Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2011 Issue 1
Motion fusion technique based on characteristics of human motion
MENG Wei;GUO Wei-bin;ZHU Chang-ming;XU Jun-jian;DU Yu;HUANG Yan-fang
..............page:42-44,49
Context-aware Focus + Context visualization technique
WU Jin-liang;LIU Li-gang
..............page:6-10
Coordinate calibration based on vanishing point
TAN Fang-yong;YU Fu-sheng;WU Jian-ping
..............page:58-60
3D model data compression in parallel rendering system Chromium
WANG Huan;QIN Kai-huai
..............page:25-28
Text extraction algorithm for traffic signs
WANG Zhen;WEI Zhi-qiang
..............page:266-269
Change impact analysis in authorization policies
WANG Qiang;LIU Qiao;QIN Zhi-guang
..............page:115-117
Sub-pixel edge detection algorithm based on Gauss fitting
SHANG Ya-ceng;CHEN Jing;TIAN Jun-wei
..............page:179-181
Image sharing scheme based on error diffusion
WU Xiao-tian;SUN Wei
..............page:74-77,81
3D models semantic retrieval method in combination with descriptive text
WANG Xian-hui;QIN Zheng;ZHUANG Chun-xiao;ZHANG Xuan-ping
..............page:1-5,36
Integrated security over outsourced database services based on encryption
YU Yong-hong;BAI Wen-yang
..............page:110-114
Pattern matching engine based on multi-dimensional bloom filters
LIU Wei;GUO Yuan-bo;HUANG Peng
..............page:107-109,114
Local search immunization strategy in inhomogeneous networks
LI Wei;GE Hong-wei;JI Peng
..............page:135-138
Frame design and implementation of realistic and controllable fire animation
HONG Yi;ZHU Deng-ming;QIU Xian-jie;WANG Zhao-qi
..............page:45-49
Edge-based adaptive real-time 3D tracking
ZENG Xiao-qi;DONG Zi-long;ZHANG Guo-feng;HUA Wei
..............page:20-24
Grouping of conjugate algorithm for ICI cancellation in OFDM
HUI Xiao-wei;CHEN Lei;HU Ting-xing
..............page:232-234
Graph coloring-based scheduling algorithm for P2P media streaming
BAO Rong-zhen;CAI Ming
..............page:190-193
Video watermarking algorithm based on moving object detection
CHEN Xi;ZHOU Ping
..............page:258-259,262
Node sleeping algorithm for wireless sensor networks based on minimal hop routing protocol
REN Zhi;WANG Qing-ming;GUO Xiao-jin
..............page:194-197,201
Application of Otsu method in motion detection system
JIANG Qin-yu;LI Ping;SUN Lan
..............page:260-262
Rough K-Modes clustering algorithm
LI Ren-kan;YE Dong-yi
..............page:97-100
Real-time recommendation method based on browsing preferences mining
XIE Yi;CHEN De-ren;GAN Hong-hua
..............page:89-92
Process of workflow exception handling based on extended UML activity diagram
BAI Hong-mei;XIE Yi-wu
..............page:277-280,285
Automated fingerprint classification based on directional image tracing and core axis
NIE Gui-jun;MENG Qing-jie;ZHU Lin;ZHANG Zhen-feng;GUO Meng;WANG Jing;YANG Jing-yu
..............page:70-73
Geographic routing protocol in Ad Hoc networks
LIN Yan-ru;ZHOU Ji-peng
..............page:225-228
Real-time cloth simulation based on particle constraints
LU Zhong-hua;CHEN Ding-fang
..............page:289-292
Multi-resolution morphable model and face modeling based on features refinement
TAN Yu-xi;SUN Yan-kui;TANG Ze-sheng
..............page:61-64
Storage design in peer-to-peer based video-on-demand systems
SHEN Shi-jun;LI San-li
..............page:187-189,211
PSMR:Power control and scheduling scheme in multi-rate wireless mesh networks
LI Wei-huang;L(U) Pin;CHEN Ying-wen;XU Ming
..............page:208-211
Frequent pattern mining algorithm based on improved FP-tree
LI Ye-bai;TANG Hui;ZHANG Chun;HE Yu-ming
..............page:101-103
Generation of testing script based on XML for safety-critical systems
HE Huan;XU Zhong-wei;YU Gang;YANG Shi-yu
..............page:281-285
Multi-objective particle swarm optimization based on crossover and mutation
LIU Yan-min;NIU Ben;ZHAO Qing-zhen
..............page:82-84,117
Fast multi-spectral image registration based on NSSCC
WANG Wei;WANG Wei;PU Yun-chen
..............page:167-169,174
Relief pasting algorithm based on normal vector adjustment
LIU Sheng-lan;TANG Zheng-xiang;LI Bo;ZHANG Li-yan
..............page:33-36
Adaptive stereo matching algorithms for color stereo images
LIU Xiao-yong;LI Da-hai;WANG Qiong-hua;LIU Xi;QI Xiao-ping
..............page:163-166
Distributed trust model in wireless Ad Hoc networks
WEI De-jian;JIA Zhi-ping;LI Xin
..............page:129-132
Key agreement protocol for Web service authentication in wireless environment
ZHANG Xue-ying;YANG Jin-ji
..............page:133-134,138
Survey on image mosaic algorithm of unmanned aerial vehicle
DI Ying-chen;CHEN Yun-ping;CHEN Ying-ying;CHEN Yan
..............page:170-174
Application of unequal error protection method with low density parity check codes in scalable video coding
REN Tong-hua;LI Xiao-feng;XIE Shi-yun;LIU Sai-si;XU Jin
..............page:270-272,276
Dynamic fuzzy comprehensive trust model based on P2P network
RAO Shen;WANG Yong
..............page:139-142
ID-based bidirectional threshold proxy re-signature
ZHANG Yu-lei;YANG Xiao-dong;WANG Cai-fen
..............page:127-128,142
Optimal routing for hybrid optical switching networks under traffic demand uncertainties
ZHANG Jing-fang;WANG Sheng;XU Shi-zhong
..............page:222-224,265
Self-feedback photometric correction approach for multi-projector tiled display
ZHOU Yan-xia;QIN Kai-huai;LUO Jian-li
..............page:65-69
Compressed video super-resolution reconstruction based on adaptive quantization constrain set
ZENG Qiang-yu;HE Xiao-hai;CHEN Wei-long
..............page:151-153,166
Compression method for ordered dither halftone image
LIU Xin;GENG Ye;LI Zhi-jie
..............page:154-155,162
Normalized cut segmentation algorithm combined with wavelet coefficient
HUANG Ying;YANG Guang-qiong
..............page:182-183,242
Separation method for handwritten shape and text based on improved stroke entropy
XING You-lu;Feng Gui-huan
..............page:50-52,57
Reliable multicast protocol based on hybrid bus-ring architecture
XU Jian-zhen;ZHANG Qian;SHANG Jin-bo
..............page:219-221,257
Improved fast topology estimation method based on maximum likelihood
WANG Yu-hong;FEI Gao-lei;HU Guang-min
..............page:212-214,238
Modified linear local tangent space alignment algorithm
LI Wen-hua
..............page:247-249,253
Interpolation method of color image metamorphosis
LI Lu;WANG Xin
..............page:156-158
Join-tree-based contributory group key management scheme for key update
CAO Zhen-huan;LI Li;GU Xiao-zhuo;CHE Yan-gang
..............page:143-146,150
Mean-Shift tracking algorithm based on adaptive bandwidth
BAI Xiang-feng;LI Ai-hua;LI Xi-lai;CAI Yan-ping
..............page:254-257
Reputation-based P2P trust system
LI Jian-li;GAO Yong;HUO Guang-lei;LIU Bo
..............page:147-150
Universally composable security of identity-based signature schemes
WANG Ze-cheng
..............page:118-122,126
Real-time rendering dynamic grass blade based on FFT
ZHU Jiang;KONG De-hui;ZHANG Yong
..............page:37-41
Method for BBS topic tracking based on semantic similarity
XI Yao-yi;LIN Chen;LI Bi-cheng;ZHOU Jie;XU Xu-yang
..............page:93-96
NPU-based image composition and display in parallel rendering system
LI Rui-rui;ZHANG Yi-tian;QIN Gui-ming;QIN Kai-huai
..............page:11-15,32
Pre-handoff mechanism with adaptive threshold for heterogeneous wireless networks
ZENG Rui-qi;FANG Xu-ming;ZHU Jian-jian
..............page:198-201
SIFT feature matching algorithm based on second moment matrix
ZHONG Jin-qin;TAN Jie-qing;LI Ying-ying;GU Li-chuan
..............page:29-32
TDMA-based quality of service mechanism for VoWLAN
WU Yan-ling;ZHANG Li-juan;PAN Yu-ru
..............page:215-218,228
Object identification methodology in multi-user digital beamforming system
ZENG Hao;ZHENG Fang;YUAN Ang-fei;HUANG Tian-cong
..............page:229-231
Quantitative approach to dynamic security of intrusion tolerant systems
HUANG Jian-hua;GAN Hong-sheng
..............page:123-126
Stereo matching algorithm based on image segmentation
YAN Ke;WAN Guo-wei;LI Si-kun
..............page:175-178,193
Difference analysis and registration research of a pair of complementary cylindrical panoramic images
ZHANG Peng-fei;ZHANG Mao-jun;WANG Wei;CHEN Li-dong;XIONG Zhi-hui
..............page:159-162
Improved linear discriminant analysis method
LIU Zhong-bao;WANG Shi-tong
..............page:250-253
Whole-body online modification of biped robot walking pattern
HU Jin-dong;LIU Guo-dong
..............page:286-288,292
Energy efficient reliable delivery protocol for wireless sensor networks
LI Yu-kai;BAI Yan;GAO Xi-kui;ZHENG Yuan-bin;WANG Ren-shu
..............page:202-207
Moving object segmentation algorithm for river surveillance video
YE Li-hua;YIN Hai-ming;WEI Yuan-wang
..............page:263-265