Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2011 Issue 4
Process business requirement modeling based on KAOS
WANG Yu-hua;YIN Gui-sheng;HE Lu;YU Jin-feng
..............page:1418-1421
High performance FFT computation based on CUDA
ZHAO Li-li;ZHANG Sheng-bing;ZHANG Meng;YAO Tao
..............page:1556-1559
Cloud computing-oriented data mining system architecture
HE Jian-jia;YE Chun-ming;WANG Xiang-bing;HUANG Zai-xin;LIU Qiu-ling
..............page:1372-1374
Strategy of wireless sensor networks coverage optimization by improved particle swarm algorithm
FENG Zhi-bo;HUANG Hong-guang;LI Yi
..............page:1272-1275
Personalized recommendation algorithm research based on content in social network
WANG Jie;TANG Xiao-chun
..............page:1248-1250
Ant scheduling model for critical resources based on airport taxi
DING Jian-li;LI Xiao-li;LI Quan-fu
..............page:1279-1282
Real-valued self set optimization algorithm in immunity-based anomaly detection
XI Liang;ZHANG Feng-bin;WANG Sheng-wen;YUE Xin
..............page:1434-1436,1445
Based on principal component analysis and D-S evidence theory and application of sensor fault diagnosis
FU Hua;LIANG Ming-guang;KANG Hai-chao
..............page:1315-1317
Efficiency analysis of photochemical reactions simulation based on SMP cluster
LI Hong-jian;TANG Hong;DOU Yu-sheng;SUN Shi-xin
..............page:1232-1234,1241
Research on multi-pattern matching algorithms based on Aho-Corasick algorithm
WANG Pei-feng;LI Li
..............page:1251-1253,1259
Automatic discovery on auxiliary word usage-based part-of-speech and segmentation errors for Chinese language
HAN Ying-jie;ZHANG Kun-li;ZAN Hong-ying;CHAI Yu-mei
..............page:1318-1321
Improved QAPF scheduling algorithm in relay networks
CHEN Bo;DU Chang-ping;TANG Lun
..............page:1502-1504,1508
Study on MPI communication performance optimization based on FC-based token-routing switch-network
ZENG Xiao-hui;LIU Qing;LUO Wen-lang;KANG Ji-chang
..............page:1505-1508
Optimization strategy of massive hydrographic image transmission based on P2P
MENG Ling-kui;XIA Hui-yu;CHEN Zi-dan;LI Ji-yuan
..............page:1382-1384,1391
Push-pull model for production planning and scheduling
LIU Wei-wei;LIU Xiao-bing;LI Zhong-kai;ZHANG Ping;HUANG Xue-wen
..............page:1385-1388
Parallel algorithm of attributes reduction of decision table based on conditional entropy
ZHANG Zhong-lin;ZHANG Jun;FENG Jing-jing
..............page:1296-1298,1321
Approach of binary code analysis based on full-system emulation and instruction-flow analysis
DENG Chao-guo;GU Da-wu;LI Juan-ru;SUN Ming
..............page:1437-1441,1469
Research on inventory policy of grain and oil under restriction of service level
XU De-gang;XIAO Ren-bin
..............page:1389-1391
Gradient optimization identification for state-space systems and convergence analysis
ZHONG Lu-sheng;FAN Xiao-ping;YANG Hui;QU Zhi-hua;QI Ye-peng;YAN heng
..............page:1238-1241
Research on traceability cost model of work in process for steel enterprise
LIU Xiao-bing;CUI Fa-jing;BO Hong-guang;HUANG Xue-wen;MENG Qiu-nan
..............page:1392-1395
Safety home registration mechanism based on fast handoff in MIPv6
XU Xing-qi;PAN Jin;CHEN An-lin;CHEN Zhi-guang
..............page:1474-1478
Multi-objective particle swarm optimization algorithm and its application
ZENG Jin-tao;LI Jin-zhong;TANG Wei-dong;XIA Jie-wu;LIU Xin-ming;WANG Bo
..............page:1225-1231
De-interlacing algorithm for DIBR
LIU Ran;WU Ying-jian;XU Xiao-yan;ZHU Qing-sheng
..............page:1563-1565,1579
Road surface crack detection technique based on topology contravariant
ZHANG Yu-cun;WANG Chao-wei;LIU Guang-hai
..............page:1570-1572
Attribute value and attribute reduction method based on inconsistent decision tables
DENG Shao-bo;LI Min;GUAN Su-jie;WAN Fang
..............page:1308-1310
Weight local preserving based semi-supervised dimensionality reduction
WU Zheng-yin;XUE An-rong;LI Ming
..............page:1245-1247
Acceleration processing for sensor data based on FPGA
SUN Shu-rong;WANG Yong-li
..............page:1365-1367,1388
Algorithm for generating strong association rules based on matrix
LV Tao-xia;LIU Pei-yu
..............page:1301-1303
Novel algorithm on semantic extraction of video key frame based on relevance vector machine
WU Chang;WANG Wan-liang;JIANG Yi-bo
..............page:1580-1583
Performance of wireless sensor networks based on mobile agent computing paradigm
WEI Yong-hong;LI Ke-jie
..............page:1490-1494
Robust infrared face recognition based on deformable model
HAO Ning-bo
..............page:1540-1543
Analytical models for energy consumption of WLAN power saving STAs carrying TCP flows over GE channel
LIAO Yong;WANG Tao;CHEN Xu-hong;PENG Xiao-qin
..............page:1515-1517
LMOD:e-learning resource library model based on ontology describing
ZHANG Hu-yin;LI Xin;LU Chun-tao;WU Di
..............page:1360-1364
Novel approach for edge detection based on improved spring-mass model
XU Yao;ZHANG Ru-yan;WANG Shi-tong
..............page:1573-1575,1583
Relative similarity evaluation model for software repair
HE Jia-lang;ZHANG Kun;MENG Jin;ZHANG Hong
..............page:1410-1412
Approach for supporting creative architectural wall shape design
WANG Wen;LIU Hong;SHANG Zhao-xia;LIU Xia
..............page:1398-1400
OBDD based symbolic algorithm for searching cyclic AND/OR graphs
ZHAO Ling-zhong;WANG Xue-song
..............page:1325-1329
Speedup segmentation of industrial DR image by CUDA
NI Feng-yue;ZENG Li;LIU Ling-hui
..............page:1560-1562
Eyes location based on multi-threshold in complex background
CHU Xiu-qin;WU Shuo;HU Le;PENG Jian-feng
..............page:1584-1585,1597
Performance optimization for wireless sensor networks based on gradient neighbor information
ZHENG Ming-cai;ZHANG Da-fang;ZHAO Xiao-chao
..............page:1495-1498
Clustering algorithm of nodes scheduling for wireless sensor networks
YI Xiao;DENG Lu;LIU Yu
..............page:1499-1501
New spatial error concealment method based on match of boundary subsection
DING Zhi-hong;LIU Li-zhu;WANG Gang
..............page:1586-1587,1591
Research and analysis of RFID complex event detection model based on CPN
WANG Zhao;MA Zhi-feng
..............page:1425-1428
Application of weighting 3D-Otsu method in image segmentation
LV Yan;GONG Qu
..............page:1576-1579
Improved ML algorithm for MIMO-OFDM systems
CHEN He;LI Zhao-xun;LI Feng
..............page:1483-1485
Survey of CAN field bus for safety critical systems
WANG Zhi-ying;MA Wei-dong;XIONG Guang-ze;YANG Zhan-ping
..............page:1216-1220
Research of reconfigurable DSP on high-performance computing
HOU Sen;TAN Man-tang;LUO Xing-guo
..............page:1336-1338
Improved immune genetic algorithm based on Latin hypercube sampling
ZHOU Ben-da;YAO Hong-liang;CHEN Ming-hua
..............page:1283-1285,1289
On homomorphic signature scheme for multi-source network coding
LUO Hai;WANG Cai-fen;FENG Fan;YU Zhi-xuan
..............page:1465-1469
Method of determining modular time quota for order-oriented enterprise
XIAO Ying-jiao;CHEN You-ling;ZHOU Yu-jie
..............page:1356-1359
Cascading failure model on power grid with energy dissipation and capability expansion
ZHOU Hai-ping;CAI Shao-bong
..............page:1396-1397,1400
Combined pose estimation method of SAR imagery to vehicle target based on feature
LIU Cong;LI Yan-jun;ZHANG Ke
..............page:1566-1569
Unscented Kalman filter with Doppler frequency
CHEN Chu-xin;ZHOU De-yun;WANG Ling-xiao
..............page:1530-1532
Blind estimation of chaotic spread spectrum sequences by using neural network
HE Shi-biao;GU Cheng;LUO Dong-mei;XIAO Li-li
..............page:1518-1520
Frequency offset estimation algorithm of OFDM system
JI Lei;LI Yu-bai
..............page:1479-1480,1485
Research on online VRFT data-driven control method and simulation
AI Wei;ZHU Xue-feng
..............page:1254-1256,1265
Spam image classification model based on Kolmogorov complexity
DENG Wei;CHENG Hong-rong;QIAN Wei-zhong;QIN Zhi-guang
..............page:1533-1535
Detecting small targets based on SVD for background suppression and particle filter
CUI Li-jie;ZHENG Jiang-bin;LI Xiu-xiu
..............page:1553-1555,1572
Formal analysis of ORM in first order logic
PAN Wen-lin;LIU Da-xin
..............page:1413-1417
Design and implementation of component-level dynamic cluster management system
LUO Rong;WANG Tao;ZHANG Wen-bo;XIE fei
..............page:1404-1409,1417
Study of supercomputer failures prediction based on log analysis
TIAN Qu-bo;QIU De-hong;ZHANG Qi-feng;SUN Lei
..............page:1235-1237
IP address auto-configuration scheme based on OLSR for MANET
QING Li
..............page:1527-1529,1532
RIP analysis for quasi-Toeplitz measurement matrices
WANG Kai;LIU Yu-lin;HE Ji-wei
..............page:1512-1514
Detection algorithm of adaptive moving objects based on frame difference method
XUE Li-xia;LUO Yan-li;WANG Zuo-cheng
..............page:1551-1552,1559
Quantum convert communication protocol based on prisoners\' problem
GONG Yan-jun;WEN Xiao-jun;JI Li-ping;NIU Xia-mu
..............page:1453-1456
Blind decoding algorithm of punctured convolutional codes based on improved WHT
QI Lin;HAO Shi-qi;WANG Lei
..............page:1457-1459,1464
Study of unified framework of security properties and their analysis method
XIE Hong-bo;TAN Xing-lie;ZHOU Ming-tian
..............page:1460-1464
Settlement NARMAX model based on changed step CMAC
WANG Hua-qiu
..............page:1368-1371,1377
Research of detection for multi-carrier spatial multiplexing systems based on nonlinear precoding
FU Hong-liang;TAO Yong;ZHANG Yuan
..............page:1509-1511
Weighted local-world evolving network model based on network growing point for power grid
LIN Wei;LI Can-bing;TANG Sheng-wei
..............page:1339-1341,1347
SA-DTN: research of DTN routing based on node social activity
WANG Gui-zhu;ZHANG Jia-yong;WANG Bing-ting
..............page:1524-1526
Real-time beamforming based on GPU cooperating with CPU
LI Xiao-min;HOU Chao-huan;YAN She-feng;YANG Li
..............page:1333-1335,1359
Fast splitting algorithm for partitioning community structure in complex networks
ZHANG Cong;SHEN Hui-zhang;LI Feng
..............page:1242-1244,1250
Recognition algorithm based on wavelet preprocessing and tensor PCA
CAO Jing-liang;LI Yi-bo;ZHANG Hai-jun
..............page:1547-1550
Novel fuzzy reinforcement learning incorporated with ant colony optimization
XIE Guang-qiang;CHEN Xue-song
..............page:1266-1268,1271
Distributed spatio-temporal query processing system based on peer-to-peer computing: design and case study
YANG Xiao-liang;ZHANG Chong;TANG Da-quan;XIAO Wei-dong;TANG Jiu-yang
..............page:1342-1347
Survey of video-based image traffic automatic incident detection algorithm
XU Yang;WU Cheng-dong;CHEN Dong-yue
..............page:1206-1210
Load-shedding strategy for data stream frequent item mining
ZOU Yong-gui;GONG Hai-ping;XIA Ying;SONG Qiang
..............page:1304-1307
Research of utility-based routing in delay tolerant networks
XU Jia;WANG Ru-chuan;XU Jie;LIAO Jun
..............page:1211-1215,1224
New hybrid APF and controlling method
PENG Jin-jie;FAN Xiao-ping;LI Gang
..............page:1375-1377
Review of automatic music transcription system
GUO Yi;XU Hong-bing;TANG Ji-yong;HE Li
..............page:1201-1205,1210
Road feel research of EPS based on fuzzy immune PID
ZANG Huai-quan;JIA Man-man
..............page:1330-1332
Novel algorithm of fast lane identification
SHEN Yu;LUO Wei-wei;WANG Xiao-peng;LEI Tao
..............page:1544-1546,1550
Novel algorithm based on companding transformation to reduce PAPR in OFDM systems
ZHANG Guo-long;SHU Qin;CHENG Kun
..............page:1481-1482,1511
Data encryption method based on evolvable cellular automata
NIE Xin;LI Yuan-xiang;WANG Long
..............page:1442-1445
DDoS attack detection model based on wavelet
LV Jia;TANG Guang-ming
..............page:1450-1452
Real-time task placement algorithm of reconfigurable system based on space adjacency degree
JIAO Ge;LI Ren-fa;LI Lang;CHEN Jian-zhen;ZOU Yi;PENG Ri-guang
..............page:1290-1292,1295
Underlay-friendly Overlay routing mechanism for IP networks
XU Tong-ya;WANG Da-bin;CHEN Chao
..............page:1221-1224
Model and solution of rescue path selection in emergency
ZHANG Jie;WANG Zhi-yong;XU Wei-sheng;XIONG Dan
..............page:1311-1314
Visualization of 2D and 3D vector field
ZHAO An-yuan;REN Jie;LIU Dong-quan
..............page:1592-1597
Analysis of ant colony clustering combination based on information entropy
TIAN Li-wei;CAO An-de
..............page:1269-1271
Bandwidth allocation mechanism based on dynamic programming
ZHOU Jian;JIANG Wei
..............page:1521-1523
Earthquake clustering method based on soft distance calculation
LI Xiang-ying;XIONG Yan;LIU Dao-hua;ZENG Zhao-xia
..............page:1299-1300,1303
Automatic summarization method based on thematic term set
LIU Xing-lin;ZHENG Qi-lun;MA Qian-li
..............page:1322-1324
Dynamic scheduling for steelmaking-continuous casting based on human-computer interaction
WANG Chao;LI Tie-ke;ZHANG Wen-xue
..............page:1378-1381
BP network optimization based on mutative scale chaos optimization algorithm
LIU Qiong-sun;SUN Xi-bo
..............page:1257-1259
Functional coverage driven verification for TAU/MVBC
YAO Ai-hong;WU Jian;ZHANG Zhi-jun
..............page:1352-1355
Combined nested partitions algorithm based on tabu search
SONG Jian-qiang;MA Liang
..............page:1260-1262
Performance analysis of OpenCL parallel acceleration on cavity flow problem
LI Sen;LI Xin-liang;WANG Long;LU Zhong-hua;CHI Xue-bin
..............page:1401-1403,1421
Study and design of extensible anti-virus framework
WANG Hai-feng;CHEN Qing-kui
..............page:1470-1473
Fuzzy semantic personalized recommendation system modeling
MU Xiang-wei;CHEN Yan
..............page:1429-1433
Improved adaptive ant swarm clustering algorithm
LIANG Jun-ling;XIAO Ren-yue;WANG Xiang-dong
..............page:1263-1265