Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2010 Issue 1
Simulation analysis of bullwhip effect on logistics service supply chain based on Anylogic
gui shou ping ; ding guo yin ; zhang zhi yong ; shi yong qiang
..............page:138-140,144
Research of attack technologies for Web service
huang kang yu ; he zheng qiu ; lai hai guang ; wu li fa
..............page:17-22
New method of similarity measure between Vague sets
liang jia rong ; peng fang yan ; wu hua jian
..............page:83-85
Study of distance-measuring method and application for time series similarity search based on slope departure
liang jian hai ; zhang jian ye ; yang feng ; pan quan
..............page:54-55
Design data mining metamodel based on UML Profile
song xu dong ; yang li guo ; liu xiao bing ; zuo xiao zuo ; zhao yan jun
..............page:68-70
Survey and research of extension neural network
zhou yu ; qian xu ; zhang jun cai ; kong min
..............page:1-5
Research on wireless delay and disruption tolerant sensor networks
zhang long ; zhou xian wei ; wang jian ping ; huang wei
..............page:14-16
Analyzing and comparing of mechanisms for RFID information acquisition
zheng fang wei ; zhou ming tian ; zuo
..............page:6-9,13
Survey of clustering algorithms for high-dimensional data
he ling ; cai yi chao ; yang zheng
..............page:23-26,31
Ensemble classification approach based on microarray data
luo mei shu ; liu shi yong ; shi lei ; yu hua long
..............page:104-106
Research on hybrid genetic algorithm based on DNA computing
tang tian bing ; shen wen jie ; wei ling yun ; xie xiang hong
..............page:89-91
PSO algorithm of chaos-based fuzzy adaptive parameter strategy
sun yong ; zhang wei guo ; zhang meng ; yin wei
..............page:39-41,44
Survey of research on identity-based encryption
zeng meng zuo ; qing zuo ; tan ping zuo ; yang yu ; zhou zuo zuo
..............page:27-31
Parallel hierarchical clustering algorithm based on preprocessed data
li chao peng ; li ken li ; cheng yun ; li chao jian
..............page:71-73
Study on feature item extraction method based on ontology view
xiao sheng ; hu jin zhu ; yao shuang yun ; shu jiang bo
..............page:42-44
Improved ACO-based wireless sensor networks routing
zheng hui jun ; zhang wei ; zuo shao hua
..............page:99-100,119
Analysis and design of DNA encoding based on partial words
li zhen ; wang shu dong ; li er yan
..............page:86-88
Robust video matting algorithm
li wen ; han guo qiang ; gu yan chun ; zhang zuo yuan ; zhang sheng kai
..............page:358-360,376
FLIR scene matching algorithm for complex ground target
liu zuo ; sun ji yin ; zhu jun lin ; ju xi nuo
..............page:350-352,395
Realization in fast eye detection and tracking algorithm
li hao ; dong xiu cheng
..............page:377-379
Expert system model research for classified evaluation based on fault tree
huang hong ; ren wei hong ; yu da tai ; liu zeng liang
..............page:204-208,211
QoS implement mechanism of bi-digital-CATV based on EPON
zhang jin yu ; lv shu bo ; ge hong fang ; ge hong hui
..............page:288-291,316
Group rekeying algorithm in wireless sensor networks
zhang xing ; wei qian ; sun xu guang
..............page:223-225
Personalized service processing in e-Learning environments based on ontology
huang jin jin ; liu yun ; zhan yong zhao
..............page:184-188
Dynamic trust model with incentive mechanism in P2P environment
zhao ling xi ; tian yuan ; deng lu yao
..............page:251-254
New high efficiency ESPRIT method on DOA estimate of coherent sources
cai hui fu ; huang deng shan
..............page:314-316
Business intelligence system based on artifical immune detection
xu rui ; ma wen li ; zheng wen ling
..............page:209-211
Algorithm for surface reconstruction based on parameters defined CS-RBF
tian jian lei ; liu xu min ; guan yong
..............page:383-385,392
Research on min-min algorithm model based on Petri net model with inhibitor arcs
fu you ; hua zuo ; tian yin hua
..............page:79-82,85
Research and optimize in IEEE802.11MAC protocol
ma dan ; wen jun
..............page:323-326
Construction of fault tolerant connected dominating sets in WSN
bian yong zuo ; wang jun ; yu hai bin ; zhang jian hua
..............page:292-294,313
Template generation method for Deep Web automatic data extraction
yang xiao qin ; ju shi guang ; cao qing huang ; wang xiu hong
..............page:200-203
High-level synthesis method based on testability and low power
sun qiang
..............page:167-169,173
Research on providing QoS resource allocation algorithms of OFDMA systems
wang jun ping ; jing zhi hong ; li yang ; li zuo
..............page:333-335
General rate distortion model and rate control scheme
xie zheng guang ; bao zhi hua ; xu chen ; zhang guo an ; zhang shi bing ; yang yong jie
..............page:339-341,344
Feature selection method combined optimized document frequency with PA
zhu zuo dong ; zhong yong
..............page:36-38
Erasable watermark algorithm for color images based on double components difference expansion
xiong zhi yong ; jiang tian fa
..............page:220-222,225
Shadow removal from face image based on illumination compensation
ou fan ; liu chong
..............page:399-400
Research on early-warning mechanism for environmental pollution caused by automobile
jiang guo rui ; li hui ; gu chuan long
..............page:177-180
Research on component-based spatial integrated modeling
zhang zi min ; li zuo ; zhu qiang
..............page:124-126,130
Efficient adaptive channel estimation algorithm for Doppler effect elimination
liu dong sheng ; liu chang zuo ; zeng xiao zuo
..............page:320-322
Logic model for formal analysis of composed protocols
zhao juan ; han ji hong ; wang ya di ; huang qing ; zhu yu na
..............page:274-277
Improvement of ID-based authenticated key exchange protocol
shu jian ; xu chun xiang
..............page:218-219
Modeling 3D hairs based on dynamic super-helices
sun wu feng ; zhou ming quan ; geng guo hua ; mao xiao lin
..............page:396-398
Adaptive relative delay guarantee scheme for Web server
hu yan su ; dai guan zhong ; gao ang ; pan wen ping
..............page:336-338
Research progress on coverage problem in wireless sensor networks
wang wei ; lin feng ; zhou ji liu
..............page:32-35
Research on churn problem in large-scale live streaming media system
lin yu song ; chen an ling ; wang zong min
..............page:181-183
Design and implementation of context-aware system based on uSD
deng zhi cheng ; zhang jin feng ; wang shuang quan ; chen can feng ; ma jian
..............page:148-150
Ontology and rule inference based GUI software test case generation
zhang li ying ; jiang zu hua
..............page:120-123
Adaptive mode decision algorithm for H.264 based on correlation
zhu jin xiu ; cao ning ; li guo xuan
..............page:371-373
Age estimation based on selected local binary and weighted support vector machine
zhang jian ming ; fang fang ; chen li ; yang feng qing ; liu xiao
..............page:389-392
Adaptive frame level bit allocation optimal algorithm for H.264/AVC
long zhao hua ; zheng xing fu ; cheng hong ; jiang gui quan
..............page:386-388
Research on extending PSL model with hybrid automata
zhang meng ; gao de yuan ; fan xiao zuo
..............page:196-199,203
Study on digital construction of plant growth based on information fusion
tang wei dong ; liu chang zuo ; li ping ping ; lu zhang ping ; zhu ping
..............page:174-176
Research on tools for knowledge evolution and group collaboration during software education
wang xia ; zuo yu ; gu jun zhong
..............page:141-144
Attack graph-based method for vulnerability risk evaluation
zhang zuo ; huang shu guang ; xia yang ; song shun hong
..............page:278-280
Fast medical image ROI volume rending based on lit spheres
qin an ; bo xiang lei ; feng qian jin ; chen wu fan
..............page:348-349,379
Research on key technologies of minority language domain name
wang yan feng ; chen tao ; li hong tao ; yan bao ping
..............page:145-147
Grid-based spatial clustering in presence of facilitators and obstacles
yang shi hai ; fu zuo
..............page:117-119
Algorithm of drawing isoline based on Delaunay triangle net
jiang zuo ; du bin ; lu jun ; wang peng
..............page:101-103
Research on workflow schedule model based on fuzzy theory
li sheng wen ; gong jun fang
..............page:131-133
Research of data index service in spatial data sharing platform
wang yong ; wang gai fang ; zhang xia
..............page:160-163
Improved directional diamond algorithm with mode decision
zhu xiao long ; luo xing ; chen zu jue
..............page:393-395
Research and implementation of ramp corner reminding system based on WSN
xu guang hua ; wang liang min ; zhan yong zhao
..............page:189-192
New semi-fragile watermarking algorithm based on image content authentication
wang zuo zuo ; wang xi chang ; liu jiang
..............page:234-236
Hybrid encryption scheme based on Blowfish and MD5
shang hua yi ; yao guo xiang ; guan quan long
..............page:231-233
Time-lapse seismic parallel phase correction based on mobile agent
liu qi cheng ; zheng wei min ; xue wei ; sun li min
..............page:154-156
Testing non-stationarity of aggregate WLAN traffic
feng hui fang ; miao wen hua ; shu yan tai
..............page:305-307
Stochastic differential equation-based general P2P file distribution model
liu yong ; luo xu cheng ; qin zhi guang
..............page:281-283,287
Differ-service supported queue management method for replay node in wireless network
zhu fang zhou ; wang xiao dong ; meng xiang xu
..............page:330-332,338
Intrusion detection algorithm based on quantum genetic clustering
cha quan min ; wang rong gui ; he wei
..............page:240-243,246
New color digital image blind watermarking algorithm based on chaotic sequences and LWT
zhao yu xia ; kang bao sheng
..............page:247-250
Chinese organization names recognition with Tri-training learning
cai yue hong ; zhu zuo ; cheng xian yi
..............page:193-195
Research of Internet worm infection probability estimation based on comprehensive analysis of net-flow and packets
wang yong chao ; xie yong kai ; zhu zhi ping ; dong ya bo
..............page:237-239
Energy efficient multicast routing heuristic algorithms in Ad hoc cognitive radio networks
miao xu na ; zhou xian wei ; wu hua zuo ; liu zhen zhen
..............page:284-287
Clutter suppression method based on DCT in wavelet domain
zhou ning ; li xiao feng ; li zai ming
..............page:374-376
Multi-threshold image segmentation based on simulated annealing algorithm
zhao yu qian ; li hui fen ; wang xiao fang
..............page:380-382
Novel algorithm of third party\'s double watermark applied in image
zhao xing yang ; sun ji yin
..............page:262-264,267
One high efficiency grid resources monitoring algorithm improved on ACTC
chen jun chen ; wang cheng liang ; liu yu jiong ; yang hui you
..............page:114-116
Delay performance analysis for mobile sinks wireless sensor networks
yu hua ping ; guo mei ; hu jie
..............page:317-319,322
Method based on semi-supervised local linear embedding algorithm for text classification
xia shi xiong ; li you wen ; zhou yong
..............page:64-67
Beamforming communication scheme design for synchronous cooperative relay systems
huang cheng rong ; guo ying ; li men hao
..............page:302-304
Kind of reconstruction method of CCD aliasing image in frequency domain
zhao xiu ying ; su yun ; wang jing mei ; xu zheng ping ; di lin pei
..............page:368-370,373
Fluid simulation for interactive applications based on particle system
chen jun ; yang ke jian ; yuan yuan
..............page:365-367
Performance analysis of orthogonal space-time block codes over Rayleigh fading channels
bao tao ; xu jia dong ; zhang hui sheng
..............page:298-301
Optimal algorithm for gradient based on edge detection
yu tian hu ; mao xing peng ; wang guo qian ; ma xiao yang
..............page:361-364
Improved particle swarm optimization based on Hénon chaos and dynamic nonlinear equations
liu huai liang ; su rui juan ; xu ruo ning ; gao ying
..............page:92-95
Authentication scheme based on biometric encryption
yao lin ; fan qing na ; kong xiang wei
..............page:268-270
Survey on human mocap data feature extraction and retrieval
xiao bo xiang ; zhang qiang ; wei xiao peng
..............page:10-13
Novel method for detection of idle state in brain-computer interface system
liu mei chun ; xie sheng li
..............page:151-153
Correlation comparison algorithm based mean shift for image segmentation
li yan ling ; meng qing wei ; zuo chang an
..............page:342-344
FJRR: parallel design pattern for array-based data decomposition applications
tang shan jiang ; sun ji zhou ; yu ce ; wu hua bei ; xu zuo
..............page:134-137
Trustworthy metrics model for Web service using genetic neural network
zhang yang ; fang bin ; xu chuan yun
..............page:215-217
Method of attributes reduction based on GA with memory function
zhang zhong lin ; zhang jun ; mi wei
..............page:96-98
Distributed Bayesian network learning algorithm based on model fusion
zuo kui xiang ; gong xiu jun ; ran yong
..............page:60-63
Study of distributed multicast key management based on creditability
xu jian zhen ; liang ke hui ; dong yong xian
..............page:271-273
Novel information retrieval algorithm for historical Web
zhang yan ; huang lian en ; lin wu
..............page:56-59,63
Research on cooperative ARQ for two-hop and two-relay system
xiong ying ; tang lun ; chen qian bin
..............page:311-313
Energy-efficient clustering algorithm for data gathering in WSN
hao ju tao ; zhao jing jing ; huo huan
..............page:295-297
Layered trusted computing platform model and its implementation
zhou yi ; zheng xue feng ; yu yi ke
..............page:212-214,217
Research of SOA-based manufacturing execution system
hao guang ke ; he wei ping ; zuo hui ; fang ya dong ; dong rong
..............page:164-166
Study on context-based domain ontology concept extraction and relation extraction
zhang yu fang ; yang fen ; xiong zhong yang ; chen xiao li
..............page:74-76
Trust negotiation algorithm based on full privacy preservation
chen ; wang ya di ; cai guo ming ; lu ming long
..............page:226-230
Electronic cash scheme based on NTRUSign
wang xiang
..............page:259-261
AAQIM watermarking algorithm based on H.264
cao er xi ; jiang jian guo ; qi mei bin
..............page:244-246
Network attack classification architecture based on multi-view
zhang li juan ; wang qing xian
..............page:255-258
Visualization of relation hierarchical tree of compound sentence based on VML
hu jin zhu ; shu jiang bo ; zhou xing
..............page:127-130
Algorithms recommend research on personalized search engine
chen hua ; li ren fa ; liu zuo feng ; lian zuo
..............page:48-50,53