Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2006 Issue 8
Fast Circle Detection Using Randomized Hough Transform Based on Gradient
WANG Jian;WANG Xiao-tong;XU Xiao-gang;LI Bo
..............page:164-165
Connected Component Labeling Algorithm Based on Max-tree
ZHANG De-wei;PU Xiao-rong;ZHANG Yi
..............page:168-170
New Method of 2D Shape Representation and Edge Smoothing
ZHENG Xiao-dong;ZHOU Ni-na;HUANG Xin-han
..............page:171-173
Improved EZW Algorithm for Image Compression
LI Jin-ping;RUI Xiao-ping;YANG Chong-jun
..............page:174-176
Multi-level Threshold Method of Quick Response Code
LIU Yue;LIU Ming-ye;SHANG Zhen-hong
..............page:177-179
Detecting Human Eyes' Character Points Based on Novel Valley Operator
YIN Fang-ping;RUAN Bang-zhi
..............page:180-182,185
Vehicle Examination Method that Based on Video Pixel-matrix
WANG Qi;YOU Zhi-sheng;QIN Shu-jian
..............page:183-185
Image Retrieval Based on Fuzzy Color Space Clustering
GUO Wei;WANG Shi-tong
..............page:186-188,191
Automatic Image Enhancement Technology in Process of Second ID Card Photo
SUN Min;ZHOU Jun-hong
..............page:189-191
Design of Embedded Real-time Database Manage System
LIU Yun-sheng;DING li
..............page:192-193
Design of Embedded MCU with Mixed Architecture of CISC and RISC
CHEN Rui-sen;GUO Dong-hui
..............page:194-196
Analysis and Optimization for Processor Architecture Simulator (SimpleScalar)
JIN Li-zhong;DOU Yong
..............page:197-198,202
Combination Research of Chinese Character Verb
SUN Xiong-yong;ZHANG Quan
..............page:199-202
Design and Implementation of Mini-computer Control System
TANG Jie;XIAO De-yun;ZHANG Zheng-fang
..............page:203-205
Deploying Scheme of P2P Technology with Telecom Service
SHEN Qi-wei;LIAO Jian-xin
..............page:228-231
Development Prototype of Virtual Plant Based on Improved L System
LI Yun-feng;ZHU Qing-sheng;FU He-gang;GU Ping
..............page:232-234,239
Performance Optimization of Internet Access in GPRS/UMTS Networks
WANG Yue;REN Yong;SHAN Xiu-ming;WANG Yao-xi
..............page:235-239
Research of Reconfigurable Manufacturing Execution System Based on Web
ZOU Shun-xiang;RAO Yun-qing
..............page:240-242
Research and Test on RIP of ForCES-based IP Routers
YUE Ting;WANG Wei-ming;DONG Li-gang
..............page:243-244,247
Event-Triggered Time Synchronization Algorithm for Sensor Networks
WEI Nuo;GUO Zhong-wen;YANG Bin;GONG Zhao-jie
..............page:245-247
New Multi-party Fair Exchange Protocol with Off-line Semi-trusted Third Party
DU Hong-zhen;ZHANG Jian-zhong
..............page:248-250
Design of Simulation Platform for UAV's Telemetry and Telecontrol Communication Network
WANG Yu;WANG Yong-sheng;GE Xian-xian;FENG Li-bin
..............page:251-253,257
Integrated System of Wireless Communication Technology and GIS
SUN Qing-hui;WANG Xiao-li;CHI Tian-he;SUN Wei-ping
..............page:254-257
Design and Implementation of Virtual Network Design Platform
LI Hua;SUN Zhi-yong;WU Zhong-fu
..............page:258-260
Research on Short Message-based Digital Certificate Status Broadcasting System
HONG Huan-jian;TENG Ran-ran;ZHENG Jian-hua;DAI Yi-qi
..............page:148-151
Mobility Management Scheme Based on HIP and Hybrid Authentication
CHEN Wei;GAO Xiao-peng;LONG Xiang
..............page:144-147
New Research on Multicast Key Management Scheme
QIN Ke;ZHOU Ming-tian;LIU Nai-qi
..............page:142-143,154
Scheme to Prevent Denial of Service Attacks Based on Survivability
ZENG Ling-hua;OUYANG Kai-cui;ZHOU Ming-tian
..............page:139-141
Research on Distributed Denial of Service Attacks and Defense
LIN Mei-qin;LI Zhi-shu;YUAN Xiao-ling;ZHOU Mi;WANG Xue-song;TONG Ming
..............page:136-138,151
Advanced Authentication System Based on Digital Certificate Technology
LV Ge-li;WANG Dong;DAI Ji;SHAO Zi-ran
..............page:114-116,119
Design and Implementation of CA Scheme Based on Secure Chip
CHEN Jun;HOU Zi-feng;WEI Wei;QU Ya-dong
..............page:110-113
Design and Realization of Distributed Intrusion Detection System Based on Ring Structure
JIANG Hua-bin;JIANG Wen;XIE Dong-qing
..............page:107-109,113
Strategy Based on Diversity to Prevent IP Cheating
CHENG Xiao-ou;LIANG Yi-wen
..............page:104-106
Adaptive Multi-method Segmentation Algorithm Based on Gaussian Fitting
LI Lei;PING Xi-jian;TONG Li
..............page:162-163,170
Highly Refined Surface Reconstruction Method Based on 3D-TIN
LI Feng-chun;GONG Jun;WANG Qing
..............page:159-161
Reconstruction for Optical Tomography Based on Maximum Entropy
SI Guang-tao;CAO Bao-xiang;MENG Jing
..............page:157-158,179
Realization of Texture Transfer in lαβ Color Model
QIAN Wen-hua;XU Dan;YUAN Guo-wu
..............page:155-156,173
.NET Platform Jurisdiction Confirmation Implementation by AspectSharp
JIN Xiao-qiang;TANG Ning-jiu;HU Xue-liang
..............page:152-154
Challenges and Solutions of ESA on NTRU
YU Wei-chi;HE Da-ke
..............page:129-132
Design and Implementation of Vulnerability Detection System
ZOU Zhi-cheng;GAO You-xing;DAI Zu-feng
..............page:126-128
New Method to Prevent Worms
PENG Guo-jun;ZHANG Huan-guo
..............page:123-125
Design of Web Page Virus Defense System
WEI Jian-ping;WEI Qiang;WU Hao
..............page:120-122,132
A New Rekeying Policy for Multicast Key Management
YANG Jun;ZHOU Xian-wei;QIN Bo-ping;XUE Nan
..............page:102-103,221
Cookie-based Single Sign-on Model in Portal System
YANG Wen-bo;ZHANG Hui;LIU Rui
..............page:100-101,125
Design of New High Efficiency Computer Monitoring and Control Audit System
LI Chao;YANG Yi-xian;NIU Xin-xin
..............page:97-99
Selection and Implementation of Secure Elliptic Curves of Prime Order over Finite Field
YIN Xin-chun;WANG Cai-mei;CHEN Jue-wei
..............page:95-96,99
Mobile Security Middleware Architecture in High Strength
MAO Hai-xia;CHEN Tian-zhou;DAI Hong-jun
..............page:91-94
Research and Application of Dynamic Password in SSL VPN
ZHOU Jing-li;WANG Yu;YU Sheng-sheng
..............page:89-90,94
Research on Model of Small Town E-government System Based on Knowledge Engineering
ZHANG Feng-xia;DING Zhen-lan;WU Hua-rui;ZHAO Chun-jiang;YANG Bao-zhu
..............page:61-63
Research and Application of Object/Relational Mapping in .NET Framework
SUN Dong-hai;SONG Shun-lin
..............page:58-60
Technology Construction of Culture Heritage in Digital Application Platform
WU Jian-ping;WANG Yao-xi;DAI Hong-bing
..............page:41-44
Global Structure of Remote Sensing Model Library and Parse of Key Technology
TANG Shi-hao;WANG Jin-di;ZHANG Li-xin;LONG Ke-feng;ZHOU Gong-le;SHUAI Yan-min;WANG Zhuo-sen
..............page:37-40
Research on Manufacturing Process Collaborative Management System
PENG Wen-li;ZHANG Ding-hua;YAO Chang-feng;GAO Dang-guo;DANG Xin-an
..............page:34-36,40
Research on Pipe-Network Coordination Flood-tide Adjusting Model for Digital Gas Fields
WANG Hong-bo;WANG Zong-jie;ZHANG Shi-qiang;ZENG Guang-ping;TU Xu-yan
..............page:31-33,44
Research on Node Operation System of Wireless Sensor Networks
LI Jing;WANG Fu-bao;DUAN Wei-jun;WANG Jian-gang
..............page:28-30
Design of Multi-bus Card for Based on TMS320F2812 DSP
JIA Wei;YAN Jian-guo;QU Yao-hong;GAO Jian-yao
..............page:209-211
Data Placement and Operation of Relation-based Parallel Data Warehouse
LV Cheng;JIN Deng-nan
..............page:212-215
PARASOLID:based CAD System Architecture
ZHENG Chun-feng;WANG Yong-jiao;HE Li-li
..............page:216-217,250
Research and Implementation Based on Grid-enabling of Computer Peripheral
YANG Yi;ZHANG Yue-dong
..............page:218-221
Workflow Engine-based Information System's General Framework Design
FANG Rui;HAN Bin;GAN Gang
..............page:222-224
Massive VCD-Pattern Compiling with Grid Technology
ZHANG Hua;DENG Qian-ni
..............page:225-227
Application Research on Collection and Analysis of Software Project Historical Data
ZHANG Jun-guang;LV Ting-jie;PENG Jiu-sheng
..............page:72-73,79
Design on Fault Tolerance of Parallel Discrete Event Simulation System
WANG Yan;WU Yue;YANG Hong-bin
..............page:69-71
Sort of Measure Model Based on Process Improvement
WEN Jun-hao;ZHANG Yang;XU Ling;XU Chuan-yun
..............page:67-68,71
Research on Enterprise Application Integration Based on Web Services
WU Jun;DENG Chao;SHAO Xin-yu;YOU Ben-shan
..............page:64-66
Summarization of Natural Language Generation
ZHANG Jian-hua;CHEN Jia-jun
..............page:1-3,13
Trend of P2P Data Management
YU Min;LI Zhan-huai;ZHANG Long-bo
..............page:4-7
Study on Individual Preference Model in Mutual-move Intelligent Communication
MA Zhong-gui;YE Bin;ZENG Guang-ping;TU Xu-yan
..............page:55-57
Management and Control System of Collaborative Business Process Based on Agile Supply Chain
YU Ding-guo;CHEN Nan;WANG Hai-hang
..............page:52-54
Architecture of 3D Game Renderer and Its Technologies
LIU Yi-wei;ZHANG Yin;YE Xiu-zi
..............page:45-48,51
Technology of Data Stream Management and Mining
MA Rui-min;WANG Xiao-long
..............page:85-88
Design of Parallel Genetic Algorithm on Grid Computing Platform
LI Lei;CAI Hong-bin;WU Yue
..............page:83-84
New QoS Architecture for Ad hoc Networks
HU Lian-fang;LI Yun;LIU Zhan-jun;CHEN Qian-bin;LONG Keping
..............page:80-82
New Method of Scheduling Periodic and Aperiodic Tasks via RMS
XIE Shuan-qin;NIU Yun;LIN Wen
..............page:76-79
Research of Controlled Worm Framework
LUO Jun-hong;ZHANG You-wei;XIE Yu-qiang;SHU Hui
..............page:74-75,82
Study of Information Model of Spatial Decision Support System
CHEN Xue-long;WANG Yan-zhang;XU Yong-tao
..............page:25-27
Feedback Job Scheduling Model in Grid Computing Based on Resource Prediction
CHENG Hong-bing;YANG Geng
..............page:22-24,27
Study on Work Breakdown Structure Model of Software Project
XIONG Yao-hua;CHEN Chuan-bo
..............page:19-21
Review of Deformable Models in Medical Image Segmentation Techniques
LIU Xin;PAN Zhen-kuan;LI Xin-zhao;BAI Jie
..............page:14-18
Review of Outlier Detection
HUANG Hong-yu;LIN Jia-xiang;CHEN Chong-cheng;FAN Ming-hui
..............page:8-13