Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2016 Issue 2
Overview of kernel-based relation extraction
Liu Jing;,Zhao Songzheng;,Zhang Xiaodi;
..............page:321-329
Survey of association rule mining
Cui Yan;,Bao Zhiqiang;
..............page:330-334
Research and application of massive DNS log data analysis and visualization
Chen Wenwen;,Wu Kaichao;
..............page:335-338
Flexible group nearest neighbor queries in road networks
Chen Shu;,Jiang Zhihui;,Lu Heng;,Miao Tianxiang;
..............page:343-346
Certainty rule base inference method using evidential reasoning approach
Jin Liuqian;,Xu Yang;,Fang Xin;
..............page:347-351
Iterated greedy algorithm for mixed constraints flow shop scheduling problem
Zhang Qiliang;,Chen Yongsheng;
..............page:352-355
Character distribution in string matching with wildcards and length constraints
Wang Haiping;,Guo Dan;,Xiang Taining;,Hu Xuegang;
..............page:356-361
Interactive iterative algorithm for multi-scale community discovering
Deng Xiaojun;,Li Yulong;,Man Junfeng;
..............page:362-364,369
New differential evolution algorithm with neighborhood structure based on complex network
Li Wenbin;,Chen Yiying;,He Yichao;,Zhao Shuliang;
..............page:370-374
Chinese text similarity algorithm based on PST_LDA
Zhang Chao;,Chen Li;,Li Qiong;
..............page:375-377,383
Opinion target extraction method based on multi-features in Chinese micro blog
Li Jingyu;,Zhang Yangsen;,Jiang Yuru;
..............page:378-383
Dependency discovery and data recovery of conditional functions based on association rules
Zhang Chunsheng;,Tu Ya;,Weng Hui;,Li Yan;,Wei Guoli;
..............page:384-387
Visual discretization for decision continuous formal context
Zhang Tao;,Shi Haobin;,Li Lin;,Li Zhaohui;
..............page:388-391,395
Comparison of Baidu index and Weibo index in surveillance of influenza virus in China
Lu Li;,Zou Yuanqiang;,Peng Yousong;,Li Kenli;,Jiang Taijiao;
..............page:392-395
Research on topic detection in text stream based on feature ontology
Guo Xin;,Chen Qian;,Xiang Yang;
..............page:396-399
Improved dissimilarity metric for categorical attributes and its application in customer segmentation
Hu Xiaoxue;,Zhao Songzheng;,Wu Nan;
..............page:400-403,408
Block lattice algorithm generating fuzzy concept lattices
Li Chengming;,Chai Yumei;,Zhang Zhuo;
..............page:404-408
Mining method for trajectory pattern based on suffix automaton
Wang Xing;,Jiang Xinhua;,Cai Weiwen;,Liao Lyuchao;
..............page:409-412,416
Accelerate K-means for multi-center clustering of big datasets
Zhang Shunlong;,Ku Tao;,Zhou Hao;
..............page:413-416
Personalized retrieval method based on user profile
Hu Miao;,Dai Muhong;,Chen Hao;
..............page:417-420
Hierarchical adaptive fast K-means algorithm
Zhang Xiaolin;,Cui Ningning;,Yang Tao;,Li Jie;
..............page:421-423,427
Mashup service recommendation algorithm based on implantable guided hierarchical clustering algorithm
Zhang Yonghua;,Li Yuan;,Zeng Fanzi;,Zhou Zhen;
..............page:424-427
K-set-over based distributed tag co-occurrence algorithm in streaming data
Zhu Ming;,Li Yuexin;
..............page:428-430,434
THT-MSMA : efficient multi-string matching algorithm based on double hashing table
Wei Lifeng;,Ji Jianwei;,Wang Ying;,Wang Xiaobin;
..............page:431-434
Subspace-oriented negative selection algorithm
Yang Tao;,Deng Hongli;
..............page:435-438,443
Research on hierarchical linkage scheduling emergency supplies based on genetic algorithm
Hu Feihu;,Tian Chaohui;,Zhao Muhua;,Han Xin;
..............page:439-443
Fault-tolerance cache research based on mixed ECC
Zhao Cai;,Ding Yonglin;,Chen Zhijian;
..............page:444-446,457
Speech enhancement recognition system based on CS
Mao Zhengchong;,Gong Xi;
..............page:450-453
Real-time look-ahead algorithm of NURBS parameter interpolation
Tang Wei;,Cai Guanghui;,Qin Hengfeng;
..............page:454-457
Modelling and analysis for data recovery strategy in business process collaboration
Mo Qi;,Dai Fei;,Zhu Rui;,Da Jian;,Lin Leilei;,Li Tong;
..............page:462-466,482
Formal semantic model for mobile cloud service system
Hou Jinkui;,Zhang Yuyan;
..............page:467-472
Bayes factor for model validation under epistemic uncertainty
Zhao Liang;,Yang Zhanping;
..............page:473-477
Semantic consistence maintenance of reference operations in real-time graph editors
Gao Liping;,Zhang Yuben;,Guo Shuxian;,Fu Qiongqiong;,Wang Shanshan;
..............page:478-482
Attribute-based threshold signcryption with constant ciphertexts
Zeng Fugeng;,Xu Chunxiang;,Sun Lixue;
..............page:483-486
Analysis of DoS attack on name resolution system in information-centric network
Ren Jing;,Li Lemin;,Wang Sheng;
..............page:495-497,517
Combinational side-channel attack on S-box in block cipher
Zhang Shuaiwei;,Yang Xiaoyuan;,Zhong Weidong;,Wei Yuechuan;
..............page:498-501
Lightweight detection approach of DDoS attacks based on GAIG algorithm for feature selection
Jiang Hong;,Chen Shuqiao;,Hu Hongchao;,Qian Kun;
..............page:502-506
Application of center maximization KFCM algorithm based on improved krill herd in intrusion detection system
Li Cong;,Hu Wenjun;,Ding Yong;,Cao Honggen;
..............page:507-512
Method of integrity for malicious code analysis based on environment recognition
Zhang Qian;,Kang Fei;,Shu Hui;,Xiao Ya'nan;
..............page:513-517
Intrusion detection model based on improved multilayer condensation algorithm
Shi Yun;,Chen Zhong;,Sun Bing;
..............page:518-520,530
H.264/AVC video watermarking algorithm against recompression
Li Shuzhi;,Zhang Xiang;,Deng Xiaohong;,Wu Xiaoyan;
..............page:521-525
Research on Bootkit detection technology of ARM Linux device based on JTAG emulation
Jiang Heguo;,Jiang Liehui;,Shu Hui;,Xie Yaobin;
..............page:526-530
Dynamic key negotiation things authentication protocol with lightweight
Cui Wei;,Zhang Guoshan;,Li Hui;
..............page:531-533,539
Comprehensive stable VM migration techniques for managing time-varied workload
Liu Liu;,Yu Hongfang;,Zheng Shaoping;
..............page:534-539
Wireless multimedia broadcast retransmission algorithm based on asymmetric network coding
Xu Yawei;,Lei Junli;,Yao Yukun;,Chen Xi;,Yu Zhilong;
..............page:540-543,548
Dynamic scheduling algorithm based on deadline for Hadoop platform
Zhang Yong;,He Yanjun;
..............page:544-548
Joint algorithm research based on interference alignment on carrier aggregation system in heterogeneous network
Zheng Longlong;,Sun Changyin;,Liu Yu;,Fang Rui;
..............page:571-574
Research on improved congestion control and request forwarding strategies in information-centric networks
Zhao Jinguo;,Luo Qingyun;,Ren Changan;
..............page:575-579,585
Design of distributed cognitive radio MAC protocol for MANET
Zhu Qingchao;,Chen Jing;,Huang Conghui;,Gong Shuiqing;
..............page:580-585
Space image sequence upscaling algorithm based on visual saliency
Zi Lingling;,Cong Xin;,Zhang Yaping;
..............page:586-589
Particle filter tracking algorithm based on graphical model
Zhang Mingjie;,Kang Baosheng;
..............page:590-593
Pedestrian detection method based on deep belief network classification algorithm
Zhang Yang;,Liu Weiming;,Wu Yihu;
..............page:594-597
Energy model based LS-TSVM for action recognition
Ren Xiaofang;,Qin Jianyong;,Yang Jie;,Ren Yongjun;
..............page:598-601,631
Road recognition algorithm under complex environment based on K-means feature
Hao Yunhe;,Zhang Haofeng;,Yu Minjie;,Yi Lei;
..............page:602-606
Research on image mosaic method with moving object
Jiao Ting;,Li Liangfu;,Xiao Zhangshu;
..............page:607-610,615
Vascular extraction with centerline constrained minimal path propagations
Dong Yinmei;,Cao Qing;,Chen Jian;,Liu Qi;,Chen Yang;
..............page:611-615
New robust fuzzy C-means clustering segmentation algorithm and its application
Hou Xiaofan;,Wu Chengmao;
..............page:616-619,623
Remote sensing image registration algorithm combining FAST with DAISY
Zha Yiyi;,Sun Quansen;,Luo Nan;,Ji Zexuan;
..............page:624-628
Image denoising algorithm for UAV visual landing
Hu Yitan;,Cao Jie;,Liu Wei;
..............page:629-631
Image-based ink and color painting quick rendering method
Hu Jianwei;,Cao Juan;
..............page:632-635,640
New year painting stylization from images
Dou Ning;,Wan Liang;
..............page:636-640