Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2005 Issue 4
Object-oriented programming by contract
LIN Jia-yi;LIU Jin;HE Ke-qing
..............page:796-798
Agent architecture suitable for the open environment
SHU Yao;LI Jian-xing;PENG Dai-wen;LIU Gan-lin
..............page:792-795
Ameliorate algorithm for network topology discovery
QIU Jian-lin;HE Peng
..............page:891-893
Design of conformance testing system for OSPF protocol of IPv6
LI Zheng-liang;ZHOU Hao;ZHAO Bao-hua
..............page:894-897
Research and implementation of IP router that supports ForCEs
GAO Ming;WANG Wei-ming
..............page:897-899
Multi-constrained optimal path selection of QoS
CHEN Li-jia;ZHOU Jian-guo;JIANG Hao;Yan Pu-liu
..............page:900-902
Efficient real-time traffic scheduling algorithm based on WRR in wireless networks
ZHAO Zeng-hua;SHU Yan-tai
..............page:903-905,909
Study on multi-agent scheduling system based on message report mechanism
XIONG Cheng;LUO Xiao-bin;WANG Xiao-min;Zhang Jia-shu
..............page:799-801
Dynamic composition of Web services based on multi-agent
REN Lei;LI Yu-chen;LI Jing
..............page:802-804,807
Algorithm of mining association rules with weighted items based on probability
Yin Qun;WANG Li-zhen;TIAN Qi-ming
..............page:805-807
Defect analysis model of Bayesian and its application in software testing
HU Yu-peng;CHEN Zhi-ping;LIN Ya-ping;LI Jun-yi
..............page:808-810
Study and implementation of unified resource database
LU Shao-fei;YANG Guan-zhong;LIU Na
..............page:811-813
Algorithm for merging materialized views
CHEN Chang-qing;Cheng Ken
..............page:814-816
Locally regular embedding
TAN Lu;WU Yi
..............page:817-819
XML metadata retrieval based an approximately matching model
OUYANG Liu-Bo;LI Xue-Yong;YANG Guang-zhong;LI Guo-hui
..............page:820-823,826
Extension of rough set model based on weighted connection degree in incomplete information systems
ZHAO Xiang;LIU Tong-ming;XIANG Yi-dan
..............page:824-826
Method of data mining based on concept lattice
WANG Xu-yang;LI Ming
..............page:827-829
High efficient incremental updating algorithm for mining association rules
SHANG Zhi-hui;TAO Shu-ping
..............page:830-832
Object persistence framework based on .NET metadata
JIANG Bian
..............page:833-836
Random mumber generation method of information security system
SU Gui-ping;YAO Xu-chu;LU Shu-wang
..............page:837-838,841
Study on information hiding technique based on chaos digital stream
GAO Tie-gang;CHEN Zeng-qiang;YUAN Zhu-zhi;GU Qiao-lun
..............page:839-841
Method of anomaly detection based on feedback neural network
YANG Tian-qi
..............page:844-845,849
Digital rights expression model based on first-order dynamic logic
SUN Wei;ZHAI YU-qing
..............page:846-849
Survey of video watermarking
ZHANG Jiang;ZHAO Li;YANG Shi-qiang
..............page:850-852
Blind watermarking algorithm for digital color images withstands cutting attacks
YIN De-hui;LI Bing-fa
..............page:853-855,858
Construction and validation of optimal diffusion layers in SPN block cciphers
CUI Ling-guo;CAO Yuan-da
..............page:856-858
Employing ECMQV key exchange scheme to enhance WTLS security
YE Run-guo;FENG Yang-jun;YU Shu-yao;WU-Yu
..............page:859-861
Study and implement of FBIDS model
LIU Yi-nan;LENG Jian;FU Ming
..............page:862-863
Role and rule-based access control
RUI Guo-rong;XING Gui-fen
..............page:864-866,869
Method for verifying log integrity
CHEN Li-ming;YU Yan;HUANG Hao
..............page:867-869
Theory and implementation of IPID covert network scanning
ZHAO Qiu;HU Hua-ping;YU Hai-yan
..............page:870-873
Research and application of software design using patterns based on MDA
LIU Fa-gui;HU Yao-min
..............page:790-791,795
Study on fast surface reconstruction algorithm for 3D unorganized points
GU Yao-lin;NI Tong-guang
..............page:783-785
Technology and application of 3D modeling based on discrete algorithm
WU Hui-xin;XUE Hui-feng;LU Cai-wu
..............page:781-782,785
Motion segmentation based on multi-model robust estimation
REN Jian-feng;GUO Lei;SHEN Yu-li
..............page:778-780
Image relevance feedback retrieval based on texture and shape
QIU Fang-peng;FENG Yu-cai;LIANG Jun-jie
..............page:775-777
2-D DCT algorithm for embedded system
WEI Ben-jie;LIU Ming-ye;ZHANG Xiao-li
..............page:772-774
Image denosing based on complex wavelet transform and H-Curve criterion
YANG Meng-zhao;LI Chao-feng;XU Lei
..............page:769-771,774
Image structure representation and classification based on recursive neural network
QU Shen;WANG Qing;Chi Zhe-ru
..............page:766-768
Application of threshold-crossing in wireless network traffic
LIU Chun-feng;SHU Yan-tai;LIU Jia-kun
..............page:878-880
Way to analyze system with shared resources based on stachastic Petri nets
HOU Rong-hui;SHI Hao-shan
..............page:881-882
An adaptive queue scheduling mechanism for supporting Diffserv
LIU Hui;XIA Han-zhu;LIU Xiang
..............page:886-888
Application of monotonic rate scheduling algorithm
YE Ming;LUO Ke-lu;CHEN Hui
..............page:889-891
ISCP-TCAM:a high speed power-efficient routing table search engine architecture
YANG Kui-wu;WEI Bo;ZHANG Xiao-yi;LI Ou
..............page:910-912
Solving weights' vector algorithm of GP-decision tree and its application
WANG Si-chun;ZHANG Tai-shan;YIN Zhi-yun;LI Ri-bao;ZHANG Chu-wen
..............page:739-741
Best path analysis of emergency decision system based on improved genetic algorithm
XIE Hong-wei;ZHANG Xiao-bo;YUAN Zhan-hua;YU Xue-li
..............page:737-738,789
Research of software design methods in data dissemination
MA Wei-dong;LI You-ping
..............page:913-914,918
Workflow performance analysis based on process mining
LIU Xin-yu;ZHU Wei-dong
..............page:915-918
New method of fingerprint minutiae extraction
MENG Xiang-ping;REN Ji-chuan;WANG Xian-yong;JU Chuan-xiang;WANG Hua-jin
..............page:919-920
Design and application of a generic distributed simulation I/O architecture
ZHANG Xiu-shan;WANG Shao-ming;BEN Ke-rong;XU Bing-liang
..............page:921-922,926
Computer audit based multi-agent system architecture
WEN Ju-feng;JIANG Yu-quan;XING Han-cheng
..............page:923-926
Algorithm for quick stereo edge matching
LI De-guang;LI Ke-jie
..............page:763-765
Algorithm of image classification based on two-dimensional hidden Markov model
HU Ying-song;ZHU A-ke;CHEN Gang;CHEN Zhong-xin
..............page:760-762
Multi-kernel nonlinear diffusion model for denoising based on image decomposition
XIE Mei-hua;WANG Zheng-Ming
..............page:757-759
Novel chinese text subject extraction method based on word clustering
CHEN Jiong;ZHANG Yong-kui
..............page:754-756
Adaptive fuzzy classifier based on table-looking learning algorithm
HUANG Zhan;JIANG Yu-ying;ZHANG Lei
..............page:750-753
Application in ERP system for artificial neural network
ZHAO Yun-feng;LIU Wan-Jun
..............page:748-750
Methods based on the Bayesian networks for situation assessment
SUN Zhao-Lin;YANG Hong-wen;HU Wei-dong
..............page:745-747
Robust optimal controller design for networked control systems
LI Zhang;Fang Hua-jing
..............page:927-928,931
Background denoising methods in vectorization of curves
LUO Feng;YU Yan-mei;WU Xiao-hong;TENG Qi-zhi
..............page:929-931
Discussion on particularity of the real-time DVD video format
Lin An;WAN Yong
..............page:932-933
Power spectrum reprocessing approach for pitch detection of speech
ZHANG Tian-qi;ZHANG Zhan;QUAN Jin-guo;LIN Xiao-kang
..............page:934-936
Traffic flow time series separation methods
REN Jiang-tao;XIE Qiong-qiong;YIN Jian
..............page:937-939
Credit Architecture of Computational Economy for Grid Computing
MA Man-fu;WU Jian;HU Zheng-guo;CHEN Ding-jian;JIANG Yun
..............page:940-943
Method for multi-agent cooperation used in the system of automatic decision-making of joint campaign
WANG Yu-zhu;Fu Ning;NIU Rong-jian
..............page:944-945,948
Facial expression recognition based on adaboost algorithm
YANG Guo-liang;WANG Zhi-liang;REN Jing-xia
..............page:946-948
Application of association rules in stock analysis
CHAI Ming-liang;SONG Su
..............page:952-954
Key technology pesearch of collaborative assembly based on B/S framework
WAN Neng;Mo Rong;CHANG Zhi-yong;LIU Hong-jun
..............page:955-956,959
Coordination middleware system for distributed information service platform
LIU Jie;SUN Li;JIANG Qin-fen;CHEN Jia-xun
..............page:957-959
Imprecise-based fault-tolerant optimal scheduling algorithm in multi-error model
LUO Qiong;ZHANG Li-Chen
..............page:960-961,965
Method for texture color image segmentation
YIN Hai-ming;ZHANG Ming-min;PAN Zhi-geng
..............page:966-967,970
Method and the application of musical tone recognition
Xu Guo-qing;YANG Dan;WANG Bin-jie;WEN Jun-hao
..............page:968-970
Edge detection for textile defects based on PCNN
XU Yi-feng;ZHANG Rui-lin
..............page:971-973
Research and design of HTML parser based on page segmentation
YU Man-quan;CHEN Tie-rei;XU Hong-bo
..............page:974-976
Content-based information processing method of Web page
WANG Shao-yu;DU Juan;QIN Qian-qing
..............page:977-978