Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2006 Issue 8
Analog circuit faults diagnosis based on clustering preprocess and SVM
CUI Jiang;WANG You-ren
..............page:1977-1979
New effective method for spam filtering
LIN Chen;LI Bi-cheng
..............page:1980-1982
Implementation of Web information extraction system based on similar pages
GONG Zheng-xian;ZHU Qiao-ming;LI Pei-feng
..............page:1983-1986
Implementation of P2P resource management technology based on JXTA
JIANG Li-li;XU Li-bo;WU Guo-xin
..............page:1987-1989
FPGA implementation analysis of Fuzzy CMAC and its control application
SHEN Xian-ming;BAI Rui-lin;ZHANG Zhi-hui
..............page:1990-1992
New text categorization method based on the frequency of topic words
KANG Kai;LIN Kun-hui;ZHOU Chang-le
..............page:1993-1995
Research of the algorithms for task cooperation execution based on multi-agent system
ZENG Xi-shan;Song Mei-yan;ZHANG Xiao-bo
..............page:1922-1924,1931
Study on de-pipeline algorithm for software-pipeline of IA-64
CUI Ping-fei;PANG Jian-min;ZHAO Rong-Cai;CUI Xue-bing
..............page:1919-1921,1927
MPI based parallel computation of matching cube
LUO Qiu-ming;WANG Mei;LEI Hai-jun
..............page:1916-1918
Property patterns of linear temporal logics
LI Sheng-hong;MIAO Huai-kou;ZHANG Xin-lin
..............page:1912-1915
Component-based dynamic updating software system
BAO Chun-jian;WU Jun-min;XU Yin-long;LI Huang-hai;WANG Wen-tao
..............page:1909-1911
Dynamic optimal control for aperiodic soft real-time system
CHEN Xu-dong;ZHU Qing-xin;LIAO Yong;KUANG Ping;XIONG Guang-ze
..............page:1906-1908
Research on space allocation strategy of the volume holographic data storage
YI Fa-ling;XIE Chang-sheng;WU Fei
..............page:1890-1893
Over-sampling algorithm based on preliminary classification in imbalanced data sets learning
HAN Hui;WANG Lu;WEN Ming;WANG Wen-yuan
..............page:1894-1897
Algorithm for mining calendar-based temporal association rules
CUI Xiao-Jun;XUE Yong-sheng
..............page:1898-1899,1903
Horizontal union algorithm of concept lattice based on Congener concept
ZHANG Lei;SHEN Xia-jiong;JIA Pei-yan;XU Yan
..............page:1900-1903
Clustering algorithm of nominal data based on entropy
WANG Yan
..............page:1904-1905
Mixed EM algorithm for large data sets
ZHANG De-xi;HUANG Hao
..............page:1884-1887
Depth measurement of the object based on the corresponding points matching
FAN Qiu-feng;YANG Guo-sheng;MA Xiao-yan;WANG Ying-jun
..............page:1873-1875
Application of simulated annealing algorithm in multi-objective airline crew rostering system
ZHANG Ying-hui;RAO Yun-bo;ZHOU Ming-tian
..............page:2001-2004
Digital watermarking technique based on 2-D Barcode
CHEN Zheng;YAO Yu-hong;WANG Xiao-jing
..............page:1998-2000
Application of data mining in customer relation management
GUO Wei;HE Pi-lian;WANG Zhong
..............page:1996-1997,2000
New mercer-kernel based Fuzzy clustering algorithm with attribute weights in feature space
FAN Xin-nan;SHEN Hong-bin;CHEN Xue-zhong
..............page:1888-1889,1915
Robust adaptive spatio-temporal video denoising algorithm based on motion estimation
CHEN Yong-bing;GUO Xiao-yun;SHEN Wei-ming
..............page:1882-1883,1887
Normalized rgb color model based shadow detection
CHEN Bai-sheng;CHEN Duan-sheng
..............page:1879-1881
Ear recognition based on feature fusion and Bagging neural network
ZHANG Wei-wei;XIA Li-min
..............page:1870-1872
Level set image segmentation based on simple Mumford-Shah model
WANG Yi;ZHOU Ming-quan;GENG Guo-hua
..............page:1848-1850,1853
Visual perceptual edge linking based on two-level threshold
WANG Xiao-peng;WANG Zi-ting
..............page:1845-1847
Nonlinear inverse diffusion image enhancement algorithm
HUANG Shi-guo;GENG Guo-hua
..............page:1842-1844
Morphological sampling based on generalized morphological transform
DUAN Shan;QIN Qian-qing
..............page:1838-1841
Enhanced advanced pyramid broadcasting with scalable capability
WANG Yong;Lü Zhao
..............page:1863-1865,1869
Fast intra-prediction mode decision algorithms in H. 264
TIAN Chuan;WANG Yong-sheng
..............page:1860-1862
Application of improved multi-scale watershed algorithm in medical image segmentation
WU Hao;LIU Zheng-xi;LUO Yi-ning;YANG Yong
..............page:1975-1976,1979
Effective method for dam recognition from visible images
SHEN Ye-jian;XU Shou-shi
..............page:1972-1974
ε-SVR mathematical model and algorithm for sale prediction problems
YI Yang;LING Ying-biao;CHANG Hui-you;XIAO Zhi-jiao
..............page:1968-1971
ID-based CES threshold signature
LIU Jun-long;WANG Cai-fen
..............page:1817-1820
Application of point-to-point SMS encryption based on Java ME
YANG Jian-qiang
..............page:1813-1816,1820
Research and application of architecture based on trusted computing platform
XIAO Zheng;HAN Ying;YE Peng;HOU Zi-feng
..............page:1807-1809,1812
Multiple one-way hash random key pre-distribution protocol in sensor networks
LI Zhi-jun;GENG Ji;WANG Jia-hao;QIN Zhi-guang
..............page:1802-1806
Short guide to the display devices
QIAN Wei-zong
..............page:1963-1967,1971
Improved real coded hybrid genetic algorithm
ZHENG Sheng-rong;LAI Jia-mei;LIU Guo-liang;TANG Gang
..............page:1959-1962
Improved evolutionary algorithm
CHEN Ming;OUYANG Zhi-min;YI Mei-xiang;QUAN Hui-yun
..............page:1956-1958,1962
Investigation of automatic generation of class-object test data based on genetic algorithm
CHENG Ye;GAO Jian-hua;QI Lina
..............page:1953-1955
Improvement of fuzzy-set-based ant colony clustering algorithm
JIANG Zhi-wei;TAO Hong-cai;BAI Xue-xiang
..............page:1950-1952
Hybridized optimization genetic algorithm for multicast routing problem
CHEN Yun-liang;YANG Jie;KANG Li-shan
..............page:1947-1949,1952
Application of adaptive artificial immune algorithm to data mining
WU Yi-lin;LI Zhong-hua;MAO Zong-yuan
..............page:1943-1946
Rapid convergence algorithms for weight values updating based on BP network
ZHOU Chang-neng;YU Xue-li
..............page:1940-1942
New method of hierarchical reinforcement learning
SHEN Jing;GU Guo-chang;LIU Hai-bo
..............page:1938-1939,1942
Strategy and algorithm for automated negotiations between multi-agent
ZHANG Hong;HE Hua-can
..............page:1935-1937
Channel selection in single-trial evoked potentials estimation
GUAN Jin-an;CHEN Ya-guang
..............page:1932-1934
Research of automatic translation based on Re-Engineering
ZHANG Hong-yan;LI Miao
..............page:1925-1927
Minimum power drain rate routing algorithm for Ad hoc networks
LIU Chuan-qing;HU Xiu-lin;YIN Ming;ZHOU Xian-jun
..............page:1785-1787
Research on networks simulation technology of channel access protocol
WANG Lei;ZHANG Hui-hui;LI Kai-sheng;JU Hong-bin
..............page:1782-1784
Multicast congestion control based on hop to hop limited
LIU Ke-jian;CHENG Zhong-qing
..............page:1779-1781
Battery-power-based routing algorithm for mobile Ad hoc networks
ZHANG Yi;WANG Xiao-fei
..............page:1776-1778
Subnet-based data-centric routing algorithm for sensor networks
WANG Lei;CHEN Zhi-ping
..............page:1772-1775
Research on gateway-aided overhead-restricted cluster routing protocol for MANET
ZHOU Jie-ying;FENG Hong-da;CAO Fei-li;CHENG Yu-liang;WANG Tao
..............page:1768-1771
Image quality assessment method based on contrast sensitivity
WANG Zheng-you;HUANG Long-hua
..............page:1857-1859
Overview on call admission control schemes in wireless communication networks
FANG Xu-ming;ZHANG Dan-dan
..............page:1762-1767
Overview on wireless mesh networking and mobile transition techniques in IEEE 802 series
FANG Xu-ming;QI Cai-xia;XIANG Zheng
..............page:1756-1761
On high-speed access network technology
ZENG Hua-shen;GAO Yu
..............page:1751-1755,1761
Human face detection based on skin color model and BDF
LI Guo-hui;MEI Kui-zhi;YUAN Ze-jian
..............page:1854-1856,1859
Image steganalysis based on moments of wavelet subband histgrams in frequency domain using prediction-error image
HUANG Cong;XUAN Guo-rong;GAO Jian-jiong;SHI Yun-qing
..............page:1851-1853
Certified E-mail protocol based on off-line TTP
LI Hui
..............page:1836-1837,1847
Robust watermark algorithm based on the wavelet moment and neural network detection
LI Dong-ming;WANG Dian-hong;CHEN Fen-xiong;HUANG Xiao-hui
..............page:1833-1835,1844
Packet marking scheme for IP traceback based on node sampling
JIE She;SUN Le-chang
..............page:1831-1832,1841
Application of SSL in constructing virtual private network
ZHANG Xue-jie;LI Da-xing
..............page:1827-1830
Telephone encryption based on 3DES algorithm and its implementation on FPGA
YAN Lei;HOU Chun-ping;CAO Da-zhong;DAI Ju-feng
..............page:1824-1826,1830
Simple verifiable secret sharing scheme
SHI Run-hua;HUANG Liu-sheng
..............page:1821-1823
Analysis and simulations for ergodic capacity channel of MIMO systems
HE Zhong-tang;ZHANG Li-jun;CHEN Zi-li
..............page:1799-1801,1806
Replica optimisation strategy based on continuous double auction
YANG Tao;LIU Gui-quan
..............page:1796-1798
Low power routing algorithm based on data-aggregation tree for sensor networks
WU Chun-jing;QIN Ji-ling;ZHENG Ming-chun
..............page:1793-1795
Analysis of adaptive algorithm in filtered multitone system
WANG Shao-bo;GAO Zhen-ming;ZHUANG Hua-wei
..............page:1791-1792,1795
Application of distributed scheduling algorithm in VOQ switch
XU Xiao-fei
..............page:1788-1790