Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2010 Issue 9
Design of embedded mobile GIS for customizable data wireless transmission
jiang dai hong ; yang hui
..............page:2538-2540
RMI-based grid re-development model for high-performance computing
cao rong qiang ; cao zong yan ; chi xue bin ; xiao hai li
..............page:2526-2529
Implementation of multi-scale Retinex image enhancement algorithm based on CUDA
wang zheng ning ; liu chang zhong ; chen lei zuo ; wu hong gang ; wu min
..............page:2441-2443
Ball velocity estimation method based on RANSAC and Kalman filter for soccer robots
dong peng ; lu hui min ; yang shao wu ; zhang hui ; zheng zhi qiang
..............page:2305-2309,2313
Optimum up-link power control in CDMA satellite communication system
gu fang lin ; zhang hang ; cui zhi fu
..............page:2512-2514,2518
Non-interactive key exchange based on cognitive radio in delay tolerant network
sun li yan ; zhou jian
..............page:2404-2407,2504
Pattern encoding method of visual 2D barcode
liu xiao dan ; zuo ruo xing ; huang cui cui
..............page:2467-2469
Rate control optimization algorithm based on Cauchy distribution for H.264/AVC
wang ke ji ; kang zhi wei ; liu xin huan ; chen bu zhen
..............page:2444-2448
Construction and generalization of Hn moment invariants
zhang wei ; he jin guo
..............page:2449-2452
Implementation of intelligent infrared control node in wireless sensor networks
tian hong qiang ; qin ya juan ; zheng tao ; gao de yun
..............page:2549-2552
AI-PPC: Projection pursuit model for dimension reduction based on artificial immune algorithm
zeng qing sheng ; yan xuan hui ; shu cai liang
..............page:2290-2293
tou gao zhu yi shi xiang
..............page:封3
Reversible data hiding based on prediction error difference expansion of ternary components
xiong zhi yong ; wang jiang qing
..............page:2408-2412
Meta-model-based model organization and transformation of design pattern unit in MDA
yang chang chun ; zhao zi yi ; sun zuo
..............page:2354-2357,2382
Progressive 3D scenes replacement mechanism for P2P overlay
wang wei ; jia jin yuan ; zhang chen zuo ; yu yang
..............page:2422-2426,2430
RSSI-based gradient clustering for wireless sensor networks
xing fei ; wang xiao dong
..............page:2501-2504
Attack and improvement of Zhang\'s multi-signature scheme
li ying ; zhou da shui
..............page:2389-2392
Real-time visualization algorithm of 2D unsteady flow field
fan yin ; sun chang hui ; li zuo
..............page:2434-2437
Access control system based on dual-core digital signal processor and face recognition
bao ke jin ; yao cheng
..............page:2553-2555,2558
Routing protocol based on energy consumption in Ad Hoc networks
zhou jie ying ; xu guo zan ; guo chang fei ; zhang jia jia
..............page:2494-2496
Color printing character image segmentation based on K-L transform and fuzzy set theory
xiao jin fei ; wang xiao yu ; chen bin ; sun xiao gang ; liu bing
..............page:2464-2466
Cooperative spectrum sensing based on reputation in cognitive radio network
zhang lei ; huang guang ming
..............page:2519-2521
Data integration method based on SOA software architecture
lang jiong ; liu yan bing ; xiong shi yong
..............page:2370-2373
Review and prospect of image dehazing techniques
guo ; cai zi xing ; xie bin ; tang
..............page:2417-2421
Incremental feature selection algorithm for data stream classification
li min ; wang yong ; cai li jun
..............page:2321-2323,2328
Hardware design and signal integrity simulation of embedded 3G wireless video surveillance system
huang shuai ; xu xue mei ; xu wei qin ; zhou wen
..............page:2535-2537,2540
Mesh simplification algorithm based on keeping shape feature
xue feng ; yuan cheng feng
..............page:2431-2433
Free resource selection approach based on fuzzy filter in grid
tian yuan ; yu jiong ; hou yong ; wang ming quan
..............page:2481-2484
New medical image segmentation algorithm based on subregion similarity
dang jian wu ; yang xu ; wang yang ping
..............page:2458-2460,2493
Data association method of SLAM based on improved minimal connected dominating set
wang xiao hua ; fu wei ping
..............page:2294-2296,2304
Margin maximization feature weighting with better adaptability
zhang xiang ; deng zhao hong ; wang shi tong
..............page:2275-2278,2289
Joint hybrid channel allocation and multi-path routing protocol in mesh networks
zuo zuo ; yang jin cheng
..............page:2505-2508
Attribute reduction of rough set based on differential evolutionary algorithm
gao yi ; yan hong wen
..............page:2329-2331
XML weak functional dependency and inference rule based on XML Schema
yin li feng ; tian hong
..............page:2314-2316
Web services composition method based on functional attribute semantics
cao hong jiang ; nie gui hua ; chen dong lin
..............page:2344-2347,2373
Efficient variant of RSA cryptosystem
li yun fei ; liu qing ; hao lin ; zhou bao lin
..............page:2393-2397
Research and implementation of key techniques of encryption and decryption system on heterogeneous database
hao wen ning ; zhao en lai ; liu yu dong ; huang ya ; liu jun tao
..............page:2339-2343
One-way hash algorithm based on chaotic coupled dynamic parameters
liu yan bing ; lv shu pin ; tang hao kun
..............page:2398-2400
Multi-keyword search over P2P based on Bloom filter
yan hua yun ; guan zuo hong
..............page:2335-2338,2343
XML-based man-machine interaction engine for mobile devices
wang bao wei ; shen bo ; chen zuo
..............page:2362-2364,2369
Image segmentation of maximum inter-class cross entropy based on 2D histogram oblique segmentation
zhang xin ming ; liu bin ; li shuang ; zhang hui yun
..............page:2453-2457
Mechanism of service virtualization adaptive to variability of business requirements
chen wang hu ; li zuo
..............page:2351-2353,2378
Recognition algorithm of online handwritten mathematical formula structure
hong liu rong
..............page:2545-2548,2552
Secure and efficient group key agreement protocol
hu hong yu ; ai ling xian
..............page:2401-2403,2448
Multi-thread quicksort algorithm based on partitioning
song hong zuo ; fu zuo ; zhang li xia ; peng hong xing ; liang hua kun
..............page:2374-2378
Research of XML regular path expression query based on automaton
zhao er ping ; wang cong hua ; zuo wei qun ; dang hong en ; zhang zhao ji
..............page:2317-2320
SCTP-based concurrent multipath transfer in wireless network
xu de li ; song fei ; gao de yun ; zuo huan
..............page:2515-2518
User security management based on trust constraint
zhang run lian ; wu xiao nian
..............page:2383-2385,2437
Data aggregation algorithm based on order coding for wireless sensor network
hou fei ; liu qun
..............page:2509-2511,2525
ITBI: Labeling scheme for XML data update
zhuang can wei ; feng shao rong ; lin zi yu ; zhang dong zhan
..............page:2324-2328
Load balancing mechanism of service control server cluster in IMS-based IPTV
lin jing hua ; yu dong ; li hong bin ; li ling nan
..............page:2488-2493
Reliability optimization of virtual machine monitor Xen
meng jiang tao ; lu xian liang
..............page:2358-2361
TCP Vegas-W: Enhanced TCP Vegas congestion avoidance mechanism
wang bin ; chen yuan zuo ; hu yu ; feng wei
..............page:2485-2487,2500
Unsupervised spike extraction and classification based on locality preserving projection
yin hai bing ; liu zhao ; liu ya dong ; hu de wen
..............page:2559-2562
Computer system simulation for gourd pyrography painting
wang dong ; zhou shi sheng
..............page:2473-2476
Feature extraction of self-adaptive illumination varying based on fuzzy control
su jie ; yin gui sheng ; wei zhen hua ; liu ya hui
..............page:2438-2440,2457
Least square support vector machine based on unconstrained optimization
xiong fu song ; wang xiao ming ; zhu xiang wei
..............page:2297-2300
Hybrid extended ant colony algorithm merging differential evolution and reverse mutation
jiang qiao yong ; gao yue lin
..............page:2283-2285,2293
Approach to activity diagram model driven testing for Web applications
he ke ; li xiao hong ; feng zhi yong
..............page:2365-2369
Combination of MRF model and particle swarm optimization algorithm for texture segmentation of remote sensing images
jin hua zhong ; ye zhi wei ; ke min yi ; li hao
..............page:2461-2463,2466
Application of multi-resolution data fusion algorithm
shi ming bo ; chen ji hong ; jiang zuo zuo
..............page:2556-2558
Text classification algorithm based on hidden Markov model
yang jian ; wang hai hang
..............page:2348-2350,2361
Mathematical modeling of closed processing paths on free-form surface described by point cloud
sha zuo ; li yang ; zhao kang ; du si dan
..............page:2470-2472,2476
Task scheduling model based on resource prediction for grid computing
cheng hong bing
..............page:2530-2534,2544
Design of embedded wireless smart home gateway based on ARM9
man sha ; yang hui xian ; peng you ; wang xu si
..............page:2541-2544
Probability and credibility-based trust model for pervasive computing
sun ling ; xin yan ; luo chang yuan
..............page:2379-2382
Approach to feature-based image mesh generation
jin wen biao ; wang xu song ; zhang zhi feng
..............page:2427-2430
Regression method based on SVM classification and its application in production forecast
dong yi ; cheng wei ; zhang yan ping ; zhao zuo
..............page:2310-2313
Intrusion tolerance model based on autonomic computing
wu qing tao ; hua bin ; zheng rui juan ; wei wang yang ; zhang ming chuan
..............page:2386-2388,2397
MC supply chain distributed scheduling based on heterogeneous multiple ant colony algorithm
zhang peng ; lin jie ; wei yun xia
..............page:2279-2282,2300
Small world routing algorithm of wireless sensor network
ren xiu li ; dong jiang ying ; zuo jian sheng
..............page:2497-2500