Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2006 Issue 9
Color image quantization algorithm based on Kernel method
GU Rui-jun;XU Wen-bo
..............page:2063-2064,2083
Moving vehicles' shadow detection with fast normalized cross-correlation
WANG Xiao-dong;HUO Hong;FANG Tao
..............page:2065-2067
QPSO algorithm for rectangle-packing optimization
XUE Ying-chun;SUN Jun;XU Wen-bo
..............page:2068-2070,2073
Image retrieval of the block edge pattern based on run-length coding
QIU Kai-jin;XIAO Guo-qiang;JIANG Jian-min
..............page:2074-2076,2080
Study on the overlap of regional intensity ranges in image segmentation
CAO Jian-nong;SUN Cheng-zhi
..............page:2077-2080
Image segmentation combining support vector machines with C-means
KE Yong-zhen;ZHANG Jia-wan;SUN Ji-zhou;ZHANG Yi;ZHOU Xiao-zhou
..............page:2081-2083
New algorithm for adaptive image enhancement based on scale correlation
TANG Zhi-hang;HUANG Zhe;ZHANG Dong-heng;YANG Bao-an;CHEN Shi-qing
..............page:2084-2085,2088
Approach to H. 264-based still stereoscopic pictures compression
YANG Lei;DAI Ju-feng;SONG Xiao-wei;HOU Chun-ping
..............page:2086-2088
Face recognition based on 2D-DWT and 2D-PCA
WU Qing-jiang;ZHOU Xiao-yan;ZHENG Wen-ming
..............page:2089-2091
Comparability determination of 3D surface based on LIM
FENG Wu-ying;PING Xi-jian;MIAO Liang
..............page:2092-2094,2104
Region counting algorithm based on region labeling automaton
YANG Su-di;GU Guo-qing;HUANG Sui
..............page:2095-2098
Application of AdaBoost algorithm in spray code recognition
WANG Qian;CHEN Bin;HUANG Wen-jie
..............page:2099-2100
Eye-gaze tracking with one camera
LIU Rui-an;JIN Shi-jiu;SONG Wei;ZHANG Xi-kun;WU Xiao-rong
..............page:2101-2104
Integrity protection of renewable data
CHEN Hong-bing;LIU Zhi-jun;LI Qian-mu;XU Man-wu
..............page:2105-2108
A secure method of mobile agent data protection
LIU Yi;ZHANG Ling
..............page:2109-2110
Implementation of ECC point multiplication with IP core
ZOU Hou-wen;WANG Feng;TANG Yi
..............page:2131-2133,2136
Preventing code injection attack with hook in kernel mode
ZHU Ruo-lei
..............page:2134-2136
Design and implementation of intrusion detection system based on system-call
ZHANG Jun;SU Pu-rui;FENG Deng-guo
..............page:2137-2139,2144
An extensible distributed testing system for network attack
YU Jia;ZHAO Bao-hua
..............page:2140-2144
Anomaly detection approach based on immune algorithm and support vector machine
ZHOU Hong-gang;YANG Chun-de
..............page:2145-2147
Adaptive digital watermarking algorithm
LI You-liang;LI Ze-ping;ZHOU Jian-chun
..............page:2150-2152
Information hiding algorithm of color image in DWT domain based on grey relation
WANG Hai-jun;FAN Yang-yu
..............page:2153-2155
Design and implementation of smart card key management system based on threshold scheme
SHI Feng;DAI Guan-zhong;LIU Hang;MIAO Sheng;LI Mei-feng
..............page:2156-2159
Study of network security based on packet filtering technology
LIU An;LONG Ya-qin;GU Le-ye
..............page:2160-2161,2165
Table-lookup determined routing algorithm for triple-based hierarchical interconnection network
QIAO Bao-jun;SHI Feng;JI Wei-xing;LIU Bin
..............page:2162-2165
Model of information security evaluation based on gray analytical hierarchy process
REN Shuai;MU De-jun;ZHU Ling-bo
..............page:2111-2113
Cryptography scheme based on congruence equation
LI Wei;FANG Jiang-tao;HAO Lin
..............page:2114-2115,2120
Improved Woo-Lam model for cryptographic protocols
ZHAO Yu;YUAN Lin;WANG Ya-di;HAN Ji-hong
..............page:2116-2120
Multi-domain key agreement protocol for WLAN
CHEN Zhuo;JIN Hao;ZHANG Zheng-wen
..............page:2121-2123
Study on the security of SIP
YU Zhi-chun;FANG Bin-xing;ZHANG Zhao-xin
..............page:2124-2126
Identification of covert channel based on source code
SONG Xiang-mei;JU Shi-guang
..............page:2127-2130
Study on model transformation and computer demonstration of virtual prototype
LI Feng;XU Cheng;GUO Kai;WANG Ya-ping
..............page:2057-2058,2062
Precise determination for the global center position of double olsen samples based on Hough transform
XU Chun;LIN Zhong-qin;LI Shu-hui;XIA Nian-jiong
..............page:2051-2053
Solving constrained optimization problems with parallel quantum particle swarm optimization
MA Yan;XU Wen-bo;SUN Jun;LIU Yang
..............page:2047-2050
A strategy for time resource allocation based on workflow graph
LIU Dan-ni;CHEN Xiu-yu
..............page:2166-2168,2171
Application level multicast routing algorithm based on poly-clonal strategies
WANG De-zhi;YU Zhen-wei;GAN Jin-ying;WANG De-yu
..............page:2169-2171
A multi-path routing protocol based on a hybrid criterion of choice
SHEN Yang;ZHENG Bao-yu;ZHAO Xian-jing
..............page:2172-2174,2181
Traffic shaping algorithm with holistic and hierarchical token parameters allocation
TU Wen-wei;ZHANG Jin;ZHANG Xing-ming
..............page:2175-2177
CAN-bus based communication application layer protocol for the colliery safety monitoring system
LI En;CAI Li;LIANG Zi-ze;ZHAO Xian-jun;ZHANG Wen-ya
..............page:2178-2181
Real-time gesture recognition based on "Bighand-Smallhand"
TENG Da;YANG Shou-bao;LIU Yan;JIANG Feng
..............page:2041-2043,2053
Deep Web query interface selecting
ZHENG Dong-dong;CUI Zhi-ming
..............page:2024-2027
Discriminant analysis based on lifting wavelet transform and learning vector quantization
CHEN Lei;HUANG Xian-wu;LIU Jia-sheng;ZHONG Xing-rong
..............page:2038-2040
Topological localization based on visual salient regions in unknown environments
WANG Lu;LI Yu-ling;CAI Zi-xing
..............page:2034-2037,2050
Semantic constraint based on frame combination
SHI Yun-hong;TU Yao-xu;WEI Hui;BAI Yu
..............page:2031-2033
HoliAdapt - An adaptive query processing strategy over data stream
ZHANG Li-jie;LI Zhi-qiang;SONG Bao-yan
..............page:2028-2030
Performance improvement of wireless TCP for encrypted networks
ZHANG Guo-qinng;XU Yong-qing;YANG Xiao-hu
..............page:2199-2201
Combined prediction model of Internet traffic based on neural network
FENG Hai-liang;CHEN Di;LIN Qing-jia;CHEN Chun-xiao
..............page:2206-2208,2228
Improved rate control algorithm for the H.264 encoder
WU Dong-wei;FAN Yang-yu;LAI Cang-cai
..............page:2209-2210,2224
Study and implementation of ATM NIC device driver and CIPOA based on RTEMS
ZHU Jun;CHEN Li-qian;YANG Xue-jun
..............page:2211-2214
Dynamic fuzzy machine learning model and its validation
ZHANG Jing;LI Fan-zhang
..............page:2044-2046
Realization of soccer robot wireless communication based on visual system
LU Fan-xing;LU Yi-min
..............page:2215-2216
Analysis of utilization bound for rate monotonic tasks assignment algorithms
WANG Tao;LIU Da-xin
..............page:2217-2221
Wrapping JDBC API with template method pattern
LIU Quan;ZHAO Xiao-ming
..............page:2222-2224
Study on architecture of WebGIS based on SOA
LI Fei-xue;LI Man-chun;LIANG Jian
..............page:2225-2228
Study on meta-models in enterprise temporal modeling
YANG Zhao-jun
..............page:2229-2231
Improvement of black-box test reduction method with I/O analysis
SUN Ji-rong;LI Zhi-shu;YIN Feng;WANG Li;LI Qi
..............page:2232-2235,2239
Multi-representation geographic information system based on object deputy model
PENG Zhi-yong;PENG Yu-wei;ZHAI Bo-xuan
..............page:2016-2019,2023
Survey of text mining based on ontology
JIA Yan;WANG Yong-heng;YANG Shu-qiang
..............page:2013-2015
A fuzzy approach for Web service discovery based on vector spaces
PENG Dun-lu;ZHOU Ao-ying
..............page:2009-2012,2015
COCA - a new way to auto-detect association based on entropy correlated coefficients
WANG Shan;CAO Wei;QIN Xiong-pai
..............page:2005-2008
Structure of collaborative design based on multi-agent
FENG Xiang-zhong;GAO Yu
..............page:2182-2183
Introduction to the implementing of IAX-SIP interworking function
SHEN Wei-jian;XU Ke
..............page:2184-2186
Study on intrusion tolerant group communication
LU Lai-feng;LI Hong-mei;MA Jian-feng
..............page:2187-2189
Implementation of 100Mbps Ethernet based on VxWorks in embedded system
FU Yi-hua;MEI Shun-liang
..............page:2190-2191,2195
System-level fault diagnosis based on mobile agent and active network
LUO Wen-quan;HE Min-wei
..............page:2192-2195
Research of VoIP QoS based on TCP-friendly rate control mechanism
CAO Ling-xi;LI Jian-hua;LOU Yue
..............page:2196-2198
Dimensionality reduction in audio fingerprint based on weighted PCA
HU Yong-gang;WU Yi;BU Jiang
..............page:2250-2254
Design pattern in embedded system development
LIU Gang;SHAO Zhi-qing;XIAO Li-zhong;WEN Sheng-jun;LIANG Hong-hao
..............page:2236-2239
Business objects association models based on state log and association log
YANG Mei-rong;WANG Zhong-jie;ZHAN De-chen
..............page:2240-2243,2254
Light-weight embedded GUI system and its implementation
WANG Yun-bo;LI De-sheng;BAI Lin;LUO Yu-ping
..............page:2244-2246,2249
Design and implementation of intelligent phone mail client-end based on BREW
LU Dong-xin;HE Lian-jun;HUANG Feng-gang;HU Yuan-ning;XIE Xin
..............page:2247-2249
Construction of equipment management integration platform for condition monitoring and diagnosis
WANG Shuang-li;WANG Tai-yong;WANG Zheng-ying;ZENG Hui;YUAN Feng
..............page:2255-2257,2260
Distributed seismic data acquisition system based on embedded Ethernet
ZHANG Lin-hang;LIN Jun;CHEN Zu-bin
..............page:2258-2260
Design and realization of common email management component based on COM
SHEN Zhe;ZHENG Hong-yuan
..............page:2261-2263
Interface design of Samsung S3C44BOX based on ARM
YANG Yu-lei
..............page:2264-2266