Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2010 Issue 9
Research of data reduction on set covering problem
chen zuo ; wu zhi yong ; sun le chang ; zhang ; liu jing ju
..............page:3307-3311
Personalized user profile modeling method based on weighted semantic net and effective information
mao xiao xing ; xue an rong ; ju shi guang
..............page:3406-3408,3433
Method of defense SQL injection attacks based on sequence alignment
sun yi ; hu yu zuo ; huang zuo
..............page:3525-3528
Stochastic scheduling for multiple mould and die manufacturing projects based on MPICH2 and parallel Q-learning
zhang sha qing ; chen xin du ; chen qing xin ; chen xin
..............page:3242-3246
Study on vision object tracking based on adaptive object segmentation
hao hui juan ; xu ji yong ; liu guang qi
..............page:3579-3580,3590
Research progress of network security situation awareness
li shuo ; dai xin ; zhou yu xia
..............page:3227-3232
TRABPT:new trusted mobile P2P network routing algorithm
yan yuan ting ; wang yang ; zhao peng cheng ; nan min ; xu yong
..............page:3458-3461
Compressed-domain watermarking for AVS video authentication
chen wei bing ; wu zuo feng ; yang gao bo
..............page:3518-3521
Reliability allocation based on genetic algorithm and LS-SVM
zhang gen bao ; liu jia ; wang guo qiang ; ren xian lin
..............page:3300-3302
Research of automatic face tracking
li jing ; fan jiu lun ; zhang yan bing
..............page:3598-3600
Fast image resizing by combining with saliency map and adaptive seam
wang hui qian ; yang gao bo ; zhang zhao yang ; xia zhong chao
..............page:3594-3597
Research on aspect-oriented grid security model
ge jun wei ; shen yu ; fang yi qiu
..............page:3533-3535
Resource sharing research of mobile social software based on fair cooperation incentive mechanism
chou na ; wang hong ; rong yue lin
..............page:3415-3417,3430
Novel routing algorithm of nonuniform node distribution in WSN based on minimum hops
yang yun ; chen yong jun ; zhang jing ; shi zuo zuo
..............page:3446-3448
Application of quantum-inspired evolutionary algorithm for DOA estimation of underwater target
niu zuo long ; wang yi ; sun jin cai
..............page:3294-3296,3306
AS topology monitor deployment method based on cover of shortest path trees
sun li wei ; peng wei ; liu yu jing ; lv bao ping
..............page:3473-3475
Scheme of quorum system construction based on privilege classification
weng jia jia ; zhang min qing ; dong bin
..............page:3500-3502
Aspect oriented software architecture model
zhu chun guo ; zeng guo zuo
..............page:3387-3389,3394
Research of thematic terms extraction algorithm from Chinese text based on increment term set frequency
liu xing lin ; peng hong ; ma qian li
..............page:3237-3238,3246
Approach of Web clustering based on hybrid particle swarm optimization model
li shi wei ; wang jian qiang
..............page:3259-3262
Prediction model of financial stock index based on GD-FNN
sun bin ; li tie ke ; zhang wen xue
..............page:3272-3275,3278
Application of network of things technology on system of status detector
wang fen hua ; nian xin ; hao guo liang ; wang zhi liang
..............page:3375-3377,3380
Research of product research and development process management information integrated modeling
sha quan you ; shi jin fa ; qin xian sheng
..............page:3378-3380
Calculation of flooding probability based on number of neighbor nodes
hou zuo ; feng hai lin ; gu zuo
..............page:3443-3445
Game model for trust establishing and steady-state analysis in P2P file-sharing environments
xiang xing bin ; zeng guo zuo ; xia dong mei
..............page:3496-3499,3502
Load balancing algorithm for high-speed IDS based on analysis of network traffic
wang ming ding ; zhao guo hong ; lu hua biao
..............page:3484-3486
Multiple description video coding with drift reduction
chen xiao ; he xuan sen
..............page:3591-3593
Hybrid elevator group control system modeling and new scheduling strategy
zhao xiao cui ; luo fei ; xu yu ge
..............page:3290-3293
Research on network design problem in integrated three-layer logistics systems
jin li ; zhu yun long ; shen hai ; ku tao
..............page:3287-3289
Java design pattern recognition based on relational calculus
miao kang ; yu xiao ; zhao ji ; shen yu
..............page:3425-3430
Distributed secure database service based on sensitive data encryption
yu yong hong ; bai wen yang
..............page:3510-3513
Solving fixed point equation by artificial fish school algorithm
qu liang dong ; he deng xu ; huang yong
..............page:3356-3357,3367
Index structure for multi-scale representation of multi-dimensional spatial data in WebGIS
lv zhi han ; ma rui na ; fang jing bao ; han yong ; chen ge
..............page:3395-3398,3402
Genetic ant colony algorithm for Job-shop scheduling problem
wu yu ming ; xu cong fu
..............page:3247-3249,3282
Mechanism based on HCBF for large flow inspect
chen shu zuo ; zhang guo ; zuo hong chao
..............page:3239-3241,3252
Document-oriented database-based full-stack propagation model of geospatial data
mei ji zuo ; du zhen hong ; liu ren yi
..............page:3390-3394
Research on acquire technology of real-time executable probability facing streaming media application
li chao ; zhang dong song ; jin shi yao
..............page:3462-3465
Splitting and searching method for construction of virtual pavilion online
du bao jiang ; wang li ping ; liu jia ; li zheng ; wang hai peng
..............page:3381-3384,3386
Design and implementation of reducing authentication cost in WiMAX handoff
tang chao wei ; liu peng jun ; tang ding ; tang zuo
..............page:3470-3472,3475
Lag synchronization of neural network and its application in secure communication
mu wen ying ; ji yan ; cui bao tong
..............page:3456-3457,3461
Adaptive Canny edge detection algorithm
xue li xia ; li tao ; wang zuo cheng
..............page:3588-3590
Review of association rules mining in data streams
zhu xiao dong ; shen guo hua
..............page:3201-3205
Traffic adaptive communication algorithm within clusters for WSN
peng na ; liu hui zhong
..............page:3449-3451,3455
Word\'s semantic similarity computation method based on Hownet
ge bin ; li fang fang ; guo si lu ; tang da quan
..............page:3329-3333
Review on studies of knowledge team for new product development under networks environment
li hai gang ; wu zuo lei ; li ya fang ; bai li
..............page:3206-3209,3232
Survey of data provenance technique
dai chao fan ; wang tao ; zhang peng cheng
..............page:3215-3221
Co-evolutionary genetic algorithm based on multi-level search area
miao jin feng ; wang hong guo ; shao zeng zhen ; zhao xue chen
..............page:3345-3347,3351
Video abstraction based on K-L transform and clustering
wang yi ; li zuo cheng
..............page:3585-3587
Fire detection based on brightness and color distribution of fire edge regions
xu hong ke ; fang jian wu ; wen chang bao
..............page:3581-3584
Blind estimation of PN sequence period for multi-user DS-UWB signals
gao yong sheng ; zhang tian zuo ; du xiao hua ; gao xiang yun
..............page:3439-3442,3445
Scheduling solving of telemedicine system in multi-expert diagnosis
xu ru ; xu ze tong ; li liu bai
..............page:3352-3355
Neural network correlation pruning optimization based on improved PSO algorithm
tu juan juan ; zhan yong zhao ; han fei
..............page:3253-3255
Real-time garbage collection algorithm in Java virtual machine
bai jiang tao ; zhong yong ; zhu zuo dong
..............page:3431-3433
Self-training method using cluster information of unlabeled samples
liu wei tao ; xu xin shun
..............page:3341-3344
Research of CUDA-based acceleration of MS-Alignment for identification of post-translational modifications
di yan tang ; tu qiang ; lang xian yu ; lu zhong hua ; chi xue bin
..............page:3409-3414
Design and implementation parser of provable security system for security protocols
li an le ; chen zuo ; gu chun xiang ; zhu yue fei
..............page:3529-3532
Based on DCIWPSO in application of valley-edge detection froth image segmentation
shen xiao jun ; tang chao zuo ; xu jin ; gui wei hua
..............page:3564-3566
Countermeasures simulation research for pandemic influenza A (H1N1) based on dynamic social contact network
zu zheng hu ; zheng tao ; xu qing ; mei shan ; zhu yi fan
..............page:3334-3337
Differentiation distance-based outliers detection algorithm
liu huan ; wu jie jun ; su jin qi
..............page:3316-3318
Dynamic process services optimized combination for BPEL4WS based on process tree
wen jun hao ; shu zhi qiang ; qin ru yu ; li peng
..............page:3418-3421
Study on dependencies between wavelet coefficients for image steganalysis and its application
lei yu ; pan xiao zhong ; yang xiao yuan ; niu ke
..............page:3536-3538,3544
HVS-based video watermarking technique using downsampling
shi chang cheng ; kang zhi wei
..............page:3539-3541,3548
Fault diagnosis method for train-ground wireless communication unit based on rough sets theory
tu ji liang ; luo yan fen ; dong de cun
..............page:3372-3374
Drawing in space:natural 3D free-form curve input method
lu peng ; chen yi song ; chen wen guang
..............page:3558-3560
Method of online public opinions pre-warning based on intuitionistic fuzzy reasoning
li zuo cheng ; wang zuo ; lin zuo
..............page:3312-3315,3325
Adaptive Bluetooth location method based on kernel ridge regression
jiang de xiang ; hu ming qing ; chen yi qiang ; liu jun fa ; zhou jing ye
..............page:3487-3489,3492
Studies of motion detection algorithms
luo tie zhen ; xu cheng
..............page:3561-3563,3566
Maximum entropy thresholding algorithm based on mean-median-gradient co-occurrence matrix model
long jian wu ; shen zuo jing ; wei wei ; he yue ; chen hai peng
..............page:3575-3578,3584
Multimodal retinal image registration based on local feature description
xing yu ; zheng jian ; xu min ; yang zuo
..............page:3567-3569,3574
FSG-based algorithm for mining maximal frequent subgraph
guo jing feng ; chai ran ; zhang wei
..............page:3303-3306
Comparison between node sensing models and relative works in wireless sensor networks
qin ning ning ; jiang min feng ; xiong wei li ; xu bao guo
..............page:3480-3483
Research of keyboard finger-write input method for mobile phone
liu bin ; miao fang ; liu rui
..............page:3422-3424
Customer perspective-oriented Web service composition optimization and integration management approach
chen dong lin ; nie gui hua ; li xiao fei
..............page:3297-3299,3311
Study on mutli-level information security model of wireless sensor networks
lu guo qing ; zeng zuo
..............page:3549-3553
Power interference removal based on particle swarm optimization
chen lei ; zhang li yi ; guo yan ju ; liu zuo ; li zuo
..............page:3263-3267
Analysis and reconstruction of genetic regulatory networks based on QPSO algorithm and S-system
feng bin ; yu yong hong ; sun jun
..............page:3279-3282
Improved ant clustering algorithm
qu jian hua ; ma ying hong
..............page:3276-3278
Distributed joint routing and channel assignment algorithm in cognitive wireless mesh networks
gu jin zuo ; zhang guo an ; bao zhi hua
..............page:3476-3479
Survey of sketch-based technique aiding 3D animation
li song ; yang zheng ; wei ying mei ; wu ling da
..............page:3210-3214
Locator resolving system for flat identity
liu jian qiang ; cheng dong nian ; zuo jiang xing ; zhang jian wei ; lan ju long
..............page:3466-3469
Survey on DDoS attack source tracing algorithm
huang zhong hou ; xu chuan ; liu yan bing
..............page:3233-3236
Online/offline multi-signature scheme in standard model
lu chao ; qian hai feng
..............page:3514-3517
m-tight error linear complexity of sequences over GF(pm) with period pn
zhou jian qin ; xiong wei
..............page:3542-3544
Distributed astronomical cross-match based on MapReduce model
zhao qing ; sun ji zhou ; xiao jian ; yu ce ; cui chen zhou ; liu xu ; yuan zuo
..............page:3322-3325
Research on personalization of mobile search engine
tan lei ; liu zuo feng ; li ren fa
..............page:3403-3405,3414
Verification of access control in Web services designing
hu ruo ; xu hong
..............page:3503-3506,3524
Research on maximal frequent itemset mining algorithm over P2P network
deng zhong jun ; song wei ; zheng xue feng ; wang shao jie
..............page:3490-3492
Survey of knowledge extraction technologies
liu peng bo ; che hai yan ; chen wei
..............page:3222-3226
Anomaly reading detection algorithm in WSN
xue an rong ; li ming
..............page:3452-3455
Hierarchy converging algorithm based on available multi-nexthop of node
guan li an ; wang bin qiang ; zhu xuan yong
..............page:3493-3495
Expansiveness for set-valued discrete dynamical systems
wang chang ; ji fei yu
..............page:3385-3386
Web-page topical feature extraction for Web-page classification
liu jian ; sun peng ; ni hong
..............page:3399-3402
Robust watermarking scheme based on NMF and SVD in Contourlet domain
liu ru jing ; yang zuo zuo ; wang ling
..............page:3507-3509,3513
Application of improved particle swarm optimization in radar network deployment
yang cui rong ; wang ming zhe ; gong hao hua ; ni feng
..............page:3268-3271
Algorithm of pupils\'location based on circle-corner point
chen shou ming ; tang ; li qing ; xie xiu zhen ; liu bo
..............page:3570-3574
Information entropy discretization algorithm based on ranking means clustering
liu jing ; luo wei min ; liu jing bo
..............page:3368-3371