Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2010 Issue 2
Point cloud simplification with boundary points reservation
HUANG Wen-ming;XIAO Zhao-xia;WEN Pei-zhi;WU Xiao-jun
..............page:348-350,384
Improved equal AQM based on CHOKe hits
JIANG Ming;BIAN Hao;ZHANG Shao-li
..............page:289-291
Color image segmentation algorithm based on K-means clustering and region merging
LI Guang;WANG Zhao-ying;HOU Zhi-qiang
..............page:354-358
Intelligent fire-fighting vehicle model based on embedded system
XU You-zhe;LI De-run;CHEN Sheng;CHANG Hua
..............page:560-563,566
Novel geodesic distance Fourier shape descriptor
CHEN Sheng;LIU Xun
..............page:362-363,414
Colorization method with optional number of cluster and histogram matching
WANG Shi-gang;Lü Dong-hui
..............page:351-353,358
New mixing algorithm for network and telephone conference
HAN Yu;PU Jie-xin
..............page:564-566
Mixed image fusion encryption based on pseudo-random points
GU Cui-chen;HU Jin-chu
..............page:525-528
k-hop compound metric clustering algorithm based on trust in tactical Internet
LIU Min;HAN Ji-hong;WANG Ya-di
..............page:521-524,528
On the security of certificateless signature scheme without pairing
CHEN Jiang-shan;HUANG Zhen-jie
..............page:510-512
Improvement of AODV routing protocol in mobile Ad Hoc network
WANG Zhong-heng;ZHANG Xi-huang
..............page:333-336
New modified particle swarm optimization on basis of two latest generations
OU Xu;LIANG Jing-zhang;LUO De-xiang;ZHANG Xin-hua
..............page:472-475
Inventory routing problem and its recent development: Review
FU Cheng-hong;FU Zhuo
..............page:453-457
Wavelet packet and hidden Markov model for off-line handwritten signature recognition
XIAO Chun-jing;LI Chun-li;ZHANG Min
..............page:445-448
Human facial wrinkles recognition based on Gabor filter and BP neural network
XU Gai-yan;XU Hua;ZHAI Zhong-wu;GE Qing-ping
..............page:430-432
Forecasting method for water quality time series of few and abnormal data
SHI Wei-ren;WANG Yan-xia;TANG Yun-jian;FAN Min
..............page:486-489,505
Airport taxi scheduling optimization strategy based on genetic algorithm
DONG Tian-sheng;PENG Jian
..............page:482-485
Artificial fish swarm algorithm for multiple knapsack problem
MA Xuan;LIU Qing
..............page:469-471,494
Road extraction from remote sensing images combining region growing with level set
GU Dan-dan;WANG Xi-li
..............page:433-436,440
Effective selection algorithm of initial quantization parameters
MIAO Guang-zhong;LIN Qi-wei
..............page:330-332,340
Network planning model for 3G network based on 3D ray tracing technology
YUAN Zheng-wu;LI Lin;LI Yi-chao;LIU Quan
..............page:316-318,322
Paralleled packet classification based on network processor
LIU Zhen-yu;LI Wei-jun;LAI Yue
..............page:306-308,315
Certificateless threshold multi-proxy multi-signature scheme
YANG Chang-hai
..............page:513-516
Speech automatic segmentation algorithm of audio publication with adaptive threshold adjustment
ZHANG Jun-xing;SHI Li-xin;WANG Du-sheng
..............page:567-570
Parallel computing method of data stream quantiles with GPU
ZHOU Yong;WANG Hao;CHENG Chun-tian
..............page:543-546
Parallel rendering efficiency analysis of 3D graphics on PC cluster
PENG Shuai;LI Dong-mei;LI Zhao-hui
..............page:547-550
Multi-scale service composition approach based on statistics of service relationship
YANG Hao;XU Hui;ZHANG Ying
..............page:380-384
Corner relocation based on density gradient direction
WANG Xu-dong;JIA Yuan
..............page:359-361,366
Clustering scheme based on simulated annealing algorithm in wireless sensor network
HU Rong;YANG Chun;HE Jun;LI Qi
..............page:299-302
Euclidean distance based method for unclassifiable region of support vector machine
LI Ren-bing;LI Ai-hua;CAI Yan-ping;LI Liang;WANG Tao
..............page:476-478,546
Comprehensive tolerance warning method of worm based on greedy algorithm
ZUO Jia-liang;KOU Ya-nan;YANG Ren-nong;ZHANG Ying;HOU Pei;HUANG Li-bing
..............page:529-531,536
Overprint error detection algorithm based on mathematical morphology
GAO Juan;DUAN Zhong-xing
..............page:437-440
Hybrid algorithm for low illumination video enhancement
YIN Yong;JIN Xian-gang;WANG Jian-dong
..............page:364-366
Approach to service adaptation for constructing situational applications
LI Jing;CHEN Wang-hu
..............page:390-393,410
Research on semantic-based component composition approach
ZENG Jing-na;YU Dan;LI Xian-jun;MA Shi-long
..............page:406-410
Ensemble learning algorithm on attribute combination
FU Zhong-liang;ZHAO Xiang-hui;MIAO Qing;YAO Yu
..............page:465-468,475
Optimization method for irregular LDPC codes in AWGN channel
MAO Qian;DONG De-cun;ZENG Xiao-qing
..............page:292-294
DEM generation and accuracy analysis in Zhenjiang using InSAR
HE Min;HE Xiu-feng
..............page:537-539
Fake verification analysis of SVD-based image watermarking
ZHAO Xing-yang;SUN Ji-yin
..............page:517-520
Object-oriented three-layer modeling in MDA
HUANG Jian-ting;ZHANG Li-chen;GU Jin-feng
..............page:385-389
Blind image super-resolution restoration based on joint interpolation-restoration scheme
XIE Song-hua;CHEN Li;NIE Hui
..............page:341-343,347
Image mosaic techniques in catching panorama image of hole wall
WANG Cheng-liang;YANG Peng;CAI Yao-ze;WANG Zhen-guo
..............page:344-347
Traffic modeling and simulation of expressway weaving area based on cellular automata
XIONG Sheng-hui;LI Xing-yi;SHI Hua-ji
..............page:551-554,570
customR2: A hybrid push/pull scheduling method with network coding in P2P live streaming systems
WANG Hui;CHEN We-tao;LIU Ya-jie
..............page:285-288,302
Research and implementation of automatic question answering system based on ontology
LIU Han-xing;LIN Xu-dong;TIAN Xu-hong
..............page:415-418
Research and implementation of embedded Java reflection mechanism
QIU Zhi-jie;LUO Lei
..............page:398-401,422
Information extraction based on semantic role and concept graph
YANG Xuan-xuan;ZHANG Lei
..............page:411-414
Design and development of H.264-based embedded network video server
ZHOU Qiang;FEI Zhang-jun;WANG Qiang;YANG Shi-you
..............page:555-559
Infrared weak target segmentation under complicated background based on mountain clustering
LI Tao;LEI Kai-bin;LIU Jian;CHEN Jian-ying
..............page:367-369
Airline flying conflict survey and extrication based on dynamic velocity modulation
HE Xiao-ju;LIAO Zhi-wu
..............page:540-542,559
Empirical research on customer segmentation of securities based on clustering
QIAN Wei-jia;WANG Yan-qing
..............page:495-498
Design and implementation of communication platform over WLAN based on SIP protocol
DU Zhong-yan;WANG Wei-xing
..............page:312-315
Design and implementation of ontology-based knowledge base system for marine hydrocarbon geology
LI Guohe;YANG Xin-ying;YE Ting;SUN Hong-jun;TANG Xian-ming;HAN Bao-dong
..............page:532-536
Scheduling analysis of linear approximate response time in hard real-time system
MO Tie-qiang;DUAN Shan
..............page:427-429,444
Improved routing algorithm with least channel handoff
XIE Jin;LI Zong-shou;ZHU Qi
..............page:295-298
Fast high-precision reliable image matching algorithm based on shape
ZHAO Zhen-min;PENG Guo-hua;FU Li-mei
..............page:441-444
Improved R~*-tree spatial index
WU Qin-yang
..............page:419-422
Research on ontology-based model for supporting software knowledge sharing
LU Qiang;CHEN Chao;WANG Zhi-guang
..............page:402-405
Protocol for privacy-preserving set intersection
SUN Yan-fei;ZHONG Hong;YAN Fei-fei;HUANG Hong-sheng
..............page:506-509,516
Novel tree cluster and classification approach based on least closed tree
GUO Xin;LI Yun;HUANG Yun;ZHOU Qing-ping
..............page:423-426,448
Survey on secure network coding
CAO Zhang-hua;TANG Yuan-sheng
..............page:499-505
Localization algorithm based on DV-HOP for wireless sensor networks
ZHANG Jia;WU Yan-hai;SHI Feng;GENG Fang
..............page:323-326