Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2010 Issue 3
Hidden line removal for wireframe projection drawing
zhao jun ; gao man tun ; wang san min
..............page:620-624
Adaptive rate control algorithm of Speex codec based on speech quality prediction
cai tie ; long zhi jun ; wu xing
..............page:761-764
Game theory-based cooperative resource management for wireless broadband network
wei meng zuo ; fang xu ming
..............page:745-750
Construction method of S-box suitable for hardware implementation
yang hong zhi ; han wen bao ; zhao long
..............page:674-676,684
Survey on search of file system with petascale size
zhang zuo zhi ; liu hai tao
..............page:813-817
Improvement of density-based method for reducing training data in KNN text classification
xiong zhong yang ; yang ying hui ; zhang yu fang
..............page:799-801,817
Study on dissemination model of network public sentiment based on cellular automata
fang zuo ; he liu jin ; sun kai ; zhao peng
..............page:751-755
XML keyword search algorithm based on efficient LCA
zheng hong zuo ; guo hong
..............page:825-830
TVCrawler: Multi-protocol P2P IPTV crawler
jiang zhi hong ; wang zuo ; fan peng yi ; yuan xue mei
..............page:715-718,728
Watermarking algorithm of complex cepstrum domain audio based on LSB and quantizing
li wen zhi ; zhang xiao ming ; yin xiong
..............page:705-707
Group negotiation-based digital watermarking for wireless sensor network
cai shao jie ; lin ya ping ; yi ye qing ; ye song tao
..............page:688-691
Research and implementation of ball games scenario interpreter
sun jing ; tan xiao hui ; zhao hui qun ; chen lei
..............page:612-614
Correlation analysis of software failure time data
lou jun gang ; jiang jian hui
..............page:600-602,624
Security analysis and improvement of efficient certificateless signature scheme
liang hong mei ; huang zhen jie
..............page:685-687,698
Research on finding connected maximal common subgraph
zuo li ming ; tang peng zhi ; xu bao gen
..............page:838-841
Data update mechanism for native XML storage scheme
wang zuo ; yuan xiao jie ; feng zhi yong ; zhang kun long ; wang shu yi
..............page:821-824
Improved Web page clustering algorithm based on partial tag tree matching
li zuo ; zeng jun ; zhou si wang
..............page:818-820
Using classical groups to construct authentication codes
li dian long
..............page:671-673
Chinese short text classification based on hyponymy relation
wang sheng ; fan xing hua ; chen xian zuo
..............page:603-606,611
Method of communication flow dependence analysis for shared-memory SPMD program
wang zuo ; liu xiao jie ; liang gang
..............page:596-599
Survey on stereoscopic three-dimensional display
wang qiong hua ; wang ai hong
..............page:579-581,588
Development and application of serial synchronous communication driver in Linux2.6
chou jie zuo ; chen ru jun ; he zhan xiang ; qiu kai lin
..............page:850-853
tou gao zhu yi shi xiang
..............page:封3
Novel topology inference algorithm for wireless sensor network
zhang zhi yong ; hu guang zuo
..............page:733-735,744
Automatic CamShift tracking algorithm based on multi-feature
lu zuo ; lei hang ; hao zong bo
..............page:650-652
3D visualization method of radiotherapy dose distribution in medical TPS
wu jun sheng ; yang hong yuan ; zuo hong chu
..............page:582-584
Depth-first search algorithm for mining frequent closed itemsets
zhang ; liao pin ; guo bo
..............page:806-809
LambdaMDE: Embedded development environment based on model
lu shao peng ; gui sheng lin ; li yun ; luo lei
..............page:607-611
Density-based detection for outliers and noises
zhang yi ; liu xu min ; guan yong
..............page:802-805,809
Research of dynamic Botnet model
fan zuo yan ; zuo guo rui
..............page:692-694
XML coding scheme for efficient query processing
wen hua nan ; liu xian feng ; li wen feng ; li ling yong
..............page:831-834
Inter mode decision of complexity scalability
xia ding yuan ; zhou yan fen
..............page:625-627
Convergence analysis of clonal selection algorithm based on BCA
fang xian jin ; mu xue hai ; liu ling bing ; wang xing wang
..............page:772-775
Research of video semantic retrieval system based on ontology
xu feng ; zheng
..............page:835-837,849
Real-time simulation of fog on GPU
hu gui ju ; wu zhi hong ; wang dan xia
..............page:585-588
Feature feedback-based system for recognition of handwritten Chinese characters
wang jian ping ; wang er shuai
..............page:768-771,775
Color image segmentation algorithm based on hue level histogram and region merging
leng mei ping ; bao su su
..............page:653-656
Research of geometry information reduction in computer automatic reasoning system
li tao ; zhang bo ; zhang qian cai
..............page:842-845,853
Survey on realistic behavior in crowd animation
rao yun bo ; chen lei zuo ; zhou jun ; li yan mei
..............page:571-578
Application of self-training based on ensemble learning in intrusion detection
cheng zhong han ; zuo zuo
..............page:695-698
Several short periodic trajectories of TD-ERCS and their stabilities
jia wei yao ; sheng li yuan ; chen ya li
..............page:680-684
Computational trust evaluation model based on temporal sequential marker
xu guang quan ; feng zhi yong ; li xiao hong ; chen jin yan
..............page:663-667,694
Static scheduling model and its greedy algorithm of agile supply chain
wang jian hua ; li nan ; guo hui
..............page:846-849
Robust tracking algorithm based on multi-feature fusion and particle filter
zeng wei ; zhu gui bin ; chen jie ; tang ding ding
..............page:643-645,656
Multi-face detection algorithm in complex background
yuan zuo zuo ; han chun xia
..............page:635-638,673
SOAP response caching strategy for non-real time services and its application
wen jun hao ; li xiao yi ; xiang yi qi
..............page:593-595,599
Design and implementation of particle system based on content pipeline in XNA
luo wei jun ; lin ya ping
..............page:589-592
Application of improved AR(1) model in DNS
zheng wei ; gu da wu ; lu hai ning
..............page:736-739,750
Survey of anonymity communication
liu zuo ; wang neng
..............page:719-722
Abnormal audio recognition algorithm based on MFCC and short-term energy
lv xiao yun ; wang hong xia
..............page:796-798
Performance analysis and comparison of AODV and AOMDV routing protocols
wang lu guang ; jia zhi ping ; li xin
..............page:740-744
Transformation from SPEM to extended workflow meta-model
zhao zong min ; wu hai tao ; wang yang
..............page:617-619
Digital watermarking algorithm based on image feature point
liu jing ; wang ying hui ; he wen juan
..............page:702-704,707
Application of clustering and time-based sequence analysis in intrusion detection
wang ling jian ; zuo shao hua
..............page:699-701,714
Dynamic threshold signature scheme based on bilinear pairing
luo li xia ; zhang jun
..............page:677-679
New linear grouping algorithm based on total least absolute deviation criteria
cao hui rong ; fang jie
..............page:810-812
Improved PSO-BP neural network for power transformer fault diagnosis
xiong zhong yang ; yang qing bo ; zhang yu fang
..............page:783-785,792
Application of SVR into quantitatively analyzing adverse selection contract model
zhang zhen feng ; zhu jia gang
..............page:779-782,788
Weighted least squares support vector regression based on AdaBoost algorithm
peng dai qiang ; lin you quan
..............page:776-778
Load balancing design based on statistical model for VOD
bai xue ; peng de wei
..............page:765-767
Distributed call center for enterprises based on Asterisk and OpenVPN
pan yun liang ; yang guan ci ; zhou ying quan
..............page:756-760
Fast scalar multiplication algorithm on Edwards curve
he yi chao ; qu wen long ; meng yong gang
..............page:668-670,679
Routing protocols for opportunistic networks
ren zhi ; huang yong ; chen qian bin
..............page:723-728
Palm-dorsa vein recognition based on two-dimensional Fisher linear discriminant
yuan zuo zuo ; wang ; sun shu hui
..............page:646-649
New workflow verification algorithm based on graph-search
dang zheng jun ; du zhong jun
..............page:615-616,619
New rapid framework for medical images registration
yang an rong ; lin cai xing ; li hong qiang
..............page:632-634,652
Face feature-points location based on 3D transform shape search
yi fa ling ; xiong wei ; huang zhan peng ; zhao jie
..............page:639-642
Survey on techniques of digital multimedia forensics
hu yong jian ; liu bei ; he qian hua
..............page:657-662