Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2009 Issue 3
Rate control algorithm based on standard H.264
YANG Yu;HE Xiao-hai;Lü Rui
..............page:675-677,680
Improved method of TCP-friendly congestion control protocol
ZHANG Da-min;CHEN Lin-zhou-ting
..............page:672-674
Routing of P2P based on trust management
WANG Hong-lin;ZHU Yan-qin
..............page:669-671,674
Layered multicast tree model based on genetic algorithm
WANG Xing-zhu
..............page:665-668,685
P2P traffic identification method based on node status
PEI Jiang;LU Xuan-min;ZHOU Ya-jian
..............page:662-664
Adaptive algorithm for dynamic traffic grooming in WDM mesh networks
SUN Su-yun;TANG Lin-yan
..............page:658-661
DBCTIA algorithm based on binary object optimization used for load balancing of multiple links
LIANG Ben-lai;QIN Yong;REN Xin-hua;JIA Yun-fu
..............page:655-657,664
Bi-directional selection mechanism based on reputation
ZHANG Guo-hua;HUANG Yan-bo
..............page:652-654
Opportunistic coding based on source directed relay
QIN Jian;YANG Bai-wei;LI Ou
..............page:649-651
An efficient RP2P network based on hierarchical dividing
LI Yuan;CHEN Shi-ping
..............page:646-648,651
Research on EPA network without collecting switchers
JIANG Xiu-zhu;FENG Dong-qin;XU Zhao;CHU Jian
..............page:643-645
Distributed group key management scheme based on cluster collaboration in WSN
ZENG Wei-ni;LIN Ya-ping;LU Qiu-ying
..............page:638-642
Design and analysis of IBC-based TLS handshake protocol
PENG Chang-yan;ZHANG Quan;TANG Chao-jing
..............page:633-637
Review of QoS mechanisms for mobile Ad Hoc networks
ZHANG Peng;CUI Yong;SUN Lei
..............page:625-632,642
New algorithm for moving object extraction in MPEG compressed domain
ZHOU Qi-ya;HE Chun-mei;YANG Gao-bo
..............page:742-746
Zero digital image watermarking method against rotation attack based on Contourlet transform
HE Bing;WANG Xuan;ZHAO Jie;ZHAO Xue-qing;ZHANG Xiao-jing
..............page:801-804
Improved negative selection algorithm for network anomaly detection on high-dimensional data
GUO Wen-zhong;CHEN Guo-long;CHEN Qing-liang
..............page:805-807,861
Moving object detection algorithm based on multi-threshold for PCNN
LIU Ying-jie;MA Ruo-fei;ZHU Wang-fei;ZHE Hao;ZHAN Kun;MA Yi-de
..............page:739-741
Moving targets detection using local OGHM
LI Hong-you;WANG Tong-qing;LIU Qing;GUO Chun-hua;JIANG Jian-chun
..............page:736-738,822
Edge collapse simplification based on similar curvature
ZHANG Guo;LIU Xu-min;GUAN Yong
..............page:729-731,816
Corner detection using multi-scale representation of contour orientation rate based on B-spline
HONG Ming-jian;ZHANG Xiao-hong;YANG Dan
..............page:725-728,746
New shape reconstruction method for little convex polyhedrons
MENG Fan-feng;QU Zhen-shen;ZENG Qing-shuang;LI li
..............page:722-724,776
UML-based approach to generate testing sequence of polymorphic software
CHEN Lian-ping;ZENG Yi;CHAI Yan-xin;QIN Zhao-xuan;GONG Yi;WANG Yan-li
..............page:712-715
Process modeling based on extended UML activity diagrams
ZHOU Jin-deng;BAI Zhen-xing;WU Jie;LI Huan-yu
..............page:708-711
An improved static program slicing algorithm
ZHANG Long-jie;XIE Xiao-fang;YUAN Sheng-zhi
..............page:705-707,711
Research of connector model oriented component composition
YAO Quan-zhu;WU Man-li;LEI Xi-ling
..............page:702-704
Study and implementation of software automatic testing system based on STAF
LI Xia-an;CHEN Zhi-bo
..............page:699-701,704
Web application test model based on action
FU He-gang;LU Yan-jun;ZENG Gang
..............page:695-698
Software reliability modeling based on grey system theory
JIN Ang;JIANG Jian-hui;LOU Jun-gang;ZHANG Rui
..............page:690-694
Approach to pointcut definition based on conceptual model
GE Jun-wei;ZHANG Peng;FANG Yi-qiu
..............page:686-689,715
Research on Tableau algorithm for Horn-Extended DL
XIAO Lan;ZHENG Li;XIAO Jian;HUANG Yi
..............page:681-685
Improved Ribbon Snake algorithm for automatic road generation
HU Yang;ZU Ke-ju;LI Guang-yao;Kacem CHEHDI
..............page:747-749,791
Carving surface modeling of images based on quadratic Bezier curved surface
CHEN Yu-tuo;YANG Wei-min;XIONG Qiu-bao;HU Liang;HAN Xu-li
..............page:750-754
Assessment method of image interpolation based on edge primitive
HE Yu-qing;WANG Cheng-you
..............page:755-756,760
Object tracking algorithm with adaptive color space based on CamShift
XU Kun;HE Yu-yao;WANG Wei-ya
..............page:757-760
Oral English training system based on speech recognition technology
ZHAO Bo;TAN Xiao-hong
..............page:761-763,773
Study on a novel method of speaker recognition
ZHANG Wei-jie;FEI Wan-chun;XU Liang-jun;LIU Lu
..............page:764-767
Musical score recognition of solo music signal based on WAV file
CAO Xi-zheng;LIU Chun-hong;SUN Lin
..............page:768-770,788
Recognition algorithm of QR code for embedded systems
HE Wei;HUANG Dan-ling;ZHANG Ling;YI Ming
..............page:774-776
Decision tree classification of remote sensing images based on vegetation indices
PAN Chen;DU Pei-jun;LUO Yan;YUAN Lin-shan
..............page:777-780,797
Improved Mean Shift real-time multiple faces tracking algorithm
ZHANG Tao;CAI Can-hui
..............page:781-784
Color-based method for face detection and location
QI Yong-feng;HUO Yuan-lian
..............page:785-788
Recognition and description system of mathematical formulae for printed documents
CHEN De-yu;ZHU Xue-fang;SU Xiao-chen;HANG Yue-qin
..............page:789-791
Online visual inspection method for O-ring number on the pipe connectors
ZHOU Lü;CAI Jin-da;LIU Ping;QIAN Wei
..............page:792-794
Flatness defect pattern recognition with data mining technology
ZHAO Xiao-yan;ZHANG Zhao-hui
..............page:795-797
Method for Chinese short text classification based on feature extension
WANG Xi-wei;FAN Xing-hua;ZHAO Jun
..............page:843-845
Automatic acquisition of customer reviews
HUANG Yong-wen;HE Zhong-shi;WU Xing
..............page:846-848,857
New feature selection algorithm based on multiple heuristics
ZHU Hao-dong;ZHONG Yong
..............page:849-851
Query expansion based on context of document and search result
JIANG Hui;YANG Xiao-hua
..............page:852-853
Extended algorithm for XML query reformulation
LI Rui;WU Kai-gui
..............page:854-857
Research on RBFNN-aided adaptive UKF algorithm
GUO Wen-qiang;QIN Zhi-guang
..............page:858-861
Intrusion alert correlation method based on uncertain knowledge discovery
XIAO Yun;WANG Xuan-hong;PENG Jin-ye;ZHAO Jian
..............page:808-812
Research of data acquisition technology in program automatic unpacking
ZENG Yong-jun;ZHU Jun-hu;XI Qi
..............page:813-816
Software protection technology based on self-sealing code block
ZHOU Li-guo;XIONG Xiao-bing;SUN Jie
..............page:817-822
Method of conflict detection and elimination for security policy
WANG Jing;LIN Zhi;LI Yun-san
..............page:823-825,829
Research on probing characteristics of proxy server
YANG Jie;SHU Hui
..............page:826-829
Clustering algorithm based on grid and fractal dimension
LIANG Min-jun;NI Zhi-wei;NI Li-ping;YANGGE Zhong-xiao
..............page:830-832
Method of constructing phylogenetic tree based on fuzzy clustering
LI Gang-cheng;LIU Zan-bo;ZENG Qing-guang
..............page:836-838,842
View-dependent greenhouse scene modeling and interactive walkthrough
WEI Wei;GUO Xin-yu;ZHAO Chun-jiang;LU Sheng-lian
..............page:888-891
Semantic Web-based context-aware service selection in task-computing
HUANG Run-cai;ZHUANG Yi-wen;ZHOU Ji-liang;CAO Qi-ying
..............page:892-895
DSS for E-government project approval based on ontology and CBR
LIU Xiao-wen;HU Ke-jin
..............page:896-899
Evolutionary design of combinational circuit based on game genetic algorithm
XU Hai-qin;DING Yong-sheng;HU Zhi-hua
..............page:900-902
Anti-spam model based on semi-Naive Bayesian classification model
HUI Bei;WU Yue
..............page:903-904,907
Interbank cash concentration model based on absolute minimum fork tree
JI Mo-li;YANG She-tang
..............page:905-907
Interaction model of community mining and topic detection and tracking
YANG Ru;TAO Xiao-peng
..............page:908-911
Coherence parallel algorithm of seismic data processing based on CUDA
WU Lian-gui;YI Yu;LI Ken-li
..............page:912-914
Study on samples regression based on priority ordered neural network
ZHU Shi-jiao;YANG Jun
..............page:862-864
Ant colony algorithm based on pheromone intensity
YANG Jie;YANG Sheng;ZENG Qing-guang;LI Ren-fa
..............page:865-867
CMAC application using triangulation in reinforcement learning
SUN Fang-yi;ZHENG Zhi-qiang
..............page:871-873
Research of subjective trust model based on credibility theory
WANG Xiao-bin
..............page:874-876
Generalized least squares support-vector-machine algorithm and its application
WU Zong-liang;DOU Heng
..............page:877-879
Parallel algorithm for matrix multiplication based on De Bruijn network
CAI Zhao-quan;WEI Wen-hong;WANG Gao-cai;ZHENG Zong-hui;LU Qing-wu
..............page:880-883,887
Research and realization of casualty evacuation model in emergency management system
HU Fei-hu;GENG Ze-fei;CHEN Hui-min;SUN Lin-yan
..............page:884-887