Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2013 Issue 7
Overview of complex event processing technology and its application in logistics Internet of Things
JING Xin;ZHANG Jing;LI Junhuai
..............page:2026-2030,2036
Behavior analysis technology of software network communication based on session association
DU Kunping;KANG Fei;SHU Hui;SUN Jing
..............page:2046-2050,2066
Dehazing algorithm based on dark channel with feedback regulation mechanism
FANG Wen;LIU Binghan
..............page:1998-2001
Research and design of Web service-based matter-centric middleware in Internet of Things
ZHENG Shuquan;WANG Qian;DING Zhigang
..............page:2022-2025,2045
Prediction of trajectory based on modified Bayesian inference
LI Wangao;ZHAO Xuemei;SUN Dechang
..............page:1960-1963
Face recognition method fusing Monogenic magnitude and phase
LI Kunming;WANG Ling;YAN Haiting;LIU Jifu
..............page:1991-1994
Automatic brain extraction method based on hybrid level set model
AO Qian;ZHU Yanping;JIANG Shaofeng
..............page:2014-2017
New engineering method for defect detection of batteries based on computer vision
XU Jianyuan;YU Hongyang
..............page:2018-2021
Novel fast rendition algorithm for dehazed image
ZHANG Xiao;WU Jun;LOU Xiaolong
..............page:1995-1997,2013
Contention management model based on relativity-detection of conflicts
CHU Caijun;HU Dasha;JIANG Yuming
..............page:2051-2054,2062
Continuous k nearest neighbor query algorithm based on road network
LIU Degao;LI Xiaoyu
..............page:1964-1968
New inverted index storage scheme for Chinese search engine
MA Jian;ZHANG Taihong;CHEN Yanhong
..............page:2031-2036
Dynamic simulation based on dyna971 for computer numerical control boring and milling machine
WU Youde;ZHU Liuxian;LI Bailin
..............page:2055-2058,2086
Metagraph for genealogical relationship visualization
LIU Jundan;ZHAO Shuliang;ZHAO Jiaojiao;GUO Xiaobo;CHEN Min;LIU Mengmeng
..............page:2037-2040
xin xi dong tai
..............page:封2
MicroWindows-based multi-device support intelligent Chinese input system
ZHOU Huijuan;XIANG Rong
..............page:2067-2070,2082
Validation method of security features in safety critical software requirements specification
WANG Fei;GUO Yuanbo;LI Bo;HAO Yaohui
..............page:2041-2045
Fireworks simulation based on CUDA particle system
CHEN Xiuliang;LIANG Yingjie;GUO Fuliang
..............page:2059-2062
Small fault detection method of instruments based on independent component subspace algorithm and ensemble strategy
HU Jichen;HUANG Guoyong;SHAO Zongkai;WANG Xiaodong;ZOU Jinhui
..............page:2063-2066
Design and implementation of regional malodor on-line monitoring platform
YU Hui;LI Jinhang;WANG Yuangang
..............page:2071-2073,2077
Scale design of Chen's system and its hardware implementation
LYU Ensheng;ZHANG Guangfeng
..............page:2083-2086
Speech emotion recognition algorithm based on modified SVM
LI Shuling;LIU Rong;ZHANG Liuqin;LIU Hong
..............page:1938-1941
Unstructured road detection based on two-dimensional entropy and contour features
GUO Qiumei;HUANG Yuqing
..............page:2005-2008
Selective K-means clustering ensemble based on random sampling
WANG Lijuan;HAO Zhifeng;CAI Ruichu;WEN Wen
..............page:1969-1972
Implementation of gray level error conpensation for optical 4f system
HAN Liang;JIANG Ziqi;PU Xiujuan
..............page:1973-1975,1983
Feature evaluation of radar signal based on aggregation, discreteness and divisibility
DENG Yanli;JIN Weidong;LI Jiahui;LIU Xin
..............page:1946-1949,1963
Image retrieval based on edge direction histogram correlation matching
SHEN Haiyang;LI Yue'e;ZHANG Tian
..............page:1980-1983
Star pattern recognition algorithm of large field of view based on concentric circles segmentation
LIU Heng;ZHENG Quan;QIN Long;ZHAO Tianhao;WANG Song
..............page:1984-1987,2021
Online transfer-Bagging question recommendation based on hybrid classifiers
WU Yunfeng;FENG Jun;SUN Xia;LI Zhan;FENG Hongwei;HE Xiaowei
..............page:1950-1954
Multi-pose cooperative face detection based on hypersphere support vector machine
TENG Shaohua;CHEN Haitao;ZHANG Wei
..............page:1988-1990,2017
Vertical handover trigger mechanism between 3 G and WLAN based on available data rate
ZHANG Jinfu;YUAN Ling;YOU Jianqiang
..............page:1825-1827,1841
Hybrid spam filtering method based on users' feedback
HUANG Guowei;XU Yuwei
..............page:1861-1865
Blind watermarking algorithm in H.264 compressed domain
LIU Lidong;TIAN Xiang
..............page:1866-1869,1889
Manifold learning and visualization based on serf-organizing map
SHAO Chao;WAN Chunhong
..............page:1917-1921,1934
Algorithm for directly computing 7P elliptic curves and its application
LAI Zhongxi;ZHANG Zhanjun;TAO Dongya
..............page:1870-1874
Method of fast cyclic redundancy check reverse decoding
LIANG Haihua;PAN Lina
..............page:1833-1835,1865
Secure and distributed cloud storage model from threshold attribute-based encryption
WU Shengyan;XU Li;LIN Changlu
..............page:1880-1884,1902
Speaker recognition method based on utterance level principal component analysis
CHU Wen;LI Yinguo;XU Yang;MENG Xiangtao
..............page:1935-1937,1968
Chord protocol and algorithm in distributed programming language
PENG Chengzhang;JIANG Zejun;CAI Xiaobin;ZHANG Zhike
..............page:1885-1889
Dimensionality reduction algorithm of local marginal Fisher analysis based on Mahalanobis distance
LI Feng;WANG Zhengqun;XU Chunlin;ZHOU Zhongxia;XUE Wei
..............page:1930-1934
Research status and development trend of human computation
YANG Jie;HUANG Xiaopeng;SHENG Yin
..............page:1875-1879
Artificial glowworm swarm optimization algorithm based on adaptive t distribution mixed mutation
DU Xiaoxin;ZHANG Jianfei;SUN Ming
..............page:1922-1925,1972
Multi-objective particle swarm optimization method with balanced diversity and convergence
GENG Huantong;GAO Jun;JIA Tingting;WU Zhengxue
..............page:1926-1929,1959
Shaping method for low-density lattice codes based on lower triangular matrix
ZHU Lianxiang;LUO Hongyu
..............page:1836-1838
Shortest dynamic time flow problem in continuous-time capacitated network
MA Yubin;XIE Zheng;CHEN Zhi
..............page:1805-1808
Echo cancellation technique solutions based on parallel filter
WANG Zhenchao;GAO Yang;XUE Wenling;YANG Jianpo
..............page:1839-1841
Auto-clustering algorithm based on compute unified device architecture and gene expression programming
DU Xin;LIU Dagang;ZHANG Kaihuo;SHEN Yuan;ZHAO Kang;NI Youcong
..............page:1890-1893,1907
Node behavior and identity-based trusted authentication in wireless sensor networks
LIU Tao;XIONG Yan;HUANG Wenchao;LU Qiwei;GONG Xudong
..............page:1842-1845,1857
Hardware/software partitioning based on greedy algorithm and simulated annealing algorithm
ZHANG Liang;XU Cheng;TIAN Zheng;LI Tao
..............page:1898-1902
Optimum packing of rectangles based on heuristic dynamic decomposition algorithm
LI Bo;WANG Shi;SHI Songxin;HU Junyong
..............page:1908-1911
Certificateless aggregate signcryption scheme with public verifiability
ZHANG Xuefeng;WEI Lixian;WANG Xu'an
..............page:1858-1860,1879
Matrix-based authentication protocol for RFID and BAN logic analysis
LI Hongjing;LIU Dan
..............page:1854-1857
Multi-objective coverage control in wireless sensor network based on Poisson distribution
XU Yixin;BAI Yan;ZHAO Tianyang;WANG Renshu
..............page:1820-1824,1832
Inter-cluster routing algorithm in wireless sensor network based on game theory
ZHAO Xin;ZHANG Xin
..............page:1813-1815,1819
Memory dependence prediction method based on instruction distance
LU Dongdong;HE Jun;YANG Jianxin;WANG Biao
..............page:1903-1907
Security key pre-distribution scheme for wireless sensor networks
ZHANG Ji;DU Xiaoni;LI Xu;LIN Jipo
..............page:1851-1853,1874
Vehicular Ad Hoc network routing protocol and its research progress
FU Yuanke;TANG Lun;CHEN Qianbin;GONG Pu
..............page:1793-1797,1801
Probabilistic transmitting-based data aggregation scheme for wireless sensor networks
GUO Jianghong;LUO Yudong;LIU Zhihong
..............page:1798-1801
Low-power secure localization algorithm based on distributed reputation evaluation
WANG Yong;YUAN Chaoyan;TANG Jing;HU Liangliang
..............page:1802-1804,1808