Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2005 Issue 2
Classification analysis of speech recognition errors
fu yue wen ; du li min
..............page:291-293
Improve search efficiency using policy of active index distributing in JXTA network
zhao zong qu ; zhuang lei ; li jian chun
..............page:289-290,293
New multilayer chaotic algorithm for video encryption with changeable key
ma da wei ; zheng ying ping ; wang ling qun
..............page:394-395,406
Design of spam E-mail filter system which independent of E-mail server
ding peng ; yang yong tian ; luo zhi yun ; zheng ke zuo
..............page:396-398
Design, realization and application of clustering algorithm based on the distance between grids
tian qi ming ; wang li zhen ; yin qun
..............page:294-296
Security analysis of data transporting in database application system with sniffer
chen xi hua ; li sheng hong
..............page:297-300
Modularization design method for Web pages based on virtual description model
xiong zuo ; zhu zheng yu ; zhu qing sheng
..............page:301-304,308
Rerank method of rearch engine
yang guang xiang ; yu ning ; zuo li
..............page:305-308
Data mining with growing self organising map
tao jun ; hong guo hui
..............page:309-311
Heuristic algorithm of user session identification based on ExLF Log file format
feng lin ; he ming rui ; luo fen
..............page:314-316
Research on multiple descriptions transform coding algorithm based on wavelet
liu jie ping ; yu ying lin
..............page:317-319
Study on image automatic registration based on layered multi-template matching
liu zhen ; gong peng ; shi pei jun
..............page:322-325
Local border search algorithm and its application
wu gui fang ; xu ke ; xu jin wu
..............page:326-328
Study on 3D-scene rebuilding technology based on microphone
lu zuo zuo ; chen you qing ; li zhen jun
..............page:329-331
Image interpolation using wavelet transform based on statistical features
du hui zuo ; mei wen bo ; su guang chuan
..............page:332-334
Adaptive image transmission scheme based on human visual system in OFDM
zuo zhong rui ; gao zhen ming
..............page:335-337,340
Two approaches of color image retrieval based on run-length description
hu en liang ; feng qiao sheng ; yang xiu guo ; lin zuo cai
..............page:338-340
Curvature estimation on triangular meshes using NURBS fitting
mao ying ; tang jie ; zhang fu yan
..............page:341-343,347
Study on contour-based freehand sketch retrieval
li man wu ; sun zheng xing ; gu qing dong
..............page:344-347
Research on the weighting exponent in fuzzy K-Prototypes algorithm
wang jia cai ; zhu yi hua
..............page:348-351
Study and application of an open performance-test framework
wu heng shan ; yu hua bing
..............page:352-354
Web Service-based cross-organizational workflow model
wang yong ; cui hang
..............page:355-358
Research on structured operational semantics of UML sequence diagram
huang long ; yu hong min ; chen zhi ming
..............page:359-361
Real-time extension of Z and the application mode based on multi-viewpoint
chen guang ming ; chen sheng qing ; zhang li chen
..............page:362-364,373
Arithmetic for matching multiple patterns based on improved doubly-chained tree
tang zuo ; lu xian liang
..............page:365-366
Study on ADL-Based automatic generation of compiler in embedded system
ren xiao xi ; li ren fa ; zhang ke huan
..............page:367-369
Research on distributed computing based on JavaSpaces
zhu wen hua ; wang zuo
..............page:370-373
Parallel genetic algorithm based on learning mechanism
zhang gui juan ; wu zhao hui ; liu xi yu
..............page:374-376
Survey on key management for secure multicast communications in mobile Internet
wang guo jun ; liao zuo ; ma hao
..............page:377-380
New scheme for digital time-stamping based on signature
zhang ya ling ; yu yong ; wang xiao feng ; wang tie ying
..............page:381-382,389
Anomaly detection based on improved negative selection matching algorithm
xiao xiao li ; tian yue hong ; chen chuan
..............page:383-385
Image watermark robustness evaluative method based on synergetic order parameter
chen yong qiang ; hu han ping ; li xin tian
..............page:386-389
Analysis and improvement of the IPSec
long yan bin ; wang li jun
..............page:390-393
E-cheque payment system based on digital watermarking and digital signature
dai hua ; zhang lin cong ; li bing fa
..............page:403-406
Design and implementation of embedded CAN-Ethernet gateway
yang bo ; xu cheng
..............page:273-275
Capability assurance mechanism in P2P system based on JXTA
zhang li ; xu jin
..............page:270-272
Performance analysis on improved schemes of TCP in mobile Ad Hoc networks
cheng jian ; hong pei lin ; li jin sheng
..............page:265-269
Design of a general architecture of live streaming servers
li zheng ming ; zhang zuo
..............page:262-264
QoS routing selected algorithm based on improved genetic algorithm
jin qiong ; zhou shi ji ; peng yan ni
..............page:256-258
FARA: an architecture of reorganizing the address
zhang li ; yu zhen wei ; zhang ying ; huang fu zuo lin
..............page:252-255
New remote network topology discovery and analysis algorithm
nan zuo ; kou xiao zuo ; wang qing xian
..............page:248-251,264
Research on request-routing system in CDN
hu peng ; hong pei lin ; li jin sheng ; yang hai song
..............page:245-247,269
Technology of XML element-wise encryption based on XSLT and its application
yang guang ming ; zhang zhi hao
..............page:407-408,411
Research on self-similarity of DDoS traffic based on the UDP
ren dong dong ; yang dong yong
..............page:409-411
Robust watermark technology based on scrambling and multi_embedding
chen he feng ; zeng wen qu ; nie zuo xian
..............page:412-413
Real-time vehicle game engine base-on multi-body dynamic
huai yong jian ; wang mei feng ; zuo zheng xing ; huang xin yuan
..............page:414-416
Information entropy-based fault diagnosis strategy with least test cost
jing xiao ning ; li quan tong ; chen yun xiang ; lv zhen zhong
..............page:417-419
Ground-based LIDAR data simplification based on quad-tree partition
luo de an ; liao li qiong
..............page:420-421,425
Partner selection in agile virtual enterprise based on grey relation analysis
du lai hong ; chen zuo ; fang ya dong
..............page:485-489
Realization on online-test with winsock
chen ai ming ; dong chao xia
..............page:490-492
Gravity-based clustering approach
jiang sheng yi ; li qing hua
..............page:286-288,300
Study and practice of coverage metrics for rule-base of expert system
li ru ; zhao xiao dong ; lv guo ying ; zuo cheng yuan
..............page:283-285
Design of a query execution method for real-time database
liu yun sheng ; peng chu ji ; liao guo qiong
..............page:279-282
Using Java technology to implement the SIP communication
yang peng ; zhao bo ; wang zuo ; zhou li hua
..............page:276-278
Hybrid integrated QoS multicast routing algorithm in IP/DWDM optical Internet
wang xing wei ; li jia ; huang min
..............page:241-244,272
Research and design of the city public transportation query system
zhang yong mei ; han zuo ; chen li chao
..............page:422-425
Specification and verification environment for embedded system over CDM
lv zuo ; zhao min zuo ; gu jun zhong
..............page:426-429
Design and simulation of auction-based resource mapping algorithm in grid
liu xiang rui ; zhu jian yong ; fan xiao zhong
..............page:430-433
Distributed control scheme for power transformation system based on network agent of VxWorks
liu qing shan ; jiang xiao hua
..............page:434-436,439
Research of chip simulation based on COM
tang ming dong ; lei dian
..............page:437-439
Design and realization of the Ethernet phone based on SDA80D51
jia de sheng ; huang yong feng
..............page:440-442
Design and implementation of general real-time data sampling in Windows 2000/XP
wu li na ; gao jing yang
..............page:443-445
Optimizing AMI model of CORBA based on the proxy pattern
he zhi hua ; zou bei zuo
..............page:446-448,452
Research on question similarity algorithm for intelligent question answering system and its implementation
guo xiao yan ; zhang bo feng ; fang ai guo ; zhou chuan fei
..............page:449-452
Design and implementation of the Web camera based on MPEG4
fang jing shuai ; zuo wen hua
..............page:453-455
Research on technology of information integration based on ontology
wu zuo ; xing gui fen
..............page:456-458
Special encryption and sign techniques in mobile auction system
qiao shao jie ; peng jian ; zheng xue qiang ; lin hong jun
..............page:459-462
Design and implementation of CNC kernel in CNC lathe emulation system
zhou chong ; qian kun ming ; qi zuo
..............page:463-465
Realization and research on ship remote sensing monitor and communication system based on Inmarsat D +
wu dong qing ; liu jiu nv ; li zhe lin
..............page:466-468
Architecture of J2EE-based workflow engine
xu jian jun ; tan qing ping ; yang yan ping
..............page:469-471
Effective descriptive model of E-commerce merchandise and the multi-website searching mechanism
peng dai yi ; yin de hui ; li bing fa
..............page:472-474
Design of Cache module for distributed RAID
feng jing ; zhu lan juan ; wu zhi ming
..............page:475-477
EAI-oriented and high-availability and loose-coupling XJCA
lei ai ping ; yin jian wei ; chen gang ; dong jin xiang
..............page:478-480
Study and exploitation for center-controller of electromotion automobile based on CAN Bus
zuo quan bin ; shen bao suo ; chen hong
..............page:481-484