Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2008 Issue 6
Reliability model of component-based software
ZHOU Na-qin;ZHANG You-sheng
..............page:1630-1631,1634
High performance implementation of factoring multivariate polynomials based on NTL
QIN Xiao-lin;FENG Yong;Li Jun
..............page:1627-1629
Shared running cache algorithm with supporting video VCR operation
LUO Wei-hua;YANG Jian;ZHENG Quan;HU Han
..............page:1624-1626
Integrating WSN into EPCglobal: the environment-aware supply chain supervision
PENG Lei;YUAN Hai;WU Lei;ZENG Jia-zhi
..............page:1616-1619,1623
Methodology of feature change detection and matching in data updating
WU Jian-hua;FU Zhong-liang
..............page:1612-1615
Chessboard grid corners detection based on geometric symmetry
TAN Xiao-jun;GUO Zhi-hao;JIANG Zhi
..............page:1540-1542
Method for unsupervised text location based on brightness grading and direction density
LIU Qiong;ZHOU Hui-can;WANG Yao-nan
..............page:1523-1526
Watershed segmentation algorithm for medical image based on anisotropic diffusion filtering
CHEN Jia-xin;WU Ying;LI Wei
..............page:1527-1529,1600
Improved algorithm of fractal image coding based on neighbour-searching
TENG Zi;DENG Hui-wen;YANG Jiu-jun
..............page:1530-1532,1536
Application of pitch synchronization dynamic frame-length features in English lexical stress detection
CHEN Nan;HE Qian-hua;WANG Wei-ning;CHEN Rong-yan
..............page:1533-1536
Scene classification based on block latent semantic
ZENG Pu;WU Ling-da;WEN Jun
..............page:1537-1539,1542
Automatic semantic Web services composition based on complete backward tree
LI Rui-ning;ZHOU Zhu-rong
..............page:1427-1430
Study on research field diffusion based on author publication track record
WANG Jin-long;GENG Xue-yu
..............page:1424-1426,1430
Generalization rough set theory and real-valued attributes reduction
XIAO Di;ZHANG Jun-feng
..............page:1420-1423
Multi-mode classification with application in customer retention
CHEN Zhi-ping
..............page:1417-1419,1423
Optimal algorithm of data streams clustering on sliding window model
HU Yu;YAN Qiao-mei
..............page:1414-1416
Projection-pursuit-based dimension reduction for visualization of text features
GAO Mao-ting;LU Peng
..............page:1411-1413,1416
Scheduling approach for non real-time applications in open real-time system based on two-level scheduling scheme
JIN Yong-xian;HUANG Jing-zhou;WANG Jian-guo
..............page:1608-1611
Byte access method for wide data bus memory based on FPGA
REN Xiao-xi;ZHANG Ke-huan;LI Ren-fa
..............page:1605-1607
Dynamic authorization scheme based on delegation in distributed system
ZHANG Run-lian;WU Xiao-nian;DONG Xiao-she
..............page:1365-1368
Recursive algorithm for generating layer patterns for strip packing
HE Dong-li;CUI Yao-dong
..............page:1632-1634
Model of business programming based on service virtualization
ZHU Jia-xian;BAI Wei-Hua
..............page:1635-1638
gao yue
..............page:封3
New image restoration model for PDE based on LIP
JIANG Wei;HU Xue-gang
..............page:1520-1522,1526
Image denoising based on Contourlet transform and total variation
SHEN Wei-yan;WEI Zhi-hui;DUAN Qiu-feng
..............page:1517-1519
Automatic multi-view point cloud merging algorithm used in structure light measure system
CHE Xiang-qian;ZHAO Can;MENG Xiang-lin;CHENG Jun-ting;WANG Guo-quan
..............page:1514-1516,1519
Curves interpolating on adjustable surface
GU Yao-lin;ZHEN Ti-wei
..............page:1510-1513
Approach to collaborative filtering recommendation based on HMM
HUANG Guang-qiu;ZHAO Yong-mei
..............page:1601-1604
Tasks mapping in grid computing environment based on ACO algorithm
TAN Yi-ming;ZHANG Miao;ZHANG De-xian
..............page:1598-1600
Similarity measures between Vague sets based on (tx, fx) expansion and its application
FU Xiao-fang;ZHANG Fu-jin;WANG Hong-xu
..............page:1595-1597
Binary tree data structure based on sequential storage model in DNA computer
ZHU Ya-li;LI Ken-li
..............page:1591-1594
Grid resource distribution based on fuzzy multi-objective decision making
FENG Jian-hong;LIU Ying;LUO Ying;CHEN Wen-guang
..............page:1588-1590,1615
Grid resource selection optimizing based on QoS parameters integrated model
MA Man-fu;YAO Jun;WANG Xiao-niu
..............page:1585-1587
Fault diagnosis based on fuzzy inference graph
ZHOU Hai-ying;DONG Su-rong
..............page:1582-1584
Semantic-based service matching algorithm in pervasive computing environments
Lü Qing-cong;CAO Qi-ying
..............page:1578-1581
Chinese question answering pattern learning based on self-training mechanism and Web
LI Zhi-sheng;SUN Yu-cheng;HE Pi-lian;HOU Yue-xian
..............page:1575-1577,1581
Multi-objective evolutionary algorithm based on neighborhood
LI Mi-qing;ZHENG Jin-hua;LUO Biao;WU Jun;WEN Shi-hua
..............page:1570-1574
FLPI: An optimal algorithm for document indexing based on LPI
TAO Jian-wen;Zhao Jie-yu
..............page:1566-1569,1574
Improved concept similarity computing approach in Ontology mapping
NIE Gui-hua;ZUO Xiu-ran;CHEN Dong-lin
..............page:1563-1565
Universal approximation of fuzzy functions by polygonal fuzzy neural networks
HE Chun-mei;YE You-pei;XU Wei-hong
..............page:1555-1558
Joint algorithm for permutation problem in frequency-domain blind speech source separation
ZHU Jian-jian;WANG Hui-gang;LI Hu-xiong
..............page:1552-1554,1562
Face recognition based on fuzzy chaotic neural network
PANG Chun-jiang;GAO Wan-qing
..............page:1549-1551,1558
Speaker recognition based on hybrid particle swarm optimization algorithm
XU Yun-xi;CHEN Fang
..............page:1546-1548
Infrared moving object tracking based on particle filter
YU Yong;GUO Lei
..............page:1543-1545
Watermarking in binary image based on Arnold transformation
LIU Fang;JIA Cheng;YUAN Zheng
..............page:1404-1406,1410
Design and implementation of H.323-based VoIP interception model
ZOU Yi-min;DU Jiang
..............page:1401-1403
Application of fuzzy window Markov chain in IDS
ZHAO Wen-gang;ZHONG Le-hai;ZHANG Ya;YANG Jin;ZOU Hai-yang
..............page:1398-1400.1403
Approach for effective fractal-based similarity search of stochastic non-stationary time series
SUN Mei-yu;FANG Jia-nan;JIANG Xue-bo;YU Dong-mei;ZHOU Yu-ping
..............page:1431-1434,1437
Improved scheme based on random key predistribution for wireless sensor network
TIAN Feng;WANG Jiao-feng;WANG Chuan-yun;PAN Zuo-jin;SUN Xiao-ping
..............page:1388-1391
Distributed secret share distribution scheme based on threshold warrant certificates
HUANG He;WANG Ya-di;HAN Ji-hong;WANG Heng-jun
..............page:1385-1387,1391
Credit-based dynamic authentication mechanism crossing heterogeneous domains
PEI Li-chun;CHEN Xing-yuan;WANG Ting;ZHANG Bin;XU Zhen
..............page:1382-1384
Location privacy protection routing for wireless sensor network
YAO Jian-bo;WEN Guang-jun
..............page:1379-1381
Bidirectional monitoring threat and simulation in IP Multimedia Subsystem
WANG Xiao-lei;GUO Yun-fei;YANG Tao
..............page:1376-1378,1381
Design and implementation of network firewall system based on Godson CPU
LI Qing;WU Shao-xiao;QIAO Chong;SHI Gang;LIU Jin-gang
..............page:1372-1375
Multi-designated verifiers signature based on multilinear forms
WU Ke-li;WEI Xiang-he;ZHANG Hong;LIU Feng-yu
..............page:1369-1371
Certificateless public key signature scheme without pairing
WANG Hui-ge;WANG Cai-fen;LI Yong-bin;YANG Xiao-dong
..............page:1395-1397
Controllable anonymous authentication protocol in wireless communications
XIE Cheng;XU Hong-yun;LIU Jing
..............page:1392-1394
Adaptive image denoising based on modified orthonormal finite ridgelet transform
XIA Ping;XIANG Xue-jun;WAN Jun-li;DENG Li-hua
..............page:1507-1509
Efficient adaptive motion estimation search algorithm
SHI Min;YI Qing-ming
..............page:1504-1506
Two-phase video shot boundary detection approach with various step-length
ZHU Qing-sheng;CHEN Yong-ping;GE Yao
..............page:1501-1503,1506
ICMP-based method for logical network topology discovery and analysis
LIU Jie;WANG Qing-xian;LUO Jun-yong
..............page:1498-1500
Research of the sleep mode based on IEEE 802.16e
QU Hong-wei;ZHANG Chun-ye;ZHANG Yan;ZHAO Li
..............page:1494-1497
Design and implementation of ASN.1 module in DSRC
TANG Bo;WANG Neng
..............page:1490-1493
Algorithm of mobility anchor point selection in hierarchical mobile IPv6
CHEN Wei-xin;LIN Lin;HAN Guo-dong
..............page:1481-1485
HCache:An efficient hybrid P2P Web caching system
LI Tian-liang;SHI Lei
..............page:1478-1480,1485
Stochastic sleeping protocol based on energy and neighbor message in wireless sensor network
HE Kang-sheng;KUANG Ji-shun;YAO Zhuo-shan
..............page:1475-1477
Formal description and test cases generation of protocols based on input/output sequence
GU Xiang;QIU Jian-lin;YAN Yan
..............page:1471-1474
Mining frequent closed patterns over data stream
RONG Wen-liang;YANG Yan
..............page:1467-1470
Algorithm of frequent-patterns mining in data stream
ZHU Qiong;SHI Rong-hua
..............page:1463-1466
Text term weighting approach based on latent semantic indexing
LI Yuan-yuan;MA Yong-qiang
..............page:1460-1462,1466
Reduction tree algorithm based on discernibility matrix
HUANG Zhi-guo;SUN Wei;WU Hai-tao
..............page:1457-1459
Efficient CBIR retrieval method for image database
TANG Min;YANG Ai-min
..............page:1454-1456,1459
XML-based mining algorithm of complete frequent query pattern
CHEN Chao-xiang;YE Shi-ping;HUA Cheng;JIN Lin-qiao
..............page:1450-1453
Rough-set based approach to solve the inference conflict in qualitative probabilistic network
LIU Shuang-xian;LIU Wei-yi;YUE Kun
..............page:1447-1449,1453
Named entity relation extraction based on SVM training by positive and negative cases
LIU Lu;LI Bi-cheng;ZHANG Xian-fei
..............page:1444-1446,1497
Affinity propagation clustering for symbolic interval data based on mutual distances
XIE Xin-xi;WANG Shi-tong
..............page:1441-1443,1493
Anomaly detection method by clustering normal data
LI Na-na;ZHAO Zheng;LIU Bo-ying;GU Jun-hua
..............page:1438-1440,1474