Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2014 Issue 5
Optimization of data scheduling algorithm in concurrent multipath data transfer
LI Ning;,WANG Cong;,YU Dongping;,ZHANG Jianfeng;
..............page:1227-1231
Secure cross-layer transmission protocol of orthogonal frequency division multiplexing vehicular Ad-Hoc network
JI Jiang;,LI Haixia;,REN Guofeng;,TIAN Zhumei;
..............page:1232-1235,1250
Speed adaptive vertical handoff algorithm based on application requirements
CHEN Leicheng;,JIANG Yanli;,TAO Yang;
..............page:1236-1238,1262
Improvement of DV-Hop based localization algorithm
LIAN Lijun;,WANG Luna;,XIA Shaobo;,ZHU Xiaoli;,ZOU Jianmei;
..............page:1247-1250
Design of DNA encoding sequences based on h-distance
WANG Bin;,ZHENG Xuedong;,ZHOU Changjun;,ZHOU Shihua;
..............page:1259-1262
Shortest cyclic quorum generation algorithm based on number of repetitions
LI Meian;,LIU Heng;,SU Meng;
..............page:1263-1266,1299
Distributed memetic differential evolution algorithm combined with pattern search
GUO Hongge;,ZHANG Chunmei;
..............page:1267-1270,1317
Multi-start tabu search algorithm for solving maximum cut problem
GONG Chunqiong;,QIN Xinqiang;,ZHANG Aijun;
..............page:1271-1274
Object classification based on discriminable features and continuous tracking
LI Qiuluan;,LI Zhihua;
..............page:1275-1278
Built-in determined sub-key correlation power analysis
FU Rong;,LI Jinliang;,LI Xiangxue;,YU Yu;
..............page:1283-1287,1330
Encryption scheme of certificateless and leakage-resilient private key
LI Jiguo;,YU Qihong;
..............page:1292-1295,1335
Cryptanalysis and improvement of provably secure k-out-of-n oblivious transfer scheme
DAI Ming;,LI Luyao;,WANG Qinglong;
..............page:1296-1299
New secure signature scheme in standard model
WANG Xu'an;,ZHANG Minqing;,ZHANG Tengfei;
..............page:1300-1303
3D point cloud model watermarking algorithm based on feature points extraction
QI Xiangming;,SHI Shuangyu;,YANG Xiaotao;
..............page:1309-1312,1353
Privacy-preserving location-aware model based on encrypted data
RAO Jie;,TAN Bo;,TAN Chengxiang;
..............page:1313-1317
Chosen initial vector correlation power attack on synchronous stream cipher Grain-128
YAN Yingjian;,YANG Changsheng;,YU Jingchao;
..............page:1318-1321,1349
Android malware detection based on permission correlation
YANG Jiyun;,ZHANG Rui;
..............page:1322-1325
Survey of dynamic prediction method for Web service quality of service
AN Jiyu;,LIU Zhizhong;,LU Baoyun;,SONG Cheng;
..............page:1326-1330
High efficient K-means algorithm for determining optimal number of clusters
RAO Qingfei;,TANG Jing;,WANG Yong;,YUAN Chaoyan;
..............page:1331-1335
Cost-sensitive hypernetworks for imbalanced data classification
GAN Zhentao;,HAO Qingfeng;,WANG Yang;,ZHENG Yan;
..............page:1336-1340,1377
Topic clause identification method based on specific features
JIANG Yuru;,SONG Rou;
..............page:1345-1349
News topic mining method based on weighted latent Dirichlet allocation model
BA Zhichao;,HUANG Li;,LI Xiangdong;
..............page:1354-1359
Behavior modeling of transport robot using Petri nets
LI Wei;,YUAN Jie;
..............page:1360-1363,1368
Gait recognition based on row mass vector of frame difference energy image
CHEN Yong;,LI Rui;,YU Lei;
..............page:1364-1368
E-mail classification algorithm based on user's action
CHEN Zhiping;,TAN Yihong;,ZHAO Bihai;
..............page:1369-1372
Face recognition using as authentication in intelligent office systems
DENG Wenhong;,ZHOU Zhongli;
..............page:1373-1377
Abnormal behavior detection for highway vehicle based on lane model
GU Ming;,HAN Jun;,QIU Lingyun;
..............page:1378-1382,1390
Improved speech endpoint detection algorithm in strong noise environment
LU Yuanyao;,XIAO Ke;,YE Qing;,ZHOU Ni;
..............page:1386-1390
Application of novel K-means particle swarm optimization algorithm in integrated navigation
DONG Miao;,HAO Shunyi;,REN Yang;,XIA Qi;
..............page:1397-1399,1412
Stability augmentation hybrid controller for quadrotor aircraft
GAO Qingji;,HU Dandan;,YUE Fengfa;
..............page:1400-1403
Co-design optimization approach based on static register allocation in system emulation
CHEN Huichao;,DONG Weiyu;,JIANG Liehui;,ZHANG Yanwen;
..............page:1404-1407,1422
Coroutine and scripted mechanism for embedded system
WANG Lin;,ZOU Changwei;
..............page:1408-1412
Control flow checking method for on-board operating system
DENG Shenglan;,MING Yuewei;,NING Hong;
..............page:1418-1422
Precision analysis of arbitrary resolution wavelet fairing
JI Xiaogang;,XUE Jie;,YANG Yan;
..............page:1423-1426,1452
Element-sizing field smoothing algorithm for mesh generation of finite element analysis
LI Shaolei;,ZENG Lijuan;,ZHU Chaoyan;
..............page:1427-1430
Ray tracing of irregular scene based on spatial grid subdivision
LIU Jiatong;,SUN Jinguang;
..............page:1431-1434,1457
Positioning and display of intensive point of interest for augmented reality browser
CHEN Jing;,WANG Yongtian;,ZHANG Yu;,ZHOU Qi;
..............page:1435-1438,1462
Improved cross-media relevance model for quick image annotation
BAO Cuizhu;,LIN Yaozong;,NIU Junhai;,SONG Haiyu;,WANG Bingfei;,XIA Xiu;
..............page:1439-1441
Human fingertip detection and tracking algorithm based on depth image
FAN Yangyu;,LEI Tao;,LIU Weihua;
..............page:1442-1448
Improved ASIFT algorithm for image registration
FAN Xueting;,ZHANG Lei;,ZHAO Chaohe;
..............page:1449-1452
3D object matching combined 3D geometrical shape and 2D texture feature
LI Shuiping;,PENG Xiaoming;
..............page:1453-1457
Culling of foreign matter fake information in detection of subminiature accessory based on prior knowledge
GOU Jiansong;,LIU Wenjing;,WANG Zhong;,ZHENG Ronghao;
..............page:1458-1462
Real-time object detection method based on foreground segmentation
BU Xiongzhu;,NIU Jie;,QIAN Kun;
..............page:1463-1466
Improved algorithm of audio-video synchronization coding based on variable code length
HE Yuanlie;,LIN Jianhao;,XIAO Hong;,ZENG Bi;
..............page:1467-1472
Object-based polarimetric decomposition method for polarimetric synthetic aperture radar images
FANG Tao;,GUO Yiyou;,LI Xuewei;
..............page:1473-1476,1490
Image splicing detection based on high frequency wavelet Markov features
LI Shenghong;,SU Bo;,YUAN Quanqiao;,ZHAO Xudong;
..............page:1477-1481
Multi-wavelet inverse transform and post filtering algorithm for digital images
CHEN Zhaofeng;,TAN Xiaorong;,ZHA Daifeng;
..............page:1486-1490
Reconstruction algorithm for auto-calibrating parallel imaging and compressed sensing
GUO Shuxu;,WANG Miaoshi;,ZHANG Jiuming;,ZHONG Fei;
..............page:1491-1493,1502
Improved image denoising algorithm using UK-flag shaped anisotropic diffusion model
DUAN Weixia;,LI Fan;,XIAO Jie;,YU Jiang;,ZHAI Donghai;
..............page:1494-1498
Wavelet threshold denoising algorithm based on new threshold function
LI Zhi;,WANG Bei;,WHANG Jing;,ZHANG Genyao;
..............page:1499-1502
Parameters design and optimization of crosstalk cancellation system for two loudspeaker configuration
LI Junfeng;,QIU Yuan;,XIA Risheng;,XU Chundong;,YAN Yonghong;
..............page:1503-1506,1525
Task scheduling scheme for civil aviation information exchange
PAN Yu;,SONG Xueyan;,SUN Jizhou;
..............page:1507-1510,1520
Deterministic algorithm for optimal two-stage cutting layouts with same-shape block
CUI Yaodong;,DU Jun;,JI Jun;,SHI Ning;,XING Feifei;
..............page:1511-1515
Retail checkout optimized scheduling based on plant growth simulation algorithm
WANG Tingting;,YANG Qin;
..............page:1516-1520
Modeling and simulating of train tracking based on multi-Agent theory
CHEN Yong;,DANG Jianwu;,HU Xiaohui;
..............page:1521-1525
Design and research of novel virtual EEPROM based on NAND flash device partition
GUO Yutang;,HUA Yupeng;,WEI Bing;,ZHANG Lei;
..............page:1526-1528,1532