Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2010 Issue 4
Dictionary-oriented quality checking tool on navigation map
sheng xiu jie ; li hong li ; tao wei liang ; zhu hong jing ; xiao cheng cai ; li zuo zuo
..............page:1121-1124
Density grid-based data stream clustering algorithm over sliding window
li zi wen ; xing chang zheng
..............page:1093-1095
Security communication system based on short message service
shu ming lei ; tan cheng xiang ; yu ding guo
..............page:1053-1055,1058
Design of spatial index structure based on RBD-tree
ma xuan
..............page:1103-1106
Implementation of edge linking by ant colony algorithm
lu man man ; zuo qi zhi
..............page:932-934,938
Storage model of servers in video grid
zhao hong ; wu shou er si la mu ; yao zheng liang ; yin lei
..............page:868-871
Weighted qualitative probabilistic reasoner based on argument system
liao shi zhong ; li xiang kun ; gao pei huan
..............page:982-984
Research and extension of Socket in KAME stack based on VxWorks
zhang zuo zuo ; ran xiang jin
..............page:895-897
Research and design of code updating mechanism in wireless senor network
wu xiao ; du peng lei ; jiang yong ; li zhi min
..............page:857-859,871
Multi-dementional concept lattice and association rules discoverey
guo xian e ; wang jun hong
..............page:1072-1075
three-dimensional encryption algorithm for two-dimensional information
xu yan shan ; wang guo cai
..............page:1059-1063
Pervasive computing access control model based on extended RBAC
sun ling ; xin yan ; luo chang yuan
..............page:1045-1047,1052
Towards semi-supervised ordinal regression with nearest neighbor
he hai jiang ; he wen de ; liu hua fu
..............page:1022-1025
Adaptive query scheduling for open online courses
hou yong ; wu shou er si la mu ; yu jiong ; zhou yan hui
..............page:1008-1010,1018
Analysis and improvement of proxy signature schemes over braid group
huang wen ping ; ning ju hong
..............page:1030-1032
tou gao zhu yi shi xiang
..............page:封3
Progressive goal searching of multimedia data based on content
jia chang yun ; cheng yong shang ; zhu min
..............page:1096-1098,1102
Image fire detection algorithm based on support vector machine
yang na juan ; wang hui qin ; ma zong fang
..............page:1129-1131,1140
Application of post-processing based on HMM to video face recognition
dai yi ; xiao guo qiang ; song gang
..............page:960-963,970
Image copy detection based on SVD in wavelet domain
kang xiao bing ; wei sheng min
..............page:917-920
Multi-pose face detection based on facial features and AdaBoost algorithm
ruan jin xin ; yin jun xun
..............page:967-970
3D model similarity matching algorithm based on outline characteristic point
feng li ying ; zhao jing ; yang ying
..............page:914-916
Multi-scale extraction approach of linear feature in high resolution SAR images
chen tian ze ; wang jian ; su yi
..............page:935-938
No-reference quality index for image blur
xie xiao fu ; zhou jin ; wu qin zhang
..............page:921-924
Semi-supervised short text categorization based on attribute selection
cai yue hong ; zhu zuo ; sun ping ; cheng xian yi
..............page:1015-1018
Research of matrix sparsity for collaborative filtering
zeng xiao bo ; wei zu kuan ; jin zai hong
..............page:1079-1082
Study on error diffusion algorithm of digital halftoning
zhang han bing ; yuan zuo
..............page:925-928
View synthesis based on image reprojection
liu ran ; zhu qing sheng ; yi lin ; xu xiao yan
..............page:898-901
Mechanism for optimizing P2P traffic between networks based on network measurement
guo tao ; zhou xu ; wang zhi ping ; tang zuo
..............page:888-891
Attribute dependency theory and its application on neural network
fang liang da ; yu yong quan
..............page:985-989
Security protocol design by composition method
deng fan ; deng shao feng ; li yi fa
..............page:1033-1037,1041
Contourlet-based super resolution restoration for remote sensing images
shi yi xing ; wu zuo ; luo dai sheng ; yu ji ye
..............page:939-942
Application of VCG mechanism in replica placement of P2P storage system
song zuo ; zhao yue long
..............page:860-864
Improved Chinese chessboard recognition method
di nai qiang
..............page:980-981
Robust watermarking scheme based on fractal and seudo-Zernike moment
miao xi kui ; sun jin guang ; zhang yu han
..............page:1038-1041
Research and design of querying approach for XML encrypted data
ke yu yi ; xia shi xiong ; wang chu jiao
..............page:1099-1102
Effective branch algorithm for integer linear programming problems
gao pei wang
..............page:1019-1021,1025
Feature selection method combing improved F-score and support vector machine
xie juan ying ; wang chun xia ; jiang shuai ; zhang zuo
..............page:993-996
Symmetry axes search of 2D point set based on convex hull technology
zhang hua mei ; gao man tun ; zhang gui mei
..............page:905-908
Electrocardiogram classification using combined classifiers
tong jia zuo ; dong jun
..............page:1125-1128
Correcting radial distortion of document images by morphology
chang jun ; miao li gang
..............page:950-952
SIP compression algorithm based on SigComp
li bing zhi ; yang fu liang
..............page:881-883
Palmprint matching algorithm based on àtrous-Contourlet transform and invariant moments
li yan ; wu gui fang ; li ji jie ; dai gao le
..............page:956-959
Short-term traffic flow forecasting model under missing data
xu jian rui ; li xing yi ; shi hua ji
..............page:1117-1120,1124
Lane mark identification method based on edge distribution function
zuo xu qin ; wu xiao bing ; che xiao bo ; zhang yun ; wang zhi xue
..............page:974-976
User context based collaborative filtering recommendation
zhou tao ; li hua
..............page:1076-1078,1082
Node analysis and optimization strategy for regional traffic network system
li ying hong ; wang li ; yin zuo xin
..............page:1107-1109
Research of sentiment classification for netnews comments by machine learning
zhou jie ; lin zuo ; li zuo cheng
..............page:1011-1014
Data mining method based on adaptive intuitionistic fuzzy inference
lv da jiang ; shi zhi han ; lei ying jie ; zhang guo suo
..............page:1089-1092
Elliptic trajectory based reliable forwarding for wireless sensor networks
li yu kai ; bai yan ; zhang jian ; cui yan bo
..............page:876-880,883
Hierarchical method to analyze malware behavior
huang zuo ; wu dong ying ; sun xiao zuo
..............page:1048-1052
Comparative study of time series model in traffic prediction of GPRS cells
zhou zuo ; zhang jin ; zhao yan ke ; wang ru long
..............page:884-887
Decision level fusion algorithm with fuzzy densities determined by object
chen ya bi ; zhu yong ; zhan yong zhao
..............page:990-992,996
Improved exemplar-based inpainting algorithm for broken Thangka images
lu xiao bao ; wang wei lan
..............page:943-946,952
Bilateral filtering based image restoration for multiple grayscale images
liu rui hua ; li fang ; su li yun
..............page:902-904,908
Method of Top-k Web service selection based on QoS
wang hai ; zhu zheng dong ; li zeng zhi
..............page:872-875
Research and application of synchronization compensation mechanism in wireless sensor networks
chen qiao ; zhang yi kun ; yang kai feng ; zhang tong ; xia hui
..............page:892-894,901
Reversible data hiding based on prediction error difference expansion and LSB replacement
xiong zhi yong ; wang jiang qing
..............page:909-913,920
Optimal scheduling model for hub airport taxi based on improved ant colony collaborative algorithm
ding jian li ; li xiao li ; li quan fu
..............page:1000-1003,1007
Nonlinear dimensionality reduction algorithm and application to hospital performance evaluation
li kai ; huang tian qiang ; yu yang qiang ; guo gong de
..............page:1004-1007
Identical base construction attack on digital signature scheme
chen ning yu ; gu yong gen ; su xiao ping
..............page:1042-1044
Access methods in moving objects databases
xiao zuo ; li qing quan
..............page:1064-1067,1071
Research of matching strategy of semantic Web services discovery
zhang hui ming ; tang hui jia
..............page:1083-1085
Phase emendation of high-throughput genome sequencing
ye bing gang ; wang de peng ; li jing xiang ; zhou zuo ; wu xiao ming
..............page:1114-1116
Objective evaluation of Mandarin initials
tang lin ; huang jian zhong ; yin jun xun
..............page:1135-1140
Design and implementation of data exchanging middleware with publish/subscribe model
gao de hong ; zhang xin jia ; chen chun lei ; liu wei yu
..............page:1110-1113
Early abandon to accelerating exactly warping matching of time series
chen sheng li ; li jun kui ; liu xiao dong
..............page:1068-1071
Inherent relationship between the mode periodicities of cat map and Fibonacci series
li yong jiang ; zhang chen guang ; li chang li ; ge jian hua
..............page:1026-1029,1032
Use of picture log information in improving session identification quality
fan chun long ; jiang hong fei ; li hua
..............page:1056-1058
Expression recognition based on 2D multi-scale block local Gabor binary patterns
zhang zuo ; zhao zheng ; yuan tian tian
..............page:964-966
Cluster-fusion recognition method for rivet lines based on Fisher discriminant criterion function
hu dan dan ; li wan min ; liu fang ; gao qing ji
..............page:953-955,959