Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2015 Issue 12
Review of modeling, statistical properties analysis and routing strategies optimization in Internet of vehicles
CHEN Yufeng;,XIANG Zhengtao;,DONG Yabo;,XIA Ming;
..............page:3321-3324,3330
Fast routing micro-loop avoidance algorithm in IP network
YANG Shiqi;,YU Hongfang;,LUO Long;
..............page:3325-3330
Clustering routing algorithm based on attraction factor and hybrid transmission
ZHAO Zuopeng;,ZHANG Nana;,HOU Mengting;,GAO Meng;
..............page:3331-3335,3373
Optimal routing selection algorithm of end-to-end key agreement in quantum key distribution network
SHI Lei;,SU Jinhai;,GUO Yixi;
..............page:3336-3340,3397
Incremental selection algorithm for incremental network monitoring points
DING Sanjun;,TAO Xingyu;,SHI Xiangchao;,XU Lei;
..............page:3344-3347
Detection method of linear frequency modulated signal based on frequency domain phase variance weighting
WANG Sixiu;,GUO Wenqiang;,TANG Jianguo;,WANG Xiaojie;
..............page:3352-3356,3361
Multiple input multiple output radar orthogonal waveform design of joint frequency-phase modulation based on chaos
ZHOU Yun;,LU Xiaxia;,YU Xuelian;,WANG Xuegang;
..............page:3357-3361
Dynamic power consumption profiling and modeling by structured query language
GUO Binglei;,YU Jiong;,LIAO Bin;,YANG Dexian;
..............page:3362-3367
Efficient memory management algorithm based on segment tree and its space optimization
WANG Donghui;,HAN Jianmin;,ZHUANG Jiaqi;
..............page:3368-3373
MapReduce performance model based on multi-phase dividing
LI Zhenju;,LI Xuejun;,YANG Sheng;,LIU Tao;
..............page:3374-3377,3382
Design and implementation of cloud monitor system based on P2P monitor network
LI Tengyao;,ZHANG Shuiping;,ZHANG Yueling;,ZHANG Jingyi;
..............page:3378-3382
Resource matching maximum set job scheduling algorithm under Hadoop
ZHU Jie;,LI Wenrui;,ZHAO Hong;,LI Ying;
..............page:3383-3386,3446
Data migration model based on RAMCloud hierarchical storage architecture
GUO Gang;,YU Jiong;,LU Liang;,YING Changtian;,YIN Lutong;
..............page:3392-3397
Lowest label algorithm for minimum cut/maximum flow based on preflow push
ZHAO Lifeng;,YAN Ziheng;
..............page:3398-3402,3407
Information fusion algorithm for Argo buoy profile based on MapReduce
JIANG Hua;,HU Ying;
..............page:3403-3407
Parallel algorithm for homomoriphic encryption base on MapReduce
HU Chi;,YANG Geng;,YANG Beisi;,MIN Zhao'e;
..............page:3408-3412,3418
Cloud storage system with fine-grained access control and low storage space overhead
YIN Kaize;,WANG Haihang;
..............page:3413-3418
Dynamic information security evaluation model in mobile Ad Hoc network
PAN Lei;,LI Tingyuan;
..............page:3419-3423
Cryptanalysis of two anonymous user authentication schemes for wireless sensor networks
XUE Feng;,WANG Ding;,CAO Pinjun;,LI Yong;
..............page:3424-3428,3436
Software-defined networking-oriented intrusion tolerance controller architecture and its implementation
HUANG Liang;,JIANG Fan;,XUN Hao;,MA Duohe;,WANG Liming;
..............page:3429-3436
K-anonymity privacy-preserving for trajectory in uncertain environment
ZHU Lin;,HUANG Shengbo;
..............page:3437-3441
Efficient partitioning error concealment method for Ⅰ frame
WANG Chaolin;,ZHOU Yu;,WANG Xiaodong;,ZHANG Lianjun;
..............page:3442-3446
Derivation and spectrum analysis of a kind of low weight spectral annihilator
HU Jianyong;,ZHANG Wenzheng;
..............page:3447-3449,3455
Error detection algorithm of program loop control
ZOU Yu;,XUE Xiaoping;,ZHANG Fang;,PAN Yong;,PAN Teng;
..............page:3450-3455
Improvement of constraint conditions and new constructional method for intuitionistic fuzzy entropy
ZHAO Fei;,WANG Qingshan;,HAO Wanliang;
..............page:3461-3464
Stopping criterion of active learning for scenario of single-labeling mode
YANG Ju;,LI Qingwen;,YU Hualong;
..............page:3472-3476
Overlapping community discovering algorithm based on latent features
SUN Huixia;,LI Yuexin;
..............page:3477-3480
Fine-grained sentiment analysis oriented to product comment
LIU Li;,WANG Yongheng;,WEI Hang;
..............page:3481-3486,3505
User influence algorithm based on user content and relational structure
MA Huifang;,SHI Yakai;,XIE Meng;,ZHUANG Fuzhen;
..............page:3487-3490,3496
Probabilistic matrix factorization algorithm based on AdaBoost
PENG Xingxiong;,XIAO Ruliang;,ZHANG Guigang;
..............page:3497-3501
Non-equilibrium mass diffusion recommendation algorithm based on popularity
GUO Qiang;,SONG Wenjun;,HU Zhaolong;,HOU Lei;,ZHANG Yilu;,CHEN Fangjiao;
..............page:3502-3505
Improvement of term frequency-inverse document frequency algorithm based on Document Triage
LI Zhenjun;,ZHOU Zhurong;
..............page:3506-3510,3514
Detecting community in bipartite network based on cluster analysis
ZHANG Qiangqiang;,HUANG Tinglei;,ZHANG Yinming;
..............page:3511-3514
Energy consumption optimization of stochastic real-time tasks for dependable embedded system
PAN Xiong;,JIANG Wei;,WEN Liang;,ZHOU Keran;,DONG Qi;,WANG Junlong;
..............page:3515-3519,3535
Application of time-Petri net for process modeling of point-of-care testing
WANG Lei;,WANG Bidou;,LUO Gangyin;,NIE Lanshun;,ZHAN Dechen;,TIAN Haoran;
..............page:3520-3523
Trust evaluation method for component reuse based on component use dependency relation
WANG Yanling;,ZENG Guosun;
..............page:3524-3529
Clone code detection based on Levenshtein distance of token
ZHANG Jiujie;,WANG Chunhui;,ZHANG Liping;,HOU Min;,LIU Dongsheng;
..............page:3536-3543
Real-time object tracking method based on multi-channel kernel correlation filter
HU Zhaohua;,XING Weiguo;,HE Jun;,ZHANG Xiuzai;
..............page:3544-3549,3554
Improved target tracking algorithm based on kernelized correlation filter
YU Liyang;,FAN Chunxiao;,MING Yue;
..............page:3550-3554
Robust tracking operator using augmented Lagrange multiplier
LI Feibin;,CAO Tieyong;,HUANG Hui;,WANG Wen;
..............page:3555-3559,3564
Object detection based on visual saliency map and objectness
LI Junhao;,LIU Zhi;
..............page:3560-3564
Regional stereo matching algorithm based on visual saliency
ZHANG Huadong;,PAN Chen;,ZHANG Dongping;
..............page:3565-3569
Multi-feature based descriptions for automated grading on breast histopathology
GONG Lei;,XU Jun;,WANG Guanhao;,WU Jianzhong;,TANG Jinhai;
..............page:3570-3575,3580
Polarized image dehazing algorithm based on dark channel prior
ZHANG Jingjing;,CHEN Zihong;,ZHANG Dexiang;,YAN Qing;,XUN Lina;,ZHANG Weiguo;
..............page:3576-3580
Dynamic obstacle avoidance method of mobile online water quality monitoring platform
LAO Jiajun;,YANG Jiang;,ZHU Wuming;
..............page:3581-3585,3591
Tunnel intersection modeling based on cylinder-axis aligned bounding box detection
WANG Chong;,AN Weiqiang;,WANG Hongjuan;
..............page:3592-3596
Passenger counting system based on intelligent detection of polyvinylidene fluoride human gait
XIE Yu;,HU Xintong;,MENG Xiyun;,LIU Yunjie;
..............page:3602-3606
Design of serial peripheral interface module for system-on-chip
YANG Xiao;,LI Zhanming;
..............page:3607-3610