Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2017 Issue 1
Design and implementation of resource management plane in virtual router platform
GAO Xianming;,WANG Baosheng;,LI Tongbiao;,XUE Huawei;
..............page:1-5,11
Virtual network embedding algorithm for dynamic virtual network requests
YAUN Ying;,WANG Cong;,WANG Cuirong;,SONG Xin;,LYU Yanxia;
..............page:6-11
Heterogeneous scheduling algorithm with immediate successor finish time
WANG Guan;,WANG Yuxin;,CHEN Xin;,WANG Fei;,GUO He;
..............page:12-17,133
Multi-task assignment algorithm for mobile crowdsensing
XU Zhe;,LI Zhuo;,CHEN Xin;
..............page:18-23,47
SaaS-oriented modeling and analysis of load balancing strategy
ming li ;, li tong ;, qin jiang long ;, zheng ming ;, jiang xu dong ;, xie zhong wen ;
..............page:24-30
Provenance graph query method based on double layer index structure
XU Guoyan;,LUO Zhangxuan;,SONG Jian;,LYU Xin;
..............page:48-53
Trajectory structure-based moving object hotspots discovery
LYU Shaoqian;,MENG Fanrong;,YUAN Guan;
..............page:54-59,72
Sweep coverage optimization algorithm for mobile sensor node with limited sensing
SHEN Xianhao;,LI Jun;,NAI He;
..............page:60-64,102
Moving target tracking scheme based on dynamic clustering
BAO Wei;,MAO Yingchi;,WANG Longbao;,CHEN Xiaoli;
..............page:65-72
Named data networking based data dissemination mechanism for vehicular Ad Hoc network
DENG Jian;,DONG Baihong;,CAO Hui;,WU Lijuan;,ZHANG Bo;,WU Weigang;
..............page:73-78
Data forwarding strategy based on weak state in vehicular Ad Hoc network
HUANG Dan;,HUANG Yan;,HUAN Tian;
..............page:79-83,96
Data forwarding mechanism in software-defined vehicular Ad Hoc network
YANG Zhiwei;,CHEN Haoliang;,ZHANG Bo;,WU Lijuan;,WU Weigang;
..............page:84-89,107
Antenna down-tilt angle self-optimization method based on particle swarm in long term evolution network
LIAN Xiaocan;,ZHANG Pengyuan;,TAN Guoping;,LI Yueheng;
..............page:97-102
2017 nian zu gao fang xiang
..............page:封2
Quasi-optimal period computation model for hierarchical checkpoint protocol
LYU Hongwu;,GU Lei;,WANG Huiqiang;,ZOU Shichen;,FENG Guangsheng;
..............page:103-107
Test case prioritization based on discrete particle swarm optimization algorithm
ZHANG Weixiang;,QI Yuhua;,LI Dezhi;
..............page:108-113,169
Real-time online evaluation method of helper thread prefetching quality
ZHANG Jianxun;,GU Zhimin;
..............page:114-119,127
Software protection method based on monitoring attack threats
TANG Zhanyong;,LI Zhen;,ZHANG Cong;,GONG Xiaoqing;,FANG Dingyi;
..............page:120-127
Application-layer DDoS defense model based on Web behavior trajectory
LIU Zeyu;,XIA Yang;,ZHANG Yilong;,REN Yuan;
..............page:128-133
Early warning method for driving safety based on CUDA
ZHAO Yongtao;,CHEN Qingkui;,FANG Yuling;,ZHAO Deyu;,JI Lina;
..............page:134-137,144
M-TAEDA: temporal abnormal event detection algorithm for multivariate time-series data of water quality
MAO Yingchi;,QI Hai;,JIE Qing;,WANG Longbao;
..............page:138-144
Real-time crowd counting method from video stream based on GPU
JI Lina;,CHEN Qingkui;,CHEN Yuanjing;,ZHAO Deyu;,FANG Yuling;,ZHAO Yongtao;
..............page:145-152
Stream computing system for monitoring copy plate vehicles
QIAO Tong;,ZHAO Zhuofeng;,DING Weilong;
..............page:153-158
Design of remote wireless monitoring system for smart home based on Internet of things
DENG Yun;,LI Chaoqing;,CHEN Xiaohui;
..............page:159-165
Near field communication-enabled water meter system with mobile payment
ZHANG Chengyu;,WANG Rangding;,YAO Ling;,FU Songyin;,ZUO Fuqiang;,GAO Qifei;,JIANG Ming;
..............page:166-169
Smart wireless water meter reading system for multi-story residential buildings
FU Songyin;,WANG Rangding;,YAO Ling;,ZHANG Chengyu;,SHAN Guanmin;,HU Guowei;
..............page:170-174,182
Dynamic sampling method for wireless sensor network based on compressive sensing
SONG Yang;,HUANG Zhiqing;,ZHANG Yanxin;,LI Mengjia;
..............page:183-187,196
Survey on construction of measurement matrices in compressive sensing
WANG Qiang;,ZHANG Peilin;,WANG Huaiguang;,YANG Wangcan;,CHEN Yanlong;
..............page:188-196
Block-sparse adaptive filtering algorithm based on inverse hyperbolic sine function against impulsive interference
WEI Dandan;,ZHOU Yi;,SHI Liming;,LIU Hongqing;
..............page:197-199,205
Information hiding method based on Have messages in BitTorrent protocol
GAO Bin;,ZHAI Jiangtao;,DAI Yuewei;
..............page:200-205
Spam detection model of campus network based on incremental learning algorithm
CHEN Bin;,DONG Yizhou;,MAO Mingrong;
..............page:206-211,216
Time-based strategy audit scheme of access control list in multi-layer firewall
WANG Xudong;,CHEN Qingping;,LI Wen;,ZHANG Xinming;
..............page:212-216
Hybrid algorithm for identifying error signatures in hierarchical identity based cryptography batch verification
XU Guoyu;,WANG Yingfeng;,MA Xiaofei;,WANG Kefeng;,YAN Ruoyu;
..............page:217-221
Incremental formation of concept lattice based on intent waned value
WU Jie;,LIANG Yan;,MA Yuan;
..............page:222-227
Automatic image annotation method using multi-label learning convolutional neural network
GAO Yaodong;,HOU Lingyan;,YANG Dali;
..............page:228-232
Application of chaos cuckoo search algorithm in harmonic estimation
NIU Haifan;,SONG Weiping;,NING Aiping;,MA Yiyuan;
..............page:239-243
Gesture segmentation and positioning based on improved depth information
LIN Haibo;,WANG Shengbin;,ZHANG Yi;
..............page:251-254,261
Object recognition method based on RGB-D image kernel descriptor
LUO Jian;,JIANG Min;
..............page:255-261
3D face modeling and validation in cross-pose face matching
LI Xinxin;,GONG Xun;
..............page:262-267
Single image in-depth dehazing algorithm based on optimization of guided image
DONG Yufei;,YANG Yan;,CAO Biting;
..............page:268-272,277
Improved ellipse fitting algorithm based on Letts criterion
CAO Junli;,LI Jufeng;
..............page:273-277
Knowledge driven automatic annotating algorithm for game strategies
CHEN Huanhuan;,CHEN Xiaohong;,RUAN Tong;,GAO Daqi;,WANG Haofen;
..............page:278-283
Real-time traffic accident prediction based on AdaBoost classifier
ZHANG Jun;,HU Zhenbo;,ZHU Xinshan;
..............page:284-288
Ultra wideband indoor localization based on inner triangle centroid algorithm
WEI Pei;,JIANG Ping;,HE Jingjing;,ZHANG Huimeng;
..............page:289-293,298
Design of iterative learning controller for systems with random noise
XIA Hao;,ZHANG Lijie;
..............page:294-298
Dynamic estimation about service time of flight support based on Bayesian network
XING Zhiwei;,TANG Yunxiao;,LUO Qian;
..............page:299-304