Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2015 Issue 11
Survey of security analysis for role-based access control
Xiong Houren;,Chen Xingyuan;,Du Xuehui;,Wang Yigong;
..............page:3201-3208
Survey on homomorphic encryption technology
Li Lang;,Yu Xiaozhong;,Yang Yaqiong;,Zheng Lanlan;
..............page:3209-3214
Longitudinal study on evolution of Internet traffic
Zhang Zexin;,Li Jun;,Chang Xiangqing;
..............page:3215-3221
Research on genetic algorithm based on adaptive mechanism
Qu Zhijian;,Zhang Xianwei;,Cao Yanfeng;,Liu Xiaohong;,Feng Xiaohua;
..............page:3222-3225,3229
Solution of knapsack problem based on improved bat algorithm
Li Peize;,Wang Shanshan;,Fan Yan;
..............page:3226-3229
Resource scheduling of cloud computing platform based on improved particle swarm optimization
Wang Dewen;,Liu Xiaomeng;
..............page:3230-3234,3246
Information filtering via non-equilibrium heat conduction with consideration of popularity
Hou Lei;,Hu Zhaolong;,Zhang Bo;,Liu Jianguo;
..............page:3235-3237
Social recommendation algorithm based on spectral clustering with Nystrm extension
Li Zhenbo;,Xu Guiqiong;,Zha Jiu;
..............page:3238-3241
First-order Bayesian derivative classifier based on Gaussian density
Du Ruijie;,Wang Shuangcheng;,Gao Rui;
..............page:3242-3246
Weighted co-association matrix oriented evolutionary clustering
Zhou Songhua;,Ouyang Chunjuan;
..............page:3247-3251,3268
Reconstruction coefficients based subspace clustering combination algorithm
Xu Kai;,Wu Xiaojun;
..............page:3252-3255
Collaborative filtering algorithm with stepwise prediction
Xiao Mingbo;,Zheng Xinwei;
..............page:3256-3258,3272
Decreasing privacy preserving data mining based on granular computing
Cheng Shutong;,Xu Congfu;,Dan Hongwei;
..............page:3264-3268
Green power control algorithm based on cloud task consolidation
Li Weiping;,Wang Gang;,Yang Jie;
..............page:3269-3272
Double subgroups fruit fly optimization algorithm for solving 0-1 knapsack problem
Li Dong;,Zhang Wenyu;
..............page:3273-3277,3282
Reliability evaluation of machining center based on mixed Weibull distribution
Zhang Genbao;,Yang Xingyong;,Li Lei;,Li Dongying;
..............page:3278-3282
Parallelization and WCRT analysis of space debris detector-DEBIE
Kang Shaohua;,Gu Zhimin;,Fu Yinxia;,An Likui;
..............page:3283-3286,3290
New method for calculating string similarity fusing location information
Xiao Yu;,Cui Rongyi;,Huai Libo;
..............page:3287-3290
Improved artificial bee colony algorithm
Liang Jing;,Ge Yu;,Ran Xiaojuan;,Li Qi;
..............page:3295-3299
Improved business process similarity retrieval algorithm and realization
Yu Xinghua;,Zhong Liangwei;
..............page:3300-3303,3308
Lag synchronization of different time-delay chaotic system and its circuit simulation
Cheng Peng;,Lu Juan;
..............page:3309-3311,3318
Sequential pattern mining algorithm based on MapReduce programming framework
Yu Xiao;,Ma Chuanxiang;,Li Weiliang;,Jin Cong;
..............page:3312-3314
Term relationship acquisition and verification based on OMKast
Wang Nana;,Huang Yunyou;,Tang Suqin;,Wang Shi;,Cao Cungen;
..............page:3319-3323
Research of software fault prediction based on PU learning
Zhang He;,Li Mei;,Zhang Yang;,Cai Xiaoyan;
..............page:3324-3327,3331
Building three-way interaction combinatorial test suites with ant colony optimization
Wang Xiaoyin;,Wang Shuyan;,Sun Jiaze;
..............page:3328-3331
Change impact analysis and test cases optimization method on document converter
Bai Qianqian;,Mu Yongmin;
..............page:3332-3335
Plant leaf classification system using CBIA and WSN
Li Chen;,Yao Wei;,Han Zhongwei;,Gao Yihong;,Jiang Tao;,Ding Huijun;,Wang Zhenyu;,Shen Minmin;
..............page:3336-3340
Application of hybrid ant colony algorithm in nonlinear harmonic balance analysis
Liu Wenjin;,Cong Rijing;,Nan Jingchang;,Li Dongmei;
..............page:3341-3344
Deep Web search interface maintenance method based on evolution version
Shu Changbo;,Shi Huaji;,Wang Ji;
..............page:3345-3348
Self-tuning of PID parameters based on modified Solis & Wets algorithm
Bai Guozhen;,Jing Pengxiang;,Luo Yanjie;
..............page:3349-3351,3355
Improved virtual force-based node deployment approach in wireless sensor networks
Zhang Tao;,Yu Xiangyu;,Lan Junjian;,Huang Weipeng;
..............page:3356-3358,3363
Coverage performance study based on target trajectory for heterogeneous sensor networks
Qin Ningning;,Zheng Xin;,Wu Hongjie;,Xu Baoguo;
..............page:3359-3363
New scheme of game-theoretic based cell selection in Macro-Pico heterogeneous networks
Li Feng;,Geng Lina;,Zhu Shihua;
..............page:3364-3367
Pheromone-based ant colony replica selection mechanism in cloud storage
Zuo Fang;,He Xin;
..............page:3368-3370,3374
Satellite links data forwarding algorithm oriented delay tolerant
Zhang Yi;,Du Xuehui;,Xu Guoyu;,Shi Xiaowu;
..............page:3375-3378
Prediction-based strategy of message adaptive forwarding for opportunistic networks
Liang Quan;,He Wenwu;,Zhang Yonghui;
..............page:3379-3382,3407
Mobile IPTV video quality optimization algorithm for user’s QoE
Zeng Wenjuan;,Gao Haibo;,Wang Jing;
..............page:3383-3386
Selection of manufacturing equipment cloud service based on quality evaluation and requirement matching
Zhao Qiuyun;,Wei Le;,Shu Hongping;
..............page:3387-3390,3394
Adaptive modulate artificial fish school optimized PTS algorithm
Zhu Yangkun;,Da Xinyu;,Zhang Yapu;,Wang Shu;
..............page:3391-3394
Dynamic cluster-based routing algorithm in DTN
Zhong Yun;,Xia Jingbo;,Fu Kai;,Bai Jun;,Zhang Yibo;
..............page:3395-3398,3412
Logistics cloud service discovery technology research based on semantics
Zhang Shuiwang;,Wang Yong;,Hu Xiaojian;
..............page:3399-3403
Recognition method to style of guard intervals in OFDM signal
Zhang Mengbo;,Yang Xiaojing;,Zhang Xinran;,Zhang Dai;
..............page:3404-3407
Secure computation service protocols for matrix singular value and norm
Liu Xin;,Li Shundong;,Chen Zhenhua;,Wang Yanchao;
..............page:3413-3415,3425
Research on improvement of information-centric networking architecture for NetInf security
Liu Jiefang;,Zhao Bin;,Zhou Ning;
..............page:3416-3420,3429
Research of network security risk prediction model based on cloud computing
Guo Zuhua;,Li Yangbo;,Xu Lixin;,Zhang Xiao;
..............page:3421-3425
Security analysis and improvement of certificateless signcryption scheme
Qin Yanlin;,Wu Xiaoping;
..............page:3426-3429
Efficient tripartite quantum secret direct sharing scheme
Zhang Xiaoqian;,Tan Xiaoqing;,Liang Cui;
..............page:3430-3434
Image encryption algorithm based on complete Latin square
Yang Liuyang;,Lyu Xiang;
..............page:3435-3438,3442
Malware detection method based on covering sensitive points
Qin Yanfeng;,Wang Qingxian;,Zeng Yongjun;,Xi Qi;
..............page:3439-3442
New method to improve identification rate of encrypted bit stream in data link layer
Xing Meng;,Wang Tao;,Wu Yang;,Li Jindong;
..............page:3443-3447
Faster FHE scheme over integers
Dai Hongyan;,Ding Yong;,Lyu Haifeng;,Gao Wen;
..............page:3448-3451,3455
Detection of jamming transmission of beacon in vehicular networks
Chen Dan;,Peng Limin;
..............page:3452-3455
Evaluating quickly method for DDoS attack on authority DNS service
Pan Lanlan;,Yuchi Xuebiao;,Hu Anlei;
..............page:3456-3459
Optimization solution of 2 dimension geometry constraints based on problem decomposition
Gao Xueyao;,Zhang Chunxiang;,Lu Zhimao;
..............page:3460-3462
Online weighted multiple instance object tracking via active feature selection
Sun Baiwei;,Chen Xiuhong;,Qian Kai;
..............page:3463-3466,3470
Threshold segmentation of uneven illumination images
Wang Zhong;,Zheng Ronghao;,Fu Luhua;,Gou Jiansong;
..............page:3467-3470
Region-based Markov random field renal cortex 3D segmentation method
Shi Yonggang;,Chen Qing;,Zhu Feng;,Liu Zhiwen;
..............page:3471-3474,3479
Mean-Shift tracking algorithm based on boundary detection and sandbags kernel function
Cao Yiqin;,Xiao Jinsheng;,Huang Xiaosheng;
..............page:3475-3479
Polarimetric SAR image classification by introducing polarization orientation angle feature
Wang Jianbo;,Wang Chao;,Zhang Hong;,Wu Fan;
..............page:3484-3488
Robust accurate camera calibration method
Wen Tao;,Zuo Dongguang;,Li Zhongke;,Li Zhanliang;,Yu Weizhong;
..............page:3489-3491,3495
Disparity map refinement based on image region segmentation and region mapping
Zhang Jinglei;,Ji Ling;
..............page:3492-3495
Precise eye location in low resolution image
Xu Guoqing;
..............page:3501-3503,3512
Facial expression recognition based on differential texture features
Xia Haiying;,Xu Luhui;
..............page:3504-3507
Multi-resolution terrain height-field data compression for rapid GPU decoding
Zhang Bingqiang;,Jiang Benqing;,Fang Jun;
..............page:3513-3517,3520
Face recognition of collaborative representation based on virtual samples
Zhang Zhelai;,Ma Xiaohu;
..............page:3518-3520