Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2015 Issue 10
MTRF: a topic model with spatial information
PAN Zhiyong;,LIU Yang;,LIU Guojun;,GUO Maozu;,LI Pan;
..............page:2715-2720,2732
Simple multi-label ranking for Chinese microblog sentiment classification
SHI Shaoliang;,WEN Yimin;,MIAO Yuqing;
..............page:2721-2726
Analysis on distinguishing product reviews based on top-k emerging patterns
LIU Lu;,WANG Yining;,DUAN Lei;,NUMMENMAA Jyrki;,YAN Li;,TANG Changjie;
..............page:2727-2732
Heuristic algorithms for paper index ranking based on sparse matrix
WAN Xiaosong;,WANG Zhihai;,YUAN Jidong;
..............page:2733-2736,2741
Constructing high-level architecture of online social network through community detection
QIU Dehong;,XU Fangxiang;,LI Yuan;
..............page:2737-2741
Overlapping community discovery method based on symmetric nonnegative matrix factorization
HU Liying;,GUO Gongde;,MA Changfeng;
..............page:2742-2746
Analysis of public emotion evolution based on probabilistic latent semantic analysis
LIN Jianghao;,ZHOU Yongmei;,YANG Aimin;,CHEN Yuhong;,CHEN Xiaofan;
..............page:2747-2751,2756
New discriminative feature selection method
WU Jinhua;,ZUO Kaizhong;,JIE Biao;,DING Xintao;
..............page:2752-2756
Extreme learning machine based on conjugate gradient
ZHANG Peizhou;,WANG Xizhao;,GU Di;,ZHAO Shixin;
..............page:2757-2760,2765
Multi-label K nearest neighbor algorithm by exploiting label correlation
TAN Hefeng;,LIU Zhengyi;
..............page:2761-2765
Enhanced differential evolution algorithm with non-prior-knowledge DFP local search under Memetic framework
MA Zhenyuan;,YE Shujin;,LIN Zhiyong;,LIANG Yubin;,HUANG Han;
..............page:2766-2770,2776
Conditional information entropy and attribute reduction based on boundary region
HUANG Guoshun;,WEN Han;
..............page:2771-2776
Ant colony optimization algorithm based on Spark
WANG Zhaoyuan;,WANG Hongjie;,XING Huanlai;,LI Tianrui;
..............page:2777-2780,2797
Matrix factorization recommendation algorithm based on Spark
ZHENG Fengfei;,HUANG Wenpei;,JIA Mingzheng;
..............page:2781-2783,2788
Real-time fault-tolerant technology for Hadoop based on heartbeat expired time mechanism
GUAN Guodong;,TENG Fei;,YANG Yan;
..............page:2784-2788
Framework of serial multimodal biometrics with parallel fusion
LI Haixia;,ZHANG Qing;
..............page:2789-2792,2823
Inconsistent decision algorithm in region of interest based on certainty degree, inclusion degree and cover degree
ZHOU Tao;,LU Huiling;,MA Miao;,YANG Pengfei;
..............page:2803-2807,2812
Prostate tumor CAD model based on neural network with feature-level fusion in magnetic resonance imaging
LU Huiling;,ZHOU Tao;,WANG Huiqun;,WANG Wenwen;
..............page:2813-2818
Fault diagnosis method of high-speed rail based on compute unified device architecture
CHEN Zhi;,LI Tianrui;,LI Ming;,YANG Yan;
..............page:2819-2823
Uncertain life strength rescue path planning based on particle swarm optimization
GENG Na;,GONG Dunwei;,ZHANG Yong;
..............page:2828-2832
Corridor scene recognition for mobile robots based on multi-sonar-sensor information and NeuCube
WANG Xiuqing;,HOU Zengguang;,PAN Shiying;,TAN Min;,WANG Yongji;,ZENG Hui;
..............page:2833-2837
Slight-pause marks boundary identification based on conditional random field
MO Yiwen;,JI Donghong;,HUANG Jiangping;
..............page:2838-2842
Anonymous circuit control method for the onion router based on node failure
ZHUO Zhongliu;,ZHANG Xiaosong;,LI Ruixing;,CHEN Ting;,ZHANG Jingzhong;
..............page:2843-2847
Cipher texts generation method in elliptic curve cryptography based on plaintext length
ZHANG Xidong;,TONG Weiming;,WANG Tiecheng;,JIN Xianji;
..............page:2863-2866,2876
Code-based blind signature scheme
WANG Qian;,ZHENG Dong;,REN Fang;
..............page:2867-2871
Service quality evaluation model based on trusted recommendation
ZHOU Guoqiang;,YANG Xihui;,LIU Hongfang;
..............page:2872-2876
Provably-secure two-factor authentication scheme for wireless sensor network
CHEN Lei;,WEI Fushan;,MA Chuangui;
..............page:2877-2882,2890
Intrusion detection model based on decision tree and Naive-Bayes classification
YAO Wei;,WANG Juan;,ZHANG Shengli;
..............page:2883-2885
Efficient plaintext gathering method for data protected by SSL/TLS protocol in network auditing
DONG Haitao;,TIAN Jing;,YANG Jun;,YE Xiaozhou;,SONG Lei;
..............page:2891-2895
Partition-based binary file similarity comparison method
DONG Qihai;,WANG Yagang;
..............page:2896-2900,2944
Focused topic Web crawler based on improved TF-IDF alogorithm
WANG Jingzhong;,QIU Tongxiang;
..............page:2901-2904,2919
Evolution analysis method of microblog topic-sentiment based on dynamic topic sentiment combining model
LI Chaoxiong;,HUANG Faliang;,WEN Xiaoqian;,LI Xuan;,YUAN Chang'an;
..............page:2905-2910
Frequent closed itemset mining algorithm over uncertain data
LIU Huiting;,SHEN Shengxia;,ZHAO Peng;,YAO Sheng;
..............page:2911-2914
Efficient information search method based on semantic Web
XIA Meicui;,SHI Hongtao;
..............page:2915-2919
Adaptive H∞ control for longitudinal plane of hypersonic vehicle based on hierarchical fuzzy system
WANG Yongchao;,ZHANG Shengxiu;,CAO Lijia;,HU Xiaoxiang;
..............page:2920-2926,2932
Service-level agreement negotiation mechanism based on semantic Web technology
WANG Xiaolong;,ZHANG Heng;,YANG Bochao;,SHEN Yulin;
..............page:2927-2932
Virtual reality display model based on human vision
XU Yujie;,GUAN Huichao;,ZHANG Zongwei;,GUO Qing;,ZHANG Qing;
..............page:2939-2944
Key technologies of human-computer interaction based on virtual hand
YANG Xiaowen;,ZHANG Zhichun;,KUANG liqun;,HAN Xie;
..............page:2945-2949
Surface blending using resultant and three-dimensional geometric modeling
LI Yaohui;,WU Zhifeng;,XUAN Zhaocheng;
..............page:2950-2954
Image completion algorithm based on depth information
HE Ye;,LI Guangyao;,XIAO Mang;,XIE Li;,PENG Lei;,TANG Ke;
..............page:2955-2958
Cross-based adaptive guided filtering in image denoising
QUAN Li;,HU Yueli;,YAN Ming;
..............page:2959-2962
Image authentication agorithm based on two-dimensional histogram shifting
WANG Bing;,MAO Qian;,SU Dongqi;
..............page:2963-2968
Autofocus method based on blur difference qualitative analysis
LIN Zhong;,HUANG Chenrong;,LU Ali;
..............page:2969-2973,2979
Improved TLD target tracking algorithm based on automatic adjustment of surveyed areas
QU Haicheng;,SHAN Xiaochen;,MENG Yu;,LIU Wanjun;
..............page:2985-2989
Constructing method of metamorphic relations in object-oriented software testing
HOU Xuemei;,YU Lei;,ZHANG Xinglong;,LI Zhibo;
..............page:2990-2994
Optimal algorithm for infrared touch screen based on target tracking
ZHOU Aiguo;,PAN Qiangbiao;
..............page:2995-2999
Vibration measurement system based on ZigBee and Ethernet
CAO Mengchao;,LIU Hua;
..............page:3000-3003
Signal denoising method based on singular value decomposition and Savitzky-Golay filter
ZHU Hongyun;,WANG Changlong;,WANG Jianbin;,MA Xiaolin;
..............page:3004-3007,3012
Directory-adaptive journaling mode selective mechanism for Android systems
XU Yuanchao;,SUN Fengyun;,YAN Junfeng;,WAN Hu;
..............page:3008-3012