Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2007 Issue 5
Lane-changing model with fuzzy control based on cellular automata
WANG Yan-na;ZHOU Zi-li;WANG Xin-wei
..............page:1197-1200
Hybrid optimization algorithm for solving maximum independent set problems
PENG Zhen-yu;GE Hong-wei
..............page:1194-1196
A modified niching particle swarm optimization algorithm for multimodal function
YANG Shi-qin;XU Wen-bo;SUN Jun
..............page:1191-1193,1200
Algorithm of case attribute optimization based on heuristic reduction
WANG Sha-sha;LIU Hui;FANG Guo-hua;MA Chi
..............page:1201-1203
Whole-priority algorithm for traveling salesman problem
LIU Xin;LIU Ren-ren;HOU Jing-chuan
..............page:1204-1207
A multiple dimension set partitioning load balancing resource optimization allocation algorithm
WU Zhen-dong;XIANG Sheng-jian;ZENG De-sheng
..............page:1208-1209,1213
Research of calculating sentential similarity in translation memory
ZHOU Wen;XU Guo-liang
..............page:1210-1213
Adaptive training and pruning algorithm for stock index prediction
FAN Huai-yu;SHEN Jin-yuan;CHANG Sheng-jiang
..............page:1214-1216,1219
MFCC feature extraction of speech based on pitch period
CHEN Di;GONG Wei-guo;YANG Li-ping
..............page:1217-1219
Study on tangent distance with SVD method for characters recognition fine classification
YANG Yi-ming;TONG Xue-feng;SHI Jian-yong;MENG Xiao-rong
..............page:1220-1221,1231
Handwritten Chinese character recognition based on local gabor filter bank
CHEN Rong;DENG Hong-bo;JIN Lian-wen
..............page:1222-1224
Collaborative filtering recommendation based on user clustering in personalization service
WANG Hui;GAO Li-jun;WANG Ting-zhong
..............page:1225-1227
Weak functional dependencies and inference rules for XML
SU Zhao;LIU Guo-hua
..............page:1228-1231
Similarity search over time series data using DCT
CUI Zhen;REN Ya-zhou;WANG Rui
..............page:1232-1234,1244
Classification text with incomplete data based on Bernoulli mixture mode
CAI Chong-chao;WANG Shi-tong
..............page:1235-1237,1250
Behavior-based software testing process model and its application
LU Yong-zhong;SONG Jun-li;GU Xi-qian
..............page:1238-1240
Application of compiler optimizing technology on out-of-core computations
LI Miao;ZHANG Jian;ZHANG Hong-yan;XU Gui-yan;XU Da-qing;HU Ze-lin;YUAN Yuan
..............page:1241-1244
The testing research based on an extended Petri net of EEPC
YIN Feng
..............page:1245-1247
An estimation method of iteration periods in XP project
WANG Xiao-hua;ZHAO Ming
..............page:1248-1250
An optimizing data decomposition method based on linear inequalities
DONG Chun-li;ZHAO Rong-cai;DU Peng;WANG Zheng
..............page:1251-1253,1263
The software reliability analysis based on test cases
LI Bao-lin;LI Zhi-shu;CHEN liang-yin;NI Jian-cheng
..............page:1254-1256,1270
Analysis and study on latent semantic index retrieval model
WANG Chun-hong;ZHANG Min
..............page:1283-1285,1288
The simulink simulation of time access services in SOIS
ZHANG Yuan-zhao;NING Hong
..............page:1286-1288
A multimodal background model based on binning kernel density estimation
WANG Guo-liang;LIANG De-qun;WANG xin-nian;WANG yan-chun
..............page:1121-1122
Spatial decision support system for controlling the outbreak and spread of animal epidemics
MA Jin-feng;PAN Yu-chun;SHEN Tao;WANG Ji-hua
..............page:1289-1292
gong gao
..............page:1098
gao yue
..............page:封2
A quantum genetic algorithm with repair function and its application in knapsack question
ZHU Xiao-rong;ZHANG Xing-hua
..............page:1187-1190
Job-shop scheduling problems based on immune ant colony optimization
SONG Xiao-jiang;LU Jun-yu;SUI Ming-lei
..............page:1183-1186
Multiple constrained QoS optimal routing selection of mobile IP
ZHU Cui-tao;GAO Liang;WANG Han-xin
..............page:1180-1182
Intelligent forecast integrated with CBR and ART-KNN for CFW
YANG Zhen-gang;DENG Fei-qi
..............page:1177-1179,1203
Frame layer rate control algorithm for H.264/AVC
CUI Peng-gang;GUO Bao-long
..............page:1167-1170
Video object extraction based on the intersection between three edge of frame change
PANG Xi-yu;GAO Sheng-fa;WANG Xiang
..............page:1164-1166
Color image restoration based on dynamic recurrent RBF neural network
YANG Wei-nan;GE Hong-wei
..............page:1160-1163
3D mesh model watermarking algorithm based on wavelet transform
ZHOU Xin;YU Xiao-ming;ZHU Tao;WANG Xiao-xiao;SHI Jiao-ying
..............page:1156-1159
Video de-interlacing algorithm based on improved 3D recursive searching
XU Hong-feng;SUN Wei-ping;DING Yu-qin;HUANG Yong-gui
..............page:1153-1155,1159
Mesh simplification algorithm based on control point error control
ZHU Jing-wei;WANG Cheng;MENG Pei-sheng
..............page:1150-1152
A novel approach to dynamic ocean surfaces simulation for Realtime 3D
WANG Sheng-zheng
..............page:1147-1149
Improved particle system for cloth animation
XIAO Ming-xing;GENG Zhao-feng
..............page:1145-1146,1170
Design and rendering of individual 3D human facial model
WANG Shu;LIU Xiao-dan
..............page:1141-1144
3D pose estimation based on single face image
ZHANG Zhi-gang;ZHOU Ming-quan;GENG Guo-hua
..............page:1138-1140
Face recognition based on dual-tree complex wavelet feature
HUANG Zhong-mei;ZHANG Xiao-hong;YANG Dan
..............page:1135-1137
Discrete ridgelet transformation and its application in SAR image compressing
LI Wei-bin;HE Ming-yi;ZHANG Shun-li
..............page:1132-1134
Real-time volume rendering of large datasets on standard PC hardware
XIE Kai;YANG Jie;ZHU Yue-min
..............page:1129-1131
A novel trajectory pattern learning method based on vector quantization and depth first search
YUAN He-jin;ZHANG Yan-ning;ZHOU Tao
..............page:1126-1128,1131
Shadow elimination by chrominance distortion and local kullback-leibler divergence
LI Wen-bin;WANG Chang-song
..............page:1123-1125
An adjustable subdivision surface modeling based on quadrilateral meshes
REN Shui-li;Zhang Kai-yuan;YE Zheng-lin;ZHAO Hong-qing
..............page:1119-1120,1144
Design and implementation of portable Mobile IPv6 protocol stack
CHEN Hai-feng;ZHANG Da-fang;LI Jun;JIANG Hai;WANG Jia
..............page:1113-1115
Research of the improved robust twinned SOM based on Voronoi distance
XIA Wen-wen;WANG Shi-tong
..............page:1109-1112
A new sip retransmission mechanism based on IMS
LIN Hui;WAN Xiao-yu;FAN Zi-fu
..............page:1106-1108
Energy-Efficient clustering routing algorithm based on LEACH
LI Yan;ZHANG Xi-huang;LI Yan-zhong
..............page:1103-1105
Research of TDOA/AOA hybrid algorithm under the NLOS environment
WANG Hong-yan;CHEN Li-xia;PEI Bing-nan
..............page:1099-1102
Adaptable mobile transaction model based on weight in mobile computing
LI Zhi-chao;Lü Xiao-feng;QIE Chen-xia;HE Tao
..............page:1092-1094
Query processing in mobile P2P system based on active database
HU Guo-ling
..............page:1089-1091,1134
Research of passive infrared sensor model for wireless sensor networks
GAO Xue-bin;ZHANG Zhi-qiang;YE Shi-wei;WU Jian-kang
..............page:1086-1088,1108
A network division model for wireless sensor networks
SUN Pei-gang;ZHAO Hai;SU Wei-ji;XU Jiu-qiang;ZHANG Xi-yuan;CHENG Da-wei
..............page:1083-1085,1105
Load balancing algorithm for P2P systems based on partial network information
YAO Lei;DAI Guan-zhong;ZHANG Hui-xiang;PAN Wen-ping
..............page:1080-1082
Connectivity analysis in self-organized network evolution
SUN Xiao;WANG Hui;WANG Hao
..............page:1077-1079
A routing protocol with balancing energy and other network performance parameters for mobile Ad Hoc networks
TAN Chang-geng;ZHANG Zhi-hua;WANG Jian-xin;CHEN Song-qiao
..............page:1073-1076
New extraction method of image steganography based on FastICA
LI Qi-yun;LI Jian-ping;XIAO Shu-cheng
..............page:1067-1069,1076
Improvement on centroid detection method for text document watermarking
DAI Zu-xu;HONG Fan;LI Xiao-gang;DONG Jie
..............page:1064-1066
Worm recovery of OLSR protocol in Ad Hoc
FENG Qing-yu
..............page:1062-1063,1079
ID-based designated-verifier threshold proxy signature
XU Li-juan;XU Qiu-liang;ZHENG Zhi-hua
..............page:1058-1061
A distributed intrusion detection system model based on correlation and agent
GUO Fan;YU Min;YE Ji-hua
..............page:1050-1053
Study of ID-based key management scheme
ZHANG Qiu-yu;WANG Rui-fang;YU Dong-mei;ZHANG Qi-kun
..............page:1047-1049
Research and realization of an embedded WLAN security detection project
Lü Jia-liang;CHEN Jing;WU Lu
..............page:1257-1259
A parallel algorithm for structural comparison of executable objects
LUO Qian;SHU Hui;ZENG Ying
..............page:1260-1263
Research and realization of ERP system based on SOA and BPM
FANG Jiang-xiong;HE Hong-bo;LI Yi-bing
..............page:1264-1267
Quality management system for the mass seismic information collection
LU Yang;CHEN Ming
..............page:1268-1270
Fine-grained access control for Web pages based on GAA-API
WANG Ting;CHEN Xing-yuan;ZHANG Bin;BAO Yi-bao;XIA Chun-tao
..............page:1274-1276
Auto-test for agricultural expert system
YIN Lai-wu
..............page:1277-1279,1282
Research of defending buffer overflow exploits based on detecting and preventing shellcode
HE Qiao;WU Liao-dan;ZHANG Tian-gang
..............page:1044-1046,1049
Intrusion detection model based on weighted multi-random decision tree
ZHAO Xiao-feng;YE Zhen
..............page:1041-1043
An intrusion tolerant KDC scheme for multicast communication
SHANG Jian-wei;LI Feng;ZHANG Yan-yan
..............page:1038-1040,1053
Adaptive hiding method of large capacity information
XIE Jian-quan;YANG Chun-hua
..............page:1035-1037
Efficient authenticated group key agreement protocol based on ECC
YU Zhao-ping;KANG Bin
..............page:1033-1034,1057