Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2014 Issue 10
Optimization study of shared cache for multi-core processor
CHEN Zhan-long;,WU Liang;,ZANG Ying;,ZHANG Ding-wen;
..............page:2881-2887
Survey of task analysis and task modeling methods in HCI
HUA Qing-yi;,LI Juan-ni;,ZHANG Min-jun;
..............page:2888-2895
Survey of CIM modeling and model formalization
GU Ai-hua;,LI Qin-feng;,LI Zong-hua;,ZHOU Xiao-feng;
..............page:2896-2901
Multi-sensor quantized fusion tracking algorithm for non-cooperative target
GE Quan-bo;,GUAN Bing-lei;,TANG Xian-feng;,XU Xiao-liang;
..............page:2902-2906
Domain-oriented microblog authoritative user analysis and research
DING Jun;,RUAN Tong;,ZHANG Ya;
..............page:2907-2911
Text clustering based on QPSO algorithm optimized by GA
MA Wei;,QIAO Ying-ying;,SONG Wei;
..............page:2912-2915
Graph mining based on co-occurrence frequent-item tree and inverted matrix
LI Tao;,XIAO Nan-feng;
..............page:2916-2919,2924
Improved particle filter algorithm based on artificial glowworm swarm optimization
XU De-zhang;,ZHU Wen-chao;
..............page:2920-2924
Chemical reaction ant colony optimization algorithm
LI Wei;,YANG Zhen;,ZHOU Hui;,ZHU Li-qing;
..............page:2925-2927,2946
Research on vehicle scheduling optimization in emergency material distribution based on improved genetic algorithm
HU Fei-hu;,LI Wei;,MA Bei-long;,YANG Li;
..............page:2928-2932,2936
Bus route choice model under influence of information accounting for latent class
GUO Hong-yang;,LIU Lan;,YIN Jun-song;,ZHANG Xi;
..............page:2937-2940,2981
Robustness analysis of railway transer system based on complex network theory
LI Yong-shu;,LIU Gang;
..............page:2941-2942,2973
Empirical study on trust mechanism of cloud based inter-organizational information systems
Ivan K.W.Lai;,River CHU;,TONG De-rong;
..............page:2947-2951
Multi-agent invasive weed optimization algorithm
HUANG Zuo-xing;,SONG Yu-jian;,YE Chun-ming;
..............page:2957-2961
Bat algorithm by using maneuver flight
WANG Wen;,WANG Xiao-wei;,WANG Yong;
..............page:2962-2964,2989
Cross-entropy-inspired bat algorithm for absolute value equation
LI Guo-cheng;,XIAO Qing-xian;
..............page:2965-2968,2985
Self-adaptive algorithm for network maximum flow problem: SAPR algorithm
JIANG Jin-cheng;,LI Zhi-feng;,WU Li-xin;,YANG Yi-zhou;
..............page:2969-2973
Interval maximum entropy method for unconstrained nonlinear lp problem
CHEN Bi-ke;,LI Su-bei;,YANG Jing;,ZHAO Jian-qiang;
..............page:2974-2976
Humanoid robot arm grasping motion planning algorithm based on generalized inverse RRT
DAN Tang-ren;,LI Hua-zhong;,LIANG Yong-sheng;
..............page:2977-2981
Parallel depth first search algorithm on multicore-CPU and GPU
LI Ken-li;,YU Ying;
..............page:2982-2985
Epidemic model with invisible patients on complex networks
LIU Fang-ai;,WANG Shu-xian;,WU Nan;
..............page:2986-2989
Method of semantic mapping based on context
CHEN Shu-xin;,ZHANG Ling-yu;,ZHANG Xin;
..............page:2990-2993,2997
Application of generalization language model in Chinese-Uyghur machine translation
LI Xiang;,MI Cheng-gang;,NAN Jiang;,YANG Ya-ting;,ZHOU Xi;
..............page:2994-2997
Dynamic estimation method of software project effort
SONG Xi-wei;,YANG Fang-fang;,ZHANG Jun-guang;
..............page:2998-3001
Part-Join: partition based string similarity join
CHEN Yi-cheng;,LI Jian-zhong;,LUO Ji-zhou;
..............page:3002-3006
Global negotiation model based on Norm and trust evaluation
JU Jun-mei;,ZHAO Jun;
..............page:3007-3010
Design and implementation of multi-function vehicle bus controller and testing/monitoring equiptment for railway vehicles
DENG Yang-dong;,FAN Hai-ning;,HU Ding-xiang;,LI Zong-hui;,WAN Hai;,XU Qiao-chu;,YAN Nai-peng;
..............page:3011-3016
Bi-level objective model of optimal parking lot recommendation based on parking guidance signs
FU Qiang;,NIU Zhao-yu;,YANG Xiao-fang;
..............page:3017-3019,3040
Dynamic multiple sub-population QPSO algorithm and its application in optimized adhesion control of locomotive
FENG Xiao-yun;,LI Ning-zhou;,WEI Xiao-juan;
..............page:3020-3023,3027
Query expansion integration of correlation rules and ontology weight graph
CAI Rui-chu;,HAO Zhi-feng;,LU Yin-zhang;,WEN Wen;
..............page:3028-3032
Self-adaptive activity recognition method based on CHMMs
LI Jun-huai;,WANG Zhi-xiao;,WEI Wei;,YAN Qi-song;,ZHANG Jing;
..............page:3037-3040
New conflict evidence fusion method based on confidence distance
HE Li-zhi;,JIANG Peng;,ZHANG Cui-fang;
..............page:3041-3043,3051
Data de-duplication mechanism for cloud storage systems
BI Chao-guo;,XU Xiao-long;
..............page:3052-3055,3060
Dynamic data integrity detection method in cloud storage service
HU De-min;,YU Xing;
..............page:3056-3060
Variable step-size modified constant modulus algorithm based on MISO equalizers
SHI Yan-yan;,WANG Shan-shan;,ZHANG Yan-ping;
..............page:3065-3067
Set pair analysis of advanced radar emitter signal feature
JIN Wei-dong;,YU Zhi-bin;,ZHU Bin;,ZHU Jian-qu;
..............page:3068-3070
NBS optimization based resource allocation method with high energy efficiency in cognitive networks
XU Shuo-na;,YIN Xiang-dong;,ZENG Bi-qing;
..............page:3071-3074
Efficient indexing method for massive data in cloud computing
HUANG Bin;,PENG Xiao-ning;,PENG Yu-xing;
..............page:3075-3077
Soft-decision dual-mode blind equalization algorithm based on clustering
JI Yi;,ZHANG Yan-ping;
..............page:3078-3080,3086
Content routing lookup mechanism based on hash coding
DU Chuan-zhen;,LAN Ju-long;,TIAN Ming;
..............page:3081-3086
Querying encrypted range data based on symmetric encryption
CHEN Ai-guo;,LUO Guang-chun;,PENG Ning-duo;,QIN Ke;
..............page:3087-3089
New public key exchange protocol based on neural synchronization
HUANG Hong-yu;,LIAO Xiao-feng;,REN Xiao-xia;
..............page:3090-3092,3099
Signcryption scheme with public verifiability and forward security
CHEN Jian-hua;,HE De-biao;,QI Ming-ping;
..............page:3093-3094
New learning rule of neural cryptography based on queue mechanism
LUO Cheng-e;,YAN Wei;,ZHANG Li-sheng;
..............page:3095-3099
Novel encryption algorithm based on discrete chaotic system and SHA-1
DENG Hai-tao;,DENG Jia-xian;,WANG Di;
..............page:3104-3107
Differential private data publishing algorithm for building decision tree
JIN Da-wei;,XIONG Ping;,ZHU Tian-qing;
..............page:3108-3112
Video copy detection based on ORB and ordinal measure feature
HAO Xiao-yan;,ZHANG San-yi;,ZHANG Xing-zhong;
..............page:3113-3116
Solutions to deal with DoS attacks of DSR-BCA protocol
LIANG Jian-wu;,MA Xiao-liang;,XU Jian-ming;,XU Long-long;
..............page:3117-3119
Research on prediction model of computer network threats based on botnet activity
XUE Dang-qin;,ZHAO Huan-ping;
..............page:3120-3121,3130
Differential fault analysis on SHACAL-2*
LI Chao;,SHEN Xuan;,ZHAO Guang-yao;
..............page:3122-3124
Research on trusted boot technology based on collaborative virtualization system
GUO Yu-dong;,LOU Rui;,SONG Yu;
..............page:3125-3130
Color image encryption method based on chaotic systems
JIANG Jun-li;,ZHANG Xue-feng;
..............page:3131-3136,3140
New serverless authentication protocol for RFID
CHEN Ming;,CHI Tao;,YAN Zhen;
..............page:3137-3140
Effects of three kinds of cyclic shift transformation to rotational attack
LI Yun-qiang;,WANG Ai-lan;,ZHAO Tu-hua;
..............page:3141-3144
Matching algorithm integrated feature points and contour information
LI Bai-lin;,WANG Qiong;,YUAN Jian-ying;
..............page:3145-3147
CAD mesh model of controllable precision and lightweight algorithm
LIU Yun-hua;,LUO Nian-meng;,RAO Gang-yi;,ZHU Lin;
..............page:3148-3151
New kind of curves and surfaces construction method
HAN Xu-li;,YAN Lan-lan;
..............page:3152-3157
Fuzzy KNN classification for criminal investigation image scenes
FAN Jiu-lun;,GAO Zi-ming;,LIU Ying;,WANG Qian;,ZHAO Yu-dan;
..............page:3158-3160,3164
Pedestrian detection method based on multi-features
FANG Jing;,HU Qing-xin;,ZHANG Chun-yang;
..............page:3161-3164
Research on related modeling between image motion of remote sensor and image parameters
CHEN Qiang;,GAO Kai;,GU Yi-he;,HUANG Zhe;,SUN Quan-sen;,ZHANG Rui-zhi;
..............page:3165-3168,3180
Real-time and global searching tracking algorithm based on distributions fields
CHIGAN Peng-fei;,NING Ji-feng;,SHI Wu-zhen;
..............page:3169-3172,3176
Graphics text detection with max gradient difference
GAO Chao;,GAO Shi-lin;,JI Li-xin;
..............page:3173-3176
Inner-grid parking CA approach in analyzing pedestrian scenario
LIU Peng;,TANG Xiang-long;,YE Zhi-peng;,ZHAO Wei;
..............page:3177-3180
Interactive active contour model based on fuzzy connectedness
DAI Jia-shu;,DENG Ting-quan;,YANG Dong-liang;
..............page:3181-3183,3195
Local shape contexts algorithm for hand shape verification in auxiliary authentication
DING Teng-fei;,NIE Mei-ling;,TANG Chun-ming;
..............page:3184-3187
Adaptive patch-based algorithm for dynamic scenes HDR image generation
LI Wei;,LI Yan-mei;,LUO Jian;,ZHU Li-qiang;
..............page:3188-3191
Approach to solving compressive sensing matrix based on sparse similarity measurement
QI Yun-song;,SHI Liang;,SONG Xiao-ning;
..............page:3192-3195
Fast line detection method applied in UAV high voltage line inspection
CAO Wei-ran;,HAN Jian-da;,ZHU Lin-lin;
..............page:3196-3200