Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2010 Issue 8
Free-starting preimage attacks on BLAKE-32
he qiang ; mao ming ; zeng shao kun
..............page:2154-2156
Dependable grid job scheduling mechanism
tao yong cai ; shi lei
..............page:2066-2069
tou gao zhu yi shi xiang
..............page:封3
Surface defects detection technique for steel strips based on artificial immune system
xu xiao run ; wu gui fang
..............page:2247-2249,2253
Extended RGB color correction based on standard white board
liu tian zuo ; song chun lin ; jiang xing ge ; xu xu hui
..............page:2085-2087,2133
Bullet holes recognization based on color similarity measurement
ge qi dong ; yu zhong qiu
..............page:2241-2243,2264
Automatic generation method for penetration test programs based on attack graph
cui ying ; zhang li juan ; wu zuo
..............page:2146-2150
Capture of long-period PN code using spectrum correction in high dynamic doppler shift situation
pang tong ; zhang tian zuo ; liu yan li ; du xiao hua
..............page:2214-2217
New method to suppress cross-terms of Wigner-Ville distribution
zhao pei hong ; ping dian fa ; deng bing
..............page:2218-2220
Approximation accuracies of a class of polynomial smoothing functions
chen yong ; yu xiao ping ; xiong jin zhi
..............page:2041-2044
Semantical analysis and modeling for OWL-S based on CSP
yang jian shu ; wu jin zhao ; zhou zuo
..............page:2173-2176,2196
Implementation of layered model based on evolutionary theory
zhou yi ; zheng xue feng ; yu yi ke
..............page:2114-2119
Network propaganda machine model based on search engine optimization
tan long jiang
..............page:2232-2234
Vehicle-logo recognition method based on image quality and PCA subspace
mo shao qing ; liu zheng guang ; zhang jun
..............page:2244-2246,2260
Logical AND operation model of variable precision lower approximation operator and grade upper approximation operator
zhang xian yong ; xiong fang ; mo zhi wen ; cheng wei
..............page:1991-1994,2023
Gap analysis method for domain requirement and its application
wang zuo ; guo ying ; yang ping ; yang mei hong
..............page:2177-2180,2192
Improved max-sum decentralized coordination algorithm
geng lei lei ; wei cheng jian
..............page:2073-2076,2084
Detection of malicious content attacks on Web services
huang kang yu ; wu li fa ; wu hai jia
..............page:2134-2138
Rule learning algorithm based on structured attribute set
shi bai sheng
..............page:2010-2012,2028
Grading model of seed cotton based on image features
ma dong zuo ; sun long qing
..............page:2235-2237,2268
Proxy blind signature scheme based on DLP
liu ju xia ; su jing feng
..............page:2167-2169
Performance analysis for audio information hiding algorithm based on spread spectrum
ma wen jun ; chen yan pu ; gao yue ; zuo gang
..............page:2272-2274
Ontology-based service network platform and its construction method
wang hui ; feng zhi yong ; chen ju ; chen shi zhan
..............page:2170-2172,2274
Efficiency evaluation model of joint air defense operation based on advanced evidence reasoning
peng fang ming ; xing qing hua ; liu zuo yuan
..............page:2265-2268
Fast feature-guided stippling method based on threshold matrix
wang hui qin
..............page:2105-2107,2145
Hash table based on Trie-tree
shi chang qiong ; tang ming ; zhang da fang ; zhou zuo qing
..............page:2193-2196
Multi-dimensional query optimization algorithm for bitmap index with binning
wang li ming ; cheng xiao ; chai yu mei
..............page:2013-2016
Design and realization of specialized wire-grinding machine system based on ARM7 and CPLD
gao fu qiang ; chen zuo qing ; lu yong ; an kang ; tan hui
..............page:2254-2256
Middleware of wireless embedded medical devices interacting with database
song yu qing ; yan zhen ; liang cheng quan ; zhang yong
..............page:2257-2260
Hyperchaos system with only one nonlinear term and comparative study of its chaotic control
chen di yi ; chen hai tao ; ma xiao yi ; long yan
..............page:2045-2048
New method of morphological color image processing
tang hong zhong ; huang hui xian ; guo xue feng ; xiao ye wei
..............page:2101-2104
Wang Tile-based improved texture synthesis
xue feng ; cheng cheng ; jiang ju lang
..............page:2098-2100,2156
Dynamic trust model based on fuzzy set in heterogeneous wireless network
huang kai zhi ; he xiao ; zhang peng ; luo xing guo
..............page:2111-2113,2169
Method of Chinese word segmentation based on character-word classification
zhang cong pin ; zhao li li ; wu chang mao
..............page:2034-2037
Image matching method based on perceptual organization of linear features in stereoscopic images
guo hai tao ; xu qing ; cong feng bo ; zhang bao ming
..............page:2088-2090,2129
Design and implementation of cost measurement for thread context switch
yang guo gui ; jiang bo
..............page:2052-2055,2072
Certificateless signcryption scheme in standard model
xiang xin yin
..............page:2151-2153
Study of routing strategy on complex networks
zuo hai juan ; ren yan ; xue xiao ping ; tan yun tian
..............page:2210-2213,2231
Escape technique of AVM2 virtual machine based on verification deception
liu xiao zhen ; li huan zhou
..............page:2130-2133
Watermarking algorithm for resisting local nonlinear geometric attacks based on normed centre of gravity
cui de long ; zuo jing long ; peng zhi ping
..............page:2161-2163
New update method with high-reliability for embedded system software
li quan ; zuo ping ; he xiao hui
..............page:2228-2231
3D box-counting algorithm for calculating fractal dimension of cities
zhang le shan ; chen ge ; han yong ; zhang tao
..............page:2070-2072
Safety test environment for safety assessment oriented CTCS-2 train control system
xiong jing ; yu gang ; xu zhong wei ; zuo meng
..............page:2181-2184,2188
Heuristic algorithm of attribute reduction based on discernibility matrix
ma xiang ; zhang ji fu ; yang hai feng
..............page:1999-2002,2037
Path planning of mobile robot based on improved artificial potential field
shi wei ren ; huang xing hua ; zhou wei
..............page:2021-2023
Method for determining optimal number of clusters in K-means clustering algorithm
zhou shi bing ; xu zhen yuan ; tang xu qing
..............page:1995-1998
Research and implementation of unit testing framework based on three-layer architecture
zhou duan yang ; wang meng
..............page:2189-2192
TA-ONS-New enquiry system of Internet of Things
zhou yan wei ; wu zhen qiang
..............page:2202-2206
New grid resource management framework for mixed types of workloads
liu yang ; han zuo ; fan jian ping
..............page:2197-2201
K-prototypes based clustering algorithm for data mixed with numeric and categorical values
chen zuo ; wang lei ; jiang zi yun
..............page:2003-2005,2110
New adaptive method for image denoising with keeping details efficiently
lv jun bai ; cai can hui
..............page:2077-2079,2119
Image denoising based on spatially adaptive Bayesian shrinkage in NSCT domain
sun qiang ; gao yong ; jiao li cheng
..............page:2080-2084
Trajectory tracking of mobile robot using iterative learning control in polar coordinates
yan shi liang ; zhang hua ; wang yin ling ; xiao xiao ping
..............page:2017-2020
Double-stage spam filtering method based on rough set
deng wei bin ; hong zhi yong
..............page:2006-2009,2048
Functional testing method for Web applications based on TTCN-3
shi yin sheng ; wang feng ; qi zuo ; zong jian jian
..............page:2185-2188
Parallel massive data oriented astronomical cross-match
zhao qing ; sun ji zhou ; yu ce ; cui chen zhou ; xiao jian
..............page:2056-2059,2206
Dynamic queue assignment algorithm under IEEE 802. 11e
wan zheng
..............page:2207-2209,2220
Cross-domain mechanism of anonymous attestation for distributed network
zhou yan wei ; wu zhen qiang ; jiang li
..............page:2120-2124
Adaptive blind presence detection algorithm for burst signals
wu di ; ge lin dong ; wang bin
..............page:2221-2223,2234
Image thresholding method based on Fourier spectrum and moment-preserving principle
zhang xin ming ; li shuang ; zheng yan bin ; zhang hui yun
..............page:2094-2097,2153
Novel masquerader detection scheme in sensor networks
wang deng di ; chai qiao lin ; sun xiang fei ; li tao
..............page:2125-2129
Mongolian part-of-speech tagging approach based on conditional random fields
ying yu long ; li zuo ; wu da ba la ; zhu hai
..............page:2038-2040
Aging forecast model for application server based on rough wavelet network
meng hai ning ; liu jian jun
..............page:2024-2028
Improving downloading performance in hadoop distributed file system
cao ning ; wu zhong hai ; liu hong zhi ; zhang qi xun
..............page:2060-2065,2240
Initial iterative learning control strategy based on CMAC neural networks
duan xiao yan
..............page:2049-2051,2138
Semi-blind watermarking algorithm based on SVD-Winograd fast transform
pei xiao gen ; ma lei ; liu jiang ; yan ming
..............page:2164-2166
Improved multi-scale retinex image enhancement algorithm
wang xiao ming ; huang zuo ; li quan bin ; liu jin gao
..............page:2091-2093
Compression algorithm of state transition table based on sparse matrix
yao yuan ; liu peng ; wang hui ; zuo cheng cheng
..............page:2157-2160,2217
Representation and application of interval-gap-based time ontology
yang zuo ; feng zhi yong ; hu jing
..............page:2029-2033,2044
Adaptive defect detection of composite plate based on grey system theory
du zhi shun ; wu guo ping ; zuo yong xiao ; huang wen li ; chen mao yuan
..............page:2250-2253
Application of neuro-fuzzy control to marine autopilot
wang ming hui ; yu yong quan ; zeng bi
..............page:2261-2264
Evaluation of vulnerability static severity based on attribute synthetic assessment system
xiao yun ; peng jin ye ; wang xuan hong
..............page:2139-2141,2150