Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2010 Issue 7
Energy-efficient coverage algorithm in 3D wireless sensor networks
li cai li ; feng hai lin ; hou zuo
..............page:1719-1721,1724
Fingerprint image enhancement by Hermite filter
wang jian kang ; peng xiao qi ; zhong yun fei ; guo qiang
..............page:1852-1854,1858
Dynamic evolution mechanism oriented to service-object
chen hong long ; li ren fa
..............page:1974-1977
Bispectrum analysis on EEG for driving fatigue
nan zuo fen ; ai ling mei ; shi li ping
..............page:1967-1969,1973
Clustering algorithm based on complex attributes similarity and its applications
peng ang ; wang ru long ; chen quan quan ; zhang jin
..............page:1930-1932
Improved CMIP data prefetching strategy in mobile environments
li jing ; yu jian qiao
..............page:1950-1952
Dunhuang mural inpainting based on Markov random field sampling
yang zuo ping ; wang shu wen
..............page:1835-1837,1840
tou gao zhu yi shi xiang
..............page:封3
Chinese word segmentation for GIS based on priority special name
luo hao ; wei zu kuan ; jin zai hong
..............page:1941-1943
Inspection algorithm of arc-parts based on machine vision
shi xue chao ; sun zhen zhong ; lu sheng lin ; yang yu mei
..............page:1841-1843,1846
Efficient mixed clustering algorithm and its application in anomaly detection
li jian guo ; hu xue gang
..............page:1916-1918
Identification of vegetable leaf-eating pests based on image analysis
cai qing ; he dong jian
..............page:1870-1872
Research on periods of chaotic sequences under computer iteration
sheng li yuan ; quan jun bin
..............page:1802-1804,1808
Flexible Agent delegation model based on RBAC
sun wei ; wang shu li ; zuo chang an
..............page:1797-1801
Design and implementation of I/O power consumption simulation modules of power consumption simulator HMSim
zhou xue mei ; guo bing ; shen yan ; wang ji he ; wu yuan sheng
..............page:1987-1990
Readable machine proofs for mass point geometry
zou yu ; zheng huan ; zhang jing zhong
..............page:1899-1901,1912
Chinese geo-coding based on classification database of geographical names
sun cun qun ; zhou shun ping ; yang lin
..............page:1953-1955,1958
Intertextuality measurement method of text translation index
jiang xin ; jiang zuo ; fang zuo
..............page:1938-1940
Rate control algorithm based on steepest-descent for JPEG2000
li shi gao ; qin qian qing
..............page:1825-1827,1831
Rendering method for large-area terrain based on texture array
wang dong ; zhang yu nan ; lin cheng di ; liu tao
..............page:1832-1834
Lung CT image retrieval based on intelligent selection of multi-dimensional characteristics
liu cong ; tang jian gang ; zhang li hong
..............page:1867-1869
Face recognition using complex wavelet and independent component analysis
chai zhi ; liu zheng guang
..............page:1863-1866
Optimization of coordinated procurement strategy in steel group
xiao wen zhong ; qiu zhu qiang
..............page:1913-1915,1918
Application of improved RANSAC algorithm to image registration
qu tian wei ; an bo ; chen gui lan
..............page:1849-1851,1872
Research on video similarity network
zhou sheng ; hu xiao feng ; luo pi ; li zhi qiang ; liu si li
..............page:1962-1966
Post-earthquake based on repair time route optimization and its GIS implementation
yuan zheng wu ; wu zhi tao ; yang fu ping
..............page:1909-1912
Uncorrelated optimal discriminant plane in unsupervised pattern
cao su qun ; wang shi tong
..............page:1859-1862
Timing synchronization algorithm based on training symbol for OFDM systems
jiang yang ; luo yan ; luo yang
..............page:1754-1756
Iterative decoding algorithm of TPC based on correlation computation
wang zuo ; ge lin dong ; gong ke xian
..............page:1760-1762
Deduplication-oriented backup-data encryption method
wang can ; qin zhi guang ; feng chao sheng ; peng jing
..............page:1763-1766,1781
Parameter optimization for B-spline curve fitting based on adaptive genetic algorithm
sun yue zuo ; wei jian xiang ; xia de shen
..............page:1878-1882
Study of data race for process based on BPEL
yang shu xin ; li shu zhi ; zhang yong jin
..............page:1959-1961,1966
Multi-objective PSO based on infeasibility degree and principle of endocrine
zou feng ; chen de bao ; wang jiang tao
..............page:1885-1888
Research and implementation of parallel rendering system based on multi-core PC cluster
tan tong de ; wang xiao wei ; zhao xin can ; shi qi bo
..............page:1828-1831
Fuzzy clustering algorithm with modified kernel functions
zhao guo liang ; huang sha ri na
..............page:1926-1929
Spread spectrum speech information hiding based on linear interference cancellation
wang xiao ming ; yan bin ; lv wen hong
..............page:1821-1824
Time series similarity matching based on event
wu xue yan ; huang dao ping
..............page:1944-1946
Extended rough set model based on improved complete tolerance relation
ma xi zuo ; wang guo zuo ; zhang qing hua ; yang qing shan
..............page:1873-1877,1882
Solution of IPSec NAT-traversal in virtual private network
du jiang ; ge luo ya ke
..............page:1757-1759
Reputation-driven grouping mechanism in P2P file-sharing system
liu tang ; peng jian
..............page:1789-1793
Bidding-based optimization of task allocation in multi-Agent system
ding zhi qin ; liu yong ; wang kai
..............page:1906-1908
Role-control-based bandwidth allocation for space-based network
zhang deng yin ; tong zhen yan
..............page:1746-1749
Application of decision tree in apparel marketing based on appearance of consumers
zhang ge ; ou yang hao nan ; xu zuo
..............page:1919-1921,1929
Spider detection based on trap techniques
fan chun long ; yuan bin ; yu zhou hua ; xu lei
..............page:1782-1784,1793
New trajectory for image reconstruction based on GRAPPA
gong wei ; chi jie ru ; yang xin qiang
..............page:1847-1848,1866
New linear genetic programming approach
pan xiao hai ; xu wei hong ; zhou zuo qing
..............page:1896-1898
K-means text clustering algorithm based on density and nearest neighbor
zhang wen ming ; wu jiang ; yuan xiao zuo
..............page:1933-1935
Parallel test combining timed Petri net with GA-PSO algorithm
cui yu shuang ; le xiao bo ; zhou zuo qing
..............page:1902-1905
Modified method of detecting DDoS attacks based on entropy
zhang jie ; qin zheng
..............page:1778-1781
Application scheme of identity e-documents based on digital watermarking
zhu da li ; chen xiao su
..............page:1818-1820,1824
Immunization strategy by cutting edges
ji peng ; ge hong wei
..............page:1775-1777,1796
Parallel OLAP query optimization method based on semantic decomposition
wei li ; yang ke hua
..............page:1956-1958
Efficient certificateless signature scheme
hong dong zhao ; xie zuo
..............page:1809-1811
Spectral clustering based on global K-means
xie ; zhang ping wei ; luo zuo
..............page:1936-1937,1940
Study on significance of attribute set
ma xiu qin ; feng bai ming ; qin hong wu
..............page:1889-1891,1895
Belief revision in intelligent Agent action reasoning
liu yi song ; sang qiu ; liu lang yu
..............page:1892-1895
CUDA-based parallel implementation of fast moment invariants algorithm
han bin ; sun wen zuo ; zhou fei ; wang shi tong
..............page:1983-1986
Adaptive ADTCP: Improvement scheme of TCP in Ad Hoc network
song jun ; li hao ; li yuan ; li lin
..............page:1750-1753,1756
Encryption algorithm of colour image based on coupling chaotic systems
lu hui bin ; liu hai zuo
..............page:1812-1814,1817
Energy model for wireless sensor networks based on hierarchical topology
wei yong hong ; li ke jie
..............page:1731-1735
Adaptive load balancing model based on prediction mechanism
shi lei ; he zeng hui
..............page:1742-1745,1749
Pattern synthesis of antenna in deep-space exploration with genetic algorithm
cao hai lin ; yang li sheng ; wang zuo ; wang shuai tao
..............page:1739-1741
English word associative memory through pronunciation based vocabulary network
li jun lin ; fu hong guang
..............page:1970-1973
Efficient group key exchange protocol with strong security
deng shao feng ; deng fan ; li yi fa
..............page:1805-1808
NNlists-based k-path nearest neighbor query in road networks
wang bao wen ; han jing jing ; chen zi jun ; liu wen yuan
..............page:1947-1949
New adaptive RFID anti-collision algorithm based on collision-tree
chen tian e ; cheng zai he
..............page:1728-1730,1735
SWBCA: Stability-oriented weight-based clustering algorithm for VANETs
lin lei ; xiao xiao qiang ; xu ming ; wei li zuo
..............page:1711-1713,1718
Method for network anomaly detection with multi-measure based on relative entropy theory
zhang ya ling ; han zhao guo ; ren zuo xia
..............page:1771-1774
Method for generating slope line of open-pit mine based on KD-tree
tan zheng hua ; wang li guan ; chen jian hong ; huang jun zuo ; bi lin
..............page:1838-1840
ASDZP: New regional strategy for adaptive MANET service discovery
tan yu bing ; zhang xin you
..............page:1714-1718
Design and implementation of ALU and shifter in X-DSP
peng yuan xi ; zou jia jun
..............page:1978-1982
Modified immune particle swarm optimization algorithm and its application
duan fu ; su tong fen
..............page:1883-1884,1888
Effective algorithm to prevent click fraud
zhang zu lian ; ka mi li mu yi ding ; wang ming quan
..............page:1794-1796
Generation of system malicious behavior specification based on system call trace
sun xiao zuo ; zhu yue fei ; huang zuo ; guo ning
..............page:1767-1770,1774
Improved Apriori algorithm to associate alerts for intrusion detection system
wang tai hua ; wan yu wen ; guo fan ; yu min
..............page:1785-1788
Online upgrade method for embedded wireless information terminal
lin zhi xiong ; zuo ping ; he xiao hui
..............page:1725-1727
Improvement of node localization in wireless sensor network based on particle swarm optimization
chen xing zhou ; liao ming hong ; lin jian hua
..............page:1736-1738
Formal modeling and analysis approach of wireless sensor network
hu xiao hui ; jiang hao ; zeng xue na
..............page:1722-1724