Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2004 Issue 10
Stateful inspection firewalls based on special protocol stack
lin shao tai ; zhang hui ting ; guo xi quan
..............page:62-63,66
ARP spoofing detection and recovery based on WinPcap
chen hui ; tao yang
..............page:67-68,85
Novel method of color image enhancement
shi mei hong ; li yong gang ; zhang jun ying ; wu dai ming
..............page:69-71,74
Logical operation-based binary image retrieval
liu yu jie ; zhao guo ying ; li zong min ; li hua
..............page:72-74
Face recognition based on eigenface analysis and wavelet transform
chen su ; ni lin
..............page:75-77,81
Efficient stereo-image feature detection algorithm based on tree structure
yu hong shan ; wang yao nan
..............page:78-81
Voxel-based optimized volume rendering techniques
hong qi ; zhang shu sheng ; xu xia gang
..............page:82-85
Generation algorithm of fractal 3D graphics based on L system
han xiang feng ; liu xi yu
..............page:86-87,91
Corner detection algorithm based on euclidean distance
shang zhen hong ; liu ming ye
..............page:88-91
New fast algorithm to sparsely decompose images
yin zhong ke ; wang jian ying ;pierre vandergheynst
..............page:92-93,96
Real-time motion detection based on adaptive background
pan shi zhu ; zuo wei qun ; wang xing
..............page:94-96
Watermarking scheme for copyright protection
zhou qing ; liao xiao feng
..............page:97-99,104
Algorithm of cascade RBF-LBF neural netwok for classification
liu hua ; gao da qi
..............page:100-104
Research and application on access control model based on workflow
wang jing ; zhang ; li jun huai
..............page:112-115
Anonymous signcrption scheme based on ECC
shang jiu qing ; xu qiu liang ; liu xin
..............page:59-61
Information hiding algorithm based on digital modulation
wu ming qiao ; zuo xin guang
..............page:56-58
Design of chaotic system and application in image secure transformation
chen yong hong ; huang xi zuo
..............page:52-55
Passing NAT of VPN by improving UDP based on Agent
lu song feng ; hu wei zuo
..............page:50-51,55
Adaptive routing protocol with power and mobility-aware in Ad Hoc network
xu li ; huang zuo ning ; zheng bao yu
..............page:46-49
Reliable multicast routing protocol in mobile Ad Hoc networks
sun bao lin ; li la yuan ; xu wei
..............page:43-45,49
Design and implementation of data exchanging based on E-mail under.NET framework
wan jun wei ; chen hong yan
..............page:40-42
Analysis and design of communication server based on EPOLL and SPED
duan han cong ; lu xian liang ; song jie
..............page:36-39
Research of conflict detection algorithms for policy-based network management system
jiang kang li ; xiong qi bang
..............page:33-35
Model approach to security audit domain
shi xing jian ; li wei hua ; wang wen qi
..............page:31-32
Research of secure reputation mechanism in mobil Ad Hoc network
xie zuo ; chen song qiao ; wang jian xin
..............page:27-30
Hybrid chaos optimization algorithm for nonlinear programming problem
yang jun jie ; zhou jian zhong ; yu zuo ; wu zuo
..............page:119-120,124
Study of integrated scheduling of tasks and messages in distributed real-time systems
li qiang ; zhan lei ; feng jian xiang
..............page:125-126,129
Design of mobile application based on working-set
su zuo ; wang zi gang ; ci lin lin
..............page:127-129
Improvements about halstead model in software science
yin yun fei ; zhong zhi ; zhang shi chao
..............page:130-132
Research of Web Service middleware based on Agent
zhang xiao bo ; liu wei ; qiu ke ning ; zhong run lu ; cheng liang yu
..............page:133-135
Uncertainty analysis of ant colony optimization algorithm
zeng zhou ; song shun lin
..............page:136-138
Constraint of co-evolution optimization in foundation excavation using genetic algorithms
chen qiu lian ; li tao shen ; wu heng ; zhou dong
..............page:139-140,143
Application of hit/miss transform in separation of standard answer card
zhang xiang rang ; cui
..............page:141-143
Discussion about ETL based on banking application
zhou long ; yao yao wen
..............page:147-150
Integrating intelligent building with CORBA
yi tao ; zuo ; pu ji guang
..............page:151-152,155
Data processing in designing scalable workflow management system
yao dan dan ; jin dan
..............page:153-155
Method of IP traceback CIPM
yang min ; zhang xiao song ; wang zuo ; tan hao
..............page:156-157,160
Detection method for search engine spam based on Web structure mining
ran li ; he yi zhou ; xu long fei
..............page:158-160
Mining pattern from stream data based on counting
zhou ao ying ; chong zhi hong
..............page:4-6
Database system on the grid
wang shan ; zhang kun long
..............page:1-3,23
Fuzzytower-based QoS unicast routing algorithm
wang xing wei ; yuan chang qing ; zhang jie ; huang min
..............page:24-26
Optimization of feed-forward neural networks based on artificial fish-swarm algorithm
ma jian wei ; zhang guo li ; xie hong ; zhou chun lei ; wang jing
..............page:21-23
Comprehensive evaluation method of association rules and an practical example
su zhan dong ; you fu cheng ; yang bing ru
..............page:17-20
Survey on semantic Web and Ontology
du xiao yong ; li man ; wang da zhi
..............page:14-16,20
Study on real-time data stream management techniques
yu ge ; wang guo ren
..............page:11-13,26
Knowledge discovery based on Gene Expression Programming--History, achievements and future directions
tang chang jie ; zhang tian qing ; zuo ; wang rui ; jia xiao bin
..............page:7-10