Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2013 Issue 8
Noise reduction of optimization weight based on energy of wavelet sub-band coefficients
WANG Kai;LIU Jiajia;YUAN Jianying;JIANG Xiaoliang;XIONG Ying;LI Bailin
..............page:2341-2345
Similar string search algorithm based on Trie tree
LIU Lixia;ZHANG Zhiqiang
..............page:2375-2378
Friends recommended method based on common users and similar labels
ZHANG Yiwen;YUE Lihua;ZHANG Yifei;LI Qing;CHENG Jiaxing
..............page:2273-2275
Analysis on availability of partition-aware CORBA-based distributed system
CHEN Yalin;HUANG Hongguang;LI Yanbin
..............page:2124-2127,2135
Multi-character DFA-based high speed regular expression matching algorithm
HE Wei;GUO Yunfei;MO Han;HU Hongchao
..............page:2370-2374,2382
Probabilistic forwarding algorithm of mobile Ad Hoc networks based on directional prediction
LI Shibao;LOU Linlin;CHEN Ruixiang;HONG Li
..............page:2117-2120
Outage performance of multi-hop cooperative diversity system
TANG Jingmin;CAO Jinshi;LONG Hua;ZHANG Chunpin
..............page:2121-2123,2131
Web video classification based on bidirectional propagation of heterogeneous attributes
LI Qian;DU Youtian;XUE Jiao
..............page:2293-2296
Research on function shift in Boyer-Moore algorithm
HAN Guanghui;ZENG Cheng
..............page:2379-2382
Multiple-dimension process behavior evaluation model and its optimization
MAO Kun;DU Xuehui;SUN Yi
..............page:2244-2249
Workflow task scheduling algorithm based on resource clustering in cloud computing environment
GUO Fengyu;YU Long;TIAN Shengwei;YU Jiong;SUN Hua
..............page:2154-2157
Learning optimal kernel mapping based on function space with dynamic parameters
TAN Zhiying;CHEN Ying;FENG Yong;SONG Xiaobo
..............page:2337-2340
Bi-level image sharpening method based on parallel computing
ZHANG Wei;HE Xing;HUO Yingxiang;TENG Shaohua;TENG Yi;LI Rigui
..............page:2325-2329
Web service composition approach based on service cluster and QoS
DENG Shiyang;DU Yuyue
..............page:2167-2170,2183
Node scheduling scheme based on spatial resolution in wireless sensor networks
REN Xiuli;WANG Weiyong
..............page:2108-2111
Weight modification accumulated epochs RAIM algorithm based on self-adaptive strategy
HUANG Guorong;CHANG Cheng;HAO Shunyi;CHANG Yanan;XU Gang
..............page:2366-2369
Influence maximization algorithm for micro-blog network
WU Kai;JI Xinsheng;GUO Jinshi;LIU Caixia
..............page:2091-2094
Dynamic community discovery algorithm of Web services based on collaborative filtering
WU Zhong;NIE Guihua;CHEN Donglin;ZHANG Peilu
..............page:2095-2099
Estimation of RFID tags based on 0-1 distribution
QIAN Xiaojie;GUO Hongyuan;TIAN Yangguang
..............page:2128-2131
Image edge detection without threshold
HONG Liurong
..............page:2330-2333
Shifted bit inverse sequential acquisition algorithm
REN Guofeng;JI Jiang;TIAN Zhumei
..............page:2136-2139
Iterative hard thresholding orthogonal projection under cosparsity analytical model
ZHANG Zongnian;LI Jinhui;HUANG Rentai;YAN Jingwen
..............page:2387-2389,2393
Association user mining of location group in mobile communication network
LIU Fen;GE Guodong;ZHAO Yu;LIU Bingyang
..............page:2100-2103
Visualization of multi-valued attribute association rules based on concept lattice
GUO Xiaobo;ZHAO Shuliang;ZHAO Jiaojiao;LIU Jundan
..............page:2198-2203,2211
Texture-preserving shadow removal algorithm based on gradient domain
HUANG Wei;FU Liqin;WANG Chen
..............page:2317-2319,2324
Tasks assignment optimization in Hadoop
HUANG Chengzhen;WANG Lei;LIU Xiaolong;KUANG Yaping
..............page:2158-2162
Delta operator sliding mode variable structure control system based on reaching law method
LIU Yunlong;HAN Xinghai;TANG Shuhong
..............page:2397-2400
Energy-aware P2P data sharing mechanism for heterogeneous mobile terminals
DU Peng;BAI Guangwei;SHEN Hang;CAO Lei
..............page:2112-2116,2120
Task scheduling algorithm based on priority and cost constraint in cloud computing
WU Xiaonian;DENG Mengqin;ZHANG Mingling;ZENG Bin
..............page:2147-2150
Method for music soft-cutting and classification in rough-emotion area
LIN Jingdong;WANG Wei;LIAO Xiaoyong
..............page:2383-2386
Particle swarm optimization algorithm with weight function's learning factor
ZHAO Yuandong;FANG Zhenghua
..............page:2265-2268
Improved glowworm swarm optimization algorithm for high-dimensional functions
PENG Shuo;OUYANG Aijia;YUE Guangxue;HE Minghua;ZHOU Xu
..............page:2253-2256,2260
RFID anti-collision algorithm based on tags grouping
CHEN Rongling;WANG Yuhao;LIU Yi;CHEN Zhongping
..............page:2132-2135
Cloud computing resource scheduling based on improved quantum genetic algorithm
LIU Weining;JIN Hongbing;LIU Bo
..............page:2151-2153
Differential co-expression relative constant row bicluster mining algorithm
XIE Huabo;SHANG Xuequn;WANG Miao
..............page:2188-2193,2239
Robust feature selection method in high-dimensional data mining
LI Zean;CHEN Jianping;ZHANG Yajuan;ZHAO Weihua
..............page:2194-2197,2235
Modified 3D facial reconstruction algorithm based on a single photo
XIONG Ping;LU Ye
..............page:2359-2361,2369
Improved vocabulary semantic similarity calculation based on HowNet
ZHU Zhengyu;SUN Junhua
..............page:2276-2279,2288
Fuzzy risk evaluation on multi-role security mutual exclusion in mobile environment
WANG Jianjun;LI Jianping
..............page:2218-2221
Quantitative associative classification based on lazy method
LI Xueming;LI Binfei;YANG Tao;FU Meng
..............page:2184-2187
Service architecture and service discovery oriented to service clusters
HU Qiang;DU Yuyue
..............page:2163-2166
Improved RRT-Connect path planning algorithm for biped robot
MO Dongcheng;LIU Guodong
..............page:2289-2292
Corner detection algorithm using multi-chord curvature polynomial
WANG Junqing;ZHANG Weichuan;WANG Fuping;CHEN Meirong
..............page:2313-2316,2354
New feature weight calculation method for short text
MA Wenwen;DEGN Yigui
..............page:2280-2282,2292
Algorithm for detecting approximate duplicate records in massive data
ZHOU Dianrui;ZHOU Lianying
..............page:2208-2211
Colluding clique detector based on evaluation similarity in WSN reputation system mechanism
WANG Yong;YUAN Chaoyan;TANG Jing;HU Liangliang
..............page:2222-2224,2231
Scrambling algorithm based on layered Arnold transform
ZHANG Haitao;YAO Xue;CHEN Hongyu;ZHANG Ye
..............page:2240-2243
Method of no-reference quality assessment for blurred infrared image
DU Shaobo;ZHANG Chong;WANG Chao;LIANG Xiaobin;SUN Shibao
..............page:2306-2309
Pipelining granularity optimization algorithm based on loop tiling
LIU Xiaoxian;ZHAO Rongcai;DING Rui;LI Yanbing
..............page:2171-2176
Replica allocation policy of cloudy services based on social network properties
LUO Haoyu;CHEN Wanghu
..............page:2143-2146,2150
Detection of application-layer DDoS attack based on time series analysis
GU Xiaoqing;WANG Hongyuan;NI Tongguang;DING Hui
..............page:2228-2231
Improved particle swarm optimization based on adaptive rejection factor
CHEN Ming;LIU Yanmin
..............page:2269-2272
Particle swarm optimization for two-echelon location-routing problem
CHEN Jiumei;GONG Ying
..............page:2261-2264,2268
Enhanced clustering ensemble algorithm based on characteristics of data sets
HOU Yong;ZHENG Xuefeng
..............page:2204-2207,2249
New disparity estimation method for multiview video based on Mean Shift
HU Bo;DAI Wanchang;XIAO Zhijian;WU Jianping;HU Jie
..............page:2297-2299,2350
Mixed optimization strategy based on eating particle swarm and conjugate gradient
WANG Jianchen;QI Xiaohui;SHAN Ganlin
..............page:2257-2260
Parallel Delaunay algorithm design in lunar surface terrain reconstruction system
WANG Zhe;GAO Sanhong;ZHENG Huiying;LI Lichun
..............page:2177-2183
Linear collusion attack analysis of combined public key cryptosystem
MA Anjun;LI Fangwei;ZHU Jiang
..............page:2225-2227
Secure protection scheme for hierarchical OSPF network
KONG Lingjing;ZENG Huashen;LI Yao
..............page:2212-2217