Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2014 Issue 2
xin xi dong tai
..............page:封2
Retransmission mechanism based on network coding in wireless networks
CAO Bin;,LIU Qilie;,WU Yangyang;
..............page:309-312,321
Approximate summation algorithm of distinct records for wireless sensor network
CAI Yuwen;,CAI Yuwu;,LIU Caiping;,MAO Jianxu;
..............page:313-317
Node centralities-aware routing in delay tolerant network
WANG Jintuo;,XIONG Yu;,ZHANG Hongpei;,ZHANG Ruoying;
..............page:318-321
New wireless positioning method with high accuracy and low complexity
CHEN Tiejun;,LIU Feng;,YANG Xiaofeng;
..............page:322-324,337
Research and application of matching communications between Virtex-5 GTP and Virtex-6 GTX
HE Songhua;,LI Kai;,OU Jianping;
..............page:325-328,332
Design of modulated filter banks for cognitive radio system
JI Xiang;,SHAO Kai;,WANG Guangyu;,ZHUANG Ling;
..............page:329-332
Modeling and simulation for high-frequency IP wide-area network
CHEN Shanghua;,HUANG Guoce;,JING Yuan;,QI Yunjun;,YANG Ming;
..............page:333-337
Optimization of intra-MAP handover in HMIPv6
JIA Xiao;,SUN Xiaolin;,ZHANG Jianyang;
..............page:338-340
Enhanced distributed mobility management based on host identity protocol
GUO Hua;,JIA Lei;,LI Juan;,WANG Lingjiao;,XU Yawei;
..............page:341-345
Analysis and suppression of influence on spotbeam selection of GMR-1 system under antenna oscillation
LIN Xiaoxu;,LIU Naijin;,QIAN Jinxi;,ZHAO Danfeng;
..............page:346-350
Artificial immune algorithm for dynamic task scheduling on cloud computing platform
LIU Nianbo;,WANG Xiaomin;,WU De'an;,WU Lei;,YANG Jing;
..............page:351-356
Load balancing technology based on naive Bayes algorithm in cloud computing environment
CAI Song;,CHEN Jiming;,PAN Jingui;,ZHANG Jianming;
..............page:360-364
P2P streaming media server cluster deployment algorithm based on cloud computing
MO Zhichao;,WANG Jun;,ZHANG Weizhan;,ZHENG Yan;
..............page:365-368
Security analysis and improvement of access control scheme for cloud storage
DU Dahai;,FAN Hong;,WANG Guan;
..............page:373-376
Dynamic allocation of virtual supplier resources based on cloud procurement platform
DING Yi;,HUANG Li;,LIN Guolong;,YAO Jinyuan;
..............page:377-381
Reconfigurable hybrid task scheduling algorithm
SHEN Shu;,WU Jiang;,ZHU Zhiyu;
..............page:387-390,405
Distributed rules mining algorithm with load balance based on vertical FP-tree
FENG Yong;,XU Hongyan;,YIN Jiena;
..............page:396-400
Continuous-valued attributes reduction algorithm based on gray correlation
WANG Jindong;,YU Dingkun;,ZHANG Jian;
..............page:401-405
Simple continuous near neighbor chain query in constrained regions
HAO Xiaohong;,LI Song;,ZHANG Liping;,ZHAO Jiqiao;
..............page:406-410
Method of creating file based on big directory of NTFS
JIANG Daqiang;,LI Haiming;,LIN Shuibin;,SU Qing;,WU Weimin;
..............page:417-420
Conflict analysis of distributed application access control policies refinement
HUANG Hao;,WU Yinghong;,ZENG Qingkai;,ZHOU Jingkang;
..............page:421-427
Reachability analysis for attribute based user-role assignment model
CHEN Xingyuan;,REN Zhiyu;
..............page:428-432
Remote attestation mechanism for platform integrity based on unbalanced-Hash tree
WANG Wei;,WENG Xiaokang;,ZHANG Ping;,ZHU Yi;
..............page:433-437
Secure quantum communication protocol based on symmetric W state and identity authentication
GENG Huantong;,LIU Chao;,LIU Wenjie;
..............page:438-441
Arithmetic correlations of symmetric Boolean function
DONG Xiaoli;,ZHAO Qinglan;,ZHENG Dong;
..............page:442-443,460
Construction of even-variable rotation symmetric Boolean functions with optimum algebraic immunity
CHEN Yindong;,XIANG Hongyan;,ZHANG Yanan;
..............page:444-447,472
Differential power analysis attack based on algebraic expression for power model
CAI Zemin;,LI Renfa;,WANG Yi;
..............page:448-451,463
Low-cost mutual authenticate and encrypt scheme for active RIFD system
HU Xiang;,LIU Dan;,XU Zhan;,YE Xiang;
..............page:456-460
Fined-grained access control protocol for privacy preservation in wireless sensor network
GUO Liangmin;,HU Peng;,LUO Yonglong;,ZUO Kaizhong;
..............page:461-463
Universal designated verifier signcryption scheme in standard model
HAN Juan;,MING Yang;,ZHANG Lin;,ZHOU Jun;
..............page:464-468
Blind watermarking algorithm of double keys based on Markov chain Monte Carlo sampling
LUO Jingyun;,XIAO Jiawei;,ZHANG Li;
..............page:469-472
Taint-marking based access control model and its implementation on Android
CHEN Xingyuan;,DU Xuehui;,WU Zezhi;,YANG Zhi;
..............page:473-476
Design of file system encryption and decryption for Xen based on QEMU
CHEN Teng;,HE Qin;
..............page:477-480
Sentiment analysis on Web financial text based on semantic rules
CUI Liang;,LI Taiyong;,TANG Changjie;,WU Jiang;
..............page:481-485,495
Bursty topics detection approach on Chinese microblog based on burst words clustering
GUO Yixiu;,LI Zhuo;,LU Xueqiang;
..............page:486-490,505
Situation assessment method based on improved evidence theory
LIU Yunan;,QIU Wei;,SI Cheng;,WANG Yongwei;,ZHAO Rongcai;
..............page:491-495
Quantum-inspired clonal algorithm based method for optimizing neural networks
DENG Hong;,DUAN Weijun;,MA Ying;,QI Hao;,WANG Fubao;,WANG Liang;,ZHAO Kun;
..............page:496-500
Weight-based cloud reasoning algorithm
YAN Xuefeng;,YANG Chao;,ZHANG Jie;,ZHOU Yong;
..............page:501-505
Diversity feedback and control particle swarm optimization algorithm
HU Xu;,RAO Xinghua;,WANG Wenge;
..............page:506-509,513
Path planning for intelligent robots based on improved particle swarm optimization algorithm
LI Ying;,ZHANG Wanxu;,ZHANG Xianglan;
..............page:510-513
On-line gait planning by using preview control of zero moment point
YANG Yimin;,ZENG He;
..............page:514-518
Dynamic evaluation of ecological security based on set pair analysis and Markov chain
LEI Luning;,SHI Xin;,ZHANG Tao;
..............page:519-522,527
Discrete harmony search algorithm for lot-streaming flow shop scheduling problem with setup time
PAN Yuxia;,XIAO Heng;,XIE Guang;
..............page:528-532,557
Mouse behavior recognition based on human computation
CHEN Zhengming;,DENG Shasha;,LIU Jing;,TONG Jing;
..............page:533-537,541
Simultaneous recursive identification algorithm of system order and parameters based on determinant ratio method
HU Tao;,LI Dingyuan;,ZHAO Yongli;,ZHONG Heng;
..............page:538-541
Concept drift detection based on distance measurement of overlapped data windows
LIU Mao;,ZHANG Dongbo;,ZHAO Yuanyuan;
..............page:542-545,549
Single sample face recognition based on orthogonal gradient binary pattern
CAI Yongyong;,FENG Junpeng;,LI Qiuqiu;,YANG Huixian;,ZHAI Yunlong;
..............page:546-549
Compressing-sensing cone-beam CT reconstruction algorithm of fixed step-size
YANG Hongcheng;,ZHANG Tao;,ZHANG Xiaomeng;
..............page:553-557
Image super-resolution algorithm based on improved sparse coding
CAO Liping;,HUANG Zengxi;,SHENG Shuai;,WU Pengfei;
..............page:562-566,571
Speech enhancement using subband spectral-subtraction
CAI Yu;,HAO Chengpeng;,HOU Chaohuan;
..............page:567-571
Optimized data association algorithm based on visual simultaneous localization and mapping
CHEN Min;,LI Hongchen;,ZHAO Liang;
..............page:576-579
Moving object detection algorithm of improved Gaussian mixture model
HUA Yuanlei;,LIU Wanjun;
..............page:580-584
People counting based on skeleton feature
DUAN Jingjing;,FAN Yong;,GAO Lin;,GAO Pan;,LIU Xu;,REN Xinyu;,XIA Jingjing;
..............page:585-588
Design of live video streaming, recording and storage system based on Flex, Red5 and MongoDB
DAI Cheng;,LIU Taijun;,WANG Honglai;,YE Yan;,ZHENG Jingjing;
..............page:589-592
Brain tumor segmentation based on morphological multi-scale modification
HE Shihe;,WAN Shengyang;,WANG Chengyi;,WANG Xiaopeng;
..............page:593-596
Washout control and stability analysis for cyclic traffic flows
REN Pengfei;,WANG Hua;,XUE Peng;
..............page:597-600
Multi-Agent urban traffic coordination control research based on game learning
DUAN Lingyu;,WANG Ning;,ZHENG Yanbin;
..............page:601-604
Taxiway conflict control strategy based on objective perception events driven model
CHEN Ping;,TANG Xinmin;,XING Jian;
..............page:610-614