Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2013 Issue 11
Survey on storage modes and solutions of Internet of things
LI Hong-yu;,LI Ting-li;,MAO Wei;,SHEN Shuo;,TIAN Ye;,YAN Zhi-wei;
..............page:3201-3208,3215
Research on privacy preservation in wireless body area network
DU Zhan-wei;,GAO Peng;,WU fang-ming;,YANG Yong-jian;
..............page:3209-3215
Survey on algorithms of community detection
CHEN Wan-lu;,GONG Shang-fu;,JIA Peng-tao;
..............page:3216-3220,3227
Present situation and trend of research of location-based service on online social networks
YU Hai-peng;,ZHAI Hong-sheng;
..............page:3221-3227
Models and algorithms for locating facilities on network with hybrid demand
HUO Jia-zhen;,LI Xu-fang;,SHEN Rui-ling;
..............page:3228-3231
Kernel search algorithm for two-level emergency repair system location problem
JUN Zhi-cai;,YU Peng;
..............page:3232-3236
One of semi-supervised classification algorithm named Co-S3OM based on cooperative training
LI Wei-hua;,ZHAO Jian-hua;
..............page:3237-3239,3252
New adaptive dynamic cultural particle swarm optimization algorithm
LIU Pei-yu;,REN Yuan-yuan;,XUE Su-zhi;
..............page:3240-3243
Study on reutilization of GEP algorithm decoding structure
HE Pei;,WANG Chao;
..............page:3244-3247
Hybrid evolutionary algorithm for solving single-machine scheduling problem with setup times
CUI Shan-shan;,LIU Guang;,XIAO Wei;,XU Hong-yun;,ZHONG Tao;
..............page:3248-3252
Particle swarm optimization algorithm for flexible flow shop scheduling problem with mixed constraints
CHEN Yong-sheng;,ZHANG Qi-liang;
..............page:3253-3256,3260
Grammatical evolution based nonlinear data automatic fitting bee colony algorithm
CHEN Jian;,MA Guang-zhi;
..............page:3257-3260
Research about relationship between train' s lateral vibration and track irregularity input
CHEN Chun-jun;,JIN Wei-dong;,LI Guang-jun;
..............page:3261-3264
Big data era development model research of huge amounts of data extraction
HU Zhi-gang;,LIN Hua;,LUO En-tao;
..............page:3269-3271,3275
Facing speech synthesis for Tibetan single phoneme and triphone automatic cutting algorithms study
JIANG Jing;,LI Yong-hong;,LI Zhao-yao;,SHAN Guang-rong;,ZHANG Jin-xi;
..............page:3272-3275
Global harmony search algorithm for absolute value equation
YONG Long-quan;
..............page:3276-3279
Algorithm based on bit operation for mining frequent closed itemsets
FAN Yun;,XU Jia-li;,YANG Hong-jun;,ZHAO Mao-juan;
..............page:3280-3282,3286
Research on integrating VGI into Chinese digital gazetteer
SHEN Lu-wen;,YANG Lin;,ZHOU Shun-ping;
..............page:3287-3291
Improvement method of dimensionality reduction through mining density information
JIA Hong-zhe;,YAN De-qin;,ZHANG Yan;
..............page:3292-3294
Research on data mining-oriented purchase decision of multi-instance combination for cloud resources
CHEN Dong-lin;,FU Min;,KANG Yan-fang;,WU Zhong;
..............page:3295-3298
New approach for fast fault diagnosis of large-scale analogue circuits
FAN Xiao-teng;,FANG Ge-feng;,HE Yi-gang;,QI Bei;
..............page:3302-3305
Analysis of structural property of user-object bipartite networks based on external factors
HU Zhao-long;,LIU Jian-guo;,SHAO Feng;
..............page:3310-3313
Parallel consistency model for global constraints based on centralized storage
CAO Yan;,DING Wen-bo;,WANG Qing-xian;,WEI Qiang;
..............page:3314-3317
Improved map-matching algorithm based on position points
SONG Hui;,WANG Qing;,WANG Zhong-min;,ZHANG Rong;
..............page:3318-3319,3323
SLAM algorithm of mobile robot with omnidirectional vision based on EKF
WANG Kai-yu;,WU Di;,XIA Gui-hua;,XIA Guo-qing;,ZHU Qi-dan;
..............page:3320-3323
Track initiation method for near space hypersonic targets based on adaptive wave gate
LI Ding-shan;,LI Zhi-huai;,TAN Xian-si;,WANG Hong;,XIAO Song;
..............page:3324-3327
Resource planning for quick emergency response with multi-objective optimization
DUAN Cheng-hua;,YOU Li;
..............page:3328-3330,3335
Method and application research of three-dimensional RFID positioning system
CHENG Liang-lun;,GAO Rui;,SU Hai-wu;
..............page:3336-3338,3345
Research of massive searching logs analysis system based on Hive
JIANG Rong-an;,ZHAO Long;
..............page:3343-3345
QoS control based on kernel density estimation in soft real-time task
LIN Jun;,NI Hong;,SUN Peng;,ZHANG Hui;
..............page:3346-3348,3352
FPGA high-level synthesis compile optimization algorithm based on matrix partitioning
CUI Xiu-hai;,LI Yuan-qiang;,YANG Hai-gang;,ZHANG Mo-li;
..............page:3349-3352
Research on environment interaction problem through mixed input
CAO Yan;,OUYANG Yong-ji;,WANG Qing-xian;,WEI Qiang;
..............page:3353-3357
Description method of spatial data services virtualization
GUO Wei;,HUANG Liang;,TAN Juan;,ZHU Xin-yan;
..............page:3358-3361
Online trusted evolution of running instance in software evolution process
LIU Cong;,WANG Li-xia;,YANG Shuai;,ZHANG Xuan;,ZHAO Qian;
..............page:3365-3369
Improved task scheduling mechanism for MapReduce in heterogeneous environment
HE Xiang;,LI Ren-fa;,TANG Zhuo;
..............page:3370-3373,3379
Unequal authenticity protection for light signature scheme in high-bitrate video multicast
CHEN Jun;,SONG Lei;,WANG Jin-lin;,WANG Ling-fang;
..............page:3380-3384
Efficient scalar multiplication of ECC based on composite operations over prime fields
WANG Yu-xi;,ZHANG Bing-hong;,ZHANG Chuan-rong;,ZHU Zhen;
..............page:3385-3387
Elliptic curve cryptosystem algorithm based on Chebyshev polynomial
GONG Gao-xiang;,LI Xu-fei;,LIU Ming-lai;,ZHAO Geng;
..............page:3388-3389,3413
Analysis and improvement of proxy blind signature scheme based on DLP
CHEN Wei;,ZENG Ji-wen;,ZHANG Ying-ying;
..............page:3390-3392
Application-layer DoS attack detection based on HMM
HAN De-zhi;,JIANG Sheng-yi;,XIE Bai-lin;,ZHANG Qian-sheng;
..............page:3393-3395,3399
Differential fault attack on LILI-128
CHEN Hao;,LIU Hui-ying;,WANG Tao;
..............page:3396-3399
Evaluation method for IMS network attack effect based on fuzzy comprehensive evaluation
CHEN Zhi-nan;,GUO Yan-zan;,JI Xin-sheng;,LIU Cai-xia;
..............page:3400-3403,3406
Analysis and improvement of new blind signature scheme
LIU Xiao-hong;,ZHANG Jian-zhong;
..............page:3404-3406
Behavior detection of malware based on combination of API function and its parameters
GAO Kun-lun;,HAN Lan-sheng;,JIN Wen-de;,WANG Yu-bo;,ZHAO Bao-hua;,ZHAO Dong-yan;
..............page:3407-3410,3425
Steganalysis of additive modelable information hiding using phase angles
YANG Gang;,ZHANG Min-qing;,ZHANG Zhen;
..............page:3411-3413
Effective and efficient copy detection algorithm for Web video
BAO Wei;,JI Li-xin;,LI Shao-mei;,LI Xing;
..............page:3414-3417
Sharing software watermarking scheme based on chaotic optimization
LI Bin;,ZHOU Qing-lei;
..............page:3418-3420,3429
Group cooperation method for physical layer security based on cooperated beamforming
HUANG Kai-zhi;,JI Xin-sheng;,KANG Xiao-lei;
..............page:3421-3425
Method to detect Chinese domain name homograph attack
GENG Guang-gang;,HONG Bo;,MAO Wei;,WANG Li-ming;
..............page:3426-3429
DCT and Logistic Map based multiple robust watermarks for medical image
LI Jing-bing;,LIU Yao-li;
..............page:3430-3433,3437
Research on adaptive network theft Trojan detection model
LIU Long;,LIU Sheng-li;,ZHANG Xiao-chen;
..............page:3434-3437
DDoS defense collaborative relationship optimization algorithm based on social network
CHUAI Ying-cai;,FAN Tao;,LIU Xiao-hu;,ZHANG Ming-qing;
..............page:3438-3441
Unicast routing algorithm of earliest deliver based on historical orderliness prediction in DTN
AN Jian-wei;,CHEN Yue-yun;,DU Shuai;,LIU Qian;,ZHOU Xian-wei;
..............page:3442-3444,3454
Novel frame synchronization method for DVB-S2 standard based on SOF + PLSC
KANG Kai;,YAN Zhan;,ZHONG Zi-fa;
..............page:3445-3447
New mechanism applied for congestion control in hierarchical mobile IPv6 networks
FANG Shi-lin;,HU Xu-huai;,LI Yi;,WANG Yue-bin;
..............page:3448-3450,3458
Multi-cell joint processing algorithm based on SLNR criterion
JIANG Jing;,LU Guang-yue;,SUN Chang-yin;,ZENG Yan;
..............page:3451-3454
Design of adaptive cooperation policy in MANET accessing Internet
WANG Lin-tao;,ZHANG Xin-you;
..............page:3455-3458
Congestion control algorithm based on dynamic threshold
LIU Bin;,LIU Wei-yan;,ZOU Xue-lan;
..............page:3459-3461
High speed Chirp BOK square law detection and equalization in multipath channel
FAN Xiao-ming;,LIANG Dong-sheng;,QIU Hong-bing;,ZHENG Lin;
..............page:3462-3464
Robust target tracking in LOS/NLOS hybrid environment based on interactive multiple model
OUYANG Ning-feng;,XU Jian-min;,ZHOU Yan;
..............page:3465-3468
Reservation multiple access protocol in underwater sensor networks based on compressed sensing
KANG Wen-jing;,LIU Gong-liang;,WANG Xue;
..............page:3469-3471,3475
Effective image classification method based on HOG-PCA
LI Lin;,WU Yue;,YE Mao;
..............page:3476-3479
Step by step 3D face reconstruction algorithm based on CLG optical flow
CHEN You-qing;,LI Bai-lin;,LIU Jia-jia;,WANG Qiong;,YUAN Jian-ying;
..............page:3480-3482,3491
3D object recognition based on path-contour
ZHANG Gui-mei;,ZHANG Yi;
..............page:3483-3487,3502
Iterative tensor high-order singular value decomposition method for image restoration
LIANG Xin-gang;,LIU Shi-gang;,QIU Guo-yong;,ZHOU Jun-xiu;
..............page:3488-3491
New appoach to model registration via shape descriptor
LIU Xue-shu;
..............page:3492-3494
Practical license plate recognition method based on multi-feature extraction
FAN Yang-yu;,LEI Tao;,MA Shuang;,WU Peng;
..............page:3495-3499
Feature line extraction method for heritage image
GENG Guo-hua;,HAO Ni;,LI Kang;,YAN Si-hai;
..............page:3500-3502
Ultrasound image despeckling using polar coordinate system and Monte Carlo approach
CHEN Bo;,CUI Jia-liang;,GAO Xiao-ming;,YANG Jin;
..............page:3503-3505,3513
Particle filter tracking method of color and SIFT features based adaptive fusion
HE Bing-wei;,XIE Tian-xu;
..............page:3506-3509
Variational level set method of medical image segmentation based on kernel fuzzy clustering
LIAO Ding-an;,LIU Ya-jing;,SONG Yu-qing;,XIA Qian-qian;
..............page:3510-3513
Image semantic segmentation based on higher-order CRF model
MAO Ling;,XIE Mei;
..............page:3514-3517
Improved algorithm of adaptive Gaussian mixture model for real-time moving object detection
CHEN Yong;,JIAO Bin;,LI Yuan;,LV Xia-fu;
..............page:3518-3520