Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2008 Issue 7
Novel group key agreement protocol for dynamic collaborative peer groups
ZHANG Li-ping;CUI Guo-hua;LEI Jian-yun;XU Jing-fang
..............page:1798-1801
Approach for policy consistency management in automated trust negotiation
WANG Ying-long;HU Jing-zhu
..............page:1795-1797
Design and analysis of a security protocol for ubiquitous environments
YANG Fan;Lü Qing-cong;CAO Qi-ying
..............page:1802-1806
Security analysis and improvement of IKE protocol with signature authentication
HE Wei-wei;JI Xin-sheng;LIU Cai-xia
..............page:1807-1809,1815
Three-factor authentication mode of network payment
CHENG Liang;LIU Hui
..............page:1810-1811,1822
Modeling of virus propagation in peer-to-peer file-sharing networks
FENG Chao-sheng;QIN Zhi-guang;Laurence Cuthbet;Laurissa Tokarchuk
..............page:1812-1815
Cancelable fingerprint fuzzy vault scheme
FENG Quan;XIAO Yuan-yuan;SU Fei;CAI An-ni
..............page:1816-1818
Service-oriented network management model based on active network technology
WANG Jian-guo;HU Chuan;LI Ying;HONG Jing
..............page:1819-1822
Cooperative incentive mechanism based on game theory in mobile P2P networks
NIU Xin-zheng;ZHOU Ming-tian;SHE Kun
..............page:1823-1827
Study of communication performance in underwater acoustic sensor networks
WANG Biao;LI Yu;HUANG Hai-ning;XUE Shan-hua
..............page:1828-1830,1834
Scheduling scheme of IPTV multicast traffic control based on fair service and multidimensional weighted round robin
ZHANG Peng;YU Bai-feng;PANG Lin;ZHANG Xing-ming
..............page:1831-1834
Research on improving a problem of the cluster-heads' death in a round using a variable round method
CHEN Lan-lan;GUO Xiao-jin;JIANG Xin-chun;HUANG Yu
..............page:1835-1837
Probabilistic analysis on fault tolerance of E-3DMesh networks based on partitioning strategies
XIAO Jie;LIANG Jia-rong;HONG Xi-qing;XU Shuang
..............page:1838-1840
Research of stability of PID active queue management in Ad Hoc network
CHEN Liang;ZHANG Hong
..............page:1841-1843,1853
Application on call signal system and call control of HMP
LIAO Xue-hua;MIAO Jing-wei;ZHU Zhou-sen;ZHANG Ying;LI Xiao-ning
..............page:1847-1849
Automatic generation of non-linear loop invariants
BI Zhong-qin;ZENG Zhen-bing;GUO Yuan-hua
..............page:1854-1857
Use of RFID technology for indoor location
DENG Hui-fang;MA Qi-ping;ZHOU Shang-wei
..............page:1858-1860,1865
Research on the service-oriented solution for integrating WSN with grid
PENG Lei;WU Lei;ZENG Jia-zhi
..............page:1861-1865
Virtual apparatus sharing platform based on SOA
LIU Zhi-Du;CHENG Xin-dang;ZHAN Shi-hua
..............page:1866-1867,1871
Model checking interactive Markov chains
XU Xiang;WU Jin-zhao;LIN Lian-nan;CHEN Jian-feng
..............page:1868-1871
Design and implementation of high resolution camera array oriented to 3DTV
ZHANG Mao-jun;LI Le;BAO Wei-dong;TAN Shu-ren
..............page:1872-1874
Study of e-government platform mechanism based on extension component
ZHANG Xiao-yuan;HAN Guo-qiang;ZOU Kun;LI Wen
..............page:1875-1877,1881
Reconfigurable statistical process control system based on SPSS
ZHANG Su-mei
..............page:1878-1881
Study on acceleration technique for ADI-FDTD algorithm based on GPU
LIU Yu;YUAN Hong-chun;LIANG Zheng
..............page:1882-1885,1889
Traffic incident detection system based on video image processing
WANG Qin;HUANG Shan;ZHANG Hong-bin;YANG Quan;ZHANG Jian-jun
..............page:1886-1889
A novel approach for vehicle license plate location and tilt correction
WANG Guo-liang;LIANG De-qun
..............page:1890-1891,1895
Fingerprint image enhancement using mixed filters
LIU Bo;WANG Cheng;MENG Pei-sheng
..............page:1892-1895
Blind signal extraction algorithm in overdetermined mixtures
XIONG Ying
..............page:1896-1897
Rapid algorithm of multi-block motion estimation for H.264
YAN Hong-kui;SHEN Yan-fei;ZHU Zhen-min;XIAO Jian-hua
..............page:1898-1900
gao yue
..............page:封2
Study and realization on secure elliptic curve over optimal extension fields
ZHANG Ren-ping;PENG Chang-gen;TIAN You-liang;CHEN Yu-ling
..............page:1789-1791
New research about covering communication based on protocol of IPSec over DNS
CAI Zhao-quan;WANG Mei-zhen;MEI Song;LU Qing-wu
..............page:1786-1788
Research of co-stimulate intrusion detection based on danger singal
LU Xiao-ya;TAN Ying;WANG Jing-li
..............page:1784-1785,1806
Novel intrusion detection algorithm based on semi-supervised clustering
SONG ling;LI Mei-yi;LI Xiao-yuan
..............page:1781-1783
Random chaotic dynamical systems group and stream cipher algorithms
TIAN Ye;LI Shu-zhong
..............page:1779-1780,1783
Robust processing method for data smooth
CUI Dong
..............page:1678-1680,1695
Classification-based automatic initialization VVS tracking algorithm
SUN Min;GU Yao-Lin
..............page:1675-1677
Illumination robust Mean Shift tracking
WANG Lu;YANG Lin-yun;ZHUO Qing;WANG Wen-yuan
..............page:1672-1674
Chart algorithm-based binary combinatorial grammar parsing
ZHANG Yu-yan;YANG Xiao;HUANG Guo-dong;HOU Jin-kui
..............page:1668-1671
Intuitionistic fuzzy rough sets based on residuation implication of T-norms
YAN Zi-qin;YAO Jian-gang
..............page:1665-1667
Resolving combinational ambiguity in Chinese word segmentation based on rule mining and Na(l)ve Bayes method
ZHANG Yan-hu;PAN Lu-lu;PENG Zi-ping;ZHANG Jingbo;YU Zhong-hua
..............page:1686-1688,1704
Rough set model based on set pair analysis in incomplete information system
TAO Zhi;DAI Hui-jun;ZHANG Yan
..............page:1684-1685,1691
Research of multi-class algorithm based on fuzzy support vector machine
ZHANG Zhao;Fei Yi-nan;SONG Lin;WANG Suo-zhu
..............page:1681-1683
Study on intrusion detection alerts analysis system based on LRE algorithm
SONG Guang-jun;SUN Zhen-long
..............page:1776-1778
Learning algorithm model of constructive PONN based on knowledge rules
GU Yang-bo;WU Yan;ZHU Shi-jiao;WANG Shou-jue
..............page:1645-1648
Transductive support vector machines based on incremental learning
XIAO Jian-peng;ZHANG Lai-shun;REN Xing
..............page:1642-1644,1648
Semantic multi-strategy combination matching algorithm
LI Ming
..............page:1639-1641
Research of HSC-based hidden process detection technique
HE Zhi;FAN Ming-yu
..............page:1772-1775
Detecting hidden process with local virtualization technology
WEN Yan;ZHAO Jin-jing;WANG Huai-min
..............page:1769-1771
Modified fast algorithm for STL file slicing
WEN Pei-zhi;HUANG Wen-ming;WU Cheng-ke
..............page:1766-1768
Modified nonlinear diffusion equation for noise removal
CONG Wei;GUO Ding-hui
..............page:1764-1765,1775
Using tow-steps Hough transform to detection ellipses
ZHAO Jing-dong
..............page:1761-1763
Volume rendering of spatial scattered data based on spatial data interpolation algorithms
PENG Nan-feng;MO Jian-wen;HAN Chuan-jiu
..............page:1759-1760,1768
Determining knots by minimizing second derivative vector
ZHANG Fan;PAN Jing-chang
..............page:1756-1758
Image fusion algorithm based on fuzzy integral
GAO Ji-zhen;LIU Yian
..............page:1753-1755
Segmentation algorithm of hydrophobic image based on region similarity
YU Wen-wen;SUN Yi;TANG Liang-rui
..............page:1747-1749,1763
Modified Split-Merge image segmentation algorithm
XIE Jun;YU Lu;WU Le-nan
..............page:1744-1746
Design of thresholding segmentation operator with high precision self-adaptive capacity
ZHAO Da-xing;WANG Huang;ZHU Jin-lei;YAN Yun-hui
..............page:1742-1743,1746
Application of WMD Gaussian kernel in spectral partitioning
CHEN Ying-liang;WANG Shi-tong
..............page:1738-1741
Research of generating sketching style from original image
WANG Hui-qin
..............page:1735-1737
Improved adaptive median filtering
WEI Bao-guo
..............page:1732-1734
An optimizing parameter selection method of neural network based on small sample
WU Gui-fang;LIN Qing-song;SUN Xiu-ming;XU Jin-wu;XU Ke
..............page:1662-1664,1671
Low-side-lobe pattern synthesis of antenna array by genetic algorithm
BIAN Li;CHE Xiang-qian;YANG Guo-hui;MENG Fan-yi;WU Qun
..............page:1656-1658,1661
Visualization of virtual plant based on 3D model converter
WANG Qian;ZHANG Ying;LIU Ji
..............page:1652-1655
Research of knowledge discovery based on information entropy Petri net model
LI Jun;DIAO Yong-feng;YIN Xing;YE Zheng-wang;ZOU Hai-yang
..............page:1649-1651,1655
Spatial shape error concealment method based on cubic B-spline interpolation
FU Xiang;GUO Bao-long;YANG Zhan-long
..............page:1726-1728
Segmented logarithmic tone mapping from HDR to LDR
TAN Rui-shen
..............page:1724-1725,1741
Motion blur scales identification based on autocorrelation of projection
ZHANG Cai-fang;TIAN Yan;LIU Jian
..............page:1721-1723,1731
Real-time shadow rendering technology for large-scale virtual environments
TAN Tong-de;XU Hui-xiang;ZHAO Hong-ling;YU Xiao-xia
..............page:1717-1720
Robustness analysis of pose estimation based on points
HAO Ying-ming;ZHU Feng;OU Jin-jun;WU Qing-xiao;ZHOU Jing;FU Shuang-fei
..............page:1713-1716,1720
QoS management for real-time and mobile database systems based on imprecise computation
XIANG Jun;LI Guo-hui;YANG Bing
..............page:1709-1712
Analysis of customer loss based on artificial immune system
QIU Xiao-ning;CHEN Zhi-ping
..............page:1705-1708
Execution optimization for composite services through multiple engines
YANG Lin;LIN Jian-su
..............page:1702-1704
Message mechanism to achieve heterogeneous database synchronization update
LEI Yuan-ping
..............page:1700-1701,1708
Algorithm of refactoring XML structure with heuristic strategy
LIU Bo;YANG Lu-ming;DENG Yun-long
..............page:1696-1699