Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2005 Issue 1
Fuzzy clustering method based on Tabu search
liu su hua
..............page:42-44,48
Application of AdaBoost method in IDS
guo hong gang ; fang min
..............page:144-146
Scheme of optimizing intrusion detection system
fang jie ; xu feng ; huang zuo
..............page:147-149
Research on the network immune system based on replication behavior of the viruses
zhang tao ; wu zuo ; zuo zuo
..............page:150-153
A security management platform for multi-application card
wang tong yang ; qin bao an ; wu jun jun
..............page:154-156,159
Electronic auction protocol with group signature
su yun xue ; zhu yue fei ; zuo li ping
..............page:157-159
Research and design of Web-based OLAP object pool technology
yang qing yue ; yang dong qing ; tang shi wei ; wang teng zuo
..............page:52-55
Schedule risk management method of software project based on critical chain
jiang guo ping ; chen ying wu
..............page:56-57,72
Dynamic constructing of small system based on object files
wang zuo ; tong jian lin ; wang jia
..............page:58-60
Credit model of Grid resource management
ma man fu ; wu jian ; hu zheng guo ; chen ding jian
..............page:61-64
Research on test cases generation technology of classes based on EMDPN
gong hong fang ; li jun yi ; zou bei zuo
..............page:65-68
Design and implementation of a cache mechanism for a lightweight persistent object manager
he qing ; lu xian liang ; song jie
..............page:69-72
Related techniques of component reuse in Java
qiu wan bin ; zhang guo jie ; zuo hong lin
..............page:73-75
Analysis of kernel object of Linux 2.6
ding xiao bo ; sang zuo ; zhang ning
..............page:76-77,84
Comparison and development of two styles of Web services invocation
lu xiao fang ; fu xin jian
..............page:78-80
Integration middleware of heterogeneous information resource based on Web
zheng zuo feng ; yu bin
..............page:81-84
Research and implementation of process automation system oriented dynamic compounding of Web service
zhou kun ; deng bao hua ; lin qi sheng ; yao dan lin
..............page:85-87,90
Automation regression testing in Java project
you yong kang ; liu nai zuo
..............page:88-90
Research and implementation of compiler based on CORBA component model
zheng xian rong ; huang jie ; jia yan
..............page:91-92,99
Compressing method of texts via bi_value and sub-sampling
duan chong zuo ; hou chen ping
..............page:93-95
Research on media player with component technique
wang ping ; chen zuo ; wang xiao ge
..............page:96-99
Fast detection of image edge based on DCT compressed domain
wang gui hua ; zhang wen yin ; tang jian guo
..............page:100-102
Restrictive MFC-ICA algorithm and its application in extracting image feature
liu zhi fang ; you zhi sheng ; zhang ji ping
..............page:103-105,109
New ROI coding algorithm based on rate-distortion optimization
pan yu ; guo bao long ; ding gui guang
..............page:106-109
Video image segmentation under the illumination changing
wang lin bo ; zhao jie zuo
..............page:110-113
Fast texture segmentation algorithm based on wavelet transform and kd-tree clustering
hou yan li ; yang guo sheng
..............page:114-116
Moving objects detection based on fuzzy clustering and Kalman filtering
pan zuo ; you zhi sheng ; wu zuo ; wang ning
..............page:123-124,131
Improved bit-allocation algorithm for video coding
zhang wen xiang ; wang xin hui
..............page:125-127
Synchronization of video and audio in MPEG-4 streaming media system
cao li yu ; yao dan lin
..............page:128-131
Constructing classifier of neural networks using improved genetic algorithms
xiong zhong yang ; liu dao qun ; zhang yu fang
..............page:31-34
Time-validity in mining association rules
wang xiao guo ; huang shao kun ; zhu zuo
..............page:28-30
Application of posterior probability to multiclass SVM
zhao zheng ; wang hong mei ; zhao zuo ; zheng jian hua
..............page:25-27,34
Construction and selection of neural-network in nonlinear modeling
zhao zuo ; wang xian lai
..............page:20-24
Study on auto-proofreading method for POS tagging of Chinese corpus
zhang hu ; zheng jia heng ; liu jiang
..............page:17-19,24
Study on SDTF*PDF algorithm implemented in system of topic retrieval from short Chinese passages
chen ke ; jia yan ; yang shu qiang ; wang yong heng
..............page:14-16
Text classification based on N-gram language model
zhou xin dong ; wang ting
..............page:11-13,16
Computer-aided geometry drawing based on natural language processing
zuo li ; fu hong guang
..............page:7-10
Auto extracting for lexicalized tree adjoining grammar
xu yun ; fan xiao zhong ; zhang feng
..............page:4-6
Algorithm of Bayesian network structural learning based on information theory
nie wen guang ; liu wei yi ; yang yun tao ; yang ming
..............page:1-3,10
Implementation of DVB transport stream creating and multiplexing
yuan yu liang ; liu yu gui
..............page:132-134
Reconfigurable hardware implementation of AES algorithm in CBC mode
liu hang ; dai guan zhong ; li zuo zuo ; mu de jun
..............page:135-137,140
Symbolic model checking analysis for cryptographic protocol
long shi gong ; luo wen jun ; li xiang
..............page:138-140
Method for encrypting image with chaos series
yu wei zhong ; ma hong guang ; wang ling huan ; zhao xing yang
..............page:141-143
Study and implementation of security protocols for wireless local network
li qin ; zhang hao jun ; yang feng ; zhang quan lin
..............page:160-162
Research of Ad hoc network structure
li yong ; huang jun cai ; wang feng bi ; yin jun xun
..............page:163-164,175
Analysis and validation of communication protocol based on Petri Net
wang jing ; fan xiao zuo ; cao qing
..............page:165-167
Anonymity scheme and implementation based on IPSec for broadband wireless IP networks
wu zhen qiang ; ma jian feng
..............page:168-172
Research and implementation of PCI interface in high-speed network adapter
lei yan jing ; miao ke jian ; kang ji chang
..............page:173-175
Design and analysis of a Grid-based RPC system
xiao jun ; he yan xiang
..............page:176-179
Dynamic resource management algorithm based on Internet traffic prediction
wang yue wei ; cao yang ; yang mian ; huang shao zuo
..............page:180-181,185
Agent-based strategy for network resource adjustment
huang min ; zhang xiao zhen
..............page:182-185
Research on the scalability of data synchronization protocols based on PDA and PC
gou yan ; chen yong zhang
..............page:186-187,191
Transition mechanisms deployed in wireless network
li zhen jun ; lu zuo zuo ; cheng liang yu
..............page:188-191
Design and implementation of distributed network performance testing system
jiang tao ; zhang bin ; wang shi pu
..............page:192-195
Application of CDN technology on MAN
xiong ming ; zhao zheng ; zhao zuo
..............page:196-198,205
Methods of building the realistic graphics of natural objects with fractal feature using OpenGL
qin zhong bao ; shi huai yu ; he wei ping ; fang ya dong ; zhao feng
..............page:202-205
Niche-based genetic & ant colony optimization algorithm for generalized assignment problem
chen yun fei ; liu yu shu ; fan jie ; zhao ji hai
..............page:206-209
Hard real-time serial communication program design for UAV flight controller
liu ge qun ; liu wei guo ; lu jing chao
..............page:210-212
New developing approach to Web UI based on JSF technology
zuo xue ming ; zhang li
..............page:215-217
Garbage collection algorithm based on embedded Java virtual machine
zuo ning ; zuo zheng
..............page:218-219,223
Preceding car detection and tracking based on the monocular vision
pi yan ni ; shi zhong ke ; huang jin
..............page:220-223
New model for evolutionary algorithms: species compete-die out algorithms
dai chun ni ; yao meng ; xie zhu jie ; chen chun hong
..............page:224-225
Application of UML in developing IFIS intelligent fingerprint identification system
zhong bing ; ma li zhuang ; nie dong dong
..............page:226-228,232
Research of process auto-optimized system based on 6 Sigma
lin bing yu ; peng si wei ; wang xu zhong
..............page:229-232
Platform of automatic discovery, match and execution of Web services based on semantics
zhou zhong cheng ; sun rong sheng
..............page:233-235
Implementation based on ebXML registry of B/S structure
peng jin ; chen de ren
..............page:236-237,240
Design and study of a kind of MVC model based on double Servlet controller
liu yun long ; huang yan bo
..............page:238-240