Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2013 Issue 5
Integration system for heterogeneous sensor networks
CHEN Jinkai;CAO Jianwei;CHEN Qingkui
..............page:1191-1193,1207
Two-stage IPv6 route search algorithm based on perfect-Hash table and multibit-trie
DU Fei;DONG Zhiguo;MIAO Lin;TUO Yupeng
..............page:1194-1196,1202
Collaborative Web service composition based on distributed Hash table
CHEN Xi;ZENG Huashen;WU Tao
..............page:1197-1202
Binary exponential backoff algorithm for slotted ALOHA
FANG Fei;MAO Yuming
..............page:1203-1207
Node secure localization algorithm in underwater sensor network based on trust mechanism
ZHANG Yao;JIN Zhigang;LUO Yongmei;DU Xiujuan
..............page:1208-1211
Community-based message transmission scheme in opportunistic social networks
LIU Yahong;GAO Yuan;QIAO Jinlong;TAN Chunhua
..............page:1212-1216
Network protocol reverse parsing technique based on dataflow analysis
DAI Li;SHU Hui;HUANG Hejie
..............page:1217-1221
Improved fuzzy auto-regressive model for connection rate prediction
SHEN Chen;SUN Yongxiong;HUANG Liping;LIU Lipeng;LI Shuqiu
..............page:1222-1224,1229
Extended joint channel estimation in cooperative multi-cell OFDM systems
CHEN Yixian;WANG Yuan
..............page:1225-1229
Deployment of virtual machines with clustering method based on frame load awareness
WANG Guangbo;MA Zitang;SUN Lei;WU Le
..............page:1271-1275,1288
Spectrogram analysis of frequency-hopping signals based on entropy measure
GUO Jiantao;WANG Lin
..............page:1230-1232,1236
Construction method of mobile cloud computing system based on mobile Agent
WANG Suzhen;DU Zhijuan
..............page:1276-1280
Multi-input-multi-output support vector machine based on principal curve
MAO Wentao;ZHAO Shengjie;ZHANG Junna
..............page:1281-1284,1293
New gene selection method based on clustering and particle swarm optimization
YANG Shanxiu;HAN Fei;GUAN Jian
..............page:1285-1288
Estimation algorithm for real-valued direction of arrival based on modified propagator method
HUANG Guangya;DENG Xiaofei;LIANG Pingyuan
..............page:1241-1243
Reachability analysis of nonlinear hybrid systems based on polyhedron inclusion
ZOU Jin;LIN Wang;LUO Yong;ZENG Zhenbing
..............page:1289-1293
PROFIBUS-based reading method of smart meter's data
CAO Shiwei;ZHU Qing;LIU Hongli
..............page:1248-1250,1254
Key technology of knowledge reuse in product design based on axiomatic design
YANG Jie;CHEN Xuezhao
..............page:1294-1297,1312
Fast rate control algorithm for high efficiency video coding
WU Min;GONG Yanchao;YANG Kaifang
..............page:1251-1254
Sequential acquisition method based on sequence core transform
TIAN Zhumei;JI Jiang;REN Guofeng;LI Haixia
..............page:1255-1259
Multi-robot formation based on biological inspired neural network
YANG Xiaofang;NI Jianjun
..............page:1298-1300,1304
Spam short message classifier model based on word terms
ZHANG Yongjun;LIU Jinling
..............page:1334-1337
Graph-based parallel distributed genetic programming model
LU Qiang;ZHONG Wei;WANG Zhiguang
..............page:1260-1266
Taxi gathering area recognition algorithm based on sample weight
JI Bo;YE Yangdong;LU Hongxing
..............page:1338-1342
Formal modeling for structured document in cloud computing
XIONG Jinbo;YAO Zhiqiang;JIN Biao
..............page:1267-1270
Similar key posture transformation based on hierarchical Option for humanoid robot
KE Wende;PENG Zhiping;CHEN Ke;XIANG Shunbo
..............page:1301-1304
Dependable data survival scheme based on Chinese remainder theorem weighted threshold secret sharing in unattended WSN
HAN Mingjun;XIONG Yan;LU Qiwei;GONG Xudong;LIU Tao
..............page:1343-1346
Active defense strategy selection based on non-zero-sum attack-defense game model
CHEN Yongqiang;FU Yu;WU Xiaoping
..............page:1347-1349,1352
Weighted-distance-based asynchronous retrieval for mechanical design images
FANG Naiwei;LYU Xueqiang;ZHANG Dan;WANG Hongwei
..............page:1406-1410
Authentication protocol of mobile RFID based on Hash function
LIU Peng;ZHANG Changhong;OU Qingyu
..............page:1350-1352
Multi-plane detection algorithm of point clouds based on volume density change rate
CHU Jun;WU Tong;WANG Lu
..............page:1411-1415,1419
Feature-retained image de-noising via sparse representation
MA Lu;DENG Chengzhi;WANG Shengqian;LIU Juanjuan
..............page:1416-1419
Improved artificial fish swarm algorithm based on social learning mechanism
ZHENG Yanbin;LIU Jingjing;WANG Ning
..............page:1305-1307,1329
Non-local means de-noising approach based on dictionary learning
CUI Xueying;ZHANG Quan;GUI Zhiguo
..............page:1420-1422
New two-party key agreement protocol in separate networks
LI Haifeng;LAN Caihui;ZUO Weiping;MA Haiyun
..............page:1353-1356
Particle swarm optimization algorithm with fast convergence and adaptive escape
SHI Xiaolu;SUN Hui;LI Jun;ZHU Degang
..............page:1308-1312
One-dimensional objects design and calibration in infrared camera group
LI Bin;TAN Guanghua;GAO Chunming
..............page:1423-1427,1449
Method of simulating realistic snow scene
XU Yuanjin;ZENG Liang;CHEN Shilong
..............page:1428-1431
Face feature extraction method based on graph
LIU Zhongbao
..............page:1432-1434,1455
New P2P botnet with high survivability based on Kademlia protocol
ZHU Junhu;LI Heshuai;WANG Qingxian;QIU Han
..............page:1362-1366,1377
Adaptive chaos fruit fly optimization algorithm
HAN Junying;LIU Chengzhong
..............page:1313-1316,1333
Authorization query method for RBAC based on partial MAX-SAT solver
SUN Wei;LI Yanling;LU Jun
..............page:1367-1370,1390
Image tamper detection scheme based on chaotic system and fragile watermarking
LIU Min;CHEN Zhigang;DENG Xiaohong
..............page:1371-1373
Improved gravitation search algorithm and its application to function optimization
ZHANG Weiping;REN Xuefei;LI Guoqiang;NIU Peifeng
..............page:1317-1320
3D scalp extraction and reconstruction of MRI brain images
MA Amin;YANG Rongqian;NING Hai;BAI Hongmin;LI Lihua;WU Xiaoming
..............page:1439-1442
Parameters optimization of combined kernel function for support vector machine
GENG Junbao;SUN Linkai;CHEN Shixue
..............page:1321-1323,1356
Feather quill crease recognition based on local Radon transform
YUE Hongwei;WANG Renhuang;ZHANG Jinghua
..............page:1443-1445
Research and implementation of four-prime RSA digital signature algorithm
XIAO Zhenjiu;HU Chi;CHEN Hong
..............page:1374-1377
Research survey on formal description for direction relations
WANG Miao;LI Songyang
..............page:1324-1329
Dynamic demodulation of fiber Bragg grating sensing based on LabVIEW
HU Liaolin;ZHANG Weichao;HUA Dentin;WANG Li;DI Huige
..............page:1473-1475
Cryptanalysis and improvement of a certificateless signature scheme
HE Junjie;WANG Juan;QI Chuanda
..............page:1378-1381
Effective and secure identity-based hybrid signcryption scheme
TONG Ruiyang;MENG Qingxian;CHEN Ming
..............page:1382-1385,1393
Concurrent signature scheme constructed by identity-based ring signcryption
LIU Kui;LIANG Xiangqian;LI Xiaolin
..............page:1386-1390
Track correlation algorithm based on modified Kohonen neural network
FANG Hao;WANG Yanhong
..............page:1476-1480
Workflow customization technology for collaborative SaaS platform of industrial chains
CAO Shuai;WANG Shuying;LIU Shuya
..............page:1450-1455
Improved Gaussian mixture model and shadow elimination method
CHEN Lei;ZHANG Rongguo;HU Jing;LIU Kun
..............page:1394-1397,1400
Optimization algorithm for I-V curve fitting of solar cell
HU Keman;HU Haiyan;LIU Guiguo
..............page:1481-1484
Research and design of hadware and software fusion render layer for embedded browser
TANG Chengjian;LEI Hang;GUO Wensheng
..............page:1456-1458
Method of getting arc length segmentation point for B-spline curve based on given accuracy
DING Lijun;DAI Shuguang;MU Ping'an;HOU Wenmei
..............page:1398-1400
Moving object detection based on background image set and sparse analysis
BAO Jinyu;WANG Huibin;CHEN Zhe;SHEN Jie
..............page:1401-1405,1410
Real-time error detection techniques based on FPGA
JU Xiaoming;ZHANG Jiehao;ZHANG Yizhong
..............page:1459-1462
Development of MPC8247 embedded Linux system based on device tree
ZHANG Maotian;ZHANG Lei;GUO Xiao;SUN Jun
..............page:1485-1488
Design of mobile phone terminal of weather warning system based on C4.5 decision tree
TANG Huiqiang;HANG Lina;FAN Haijuan
..............page:1467-1469,1480
Anti-interference method based on TDOA residual error in multilateration system
LU Yu;WU Honggang;XU Zili
..............page:1470-1472,1488