Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2011 Issue 8
Group discussion information-structuring model orienting to war design engineering
ZHANG Zhen;CHEN Chao;CHEN Jun-liang
..............page:2967-2970,2973
Polynomial based broadcast authentication mechanism in support of broadcast optimization for WSN
LIU Yun-ru;PENG Ge;YI Ye-qing;CAI Li-jun
..............page:3090-3093
Research about prosody dependent mandarin speech recognition system
NI Chong-jia;LIU Wen-ju;XU Bo
..............page:2941-2945
Research on task assignment for workflow based on fuzzy sets and TOPSIS
CHEN Jun;ZHANG Zhen-ming;TIAN Xi-tian;GENG Jun-hao
..............page:2883-2885,2945
Feature extraction based on kernel function and application of improved methods
LI De-qi;LIU Chuan-ling
..............page:3185-3187,3191
Optimal assignment model and solution of coordinated jamming nodes
HUANG Jun;SHAN Hong;SHEN Nan
..............page:2912-2914
Outlying subspace searching algorithm based on power graph
ZHANG Li-sheng;HE Gai-li;LEI Da-jiang
..............page:2859-2861
Ultra-wideband wireless communication system based on Chirp-BOK-DQPSK modulation
CHEN Jin-yu;ZHAO Liang;LIU Shuang-ping;LUO Xing-guo;JI Zhong-heng
..............page:3073-3076
Efficient broadcast authentication scheme inclustering sensor networks
ZHONG Zhi-chu;LI Xing-hua;GUO Jiang-hong
..............page:3120-3123
Optimal control model for computer viruses
ZHANG Xu-long;YANG Xiao-fan
..............page:3040-3042
Research on source code safety defectsbased on static test tools
LI Xiao-nan;FAN Ming-yu;WANG Guang-wei
..............page:2997-2998,3021
Method of generating test data in polymorphism path based on SA-PSO
ZENG Yi;CAI Sen-hu;QIN Zhao-xuan;ZHOU Ji;XU Lin
..............page:3034-3036
Conflict management approach for aspectual compositions at architecture level
JIANG Cao-qing;YING Shi;JIA Xiang-yang;WU Qing;GUAN Hua
..............page:3013-3017
Research & implementation of virtual human animation based on semantic virtual environment
HUANG Shu-lin;ZHOU Bin-bin;ZONG Yuan;L1U Ting-ting;ZHU Bin;LIU Yi-song
..............page:3030-3033
Mechanism of node behaviors evidence monitoring and management in trusted network
MA Jun-yu;ZHAOZhi-jing;YE Xue-yi
..............page:3116-3119
Dynamic (t, n) threshold key sharing scheme without trusted party
ZHOU Meng-chuang;YU Zhao-ping
..............page:3061-3063
Interval-based spread spectrum watermarking scheme for tracing network flows
ZHANG Lian-cheng;WANG Zhen-xing;SUN Jian-ping
..............page:3049-3053,3057
Research and improvement on architecture-aware analytic mapping model for networks-on-chip
SANG Xiao-dan;LUO Xing-guo;CHEN Tao;XIE Tong-fei
..............page:3094-3096,3119
XOR visual cryptography based on optimization model
SHI Lin;WANG Yi-wei;YU Bin
..............page:3043-3045
Data gathering protocol based on clustering in mobile wireless sensor networks
ZHONG Zhi;LUO Da-yong;LIU Shao-qiang;FAN Xiao-ping;QU Zhi-hua;XIONG Zhe-yuan
..............page:3077-3078,3082
Surface intersection algorithm based on dynamic OBB hierarchy
HUANG Song-bai;XU Hua
..............page:3181-3184
Optimal planning programming language OPPLFC
LIU Yi-song;LI Qian-qian
..............page:3007-3009
Research on large scale vehicle routing problem with handling frequency
MA Han-wu;XU Sen;ZHU Wei
..............page:2927-2930
Research on channel accessing and routing in cognitive wireless Mesh network
PENG Yi;ZHU Lei;LIU Ling
..............page:3086-3089
Automatic identification and real-time tracking based on multiple sensors for low-altitude moving targets
ZHANG Zuo-nan;LIU Guo-dong;LOU Jian
..............page:3134-3137,3170
Automatic segmentation of motion capture data based on latent space
Qu Shi1;YU Rong-huan;WU Ling-da;WEI Ying-mei;FENG Xiao-meng
..............page:3128-3130
PN code acquisition method based on Boolean satisfiability
WANG Jing;YI Bo
..............page:3100-3102
Schematic eye model-based vision-realistic rendering
ZHANG Yu-xuan;WU Jia-ze;ZHENG Chang-wen
..............page:3124-3127,3130
Remote detecting forged IP traffic
JIAO Cheng-bo
..............page:3109-3111
Modeling of assembly reliability and development of maintenance-alarm system on CNC
ZHANG Gen-bao;TANG Xian-jin;CUI You-zhi
..............page:2946-2948,2953
Environment benefits evaluation approach for freeway network traffic management strategies
YANG Zhen-zhen;GAN Hong-cheng;SUN Liang
..............page:2961-2963
Scheme of neighbor nodes selection for P2P network based on immunity-learning
XIAO Guo-rong;GAO Ya-li
..............page:2935-2936,2940
Research on multicast routing protocol in outer space wireless sensor network
HU Jia-hui;LIU Tao;XU Peng;HUANG Qiu-xiang
..............page:3068-3072
Video watermarking algorithm based on chaos and motion vector
SUN Ke-hui;CHENG Wei;CHEN Yah-shah
..............page:3046-3048
Approach to transform relational database to semantic-rich ontology
JIANG Cui-qing;LU Jiao
..............page:3018-3021
User clustering analysis based on implicit navigation
CUI Chun-sheng
..............page:2862-2864
Weight in system security evaluation
ZHAO Jin-hui;QIAN Xu;SUO Ning1
..............page:3037-3039
Deep Web result pattern extracting based on heuristic information
LI Ming,;LI Xiu-lan
..............page:3026-3029
Method about identifying hot data in solid state memory based on queue count
ZHANG Yu-fang;YANG Ji-hong;XIONG Zhong-yang;WANG Zhi-yuan
..............page:2886-2888,2892
Study on chaotic time series prediction based on genetic algorithm
XIANG Chang-sheng;ZHOU Zi-ying;YU Xi-lin;ZHANG Lin-feng
..............page:2831-2834
Novel method for phylogenetic tree construction based oncorrelation feature and fuzzy clustering
LUO Jia-wei;YIN Zhi-qiang;LIU Shu-yan
..............page:2844-2847
Abnormity mining based on error and key-point in seismic precursory observation data
LI Zheng-yuan;CHEN Jing;WANG Li-na;YANG Song
..............page:2897-2901
Social relationship discovery based on spatio-temporal data
HUANG Yun;QIN Zun-yue;ZHUO Yue-ming
..............page:3004-3006,3017
Research and application of codon bias of human p53 tumor protein
KONG Juan-juan;ZHU Ping
..............page:2987-2990
Research and application of tag recommendation based ambiguity and redundancy on tag
ZHANG Xin-lun;SU Yi-dan;QIN Xi
..............page:2971-2973
Method for fast closed caption detection and localization in news videos
LIU Hai-tao;LAO Song-yang;GUO Jin-lin;BAI Liang
..............page:3148-3150,3180
Research progress on security in micro data outsourcing scenario
XU Yong;DING Zhong-ming;SHEN Xiao-ling
..............page:2812-2816
Research of distributed cluster WebGIS based on FastCGI
TANG Jian-zhi;REN Ying-chao;YANG Chong-jun;SHEN Lei;XIE An-tao;FAN Xie-yu
..............page:2978-2981
Handling class imbalance problem in context knowledge dataset based on improved SVM
WANG Wei;XUE An-rong;LIU Feng
..............page:2902-2904,2908
Usage analysis for applying Fitts\' law in context of mobile/wearable computing
SONG Hai-tao;LIU Huan-yu
..............page:2880-2882
New algorithm of detecting community structure based on degree centrality
DAI Ai-ming;GAO Xue-dong;WANG Li-min
..............page:2909-2911
Fast and low power TLB access mechanism with prediction buffer
WU Shu-li;MENG Jian-yi;WANG Rong-hua;YAN Xiao-lang;GE Hai-tong
..............page:2964-2966,2996
Improved multi-user detection algorithm in uplink out-of synchronous TD-SCDMA systems
LIU Zheng-tang;REN Xiu-kun;HU Han-ying;DONG Min
..............page:3106-3108
Nonlinear algorithm based on edge diffusion for medical image denoising
CHEN Qing;HU Shao-xiang
..............page:3178-3180
Research of relationship between iris clarity and human eye shooting distance
YUAN Wei-qi;YANG Ran-ran;ZHANG Kai-ying
..............page:3162-3165
Thesaurus retrieval approach in semantic image annotation
HU Xiao-hong;QIAN Xu;WANG Xiao-lei
..............page:3174-3177
Pruning structure neural network model for stock index forecasting
SUN Bin;LI Tie-ke;ZHANG Wen-xue
..............page:2840-2843
Movement traces-based container terminal in control scheduling
YE Chun-xiao;SONG Wei-tao
..............page:2868-2870,2875
Cognitive radio spectrum sharing model based on social networks
CHEN Hong-bin;ZHAO Feng;DENG Xiao-fang
..............page:3083-3085
Algorithm for channel estimation in UWB communicationsystem based on frequency domain RLS
GUO Li-li;YANG Zhuo;WAN Jian
..............page:3103-3105
Mercer kernel based hybrid C-means fuzzy clustering algorithm with dynamic weight
WANG Liang;WANG Shi-tong
..............page:2852-2855
Local feature size based Delaunay tetrahedral mesh generation from medical volume data
ZHOU Yun;FAN Xiao-ping;LIAO Zhi-fang;LIU Shao-qiang
..............page:3166-3170
Case-based reasoning cost estimate knowledge reuse model
CHEN Yi-fei1;TANG xiang-zhong;LI Fang-cheng
..............page:2937-2940
Image analogies method based on learned dictionary
LI Min;CHENG Jian;TANG Wan-qiong
..............page:3171-3173,3177
Indoor spatial resource utilization analyzing system using mobile social network
XU Gu-wei;WANG Hao;CHIN Alvin;XU Bin;CHANG Le-le;ZHANG Li
..............page:2958-2960,2963
Forming contraction Markov chain of dynamic fault tree based on timing and logical rules
ZHENG Xian-ju;XIE Zhi-ping;LUO Hang
..............page:3022-3025
Improved particle swarm optimization algorithm with density factor
SUN Feng-li;HE Ming-yi;GAO Quan-hua
..............page:2828-2830
Monitoring system of digital video forensics based on cloud computing platform
PENG Zhmo-yi;ZHOU Yu;WEN Zhi-qiang
..............page:2974-2977
Web services discovery ontology model based on matching algorithm
CUI Xiao-hui;YIN Gui-sheng
..............page:3010-3012
A-tree based bottom-up and deep recursion algorithm of KNN search
LIU Yan;HAO Zhong-xiao
..............page:2889-2892
Image denoising algorithm of dictionary learning restricted by nonzeros number
DUAN Xin-tao;YUE Dong-li
..............page:3192-3194,3197
FPGA application in neural system model simulation
ZHANG Rong-hua;WANG Jiang
..............page:2949-2953
Overviews on protocol reverse engineering
PAN Fan;WU Li-fa;DU You-xiang;HONG Zheng
..............page:2801-2806
Novel chaos genetic algorithm for solving O-1 knapsack problem
TIAN Jian-li;CHAO Xue-peng
..............page:2838-2839,2879
Chinese compound-word recognition and word segmentation modification
LIU Xing-lin;ZHENG Qi-lun;MA Qian-li
..............page:2905-2908
Low power FPGA routing algorithm based on firewall register
HUANG Juan;YANG Hai-gang;TAN Yi-tao;CUI Xiu-hai;LI Wei
..............page:2954-2957
Forecasting methods of oil field development indexes based on T-S reasoning networks
ZHU Xiu-li;LI Long;LI Pan-chi
..............page:2991-2993
Key production scheme based on double matrix combined public key algorithm
LONG Di-qiang;WANG Ya-di;HAN Ji-hong;CHENG Rong;ZHANG Yu-heng
..............page:3058-3060
Semantic knowledge bases construction based on Wikipedia
ZHANG Hai-su;MA Da-ming;DENG Zhi-long
..............page:2807-2811
Novel frog-leaping algorithm and its application
XU Jin-yuan
..............page:2835-2837
Improvement of data structure for algorithm of heuristic optimization for path planning
YANG Nan;ZHANG Jian;LIU Xi;IEN Li-wei
..............page:2919-2921
Spread spectrum watermaking algorithm based on utilizing human visual masking and SVD
BAO Rui;ZHANG Tian-qi;WANG Yu-e;BAI Juan
..............page:3054-3057
Research of improved ant algorithm for load-balancing in network environment
LI Shi-chang;ZHU Qing-sheng;YANG Hao-lan
..............page:3112-3115
Two-level degradation hybrid algorithm for multiple traveling salesman problem
LIN Dong-mei;WANG Dong;LI Ya
..............page:2876-2879
Head tracking method based on multi-feature fusion
CAO Jie;LI Wei
..............page:3155-3158
3D Susan comer detection algorithm based on deformation analyzing
LIN Zeng-gang;ZHANG Yan-ning;GUO Zhe
..............page:3141-3144
Routing and rate selection in UWB-based WPANs
LIU Wei;GUO Hong;LIU Luo-kun
..............page:3079-3082
Optimization method of preheating process in rapid prototyping based on image analysis
ZENG Feng;YAO Shan;YANG Tong;JIAO Zhong-fei;ZHAO Shu-ming
..............page:2994-2996
xin xi dong tai
..............page:后插1
Algorithm to improve long patent sentence machine translation
JIN Yao-hong
..............page:2893-2896,2901
Block-weight image retrieval based on human eye perception measure
XUE Li-xia;JI Zhi-min;WANG Zuo-cheng
..............page:3198-3200
Improved possibilistic fuzzy clustering algorithm
ZHANG Chen;XIA Shi-xiong;LIU Bing
..............page:2848-2851,2882