mahalanobis distance and gray analysis
LIU Xing-yi
..............page:2502-2504,2536
Research of necessary rules\' influence on classifying
LI Ying-jie;YIN Yi-xin
..............page:2499-2501,2526
Survey on applications of software source code mining
YU Xiu-mei;LIANG Bin;CHEN Hong
..............page:2494-2498,2515
FPGA verification technology based on Synopsys VMM
Lü Xin-xin;LIU Shu-fen
..............page:2527-2529,2533
Rough set-based algorithm for discretizing continuous variables of Bayesian network
QU Ying;LI Ping;WU Qi-zong;JIA Jian
..............page:2491-2493,2508
Inverse problem of SVM via margin merging clustering algorithm
ZHU Jie;LI Ning;GAO Xiang-hui
..............page:2481-2482,2486
Incremental updating algorithm for computing core based on improved discernibility matrix
LAI Tao-tao;FENG Shao-rong;ZHANG Dong-zhan
..............page:2477-2480
Secure and effective anonymous communication scheme for ireless sensor network
ZHANG Zhi-ming;DENG Jian-gang;ZOU Cheng-wu;YU min
..............page:2351-2354
Text watermarking based on text feature
SI Qin;ZHANG Li;LIAN De-liang
..............page:2348-2350
Blind image steganalysis based on multi-directional correlation of DCT coefficient
WANG Yong;LIU Jiu-fen;ZHANG Wei-ming
..............page:2344-2347,2350
New digital signature scheme based on discrete logarithm
ZHU Zi-zhao;YAO Guo-xiang
..............page:2342-2343,2345
Identity-based structured multi-signature
GENG Yong-jun;ZHANG Yan-hong;CUI Xue-bing
..............page:2339-2341
New scheme of XML-based access control for effective querying and quick updating
LI Shi-wen;LU Jian-zhu
..............page:2336-2338,2341
Evaluation method of service-level network security situation based on fuzzy analytic hierarchy process
LIU Lei;WANG Hui-qiang;LIANG Ying
..............page:2327-2331,2335
Audio watermarking algorithm for public information transmission
ZHANG Xiao-ming;YU Zhao-yang;LI Wen-zhi
..............page:2323-2326
Design and implementation of usable security model for operating system
LIU Zun;LI Wei-hua;WANG Tao
..............page:2319-2322,2326
Research on collaborative operation of network security components
YANG Hong-yu;DENG Qiang;XIE Li-xia
..............page:2315-2318
Face recognition method based on Gabor wavelet and common vector
HUO Yuan-lian;QI Yong-feng
..............page:2383-2385,2388
Data association algorithm of multiple non-overlapping cameras
LIU Shao-hua;ZHANG Mao-jun;CHEN Wang
..............page:2378-2382
Intersecting feature recognition based on 3D solid model of graph
LU Hai-shan;LU Tong;YANG Yu-bin
..............page:2375-2377
Text zero-watermark based on use frequency of Chinese characters
WANG Xiao-long;YAN Cheng-hua
..............page:2366-2368,2382
Public verifiable algorithm of threshold secret sharing with short share
LIU Zhen;YANG Xiao-yuan;WEI Ping;XIAO Hai-yan
..............page:2363-2365
Logical definition of usage control authorization model
HU Zhao-wei;JIN Rui-fang;YU Wan-jun;REN Shuo;YANG Bo
..............page:2360-2362,2374
Study of new trusted network framework
ZHOU Yan-wei;WU Zhen-qiang;YE Jiang-cai;CHONG Hui-fang
..............page:2355-2359,2365
Cloth simulation based on improved mass-spring model
LI Jian;LI Peng-kun;LIAO Qiu-jun
..............page:2386-2388
Design and implementation of FPGA data communication interface driver based on Linux
JIANG Gui-quan;ZHANG Hui;WANG Guo-feng
..............page:2520-2522,2545
Improved fast DBSCAN algorithm
WANG Gui-zhi;WANG Guang-liang
..............page:2505-2508
Research on optimal placement of data copies in distributed database
ZHU Hong-cheng;XU Zhi-guang
..............page:2509-2511
Application of workflow-based service composition in E-government
WEN Jun-hao;RAO Xi-ru;HE Pan;WANG Yu-biao
..............page:2512-2515