Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2009 Issue 5
Overview of artificial metabolic system
HU Yang;GUI Wei-hua
..............page:1601-1603,1624
Classifying data streams by stacking ensemble
LIANG Chun-quan;ZHANG Yang;LIU Quan-zhong
..............page:1716-1718
Kernel-based adaptation for semi-supervised clustering
CUI Peng;ZHANG Ru-bo
..............page:1719-1722
Mining algorithm of complex ontology mapping
LI Ming
..............page:1723-1725
Digital video forensics method based on event detection
WANG Wei;CHEN Long;ZHOU Hong
..............page:1710-1712
Method of similarity measures for XML documents structure based on TreeMiner algorithm
YAN Hong-can;WANG Shu-fen;ZHU Xiao-liang;LI Min-qiang;LIU Bao-xiang
..............page:1706-1709,1722
Pattern recognition algorithm for license plate character based on multilevel network
LI Meng-xin;WU Cheng-dong
..............page:1703-1705
New hybrid particle swarm optimization
LI Rong-jun;CHANG Xian-ying
..............page:1700-1702,1705
Parallel collision detection algorithm based on coloring algorithm
ZHAO Wei;TAN Rui-pu;YANG Qiu-na;DING Wen-bao;LI Wen-hui
..............page:1695-1699
Pareto-based multi-object evolutionary immune algorithm
TAO Yuan;WU Geng-feng;HU Min
..............page:1687-1690
Research of localization mode for wireless sensor networks based on grid partition
CHEN De-min;ZHANG Yuan
..............page:1685-1686,1690
Dynamic feed-back load balancing algorithm based on different services
DING Zhen-guo;ZHU Jian-xin
..............page:1682-1684
GPU accelerated BP algorithm of neural network
TIAN Xu-hong;JIANG Min-jie
..............page:1679-1681,1699
Adaptive whitening for real-time music beat tracking
WANG Yue;XIE Lei;YANG Yu-lian
..............page:1676-1678,1684
Hierarchical audio classification algorithm for news video content analysis
JI Zhong;SU Yu-ting;SONG Xing-guang;AN Xin
..............page:1673-1675
Parallel particle swarm optimization algorithm based on space-division and layered search
GONG Yan;JIANG Yu-ming;ZHANG Pei-song
..............page:1670-1672
Strategy research of global optimization based on genetic algorithm
LI Hai-fang;FAN Hai-liang;JIN Hui
..............page:1667-1669
New algorithm of topic-oriented crawler
LI Wei-jiang;ZHAO Tie-jun;PIAO Xing-hai
..............page:1663-1666
Massive terrain navigation search model based on P2P
PAN Shao-ming;YU Zhan-wu;WANG Hao;LI Rui
..............page:1659-1662
New method for support vector machine based on imbalanced data
XIE Dan-rui;HAN Jian-xin;XUE Hui-feng;DU Zhe
..............page:1654-1655,1666
Concept decomposition-based policy refinement method
HU Jun;FU Ya-jun
..............page:1650-1653,1672
Survey for correctness problem of workflow system
ZHANG Min;GUO Yu-bin;LI Xi-ming;JIANG Yu
..............page:1645-1649
Application process oriented testing tool to monitoring system
LI Ye-qing;MA Xiao-xing;LV Jian
..............page:1639-1644
Dynamic accessing technology of 3D geometric modeling for collaborative design
LUO Tian-hong;CHEN Xiao-an;FANG Yi-ping
..............page:1636-1638,1644
Architecture and implementation of virtual machine monitor
TANG Yuan;LI Jian-ping;BAI Xue;HUANG Yuan-yuan
..............page:1632-1635,1649
Research and implementation of automated C+ + code defect detection tool
GU Ke;LIU Chao;JIN Mao-zhong
..............page:1628-1631
Survey on Internet topology modeling method
YANG Guo-zheng;LU Yu-liang;ZHU Feng
..............page:1625-1627
Research and development of Botnet based on computer network operations
ZHOU Jia-jun;WANG Ting-ting;WEI Gang;LI Xiao-jian
..............page:1621-1624
Research on IEEE 802.11 wireless local area networks standards
LI Hao;GAO Ze-hua;GAO Feng;ZHAO Rong-hua
..............page:1616-1620
Survey on spam filtering technology
CHEN Zhi-xian
..............page:1612-1615
Study of grid service matching based on semantic knowledge
LIU Mei-mei;ZHU Qiao-ming;GONG Zheng-xian;LI Pei-feng
..............page:1607-1611
Recent development of service discovery mechanism
LEI Wan-bao;ZHU Yian;ZHONG Dong
..............page:1604-1606,1615
Using Capture-Recapture approach estimate size of Web databases
MIAO Zhong-yi;HU Peng-yu;CUI Zhi-ming
..............page:1754-1756,1759
Research on one fuzzy cognitive map classifier
PENG Zhen;YANG Bing-ru;LIU Chun-mei;TANG Zhi-gang;YANG Jun
..............page:1757-1759
Technology for selection of news information pages based on attribution agent
HU Jun;YANG Xian-fen;LIU Xi-liang;HUANG Shen
..............page:1760-1763
Adding linear temporal logic with clocks to Object-Z
WEN Zhi-cheng;LI Chang-yun;MAN Jun-feng
..............page:1764-1769
Dynamic proxy-based recovery mechanism for BPEL
ZHOU Ru-min;CHEN Ping;BAO Liang;HU Sheng-ming;KANG Chun-nong
..............page:1770-1773,1784
Interface automata-based formal model for BPEL4WS Web service composition
SU Huan-cheng;HUANG Zhi-qiu;LIU Lin-yuan
..............page:1774-1777
Norm-based contract net protocol for coordination in multi-agent system
WU Ju-hua;WU Li-hua;GAN Ren-chu
..............page:1778-1781
Comparison on pattern analysis performance of SVM and RVM based on RBF kernel
LI Gang;XING Shu-bao;XUE Hui-feng
..............page:1782-1784
Research and implementation of quality control system of product design
WANG Guo-qiang;ZHANG Gen-bao;ZENG Hai-feng;REN Xian-lin
..............page:1785-1788
Design of decoder for LDPC codes used in CDTTB standard
LIN Jing-li;SUN Gang;ZHU Wei-le;CHEN Ke-song
..............page:1792-1795
Research and implementation of all-purpose structure of Web cross-realm authentication
ZHANG Hong-qi;YANG Zhi;WANG Xia;SHEN Chang-xiang;ZHANG Bin
..............page:1796-1798,1818
From usability to adoption: new m-commerce adoption study framework
MIN Qing-fei;LI Shuang-ming
..............page:1799-1802,1809
Model of collaborative design system based on P2P architecture
SUN Li-juan;YANG Shou-ang
..............page:1803-1805,1824
Research on dynamic expression of digital rights based on logic reasoning
HAN Li-long;LIU Qing-tang;YANG Zong-kai
..............page:1888-1890
Research in security problems of vehicular Ad hoc networks MAC layer
AN Jian-wei;ZHOU Xian-wei;HUANG Huan;WU Xiao-bo
..............page:1891-1895,1899
Algorithm of dynamic patterns for NTRU
BU Shan-yue;ZHANG Hai-yan;WANG Ru-chuan
..............page:1896-1899
Study on model of campus resource planning based on SOA
JI Yi-mu;LU Li-li;WANG Ru-chuan
..............page:1810-1812,1827
Study on intelligent simulation system of bulk terminal handling process
LI Qiang;TONG Shi-qi;WANG Nuo
..............page:1813-1815
Establishment and application of vegetation water monitoring system
XIONG Jin-guo;WANG Li-tao;WANG Shi-xin;ZHOU Yi
..............page:1819-1821,1831
Research on optical mark card reader based on blur Hit-Miss transform
XIA Yong;XIAO Bai-hua;ZHU Yuan-ping
..............page:1822-1824
Mechanism of semantic information interaction based on ontology in P2P network
TANG Jiu-yang;TANG Da-quan;XIAO Wei-dong
..............page:1852-1854
Traffic load aware time-slot scheduling protocol based on clustering for wireless sensor networks
LIU Ming;LIU Rui;HUANG Xiao-yan;ZHOU Zi-bo
..............page:1855-1857
Simulation analysis of recovery performance in VoIP network based on MPLS
NONG Si-jing;WANG Ning-zhang;YANG Ying
..............page:1858-1859,1864
Utility-based resource allocation for heterogeneous services in OFDM wireless networks
HUANG Xiao-yan;MAO Yu-ming;WU Fan;LENG Su-peng
..............page:1860-1864
Unequal clustering energy-economical routing algorithm based on game-theory for WSN
ZHONG Liu-sheng;CHENG Liang-lun
..............page:1865-1867
Topology discovery algorithm for wireless sensor networks
SHEN Jun;QI Wang-dong
..............page:1868-1870
Congestion control of Internet video streaming based on fuzzy-logic
LI Hong;SHEN Wei-ming
..............page:1871-1873,1876
Synchronization of different structure chaotic systems and its application in secure communication
WANG Xiao-yan;QU Shao-cheng;TIAN Wen-hui;LI Sha
..............page:1874-1876
Time permutation and phase rotation for OFDM peak-to-average power ratio reduction
WANG Li-bo;WANG Yong-sheng;WANG Yu
..............page:1877-1879
Research of wireless sensor networks simulation based on Truetime
YAN Bin;ZHOU Xiao-jia;WANG Hou-jun;LANG Fang-nian;WANG Shu-li
..............page:1880-1882
Model construction and quantitative analysis of autonomic intrusion tolerance system
LI Bing-yang;WANG Hui-qiang;FENG Guang-sheng
..............page:1883-1887
Study on multiple traveling salesman problem based on genetic algorithm
WANG Hai-long;ZHOU Hui-ren;ZHENG Pie;TANG Wan-sheng
..............page:1726-1728,1732
Fault-tolerant scheduling algorithm of real-time tasks for reconfigurable system
YIN Jin-yong;GU Guo-chang;WU Yan-xia
..............page:1729-1732
Analysis of computational structure of software process
LI Hui;CHEN Shi-hong
..............page:1733-1735,1753
Safety risk analysis of software architecture based on probabilistic influence diagram
WANG Xi-e;REN Sheng-bing;HU Ge;WANG Guo-jun
..............page:1736-1738
Coordination model for trust
SHEN Li-min;YANG Mei;BAI Lian;LI Feng;CUI Qian
..............page:1739-1742
One trusted software constitution environment based on aspect-oriented programming
ZHANG Zhu-xi;LI Ren-jie;WANG Huai-min
..............page:1743-1745
Study of congruence relation based on minimization theory of FA
GUO Kai-hong;LI Wen-li
..............page:1746-1748
Study on self-adaption mechanism for component oriented internetware
GAO Jun;LI Chang-yun;WEN Zhi-hua;RAO Ju-hua
..............page:1749-1753
Network connection redirection technology in virtual machine migration system
WEN Min-xiong;LI Qin
..............page:1839-1843
QoS routing based on availability
WANG Yu;LI Le-min
..............page:1844-1846,1851
SMJ:synopsis-based data stream multi-join operation
YIN Tian-tian;ZHANG Jun-hu
..............page:1847-1851
Efficient short group signature with IND-CCA2 full-anonymity
MA Hai-ying;WANG Zhan-jun;WANG Zhou-xiu
..............page:1922-1925
Research of RSA-based XML undeniable signature method
LI Xin;LIU Jian-hui
..............page:1900-1903,1907
Abuse-free and optimistic multi-party contract signing protocols
LI Xiang-dong;WANG Qing-xian;CHEN Li
..............page:1904-1907
Digital video encryption in AVS compressed stream for real-time transmission
SONG Xing-guang;LIU Yu;SU Yu-ting
..............page:1908-1910
Study of security issues in educational examination information systems
WAN Ya-qi;DUAN Li-juan;ZHANG Shu-jie
..............page:1911-1913,1918
Analysis of DDoS attack trait in Gnutella peer-to-peer
GENG Ji;MA Xin-xin
..............page:1914-1918
Test packet-choosing algorithm for rules updating
LI Lin;LU Xian-liang;NIE Xiao-wen;XU Hai-mei;PU Xun;PENG Yong-xiang
..............page:1919-1921
Research on application of rule engine in distributed environment
WANG Xiao-guang;YANG Dan
..............page:1825-1827
Knowledge's acquisition method based on simulated data for driving head of hydraulic drill
YUAN Si-cong;LIU Dao-hua;HUANG Jun;ZHANG Man-yi
..............page:1828-1831
New reconfigurable technology facing on low power dissipation of SoC
WANG Yi-lei;LI Tao;XU Qun-san;SONG Li-hua
..............page:1832-1834,1838
Design of storage scheme with high reliability based on Erasure Codes in environment of networks
JIA Jun-bo;GU Jian-hua;ZHU Jing-fei;ZHANG Ji-wei
..............page:1835-1838
Image information hiding scheme based on new anti-Arnold transformation
ZHU Ling-fang;WANG Bing
..............page:1926-1928
Server-aided RSA key generation based on Smartphone
LUO Qi-han;CAO Tian-jie;HE Tao
..............page:1929-1931
Key predistribution scheme using Hamming distance for WSN
ZHANG Li-ping;YU Zhi-gang
..............page:1932-1934
Active shape models based on artificial fish swarm algorithm
LIU Qing-yan;LIU Yuan
..............page:1935-1937
New approach of capture data processing for optical motion
WU Sheng;ZHANG Qiang;XIAO Bo-xiang;WEI Xiao-peng
..............page:1938-1940,1964
Research on template matching similarity criterion in visual tracking
XIA Yu;WU Xiao-jun;WANG Shi-tong;YANG Jing-yu
..............page:1941-1943
New distributed classification system development of remote sensing images
ZENG Lian-ming;WU Xiang-bin;LIU Peng
..............page:1944-1946,1954
Fast H.264 inter-prediction mode decision with macro-block information
FU Yan;LUO Yin;SONG Jing-kuan
..............page:1955-1957
Quarter-pixel accuracy fast search algorithm based on H.264
WEI Wei;GUO Bao-long
..............page:1958-1960
Mixture video transcoding method for H.264
WANG Bo;LIU Di-chen;LI Min
..............page:1961-1964
Face recognition based on linear projection analysis and FCM dynamic clustering
HU Ming;ZHANG Qiang;WANG Zhi-ping
..............page:1947-1948,1957
Fast image registration based on spline pyramid and mutual information
LI Qiao-liang;WANG Guo-you;LIU Jian-guo;CHEN Shao-bo
..............page:1949-1950,1960
Thorax multimodal image registration based on artificial immune algorithm and maximization of mutual information
LI Bin;OU Shan-xing;TIAN Lian-fang;MAO Zong-yuan
..............page:1951-1954
Research on effective fusion method for infrared and visible images
ZHAO Yun-feng;YIN Yi-xin;FU Dong-mei;WANG Jia
..............page:1968-1970
New steganographic method based on histogram information table compensation
CHEN Zhi-hong;LIU Wen-yao
..............page:1971-1973,1976
Kind of active fortify method of moving object detection
LIN Ying;FU Yang;DOU Run-liang
..............page:1974-1976
Rendering forest scenes in real-time based on pen-and-ink style
ZHAO Bin-ru;CHEN Lei-ting;HE Ming-yun
..............page:1980-1982,1990
Fast repairing errors in STL files
HE Qiang;ZHANG Shu-sheng;BAI Xiao-liang
..............page:1983-1984,1988
New filtering algorithm based on improved impulse noise detection
CHEN Heng-jin;MA Xiao-hu;GUO Zhen;YU Ping
..............page:1985-1988
Novel algorithm to solve angle variation of mobile objects
NIE Xuan;WU Cheng-fu;MA Song-hui
..............page:1989-1990
Quick image inpainting algorithm under new searching strategy
NIE Dong-dong;MA Qin-yong;MA Li-zhuang
..............page:1991-1993,1996
Image median filtering algorithm based on impulse noise detection
TONG Cheng;WANG Shi-tong
..............page:1994-1996