Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2014 Issue 1
High-efficiency and low-delay address assignment algorithm for LR-WPAN mesh networks
LEI Hongjiang;,LIU Yan;,REN Zhi;,SUO Jianwei;
..............page:1-3,17
Geographic routing algorithm based on directional data transmission for opportunistic networks
LEI Hongjiang;,REN Zhi;,WANG Lulu;,YANG Yong;
..............page:4-7,12
Distributed time division multiple access scheduling strategy for wireless sensor networks
CHEN Yaxi;,CHEN Yihong;,LIU Tao;,TAN Ying;
..............page:8-12
Sparse channel estimation method based on compressed sensing for OFDM cooperation system
GUI Guan;,LI Chunlei;,ZHANG Aihua;
..............page:13-17
Unknown protocol reversing engineering for CCSDS protocol
HOU Chongyuan;,JIAO Jiao;,ZHU Lei;
..............page:23-26,53
Integrity check method for fine-grained cloud storage data
HU Demin;,HUANG Chao;,YU Xing;
..............page:27-30
Prediction on hard disk failure of cloud computing framework by using SMART on COG-OS framework
BAI Wenyang;,SONG Yunhua;,ZHOU Qi;
..............page:31-35,188
Selection sequence of parallel folding counter
CHANG Hao;,FANG Xiangsheng;,JIANG Cuiyun;,LI Yang;,LIANG Huaguo;,YANG Bin;,YI Maoxiang;
..............page:36-40,68
Fault detection approach for MPSoC by redundancy core
FANG Fengcai;,HOU Yibin;,HUANG Zhangqin;,TANG Liu;,ZHANG Huibing;
..............page:41-45
Survey on energy-aware green databases
JIN Peiquan;,JIN Yong;,XING Baoping;,YUE Lihua;
..............page:46-53
TRAP-4 based continuous data protection system
LIU Xiaojie;,LUO Peng;,WU Hao;
..............page:54-57,63
Index mechanism supporting location tracing for radio frequency identification mobile objects
DI Guoqiang;,JIANG Jian;,LIAO Guoqiong;,LIU Dexi;,YE Xiaoyu;
..............page:58-63
Weakly supervised method for attribute relation extraction
DAI Qi;,JIA Zhen;,YANG Yufei;,YIN Hongfeng;
..............page:64-68
Biclique cryptanalysis of ARIRANG-256
WANG Xinning;,WEI Hongru;,ZHENG Yafei;
..............page:69-72,112
Collision attack on Zodiac algorithm
LIU Qing;,PAN Wei;,WEI Hongru;
..............page:73-77
Lattice signature and its application based on small integer solution problem
CAO Jie;,LI Zichen;,YANG Yatao;
..............page:78-81
Timelag weakening strategy for enhancing reliability of trust evaluation
CHEN Geng;,HAN Zhigeng;,JIANG Jian;,WANG Liangmin;
..............page:82-85
Distributed intrusion detection model based on artificial immune
CHENG Jian;,FAN Tao;,LIU Xiaohu;,ZHANG Mingqing;
..............page:86-89,94
Mixed key management scheme based on domain for wireless sensor network
WANG Binbin;,ZHANG Xuelin;,ZHANG Yanyan;
..............page:90-94
Continuous queries attacking algorithms of location based service
YANG Qiong;,YU Lifeng;
..............page:95-98,170
RFID anti-collision strategy of embedded safety mechanism
LI Jia;,LIU Chunlong;,ZHENG Yiping;
..............page:99-103
xin xi dong tai
..............page:封2
Hybrid model of alert correlation based on attack graph and alert similarity
XU Lei;,ZHU Mengying;
..............page:108-112
Medical image privacy protection scheme based on reversible visible watermarking
CHEN Zhigang;,DENG Xiaohong;,GAO Haibo;
..............page:119-123,157
Real-time simulation for 3D-dressing of random clothes and human body
CHEN Yan;,XUE Yuan;,YANG Ruoyu;
..............page:124-128
Solution method for inverse kinematics of virtual human's upper limb kinematic chain based on improved genetic algorithm
DENG Gangfeng;,GAO Qinhe;,HUANG Xianxiang;,LI Min;,ZHANGN Zhili;
..............page:129-134,174
Multi-function rendering technology based on graphics process unit accelerated ray casting algorithm
HOU He;,LYU Xiaoqi;,ZHANG Baohua;,ZHANG Chuanting;
..............page:135-138,178
Implementation of calibration for machine vision electronic whiteboard
LI Hui;,PENG Guojie;,WANG Run;,WANG Yiwen;,XU Xiao;,YANG Qi;
..............page:139-141,153
Multi-frame image super-resolution reconstruction algorithm with radial basis function neural network
CHENG Yaoyu;,WANG Gao;,YANG Xuefeng;
..............page:142-144,203
Filtering method for medical images based on median filtering and anisotropic diffusion
FU Lijuan;,FU Zhongliang;,YAO Yu;
..............page:145-148
Fast image registration algorithm based on locally significant edge feature
DING Chuang;,HUANG Chenyang;,LI Ruonan;,WANG Gang;,YANG Jian;
..............page:149-153
Face recognition based on histograms of nonsubsampled contourlet oriented gradient
CAI Yongyong;,FENG Junpeng;,LI Qiuqiu;,YANG Huixian;,ZHAI Yunlong;
..............page:158-161,166
Unequal error protection with adaptive genetic algorithm for scalable video coding
CAI Shuting;,TIAN Bo;,YANG Yimin;
..............page:162-166
Fast inter-mode decision algorithm for multi-view video coding
DU Sidan;,SHEN Qinghong;,WANG Fengsui;
..............page:167-170
H.264 authentication playing method based on video steganography
CAI Yangyan;,ZHANG Yu;
..............page:171-174
Preliminary application of combination resultant theory
YUAN Xun;
..............page:175-178
Differential evolution algorithm for high dimensional optimization problem
WANG Xu;,ZHAO Shuguang;
..............page:179-181
New algorithm for semidefinite programming
GAO Leifu;,YU Dongmei;
..............page:182-184
Cuckoo search algorithm for multi-resource leveling optimization
HUANG Zuoxing;,SONG Yujian;,YE Chunming;
..............page:189-193
Optimal iterative max-min ant system for solving quadratic assignment problem
DAI Xili;,HE Lingyue;,LI Kun;,MOU Lianming;
..............page:199-203
Improved artificial bee colony clustering algorithm based on K-means
CAI Zhengqi;,CAO Yongchun;,SHAO Yabin;
..............page:204-207,217
Improved single pattern matching algorithm based on Sunday algorithm
JIANG Xue;,QIN Zhiguang;,ZHU Yongqiang;
..............page:208-212
Trustworthy Web service recommendation based on collaborative filtering
LIU Cong;,WANG Lixia;,YANG Shuai;,ZHANG Xuan;,ZHAO Qian;
..............page:213-217
Hybrid recommendation model for personalized trend prediction of fused recommendation potential
CAI Shengzhen;,CHEN Hongtao;,DU Xin;,GONG Pin;,NI Youcong;,XIAO Ruliang;
..............page:218-221
Property of trust-based recommender systems
LONG Yu;,TONG Xiangrong;
..............page:222-226,235
Fatigue behavior detection by mining keyboard and mouse events
LIN Qiang;,NI Hongbo;,WANG Haipeng;,WANG Tianben;,ZHOU Xingshe;
..............page:227-231
Trajectory tracking control of manipulator based on FSMC
CAI Zhuang;,TIAN Qi;,ZHANG Guoliang;
..............page:232-235
Method for customer segmentation based on three-way decisions theory
HUANG Shunliang;,WANG Qi;
..............page:244-248
Improved K-means algorithm based on latent Dirichlet allocation for text clustering
WANG Chunlong;,ZHANG Jingxu;
..............page:249-254
Discriminative maximum a posteriori for acoustic model adaptation
GE Fengpei;,PAN Fuping;,QI Yaohui;,YAN Yonghong;
..............page:265-269
Test clue generation based on UML interaction overview diagram
HONG Hao;,LI Hanyu;,WANG Cuiqin;,ZENG Yi;
..............page:270-275,291
System-level test case generating method based on UML model
FENG Qiuyan;
..............page:276-280
Steel furnace online quality monitoring method based on real-time data processing
LI Baolian;,ZHANG Xiaolong;
..............page:286-291
Real-time temperature monitoring system design based on Matlab GUI serial communication
DONG Futao;,MENG Fanwei;,XUE Fei;,YANG Youliang;
..............page:292-296
Application of OPTICS to lightning nowcasting
HOU Rongtao;,LU Yu;,WANG Jun;,WANG Qin;,YUAN Chengsheng;
..............page:297-301