Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2008 Issue 5
Task-oriented architecture design for humanoid robot
MU Yan-hua;YIN Yi-xin
..............page:1400-1401
Mechanism based complex adaptive system modeling
TAO Qian;XU Fu-yuan
..............page:1396-1399
Researchontolerance-faultdetectionmethodofcomponentaboutillegaldivisionfault
YE Jun-min;YE Yan-feng;LEI Zhi-xiang;HE Peng-cheng;ZHANG Hong-chun
..............page:1402-1403,1407
Analysis and implementation of porting data grid middleware to IPv6 environment
ZHANG Xi-guang;XU Hao;YANG De-ting;YAN Bao-ping
..............page:1404-1407
Composite Web service orchestrate dynamically based on agent
OU Yu-yi;WANG Hao;LING Jie
..............page:1425-1428
Study of Web-based framework based on J2EE multi-tier architecture
LI Xiao-ping;XIAO Yue-feng;SU Yuan;SONG Han-tao;YAO Yong-biao
..............page:1429-1431
Research of domain-oriented data mining system
SONG Xu-dong;ZHANG Tong-xue;LIU Xiao-bing
..............page:1432-1433,1499
Automatic proofreading techniques for texts digitization
CHEN Xiang;XU Ping-xian;ZHANG Yu-zhi
..............page:1434-1436
Research on PPKM technology based on object-oriented model driving
JIA Xiao-liang;TIAN Xi-tian;ZHANG Zhen-ming
..............page:1437-1439
Study of neural network applied to weighted association rules mining
LI Tong-yan;LI Xing-ming
..............page:1440-1441,1449
CombinationalcircuittestgenerationmethodbasedonBDDandBooleandifference
OUYANG Yi-ming;MOU Yi;LIANG Hua-guo
..............page:1450-1452,1523
Encoding technology research on data matrix barcode in automatic marking and identification of manufacturing tool
LEI Lei;HE Wei-ping;ZHANG Wei;XI Wei-dong
..............page:1453-1454,1457
Design and implementation of off-line equipment general check management system based on Internet
ZHAO Yan-ju;WANG Tai-yong;XU Yue;DENG Hui;XU Chun-sheng;WANG Hong-qiang
..............page:1455-1457
Group work mode in group-based image interpretation system for remote sensing applications
ZHANG Long-qi;LIU Ya-lan;YAN Shou-yong;WANG Tao
..............page:1458-1460
Design and implementation of multi-processor chipset based on Godson 2E CPU
FANG Zhi-bin;HU Peng;AN Xue-jun;SUN Ning-hui
..............page:1465-1469,1473
Service oriented architecture to apply sensor networks
FENG Yun-fang;CHEN Jiong
..............page:1474-1476
Study on role-based and time sequence-based conflict solution mechanism of virtual collaborative design
ZHAO Bo;YAN Yan;NING Ru-xin;ZHAI Geng-yun
..............page:1477-1479,1482
Research and design of embedded home media adaptor based on UPnP protocol
WU Fei;WU Hao;LIU Jin-yu
..............page:1480-1482
Chinese patent search model and experiment for examination task
LIU Yu-qin;LIU Song;YU Bo
..............page:1483-1484,1495
Method of making dynamic thematic maps based on ArcIMS Java connector
MA Jin-feng;PAN Yu-chun;GUO Zhan-jun;WANG Ji-hua
..............page:1485-1488
Automatic Blog recognition with DOM tree
ZHANG Cheng;CHEN Zi-yu;GU Ping;YANG Rui-long
..............page:1489-1491
Study of network traffic classification and application identification
LIU Ying-qiu;LI Wei;LI Yun-chun
..............page:1492-1495
Optimal model for MC/MP supply chain based on mixed assembly mode
GU Qiao-lun;JI Jian-hua
..............page:1408-1411
PCA and K-means based supervised split hierarchy clustering method
PU Lu-ping;ZHAO Peng-da;HU Guang-dao;ZHANG Zhen-fei;XIA Qing-lin
..............page:1412-1414
Hybrid XML index composing structure-encoded with cluster
YANG Jin-cai;ZHANG Lin;LI Guo-hui
..............page:1415-1418
Approximate global rarest first strategy for block selection in BitTorrent system
WANG Li-e;HUANG Kun;ZHANG Da-fang
..............page:1419-1421
Resources sharing framework of spatial information grid
CHEN Hong-hui;RUI Hong;GUO De-ke;LUO Xue-shan
..............page:1422-1424
Extended QD-Sufferage algorithm in grid workflow
HU Zhi-gang;CHEN Jun
..............page:1504-1506
Dynamic load balancing in content-based publish/subscribe system
LU Peng;LIN Xue-lian;LIU Xu-dong;LI Dong-song
..............page:1507-1510
Research of data query processing algorithm for wireless sensor networks
CUI Yan-rong;CAO Jia-heng;HE Ning;ZHU Fan
..............page:1511-1512,1585
Priority-based hierarchical application layer multicast model
XU Jian-zhen;XU Mi-hua;ZHANG Fu-yan;CHENG Yi-jing
..............page:1517-1520
Research on firewall irrelevance factors of intrusion
DENG Lin;YU Liu-lang;WANG Jun;HAN Jiang-hong
..............page:1521-1523
Intrusion detection method based on ICA and fuzzy-rough set
FU Chang-long;DU Xu-hui;YAO Quan-zhu
..............page:1524-1526
Evaluating performance of NATPT based on network processor
LI Hai-bo;CHEN Mo;YIN Zhao-yin;LIU Da-peng
..............page:1496-1499
Task scheduling pattern for grid computing environment
YU Ce;SUN Ji-zhou;HUANG Yan-yan;LI Ming-chu
..............page:1500-1503,1510
Novel method for Web image search based on spectral graph theory
ZHAO Ji-dong;LU Ke;WU Yue
..............page:1598-1600
Algorithm of resource discovery in dynamic grid
ZHANG Yong-ping;LI Cong-dong
..............page:1361-1363,1367
Robust stability analysis of predictive PID controller or first-order system
ZHANG Yun;LIU Hong-bo;JIA Lei
..............page:1357-1360
Improved blind beamforming algorithm of smart antenna
WANG Deng-wei;LV Ying-hua
..............page:1355-1356,1360
Analysis of main case matching algorithm used in fault diagnosis
CHEN Fu-min;WU Dong-yuan;LIN Zhi-hang
..............page:1352-1354,1371
Novel mixing speech retrieval algorithm
WANG Rang-ding;YUAN Xu-hai;XU Ji
..............page:1349-1351
Efficient anonymity algorithm based on random mix
ZHANG Lin;WU Zhen-qiang
..............page:1345-1348
New clustering algorithm based on grid
ZHANG Wei-li;NI Zhi-wei;LAI Jian-zhang
..............page:1337-1339
High-speed image rendering method based on OpenGL
QIAO Shao-jie;WANG You-wei;NI Sheng-qiao;PENG Jing
..............page:1589-1592,1595
Non-uniform FDTD mesh generation based on OpenGL in cylinder coordinate
ZHOU Guo-xiang;PAN Bao-guo;WANG Chun-yan
..............page:1593-1595
Edge-preserved image denoise algorithm based on dyadic wavelet transform
WANG Shi-jun;YANG Shu-yuan
..............page:1596-1597,1600
ID-based signature and verifiably encrypted signature schemes
QI Ya-ping;DU Li-hua
..............page:1527-1529
Improvement of ID-based ring authenticated encryption
SUN Jin-qing;SUN Yan-rui;YUAN Xi-feng
..............page:1530-1531
Mutual authentication-based hash chain signature scheme in mobile environment
CAI Man-chun;ZHAO Hai-yang;GUO Dai-fei
..............page:1532-1533,1588
Design of security data mining system of large-scale network
LIN Lei;LIN Dong-dai;WAN Li
..............page:1534-1536,1549
Research of novel anti-spam technique based on URL filtering
WU Jun;LI Yang
..............page:1537-1539
Authorization method based on contract and negotiation
GUI Jin-song;CHEN Zhi-gang;DENG Xiao-heng;LIU An-feng
..............page:1540-1542
New electronic cash system with higher security and efficiency
FEI Xiong-wei;LI Qiao-liang
..............page:1543-1545
Secure mobile payment
LI Xi;HU Han-ping
..............page:1546-1549
Survey of iris recognition
TIAN Qi-chuan;LIU Zheng-guang
..............page:1295-1300,1314
Study and comparison of task description fashions in wireless sensor networks
GU Jian-hua;SHEN Chen;PENG Li-jing;LI Zhi-gang
..............page:1292-1294
Survey of hard disk data protection techniques
GAO Wei;GU Da-wu;HOU Fang-yong;SONG Ning-nan
..............page:1288-1291
Dynamic approach to detecting memory errors
WANG Yong;ZENG Qing-kai
..............page:1550-1552
Construction of S-boxes based on genetic and ant colony algorithm
CAO Ming;HUANG Yin-feng;GU Li-ze;HU Zheng-ming;YANG Yi-xian
..............page:1553-1555
Fast Pareto-based multi-objective clonal selection algorithm
LI Heng-jie;HAO Xiao-hong;ZHANG Lei
..............page:1368-1371
Scheduling discipline based on CPU-MEM load sharing system
SHI Lei;SUN Yu-yan
..............page:1364-1367
Improved retrospective event detection algorithm
CHANG Cheng;FAN Qi-na;ZHANG Kuo;LI Juan-zi
..............page:1333-1336
Novel ROI segmentation method using region growing
MA Jian-lin;CUI Zhi-ming;WU Jian;ZHANG Na-min
..............page:1582-1585
Infrared face recognition based on PCA and LDA in wavelet domain
WU Shi-qian;WEI Li-zhen;FANG Zhi-jun;LI Run-wu
..............page:1586-1588
DDRLD: directed diffusion routing supporting local detection for WSN
LI Zhi-yu;SHI Hao-shan
..............page:1330-1332
New data intelligent processing algorithm
WEI Yu-ke;WANG Ren-huang;LI Jiang-ping;CHEN Qun
..............page:1328-1329,1332
Escapable particle swarm optimization based on simulated annealing algorithm
WANG Wei;YIN Zhi-xiang
..............page:1326-1327,1339
Genetic algorithm for constrained optimization TSP
JIANG Tai;CHEN Ming-jun;HUANG Yuan
..............page:1323-1325
Protect strategy for effectual gene block of genetic algorithm
WANG Dong;WU Xiang-bin
..............page:1319-1322
Feature selection with link-like agent genetic algorithm combining multi-criteria
ZENG Xiao-ping;ZHENG Ya-min;LI Yong-ming;WANG Jing;ZHANG Xiao-juan
..............page:1315-1318,1322
Immune genetic algorithm based on meta-population
WU Yun;WU Qing-feng;ZHOU Chang-le
..............page:1312-1314
New lower bound for three classical Ramsey number R(3,q)
SU Wen-long;LUO Hai-peng;XU Xiao-dong;WU Kang
..............page:1309-1311
Overview of QoS routing protocols in wireless sensor networks
LI Shi-ning;TENG Wen-xing;ZHANG Qi;ZHANG Bao-hua
..............page:1304-1308
Research of imbalanced data classification
WANG He-yong;FAN Hong-kun;YAO Zheng-an;LI Cheng-an
..............page:1301-1303,1308
Random block cipher frame and implementation
LUO Ping;SONG Tao
..............page:1556-1559
Implementation of embedded anti-virus firewall based on IXP2800 and VxWorks
YANG Li-bin;MU De-jun;CAI Xiao-yan
..............page:1560-1562
Cortex-like object recognition based on ColorMax model
ZHU Qing-sheng;ZHANG Min;LIU Feng
..............page:1563-1565,1568
Method and application of generalized binary morphological transform
DUAN Shan;QIN Qian-qing
..............page:1566-1568
Improved Hough transform based on peak detection by local operators
JI Jun-hong;CHEN Guo-dong
..............page:1569-1572
Method of texture classification using dual-tree complex wavelet transform and support vector machines
XIE Hong-sheng;ZHANG Hong;XU Xiu
..............page:1573-1575,1578
Linear features extraction from remote sensing image with Beamlet transform
MEI Xiao-ming;ZHANG Liang-pei;LI Ping-xiang
..............page:1576-1578
Image segmentation method based on region growing and ant colony clustering
YANG Wei-li;GUO Lei;XU Zhong;XIAO Gu-chu;ZHAO Tian-yun
..............page:1579-1581
Novel method for slice-mutation based on program testing
CAI Guo-yong;QIAN Jun-yan
..............page:1393-1395,1399
Research and design on adaptive model domain-agriculture software architecture
REN Shou-gang;GAO Shang-shang;XU Huan-liang
..............page:1390-1392,1428
Business-level service description model and its semantic annotation
YE Lei;ZHANG Bin
..............page:1383-1389
Services network: new anchor for Web services composition
CHEN Shi-zhan;FENG Zhi-yong
..............page:1378-1382
Research of searching strategy in topic crawler using dynamical particle swarm optimization
TONG Ya-la;LI Yuan-xiang;SHEN Xian-jun
..............page:1374-1377
Chaos and its applications in covert communication
JU Sheng-gen;ZHOU Ji-liu;SU Li-yun;LI Zheng
..............page:1372-1373,1411
Data models for information integration
fu ning ;zhou xing-she; zhou xing she ; zhan tao
..............page:1285-1287,1294
Research and development of spatio-temporal data model
LI Yang-dong;LIU Miao-long;TONG Xiao-hua
..............page:1281-1284,1311