Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Xi'an Jiaotong University
0253-987X
2013 Issue 2
Feature Selection Algorithm Based on Neighborhood Decision Distinguishing Rate
ZHU Wenzhi;SI Gangquan;ZHANG Yanbin
..............page:20-27
Deployment and Scheduling of Virtual Machines in Cloud Computing: An "AHP" Approach
ZHUANG Wei1;2;GUI Xiaolin1;2;LIN Jiancai1;WANG Gang1;DAI Min1
..............page:28-32,130
An On-Demand Service Composition Method Based on Trustworthy Quality of Service
CAO Buqing1;LI Bing2;LIU Jianxun1
..............page:131-138
Design of an Agile Service Composition Approach Model
SHI Yi1;QIU Jinfeng1;HOU Di1;QI Yong1;LIN Qinying2
..............page:1-6,68
An Adaptive Iterative Chaos Optimization Method
FU Wenyuan;LING Chaodong
..............page:33-38
An Adaptive Shadow Detection Algorithm Using Edge Texture and Sampling Deduction
JIANG Ke;LI Aihua;SU Yanzhao
..............page:39-46
Self-Decision Geographic Opportunistic Routing for Highly Dynamic Networks
LI Linqi;YANG Xinyu;LIU Wei
..............page:7-13
An Accurate Estimation Algorithm for Phase Parameters of Multi-Chirp Signals
ZHENG Jibin1;REN Aifeng2;SU Tao1;ZHU Wentao1
..............page:69-74
A Low Power Test Pattern Generation Method
ZHANG Guohe;JI Lili;ZHANG Linlin;LEI Shaochong;LIANG Feng
..............page:47-52
A New Optimization Method for Thresholds and Collaborative Targets Detection in Perimeter Monitoring
DENG Sui1;2;DENG Hanlin1;LIANG Qingwei2;CAO Hongbing1;LIU Haitao1
..............page:75-80
A Method to Detect Network Attacks Using Entropy in the Intrusion Detection System
XIA Qin;WANG Zhiwen;LU Ke
..............page:14-19,46
Multiscale Non-Parametric Level Set Segmentation of Ultrasound Echocardiography
GAO Yanhua1;LIU Yuhuan2;YU Gang2
..............page:53-57,96
Simulation and Optimization of Capacitance Sensor Based on Orthogonal Test
WANG Xiaoxin;YAN Jiebing;HU Hongli;GAO Xiangxiang;ZHANG Xiao
..............page:81-86
A Distributed Authentication Protocol for VANET
LIU Hui;LI Hui
..............page:58-62
Modified Electrical Conductivity Model for Transformer Oil-Based Nanofluids
MIAO Jin1;DONG Ming1;YANG Yanbo1;SHEN Liangping2;WANG Hao2
..............page:87-91
A Parsing Architecture for Bidirectional Forwarding-Oriented High-Speed Packet
DONG Yongji1;GUO Yunfei1;2
..............page:63-68
Actuating Principle of Online Automatic Balancer with Counter Weight Driven by Magnetic Force
FAN Hongwei;JING Minqing;WANG Renchao;LIU Heng
..............page:97-102
Stress Analysis and Experiments for Slipper Retainer and Ball Guide in Axial Piston Pump
SUN Yi1;LI Yang2;JIANG Jihai1
..............page:103-108
On-Demand Integration of Cross-Organizational Data in a User-Guided Way
WEN Yan1;2;LIU Chen2;HAN Yanbo2
..............page:116-123