Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2007 Issue 10
Real time detection and classification algorithm for abandoned and stolen objects
WANG Wei-jia;LIU Hui;SHA Li;LIU Xin;JIANG Hua
..............page:2591-2594
Using Gini-Index for feature selection in text categorization
LIN Yong-min;ZHU Wei-dong
..............page:2584-2586,2590
Optimization research of spatial index structure of R*-tree
CHEN Min;WANG Jing-hai
..............page:2581-2583
Grid-based LiDAR data processing platform architecture
TAO Jin-hua;SU Lin;LI Shu-kai
..............page:2578-2580,2583
ISOMAP based on minimal connected neighborhood graph
SHAO Chao;WAN Chun-hong;CHEN Guang-yu
..............page:2570-2574
Applied research of clustering algorithm in telecom consumer segments
CHEN Zhi-ping;HU Yu-zhou;GU Xue-dao
..............page:2566-2569,2577
Improved image recognition and registration algorithm based on convex hull and affine invariant
ZHU Zheng;ZHAO Wei-dong;WANG Zhi-cheng
..............page:2559-2562
Ultra-lightweight IPv6 protocol stack of wireless sensor network
SONG Shu-bin;WANG Neng
..............page:2556-2558,2562
Study on behavior characteristics of WSN based on minimum-hop-count routing
ZHENG Ming-cai;ZHANG Da-fang;ZHAO Xiao-chao
..............page:2552-2555
Improved density-based routing algorithm for wireless sensor networks
ZHANG Xi-huang;GAO Cui-fang
..............page:2549-2551
Speech recognition based on two-dimensional PMCC robust feature parameter
QU Bai-da;LI Jin-bao;XU Bao-guo
..............page:2547-2548
Improved moving objects detection method based on Gaussian mixture model
MA Yi-de;ZHU Wang-fei;AN Shi-xia;QIU Hui-yin;TANG Shu-sen
..............page:2544-2546,2548
Face feature recognition based on depth information
SHAN Cheng-gan;LI Bao-hua;HU Qing-xin
..............page:2541-2543
Algorithm of real-time soft shadows based on shadow maps
WANG Hua;ZHU Li-hua;GU Yao-lin
..............page:2538-2540,2543
Optimized recording approach of surveillance system
WU Pei;XIE Yi-qun;XU Hua-hu
..............page:2534-2537
3D reconstruction based on fundamental matrix estimation weighted by match measure
LI Li-chun;QIU Zhi-qiang;WANG Kun-peng;YU Qi-feng
..............page:2530-2533,2537
Research and design of location service architecture in migrating workflow system
QIN Yu-feng;ZENG Guang-zhou
..............page:2595-2597,2601
Algorithm of two-phase approximate KNN outliers mining and its application
LIN Jia-xiang;FAN Ming-hui;CHEN Chong-cheng;JIANG Xian-wei
..............page:2598-2601
New score normalization method in speaker verification
GAO Xin-jian;QU Dan;LI Bi-cheng
..............page:2602-2604
Signal de-noising in wavelet based on new threshold function
ZHU Hua;WU Chuan-sheng;WANG Xiao-mei
..............page:2605-2606,2609
Personalized text content filtering based on typical feedbacks
HU Juan-li;YAO Yong;LIU Zhi-jing
..............page:2607-2609
Pedestrian abnormal behavior detection based on region feature
CHEN Yi-wen;WANG Wei;WANG Run-sheng
..............page:2610-2611,2614
Implementation of embedded real-time driving fatigue monitoring system based on DM642
WANG Guang-juan;ZHAN Yong-zhao;LIU Zhi-qiang
..............page:2612-2614
gao yue
..............page:封2
Quantitative analysis method for causality knowledge based on time-event exchange diagram
ZHENG Wei;MENG Xiao-feng;SUN Qun
..............page:2481-2483,2486
Hybrid ant colony algorithm for solving TSP based on path exchanging
LIN Dong-mei;WANG Dong
..............page:2478-2480
Shape adjust based on surface of interpolating of Doo-Sabin subdivision
ZHEN Ti-wei;GU Yao-lin
..............page:2525-2529
Surface reconstruction from scattered points based on Bayesian
YANG Jun;XING Qi;ZHU Chang-qian;PENG Qiang
..............page:2522-2524,2529
Improved tMHI based real-time video moving object detecting and tracing
MENG Fan-feng;ZENG Qing-shuang;JIANG Yong-lin;GAO Xiao-ying
..............page:2518-2521
Market-driven strategy for multi-agent automated negotiation
XIANG Zhao-xia;LI Li-xin
..............page:2487-2489,2492
Improved genetic algorithms based on chaotic mutation operation and its application
GU Xiao-lin;HUANG Ming;LIANG Xu
..............page:2490-2492
Research of model checking UML
ZHANG Pin;LUO Gui-ming
..............page:2493-2497,2500
New DAO pattern with dynamic extensibility
FANG Cheng;ZENG Ping
..............page:2498-2500
Coloured Petri net extended with price information and its application
LIU Feng;ZHANG Wei
..............page:2501-2503
Research of Ontology-based user model
GUAN Qing-zhen;ZHOU Zhu-rong
..............page:2504-2507
Dynamic user access control mode extending RBAC for CRM system & implementation
CHEN Min;LIU Xiao-qiang
..............page:2508-2511
Research of intrusion detection based on clustering and support vector machine
NI Lin;ZHENG Hong-ying
..............page:2440-2442,2452
New TCP algorithm over heterogeneous networks
QU Da-peng;HUANG Dong-jun
..............page:2437-2439,2449
Mixed concurrency control algorithm of composed service transaction based on conflict probability
ZENG Hui-qiong;LI Jian-hua;XU Dian;MA Hua
..............page:2433-2436
Grid resource recovery based on ant algorithm
DENG Xiao-qing;ZHOU Zhu-rong;CHENG Xiang-rong
..............page:2430-2432
Secure clustering algorithm based on trust evaluation in Ad Hoc network
ZHANG Jing;XU Li;XU Dao-wei
..............page:2426-2429
Power-aware routing mechanism based on Newton's interpolation in MANET
ZHANG Lu;ZHANG Xi-huang
..............page:2423-2425
Evaluating method over remote Web based on linear weighted technique
LEI Yang;HUA Ji-xue;LI Cheng-hai
..............page:2420-2422
Improved algorithm for streaming media congestion control based on feedback
CHANG Ke-pei;LI Shao-zi
..............page:2417-2419
Application of SVM based NFD in network management platform
LI Yuan-yuan;MENG Xiang-ru;ZHANG Li
..............page:2414-2416
Parallel implementation of neighbor-based FCM clustering for remote sensing image
GONG Xue-jing;CI Lin-lin;YAO Kang-ze
..............page:2512-2514,2517
Image denoising using nonsubsampled contourlet transform
WANG Fa-niu;LIANG Dong;CHENG Zhi-you;TANG Jun
..............page:2515-2517
Improved SNMP-based network topology discovery algorithm and its implementation
YANG An-yi;ZHU Hua-qing;WANG Ji-long
..............page:2412-2413,2419
On-demand multicast routing protocol with on-demand clustering in Ad Hoc network
XU Hao;MU De-jun;ZHANG Zhi
..............page:2409-2411
Digital signature project based on BB84 and elliptic curve cryptography
JIAN Li;YANG Chun;HE Jun
..............page:2475-2477
Algorithm based on key to confuse watermark embedding positions
ZHOU Xiang-xiang;YIN Zhong-hai;LIU Shou-yi;HAN Yi-na
..............page:2473-2474,2477
Secure clustering algorithm based on trust evaluation in tactical Internet homogeneous layer
ZHANG Han;WAN Ming-jie;WANG Han-ning
..............page:2464-2469
Signature scheme with message recovery based on discrete logarithms and factoring
YUAN Xi-feng;SUN Yan-rui;SUN Jin-qing;YANG Ying-hui
..............page:2459-2460,2463
ID-based content extraction signature
LAN Cai-hui;WANG Cai-fen
..............page:2456-2458
Adaptive image watermarking method based on chaotic encryption
CHEN Yong-qiang
..............page:2453-2455
Multi-secret key agreement scheme with threshold and authority
ZHANG Yan-shuo;LIU Zhuo-jun
..............page:2450-2452
Alert aggregation algorithm based on category and similarity
GUO Fan;YU Min;YE Ji-hua
..............page:2446-2449
Intrusion detection system based on PC-LINMAP and cloud theory
ZHANG Qiu-yu;SUN Lei
..............page:2443-2445
Research of a deterministic small world network based on Cayley graph
WEI Wen-hong;GAO Da-li;SUN Zhen-tao
..............page:2406-2408
Semi-global trust model design for Peer-to-Peer networks
ZHANG Jie;ZHAO Zheng;XIONG Xiao
..............page:2403-2405
Application of relaxation in TCP friendly rate control
ZHANG Da-min;CHEN Ling-zhou-ting
..............page:2401-2402,2411
Performance evaluation of real-time video transport over UAV multi-hop Ad Hoc networks
LIU Si-wei;ZHAO Yu-ting;MU De-jun
..............page:2398-2400
Routing selection algorithm under multiple link state limited
WANG Wei-ya;WANG Feng-lin
..............page:2395-2397
Prediction-based resource matching algorithm
HU Zhi-gang;HU Zhou-jun
..............page:2391-2394,2400
Analysis of AODV in MANET-based NCS
WU Chun-xue;HAN Wen-dong
..............page:2388-2390
Implementation of adaptive aggregate operator based on synopsis
TIAN Hai-sheng;CHEN Li-jun
..............page:2383-2387
Research of log overflow protection based on bitmap
ZHENG Ran;LI Zhan-huai;WANG Yan-long
..............page:2379-2382
Classification rule acquisition based on extended concept lattice
WANG Yan;LI Ming
..............page:2376-2378
Algorithm of outliers mining based on grid techniques in high dimension large dataset
CAO Hong-qi;SUN Zhi-hui
..............page:2369-2371,2382
Web Service retrieval based on operation clustering
PENG Dun-Lu;ZHOU Ao-ying
..............page:2365-2368
Survey of research on anonymilization technology in data publication
LIU Yu;Lü Da-peng;FENG Jian-hua;ZHOU Li-zhu
..............page:2361-2364
Discover formulas based on GEP with trans-gene
TANG Chang-jie;CHEN Yu;ZHANG Huan;DUAN Lei
..............page:2358-2360,2364
Research of main memory database
WANG Shan;XIAO Yan-qin;LIU Da-wei;QIN Xiong-pai
..............page:2353-2357