Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2016 Issue 8
Digital cancellation algorithms of in-band full duplex
Wang Dan;,Huang Kaizhi;,Li Yunzhou;
..............page:2241-2245
Survey on some new advances in video coding technology
Li Hongsong;,Cheng Fulin;,Ai Xinyu;
..............page:2246-2254
High efficient parallel implementation of BH algorithm on heterogeneous platforms
Li Chanyi;,Wang Wu;,Feng Yangde;,Xie Li;
..............page:2255-2259
Map-matching algorithm research based on spatio-temporal analysis
Liu Weining;,Wang Jieyu;,Zheng Linjiang;
..............page:2266-2269
Research on pickup point location model and algorithm in presence of gradual coverage
Chen Yiyou;,Chen Yiheng;
..............page:2275-2277,2297
Study on GARW recommendation algorithm
Wang Guoxia;
..............page:2278-2281
Domain-specific terms extraction algorithm based on combination of statistics and rules
Fan Mengjia;,Duan Dongsheng;,Du Cuilan;,Zhang Yangsen;,Tong Lingling;
..............page:2282-2285,2306
Information gain-based method of people relationship extraction on Web
Huang Weichun;,Xu Li;,Xiong Liyan;,Zhong Maosheng;
..............page:2286-2289,2293
Measurement study of topology structure and crucial nodes for spread of Weibo topics
Zhong Jie;,Chen Xingshu;,Wang Wenxian;,Shi Jianhong;,Wang Haizhou;
..............page:2290-2293
Topic detection method of outlier pretreatment combining with Singel-Pass for Chinese microblog
Ye Shiren;,Yang Ying;,Yang Changchun;,Zhu Mingfeng;
..............page:2294-2297
Semi-supervised learning algorithm based on label propagation in constrained range
Ma Huifang;,Yuan Yuan;,Zhang Di;,Lu Xiaoyong;
..............page:2303-2306
Collective matrix factorization based topic discovering and tracking model
Yang Dongfang;,Wang Dan;,Zhang Zhibin;,Yang Xinfeng;
..............page:2307-2310
Job scheduling algorithm based on data-aware in Hadoop
Lu Hui;,Gao Hongbo;,Zhang Fengman;,Wang Mei;,Xiao Zhen;
..............page:2311-2314
Resource scheduling methods based on deadline and cost constraint in hybrid cloud
Zuo Liyun;,Dong Shoubin;,Shu Lei;
..............page:2315-2319
Method of complicated pattern recognition based on hierarchical classification strategy
Zhao Mandan;,Hao Xiangyang;,Zhang Zhenjie;
..............page:2320-2323,2330
Dynamic strategy of adding link for cascading failure in complex work
Li Congdong;,Yuan Zhifeng;,Deng Yuan;,Wang Yu;,Cao Cejun;
..............page:2324-2327,2338
Optimization and application of GM(1,1)model based on minimum error
Yue Xi;,Yang Yang;
..............page:2328-2330
Analysis of daily active user in membership-based websites based on user interaction model
Tan Jianqiang;,Yang Jianping;
..............page:2335-2338
Axiomatization and knowledge reduction of full covering GrC model
Qin Qin;,Xie Jun;,Shi Peilin;,Xu Xinying;
..............page:2339-2344
xia qi yao mu
..............page:2344-2344
Catlytic particle swarm optimization and its performance analysis
Meng Anbo;,Li Zhuan;
..............page:2345-2349
Hybrid optimization algorithm based on game theory
Yang Mei;,Liu Jian;
..............page:2350-2352,2362
Real-time fine-gained power budget method for network-on-chip
Rao Dongning;,Li Jianhua;
..............page:2358-2362
Software bug localization based on source code structure
Chang Peipei;,Zhao Fengyu;
..............page:2371-2374
Fault localization method based on predicate hierarchical coverage matrix
Zhu Running;,Zhao Fengyu;
..............page:2375-2380,2395
Formal approach for aspect-oriented software architecture weaving
Hou Jinkui;,Yang Chunhua;
..............page:2381-2385,2416
Lightweight and efficient location-based service privacy protection model
Ni Lihao;,Liu Yanshen;,Liu Yi;,Cui Xiaojun;
..............page:2386-2390
Sensitive data leak detection model based on Android light gateway
Wang Jinping;,Chen Shangye;
..............page:2391-2395
Privacy protection revocation mechanism based on universal one-way accumulator in VANET
Cai Pengfei;,Wang Chongke;,Li Xiaoping;
..............page:2396-2401
Study on GPS generated spoofing attacks
He Liang;,Li Wei;,Guo Chengjun;
..............page:2405-2408
Detecting frame-rate up-conversion forgery in videos using periodicity of PSNR change
Xia Ming;,Yang Gaobo;,Huang Qinzhen;
..............page:2409-2412
Heuristic construction method of LKH multicast key tree
Liu Haike;,Zhang Huajian;,Li Jilin;,Zou Guangnan;
..............page:2413-2416
Network security situation forecasting based on combining kernels function relevance vector machine
Liu Fumin;,Wang Jingyong;,Zhang Zhibin;
..............page:2417-2419,2424
Research on TPMAuthData derived scheme based on bilinear maps
Zhao Na;,Jia Zongpu;,Peng Weiping;,Song Cheng;
..............page:2425-2428
Security analysis of information flow policy on model checking
Shao Jing;,Yang Zheng;,Chen Zuoning;,Yin Hongwu;
..............page:2429-2432
Form-syntax based Fuzzing method for industrial control protocols
Zhang Yafeng;,Hong Zheng;,Wu Lifa;,Kang Hongkai;,Sun He;
..............page:2433-2439
Design of closed-loop model on selfish behavior in MANET
Zhu Qingchao;,Chen Jing;,Gong Shuiqing;,Shi Ting;
..............page:2446-2450
Impact of channel randomness to critical density of wireless sensor networks
Kang Lin;,Dong Zengshou;,Li Xiuhua;,Li Jinlan;
..............page:2451-2453
Minimum transmission delay algorithm design in multi-hop opportunity network
Tan Ziyi;,Chen Zhigang;,Wu Jia;,Zhang Weibin;
..............page:2458-2461
Optimal path allocation algorithm based on load balancing for SDN
Wang Chunzhi;,Luo Chen;,Chen Hongwei;
..............page:2462-2466
SVC transmission scheme over wireless networks
Tian Bo;,Cai Shuting;,Yang Yimin;
..............page:2467-2469,2474
Cloud P2P network index framework for supporting multidimensional range query
Liu Jingyan;,Chen Shiping;
..............page:2470-2474
Research on reconnecting strategy of adaptive networks based on cellular automata
Cao Yulin;,Zhao Yanxin;,Wang Xiaoming;
..............page:2475-2478
Multi-QoS objective constrained task scheduling strategy of cloud computing
Deng Jianguang;,Zhao Yuelong;,Yuan Huaqiang;
..............page:2479-2482,2490
Novel reconstruction algorithm for frequency hopping signals
Ren Xu;,Zhu Weigang;
..............page:2483-2485,2495
High real-time service scheduling method in wireless Mesh network
Wang Jintao;,Zeng Peng;,Li Dong;,Zheng Meng;
..............page:2491-2495
Coherent noise filtering algorithm in SAR images based on FCMalgorithm
Li Yufeng;,Li Jingfang;
..............page:2496-2499,2503
Mixture hyperplanes approximation for template tracking
Gu Song;,Ma Zheng;,Xie Mei;
..............page:2500-2503
Research on remote sensing image parallel processing method for partition facet template
Du Genyuan;,Zhang Huolin;,Miao Fang;
..............page:2504-2508
Facial expression recognition based on LBP/VAR and DBN model
He Jun;,Cai Jianfeng;,Fang Lingzhi;,He Zhongwen;
..............page:2509-2513
Detection for railway fasteners based on local features and semantic information
Luo Jianqiao;,Liu Jiajia;,Li Bailin;,Xiong Ying;
..............page:2514-2518,2523
Face recognition with pose variation based on fusion of multi-scale MRF and SCT
Chu Xiao;,Leng Ze;,Wang Yanling;,Liu Hongcheng;
..............page:2519-2523
Large broken color texture image inpainting using non-local CTV-L1 model
Lu Wenqi;,Duan Jinming;,Wei Weibo;,Pan Zhenkuan;,Wang Guodong;
..............page:2524-2529
Hybrid high-order total variation regularization method for motion blur image blind restoration
Zhang Suqi;,Liu Qiaohong;,Li Bin;
..............page:2530-2533
Distributed inspection method for detect with blurry contour of TFT-LCD
Xia Xiaoyun;,Zhang Renbin;,Xie Rui;,Wang Cong;
..............page:2534-2538,2542
Method of basing on neighboring voxel selection for white matter fiber crossing and bifurcating
Yang Zhifei;,Lyu Xiaoqi;,Zhang Ming;,Ren Guoyin;
..............page:2539-2542
Color image matching technology based on improved parallel particle swarm optimization
Yang Jin;,Gao Fei;,Ma Liang;
..............page:2543-2546
Object tracking by fusing narrow-band graph cuts and shape information
Liu Liman;,Zhang Zhiguo;,Man Zhengrui;
..............page:2547-2551
Motion segmentation method using visual saliency detection
Hua Man;,Li Yanling;
..............page:2557-2560