Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2009 Issue 5
Automatic detection of shared fragments model
SHI Lei;CHENG Gang-yun
..............page:1197-1200
Grammatical parsing algorithm based on expected categories
WANG Yi;LI Zhong-zhi
..............page:1251-1253
Monitor technique with high flow of data packets in Linux
MA Bo;YUAN Ding
..............page:1244-1247,1250
ARQ protocol based on time delay in half-duplex HF data communication
WANG Ye-qun;HUANG Guo-ce;CAO Peng
..............page:1241-1243
Adaptive blind equalization for ultra wideband system
SHI Xiao-lin
..............page:1238-1240
Survey of channel assignment for multi-radio multi-channel wireless networks
GUAN Jun-ming;LU Yang;SHENG Feng;FANG Mei
..............page:1233-1237,1240
Research on new evolution model of scale-free network
RAO Hao;YANG Chun;TAO Shao-hua
..............page:1230-1232
Test and analysis of network prototype for micro communication-element
HU Yu-rong;YI Fa-sheng;ZENG Jia-zhi
..............page:1222-1224
Feature interactions detection in SCML
HUANG Xing-ping;FAN Bing-bing;ZHANG Qi-zhi
..............page:1218-1221
New model of OBS network traffic based on wavelet
HU Jun;WEI Rong-hua
..............page:1214-1217
Adaptive routing algorithm for multi-channel wireless mesh networks
CHEN Jin-yuan;PENG Li-min
..............page:1211-1213,1217
Maximized lifetime model and its solution of layer-based sensor networks
YUAN Hui-yong;LI Su-jun;YANG Si-qing;DAI Jing-guo
..............page:1208-1210
Fair scheduling algorithm in IEEE 802.16e system
ZHANG Hong-xia;DAI Ju-feng
..............page:1204-1207
WMN QoS routing strategy based on interference model
SHU Yong-an;LUO Bin;SHI Bin-ning
..............page:1201-1203,1207
Information-hiding scheme with high capacity based on double-random phase-encoding technique
SANG Jun;YE Chun-xiao;XIANG Hong;FU Li
..............page:1301-1304
XML signature based on IBS without trusted third-party
YE Xiao-tong;PENG Yan;JIAN Qing-ming
..............page:1297-1300
Image scrambling effect evaluation method based on mutual information distance of difference image
WU Cheng-mao;TIAN Xiao-ping;TAN Tie-niu
..............page:1293-1296,1300
Fast DBNS scalar multiplication algorithm based on halving operation
YIN Xin-chun;ZHAO Rong;HOU Hong-xiang;XIE Li
..............page:1285-1288,1292
Approach to intrusion detection model based on biological memory principles
HUANG Guang-qiu;ZHAO Yu
..............page:1279-1284
Task scheduling algorithm based on resources grey prediction feedback
Lü Liang-gan;YU Jiong;LI Jing;DENG Ding-lan
..............page:1276-1278,1304
Two series of similarity measures between Vague sets
SHI Yu-qiang;WU Jia-pei;WANG Hong-xu;XU Yun-sheng
..............page:1270-1272
Ant colony algorithm based on mind evolution
JIA Hong-yan;GUO Jin-li
..............page:1267-1269
Hybrid algorithm based on cultural algorithm and modified differential evolution algorithm
HUANG Fu-ling;GAO Hui-min
..............page:1264-1266,1269
Bilevel optimization based multi-model modeling method for nonlinear systems
SHAO Lei;LEI Hu-min;ZHAO Zong-bao
..............page:1261-1263
Blind deconvolution based on improved genetic algorithm
DONG Shu-min;LI Yao;LIU Hong-bo;QIAO Shuang
..............page:1257-1260
Evolutionary strategy algorithm based on bi-group
WU Wei-min;CHEN Bao-cai;CHEN Dan;WANG Zhen-hua;SU Qing
..............page:1254-1256,1260
Semantic clustering-based attack detection model on CF-based recommender systems
CHEN Jian;OU Qing-yong;ZHENG Yu-xin;LI Dong
..............page:1312-1315,1320
Survey of trust management in mobile Ad Hoc networks
WANG Heng-jun;WANG Ya-di;ZHANG Qi
..............page:1308-1311
Method for trust computation based on behavior risk evaluation
WU Xiao-nian;ZHANG Run-lian;ZHOU Sheng-yuan
..............page:1305-1307
Improved route packet marking tracking scheme
XU Jin-song
..............page:1316-1320
Grid resource scheduling model based on risk evasion
YAO Jun;HE Ting-nian;LI Yong;QU Wei-li;MA Man-fu
..............page:1321-1323
Crop-resistant digital watermarking for image based on structured coding
ZHOU Xiang-xiang;YIN Zhong-hai;WANG Xin;HAN Yi-na
..............page:1324-1326
Preimage attack on step reduced hash function HAVAL
WANG Gao-li
..............page:1327-1329
Efficient certificateless signature scheme based on bilinear parings
ZHANG Yu-lei;WANG Cai-fen;ZHANG Yong-jie;CHENG Wen-hua;HAN Ya-ning
..............page:1330-1333
[a, b]-shrinking generator
LIAO Cui-ling;YU Zhao-ping
..............page:1334-1335,1338
Improved fuzzy C-means clustering algorithm and its application to intrusion detection
ZHANG Guo-suo;ZHOU Chuang-ming;LEI Ying-jie
..............page:1336-1338
Learning-based nonlinear algorithm of face image super-resolution
HUANG Dong-jun;HOU Song-lin
..............page:1339-1341
Remote sensing image compression based on morphologic bit plane scan
GAO Shan;BI Du-yan;WEI Na
..............page:1342-1343,1348
Fast and simple vehicle logo location method
LIU Zhi-fang;WANG Yun-qiong
..............page:1344-1348
Improved LSB steganography based on scanning correlative degree
REN Xiao-ping;CAI Zi-xing;LU Wei-wei
..............page:1349-1352
New supervised locality-preserving projections algorithm for face recognition
LIU Min;LI Xiao-dong;WANG Zhen-hai
..............page:1416-1418,1422
Audio classification based on one-class SVM
YAN Jing-bin;WU Shi;IGOR Kheidorov
..............page:1419-1422
BPNN algorithm towards shot boundary detection
ZHANG Nan;XIAO Guo-qiang;JIANG Jian-min;QIU Kai-jin
..............page:1369-1372
Hierarchical layout algorithm based on order of succession and degree of association
ZHANG Yi-kun;ZHU Wei;WANG Kai;HU Yanj-ing
..............page:1373-1375
Static detection of array bounds errors and null pointer dereference in Java
CHEN Bai-qiang;GUO Tao;RUAN Hui;YAN Jun
..............page:1376-1379
Test path generation approach for GUI based on event weight
JIANG Qin;LIU Lin-lan;SU Xi;CAI Ke
..............page:1382-1384
Method of test scenario generation based on UML dynamic view
ZHAO Xin;LIU Lin-lan;LUO Hai-ping;FAN Xin
..............page:1385-1388,1392
Process mining based on parallel recombination simulated annealing algorithm
TIE Ju-hong;PENG Hui;ADU Jian-hua
..............page:1389-1392
Location of MFC messages processing functions in converse analysis
XIE Yu-min;SHU Hui;CHEN Jian-min;XIONG Xiao-bing
..............page:1393-1396,1400
Incremental construction algorithm of constrained concept lattice based on pruning
MA Yang;ZHANG Ji-fu;ZHANG Su-lan
..............page:1397-1400
Evaluation of access patterns from log Ontology with DL-safe rules
SUN Ming;CHEN Bo;ZHOU Ming-tian
..............page:1401-1404
Method based on rough set for mining multi-dimensional association rules
TAO Duo-xiu;LV Yue-jin;DENG Chun-yan
..............page:1405-1408
Distributed algorithm for constructing concept lattice based on index
TAN Zhe;HU Xue-gang
..............page:1409-1411
Precise recognition algorithm for handwritten digit characters based on low-dimensional features
GAO Hong-bin;CHEN Jun;CHEN Li-ping
..............page:1412-1415
Sensor fault detection model based on self-organizing immune network
HOU Sheng-li;WANG Wei;BO Lin;ZHOU Gen-na;QIAO Li
..............page:1426-1429
Ontology-cored image emotional semantic search model
ZHAO Juan-juan;CHEN Jun-jie;LIU Jia-lin;XU Wei-zhong
..............page:1430-1432,1436
Pitch detection based on autocorrelation square function and wavelet transform
LIN Qin;GUO Yu-tang;LIU Ya-nan
..............page:1433-1436
Study and application of emergency case Ontology model
WANG Wen-jun;YANG Peng;DONG Cun-xiang
..............page:1437-1440,1445
Application of generalized Jensen-Schur measure in medical image registration
HU Shun-bo;WANG Guang-tai;LIU Chang-chun;SHAO Peng
..............page:1441-1445
Dynamically reconfigurable cache scheme with lower-power
ZHAO Huan;SU Xiao-kun;LI Ren-fa
..............page:1446-1448,1451
SDRAM controller designed for real-time display system of large-array CCD image
WANG Ming-fu;YANG Shi-hong
..............page:1449-1451
Research of high sensitive GPS software receiver developing platform
QIN Xin-xian;HAN Cheng-de;XIE Ying-ke
..............page:1452-1455,1460
Temporal error concealment algorithm designed for H.264
HUANG Zhi-hua;YI Ben-shun
..............page:1355-1358
Real-time line segments detection based on graphic processor
ZHANG Tong;LIU Zhao;OUYANG Ning
..............page:1359-1361
Fast motion estimation algorithm for H.264 with multi-references
WANG Li-li;HUANG Xiao-ge;ZHANG Ming
..............page:1362-1364,1368
Electronic elections based on secure E-mail protocol
NIU Xiang-xu;CUI Zhe;DAI Xiang
..............page:1470-1472,1476
Interconnected delay robust decentralized H∞control for large-scale systems
ZENG Shu-hua;CHEN Ning;LIU Wei-ying;GUI Wei-hua;HUANG Yin-xiu
..............page:1473-1476
Application of data mining in CRM of children training institute
ZHAO Yan-qin;SUN Chang-li
..............page:1477-1479
Knowledge acquisition framework based on experience feedback model for die and mold enterprise
HU Sha;YANG Shuang-rong;LI Jian-jun
..............page:1456-1460
Applying AB classification method in one-dimensional cutting stock problem
LIN Jian-liang
..............page:1461-1463,1466
New image stippling approach
WANG Song;LI Yu-long;WANG Wei-hong
..............page:1464-1466
Safety visiting strategy in network measurement and control laboratory
JIA Hui-qin;LI Zhou-li
..............page:1467-1469