Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2008 Issue 3
Model of reusable mobile agent-based network management system
DONG Xiang-jun;SHI Hao-shan;ZHAO Yong-hui;JIANG Fei
..............page:876-877,894
Feedback-based hybrid search algorithm in unstructured peer-to-peer networks
FENG Ming-xing;ZHONG Cheng;LI Zhi
..............page:872-875
Dynamic data replication technology in education resource grid
GAO Tian;LIU Fang-ai
..............page:869-871
Scheme of constructing scalable packet switching fabrics with Torus networks
WANG Hong;XU Du;LI Le-min
..............page:866-868
Barrier coverage of wireless sensor networks based on Voronoi diagram
QIN Ning-ning;GAI Yi;ZHANG Lin;JIANG Min-feng;XU Bao-guo
..............page:863-865
Location-based energy-efficient mechanisms for wireless sensor networks
LIU Chao;ZHANG Bao-xian;YAO Zheng
..............page:860-862
Schedule-based sensor MAC protocol in wireless sensor networks
YANG Shuang-mao;GUO Wei
..............page:855-859
Rule-based approach to transform relational database to ontology
YU Xia;LIU Qiang;YE Dan
..............page:767-770,785
Mapping COBOL data to Java type system based on source-to-source translation
SU Ling-yan;WU Cheng-gang;TANG Sheng-lin;WU Zeng
..............page:771-774
PSP enactment method based on extended SPEM
GUO Jun;YUAN Feng;RUAN Li;ZHOU Jin-hui
..............page:775-778
Multi-agent cooperative system based on 3APL
LIN Xin-jian;HU Shan-li;ZHENG Sheng-fu
..............page:779-781
New model for computer aided audit
HU Jun-jun;SUN Jing
..............page:782-785
Hybrid algorithm of automatically generating of test data for object-oriented program
HU Yue-feng;GAO Jian-hua
..............page:786-788,802
Real-time detection system for infrared small target
ZHANG Zhen-jun;ZHANG Tian-xu;YAN Lu-xin;ZHONG Sheng
..............page:789-790,794
Research of text concrete syntax analysis methods in modeling language
XU Yu-kun;LIU Shu-fen;LI Bing
..............page:791-794
Cost estimation system used for software acquisition pricing
TANG Zi-nan;SHU Feng-di
..............page:795-798
User's multi-interest processing in medical information retrieval
DONG Li;WU Gang-shan;YUAN Chun-feng
..............page:799-802
Efficient packet capture method for very high speed network based on shared memory
ZHANG Dun-xing;ZHANG Guang-xing;ZHANG Da-fang;XIE Gao-gang;YU Zhen
..............page:807-810,813
Multi objective optimization system of coal-fired boiler combustion based on SVM and genetic algorithm
FEI Hong-xiao;HUANG Qin-jing;DAI Yi;XIAO Xin-hua
..............page:811-813
Research on embedded file system faced flash memory
WANG Hong-qiang;WANG Tai-yong;DENG Hui;XU Chun-sheng;ZHAO Yan-ju
..............page:814-815,819
Design and development on virtual prototyping dispatching platform of locomotive
LIU Jia;DING Guo-fu;ZOU Yi-sheng;WANG Xiao-yu
..............page:816-819
Research and design of RFID intelligent site
LIANG Ying-hong;WANG Zhi-yan;CAO Xiao-ye;XU Xiao-wei
..............page:820-822,825
Design of DM6446-based mobile video surveillance system
WANG Shu-feng;HOU Yi-bin;HUANG Zhang-qin;HE Dong-zhi;YU Jing-zhi
..............page:823-825
Web-based cluster application performance testing and optimization
XIONG Zhong-yang;LI Guang-yong;ZHANG Yu-fang;ZHAO Ying;DENG Ming-lin;CHEN Wei
..............page:826-828,832
Design and implementation of network map about intestine microorganism based on SVG
NIU Zhi-jia;HUANG Yan;WU Ping;ZHANG Ri-jun
..............page:829-832
Scheme for sharing of real-time information generated by sensors
GOU He-ping;FENG Bai-ming;ZOU Yan-fei;JING Yong-xia
..............page:833-835
Research of techniques to display and typeset language of Uigur, Kazak and Khalkhas
ZHANG Wei;REN Da-ming;XU Xiao-hui;ZHAO Fan;ZHANG Yan
..............page:836-838,843
Energy-balanced clustering method in wireless sensor networks
TANG Bo;LUO Chang-jun;ZHOU Ming-tian
..............page:878-880
Cause of gamma distribution analysis of MAN traffic
SU Guang-wen;GAO De-yuan;FAN Xiao-ya;GAO Xiang
..............page:881-884
Access control in workflow management systems based on rule strategy
JIAO Zhen-hai;DING Er-yu;LUO Bin
..............page:885-887,902
Service integration model and method based on government knowledge
ZHENG Yi-qiang;GUO He-qing;GAO Wei
..............page:839-843
Research on congestion control mechanism for micro-communication element system
ZHU Jin-qi;ZENG Jia-zhi;ZHANG Ke
..............page:844-846,880
Energy-based radius self-adaptive routing protocol in wireless sensor networks
SONG Yan-yan;ZUO De-cheng;LIU Hong-wei;YANG Xiao-zong;CUI Gang
..............page:847-850,884
Routing protocol based on cross-layer design in sensor networks
WEN Kai;GUO Wei;ZHANG Shu-qiang
..............page:851-854,875
Fault-tolerant grid job scheduling based on dynamic replication
JIANG Cong-feng;WANG Cheng;LIU Xiao-hu
..............page:738-740,743
Study of Web page classification based on graph-based semi-supervised learning
LIU Rong;ZHOU Jian-zhong
..............page:735-737
Orthogonal evolutionary algorithm for dynamic robust optimization problems
SHI Hui;ZENG San-you;CHEN Guang
..............page:732-734,778
Real-time divisible load scheduling algorithm on heterogeneous bus networks
LU Jian-bin;XIAO Hui;HU Wei-dong;YU Wen-xian
..............page:729-731,737
Speech signal adaptive time delay estimation based on glottal pulses
GUO Wei;ZENG Qing-ning;LIU Qing-hua;TANG Jiang-bo
..............page:726-728
Formal method Designware and its specification refinement mechanism
SHI Hai-he;SHI Hai-peng;XUE Jin-yun
..............page:721-725,728
Optimization and application of parallel molecular dynamics simulation
LIU Zheng-hua;YANG Jue-kuan;CHEN Yun-fei
..............page:718-720
Ant colony-based wireless sensor networks routing algorithm
YE Gang-qiang;LIANG Yan;SUN Shi-yu;PAN Quan;CHENG Yong-mei
..............page:715-717,720
Research on computer network attack drill based on attack description language
TANG Shu-jun;LI Xiao-jian;WEI Gang;TU Shou-zhong;XIA Chun-he
..............page:906-910,914
Study on void valuing method for wood-based panel based on image processing technique
REN Hong-e;A Lun;XU Hai-tao;GAO Jie
..............page:936-938
Intrusion detection method based on two-layer HMM
ZHOU Xing;PENG Qin-ke;WANG Jing-bo
..............page:911-914
History and recommendation-based trust model in P2P environment
LI Wen;XIE Dong-qing;WU Yong
..............page:915-919
Authentication and implementation of MPEG-2 video based on its expansibility
XU Liang-yu;JING Ji-wu
..............page:920-923,949
ID-based revocable group signature scheme
BAO Wan-su;WEI Huai-jian;WEI Yun;HUANG Xu-xu;LU Ming-wei
..............page:924-926
New type of group blind signature scheme
ZHONG Jun;HE Da-ke
..............page:927-929
Research on how to reconcile two views of security protocols'analysis
ZHU Yu-na;WANG Ya-di;HAN Ji-hong;FAN Yu-dan
..............page:930-933
Video retrieval relevance feedback algorithm based on Bayesian learning
DENG Li;LIU Xiao-hui;JIN Li-zuo;FEI Shu-min
..............page:934-935,938
Automatic recognizing of complex sentences with coordinating relation
ZHOU Wen-cui;YUAN Chun-feng
..............page:764-766
Study of phase-oriented software defect classification method
CHE Mei-ru;JIANG Nan;GOU Lang;ZHANG Rong-hui;SHU Feng-di
..............page:759-763
Research on knowledge support structure of IT service management
WAN Jiang-ping;WANG Yun-feng;ZHENG Chu-wei
..............page:756-758
Framework of model reuse based on RM-ODP:OMRF
YU Hai-long;LIU Li-ping;WU Lun;XIE Gang-sheng
..............page:752-755,763
Research on service-oriented content adaptation frameworks
TONG Ming-wen;YANG Zong-kai;ZHANG Jing-zhong
..............page:749-751
Study on business process model for rapidly constructing domain application system
DU Shuan-zhu;CHI Cheng-zhong;ZHAO Hui-juan
..............page:744-748
Handwriting verification using wavelet transform and neural network ensemble
ZHANG Hui-dang;HE Yu-yao
..............page:741-743
Arithmetic of ambiguity function for new chaotic oscillator and it's signal analysis
LI Chun-biao;HU Wen;WANG De-chun;LIU Zhong
..............page:712-714
Design and realization of new C-RBF neural networks classifier
HUANG Guo-hong;LIU Gang
..............page:709-711
Parallelization research on mRNA alternative splicing
NIU Bei-fang;LANG Xian-yu;LU Zhong-hua;CHI Xue-bin
..............page:705-708
Mining maximal frequent patterns using minimal combination algorithm
LI Qing-feng;ZHOU Xian-cheng;WANG Li;ZHOU Wei-lin
..............page:702-704,708
Recommendation approach based on double-factorial analysis of variance
CHEN Jian;ZHUANG Yu-wen;MIN Hua-qing
..............page:698-701
Similarity-based distributed data mining model research
TAN Ran;LU Zheng-qiu;YAN Xin-ping
..............page:695-697,701
Nonlinear distributed pricing algorithm for grid resource
WU Jia-ze;ZHENG Chang-wen;WANG Yu-xin;LIU Qing-wu
..............page:692-694,714
Real-time task scheduling algorithm based on task synchronization and energy saving
HAN Jian-jun;LI Qing-hua;Abbas A.Essa
..............page:687-691
Quantum-behaved particle swarm optimization for solving job-shop scheduling problem
SHI Jin-feng;FENG Bin;SUN Jun
..............page:684-686,691
Formally deduce approach of algorithm and its time complexity synchronously
WANG Chang-jing;XUE Jin-yun
..............page:681-683
Shallow semantic parsing based on Chinese Penn Treebank
LIAN Le-xin;HU Ren-long;YANG Cui-li;YUAN Chun-feng
..............page:674-676,680
Complex problem solving based on complex problem definition model
FAN Shao-kun;DOU Wan-chun
..............page:670-673
Survey on modeling and rendering of ocean wave
LI Su-jun;YANG Bing;WU Ling-da
..............page:666-669
Survey of data process in RFID systems and sensor networks
DING Zhen-hua;LI Jin-tao;LUO Hai-yong;FENG Bo;GUO Jun-bo
..............page:660-665,673
Review of key security threats and countermeasures in recommender systems
ZHANG Fu-guo;XU Sheng-hua
..............page:656-659
Research and recent development of image fusion at pixel level
HU Gang;LIU Zhe;XU Xiao-ping;GAO Rui
..............page:650-655
Research and prospect on multimedia information retrieval
SUN Ji-hong;LIU Wei-cheng;JIAO Yu-ying
..............page:646-649
Development and prospect of quantum computation
ZHENG Jian-guo;QIN Chao-yong
..............page:641-645
Multi-domain access control policy model based on role mapping and PBNM
ZHANG Guang-hui;HAN Jin;XIE Jun-yuan
..............page:888-890
Configure multi-level security policy using RBAC model
XIA Lei;HUANG Hao
..............page:891-894
Distributed agent intrusion detection system model based on immunology mechanism
MA Zhan-fei;ZHENG Xue-feng
..............page:895-898
Analysis of malicious code variants based on structural fingerprints
WEI Qiang;JIN Ran;WANG Qing-xian
..............page:899-902
IP traceback in mobile IPv6
ZHOU Yao;LIU Yao-zong;JIANG Dao-xia;LIU Feng-yu
..............page:903-905,919
Image registration based on maximization of feature point pair mutual information
LIAO Yong-jun;YANG Dan;ZHANG Xiao-hong
..............page:939-941,944
Rotation, scaling, and translation invariant digital image watermarking in DWT domain
WANG Yong-yu;SUN Qu;WANG Qi
..............page:942-944
New method for solving coordinates of circular points in image
LI Jian-fei;ZHANG You-sheng;HONG Pei-lin;LI Xian-jie
..............page:945-946,960
Relation between de-noising effect and noise density of contourlet-based de-noising
CHEN Xin-wu;GONG Jun-bin;TIAN Jin-wen;SHEN Xu-bang
..............page:947-949
Video objects tracking under occlusions
LIANG Hua;LIU Yun-hui
..............page:950-952,956
Printer identification based on computer fuzzy recognition of character image
WANG Ning;HAN Guo-qiang;GU Guo-sheng
..............page:953-956
Image retrieval based on combined texture and color features in MPEG-7
GUAN Qian-ning;QIN Tuan-fa;SHUAI Qin;TIAN Hui
..............page:957-960