Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2011 Issue 7
Design and implementation of U disk virus isolator with hi-speed
ZHANG Yi;YANG Xiao-quan
..............page:2008-2010,2014
Multi-level proxy blind signature scheme based on discrete logarithm problem
WANG Wan;DU Wei-zhang
..............page:1904-1905
Improved SIR model of computer virus propagation in the network
FENG Li-ping;WANG Hong-bin;FENG Su-qin
..............page:1891-1893
Variable length gram based file type identification algorithm
CAO Ding;LUO Jun-yong;YIN Mei-juan
..............page:1894-1897,1900
Intrusion detection method based on graph clustering algorithm
WANG Guo-hui;LIN Guo-yuan
..............page:1898-1900
Improved image encryption algorithm based on Henon hyperchaotic system
YUE Hong-hui;LI Tao;SHI Lei
..............page:1909-1911,1916
Grey prediction based link going down trigger algorithm
KONG Bo-wen;YUAN Ling;ZENG Xu-bin
..............page:1976-1979
Display and enhancement of spectrogram based on field programmable gate array
TAO Zhong-xing;PEI Dong;WANG Quan-zhou;YANG Hong-wu;PEI Hui-xin
..............page:1995-1997,2000
Collaborative design system of automatic weapon based on basic class module template
LOU Li;XU Cheng;WANG Yong-juan;ZHANG Fei-meng
..............page:1988-1991
Application-layer multicast algorithm based on maximum interference network coding
LIU Yong-guang;ZHANG jian;YAO Ruo-he
..............page:1959-1961,1983
Design and application of migration information system based on World Wind
JIANG Ren-gui;XIE Jian-cang;LI Jian-xun;YANG Ming-xiang
..............page:2001-2003,2007
Comparative analysis on three ultra wideband chip design methods
ZHAO Liang;JIN Liang;JI Zhong-heng;CHEN Jin-yu;LIU Shuang-ping
..............page:1971-1975
Network selection for wireless heterogeneous networks
ZENG Xu-bin;YUAN Ling;KONG Bo-wen
..............page:1966-1970
Fast image matching method based on eigen-scene
YANG Lei;GUO Xiu-juan
..............page:1850-1852
Parallel algorithm for computing coefficients of periodic B-spline basis functions
ZHOU Kai-ting;ZHENG Li-xin;LIN Fu-yong
..............page:1800-1803
Adaptive media playout algorithm for H.264 scalable video streaming
LI Xiao-feng;LIU Hong-sheng;RENG Tong-ju
..............page:1956-1958,1970
Improvement on location error and coverage rate in DV-Hop algorithm
ZHANG Jing;CAO Dun;FU Ming;CHEN Zi-qi
..............page:1944-1947
Collaborative filtering algorithm based on real-time user feedback
FU He-gang;LI Ran
..............page:1744-1747
Focus depth extension for microscopic visual system based on wavelet analysis
SONG Yu;LI Qing-ling
..............page:1815-1817,1843
Improved ranking algorithm based on pairwise method
CHENG Fan;ZHONG Hong
..............page:1740-1743
Password-based authenticated key agreement scheme with mutual anonymity for trusted computation
ZHU Chang-sheng;LIU Peng-hui;WANG Qing-rong;CAO Lai-cheng
..............page:1862-1867
Multi-task and multi-resource optimization scheduling of virus genetic algorithm
QI Jin-ping;ZHA Xian-feng
..............page:1773-1775
Attack analysis and improvement on two DL-based digital signature schemes
FAN Han;ZHANG Shao-wu
..............page:1859-1861,1867
Compression algorithm based on half-length of the binary stream
GAO Jian;LIU Wan;SONG Ao;WANG Zhong-yuan;CHEN Yao
..............page:1856-1858
Hardware/software partitioning based on improved simulated annealing algorithm
XIAO Ping;XU Cheng;YANG Zhi-bang;LIU Yan
..............page:1797-1799,1803
Testing of service-oriented software: a metamorphic testing approach
LU Xiao-li;DONG Yun-wei
..............page:1756-1758
Freeways detection from high-resolution SAR images
LI Min
..............page:1825-1826,1834
Accelerated algorithm of face detection based on dual-threshold cascade classifiers
WANG Yan;GONG Wei-jun
..............page:1822-1824,1830
Enhanced key distribution scheme based on grid for wireless sensor networks
YUAN You-nan;YOU Lin
..............page:1872-1875
New divisional fire strategy of RoboCup rescue simulation
WU Yun-biao;YANG Yi-min
..............page:1998-2000
Popularity forecast of movies based on data mining in content distributed/delivery network
ZHOU Zhi-wei;ZHENG Quan;WANG Song
..............page:1737-1739
Cascading failure in coupled map lattices with directed network
MA Xiu-juan;MA Fu-xiang;ZHAO Hai-xing
..............page:1952-1955,1979
Research of AODV routing protocol based on neighbor cache
LI Shi-bao;HONG Li
..............page:1931-1933,1943
Improved K-nearest neighbor algorithm for feature union entropy
ZHOU Jing;LIU Jin-sheng
..............page:1785-1788,1792
Improved algorithm of monocular camera calibration for vision navigation
ZHOU Lei;REN Guo-quan;LI Dong-wei
..............page:1838-1840
Dynamic classification of trust for Web services
CHANG Yan
..............page:1880-1883
Network coding signature scheme with limitation of nodes to check news
FENG Fan;WANG Cai-fen;LUO Hai;YU Zhi-xuan
..............page:1868-1871,1879
Adaptive subcarrier allocation of multiuser STBC-OFDM systems in correlated channels
LI Qiang;LI Cheng-xin;HUANG Yu-qing;YAO Yuan-cheng
..............page:1948-1951,1965
Parameter optimization based multi-level partition of unity surface reconstruction
WEN Pei-zhi;NING Ru-hua;HUANG Jin-fang
..............page:1811-1814
Research and application of performance test on Web application system
HUI Bin-wu;CHEN Ming-rui;YANG Deng-pan
..............page:1769-1772
Application of neural networks and improved PSO algorithms to earthquake prediction
SU Yi-xin;SHEN Jun;ZHANG Dan-hong;HU Xiao-fang
..............page:1793-1796,1807
Niederreiter public-key cryptosystem based on QC-LDPC
YANG Lei-xin;DU Wei-zhang
..............page:1906-1908,1923
Pornographic images filtering model based on high-level semantic bag-of-visual-words
L(U) Lin-tao;ZHAO Cheng-xuan;SHANG Jin;YANG Yu-xiang
..............page:1847-1849
Classification of packed PE files based on data mining
ZHAO Yue-hua;ZHANG Yi;YAN Hong-ping
..............page:1901-1903
Routing protocol in multi-channel wireless mesh networks
PENG Yi;ZHU Lei;LIU Ling
..............page:1928-1930
Ideal reaching law based on dynamic disturbance compensator for discrete variable structure control
LIU Yun-long;GAO Cun-chen;ZHAO Lin;LIANG Xiao
..............page:2011-2014
Improved CenSurE detector and a new rapid descriptor based on gradient of summed image patch
CHEN Fang;JIANG Yun-liang;XU Yun-xi
..............page:1818-1821,1858
Bottleneck bandwidth measurement and localization based on meltable packet train
JIA Min-zheng;ZHU Yuan-zhong;YU Zhen-wei;ZHANG Ying
..............page:1934-1938,1947
Weighted trust computation method based on behaviors of users
LIU Qi-hong;WU Xiao-nian;YANG Li
..............page:1887-1890
Self-adaptive step glowworm swarm optimization algorithm
OUYANG Zhe;ZHOU Yong-quan
..............page:1804-1807
Case-based reasoning engine model with variable feature weights and its calculation method
HUANG Zhe-jing;WANG Bin-qiang;ZHANG Jian-hui;HE Lei
..............page:1776-1780,1810
Adaptive background update based on Gaussian mixture model under complex condition
LI Ming-zhi;MA Zhi-qiang;SHAN Yong;ZHANG Xiao-yan
..............page:1831-1834
Improved data hiding scheme based on modulus function
LIU Kai-hui;XU Jiang-feng
..............page:1917-1919,1975
Multiple ellipses detection based on curve arc segmentation of edge
LI Nan-nan;LU Rong-sheng;LI Shuai;XU Yan;SHI Yan-qiong
..............page:1853-1855
Trademark retrieval algorithm based on SIFT feature and corner feature
WANG San-hu;YAO Wang-shu;LING Xing-hong
..............page:1841-1843
Design and realization of branch prediction for embedded microprocessor
CHEN Hai-min;LI Zheng;WANG Rui-jiao
..............page:2004-2007
Security analysis and improvement of KNXnet/IP protocol
LIU Jun-chang;ZHANG Xi-huang
..............page:1912-1916
Mobile Agent-based routing optimization algorithm in large-scale wireless sensor networks
ZHOU Qiang;CUI Xun-xue;CHEN Gui-lin
..............page:1924-1927
Software reliability prediction based on improved PSO-SVM model
ZHANG Xiao-nan;LIU An-xin;LIU Bin;ZHANG Hong-mei;QING Xing
..............page:1762-1764,1772
Deep Web data annotation method based on result schema
LI Ming;LI Xiu-lan
..............page:1733-1736
Environmental perception and adaptive research in moving object detection
ZHANG Yan;GUO Ji-chang;WANG Chen
..............page:1827-1830
Bottleneck nodes in wireless sensor networks based on mobile sensors
DENG Ya-ping;WU Chuan-ping
..............page:1939-1943
Improved adaptive median filtering algorithm
HUANG Bao-gui;LU Zhen-tai;MA Chun-mei;ZHAO Jing-xiu
..............page:1835-1837,1883
Software reliability growth model considering environmental difference
HAN Xuan;LEI Hang
..............page:1759-1761,1784
Static eparation of duty policy base on mutually exclusive role constraints
WANG Ting;CHEN Xing-yuan;ZHANG Bin;REN Zhi-yu;WANG Lu
..............page:1884-1886,1890
Research of atomicity in workflow transaction
YUN Ya-li;CHEN Hong-mei
..............page:1765-1768