Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2009 Issue 12
Research on coordinated production-purchase planning based on knowledge evolution algorithm
MA Hui-min;YE Chun-ming;ZHANG Shuang;XU Sheng-liang
..............page:4621-4623
Study on material tracking model oriented to small and medium manufacturing enterprise
LIU Xiao-bing;LI Zhong-kai;HUANG Xue-wen;YU Guo-xu
..............page:4595-4598,4620
De-noising and enhancement for SAR image based onlocal geometric structure of image
LU Dan;TANG Ping;GUO Tong
..............page:4841-4843
Color image encryption based on three-dimensional tent map
YUAN Sui-wei;FAN Jiu-lun;ZHU Min-tao
..............page:4780-4783
Robust survivability design of WDM mesh networks using tree routing
DAI Rui;LI Le-min;WANG Sheng
..............page:4652-4655
Improved multi-relational decision tree algorithm
SONG Guang-ling;HAO Zhong-xiao;WU Hai-yan
..............page:4502-4505,4512
Study on covering problem of temporal functional dependencies in totally-ordered temporal scheme
WAN Jing;YANG Hong-yu;HAO Zhong-xiao
..............page:4516-4519
Digital image scrambling encryption based on circular shifting
YUAN Sui-wei;FAN Jiu-lun;ZHANG Xue-feng
..............page:4821-4823
Distributed group signature scheme for authorized subsets
WANG Ming-wen;ZHENG Wei-fan
..............page:4761-4763
Lattice-based continuous Chinese speech indexing based on mutual information confidence measure
HUANG Xiang-song;ZHAO Chun-hui;ZHANG Lei;LIU Bai-sen
..............page:4607-4609,4616
Research and implementation of trusted software constitution based on monitoring
LI Ren-jie;ZHANG Zhu-xi;JIANG Hai-yan;WANG Huai-min
..............page:4585-4588
Design and implementation of integration middleware in mobile ERP
OUYANG Su-zhen;DENG Cheng-yu;LIU Yong-shan
..............page:4577-4580
Periodic time role-based access control
XIA Qi-shou;YIN Xiao-ling;HUANG Hai-sheng;WANG Ru-chuan
..............page:4730-4734
Cross-domain trust-based access control of Web services
MA Xiao-ning;FENG Zhi-yong;XU Chao
..............page:4751-4753,4767
Asymptotical stability for model of neural networks with distributed delay
LI Fei-yue;YANG Ming-guang;YANG Ya-zhi
..............page:4530-4531
Distributed controlling model for hubs in P2P networks
RAO Hao;YANG Chun;TAO Shao-hua
..............page:4686-4689
Improved CBA prediction algorithm in compound pyramid model
YANG Bing-ru;ZHOU Zhun;HOU Wei
..............page:4617-4620
Logistic transportation system based on integration of RFID,GPS and GIS technology
DAN Yu-fang;MA Qing-lu
..............page:4628-4630,4634
Implementing Anycast communication model in P2P networks
WANG Xiao-nan;QIAN Huan-yan;TANG Zhen-min
..............page:4662-4664,4668
Research on Web user behavior based on Chinese search engine
WANG Hao;YAO Chang-li;GUO Lin;AI Guo-qing
..............page:4665-4668
Novel intelligent data processing model for fishery forecasting
YUAN Hong-chun;LI Ying;XIONG Fan-lun
..............page:4520-4522
Research of text filtering based on semantic orientation
CHENG Xian-yi;YANG Tian-ming;ZHU Qian;CAI Yue-hong
..............page:4460-4462
Survey of moving object tracking algorithm
ZHANG Juan;MAO Xiao-bo;CHEN Tie-jun
..............page:4407-4410
Application of one local texture characteristic to region growing
XU Cheng;FENG Bin;LIU Yan
..............page:4852-4854
Evolution-based vulnerability detection framework
ZHANG Lin;GAO Ling;TANG Sheng-chao;YANG Yang
..............page:4724-4727
Self-organizing method of SOA service region
LI Shuang-qing;HUANG Chuan-guan;LUO Xi-yi;ZHOU Ming-qiang
..............page:4694-4696
Audio watermarking algorithm robust to TSM based oncounter propagation neural network
JIN Wen-biao;DAI Hong-liang
..............page:4758-4760,4796
Non-repeatedly mark model based probabilistic packet marking for IP traceback
WU Zhe;XIE Dong-qing
..............page:4744-4746,4750
Correction method for moving target location with mobile nodes
ZHANG Xin-lin;CHEN Yuan;ZENG De-sheng
..............page:4680-4682,4685
Wireless multi-media sensor networks based on CC2420 and ZigBee communication mechanism
CHEN Ting-de;SUN Li-juan;WANG Ru-chuan;HUANG Hai-ping
..............page:4676-4679
Resources indexing model expanded from Chord to support string-fuzzy-matching
ZHAO Xiu-mei;LIU Fang-ai
..............page:4648-4651,4655
New method for iris image noise detecting
LEI Hao-peng;LI Feng
..............page:4824-4826,4838
Design and realization of flexible role of control system
LIU Ru-qiang;HUANG Hai-ming;LIU Jin-gang
..............page:4631-4634
Mutual exclusion model under shared memory MPSOC
XU Cheng;LONG Bang;LIU Yan;TAO Hai-yang;WANG Li-dong
..............page:4484-4487
Dynamic grids clustering algorithm based on overlapping partition
QIU Bao-zhi;SONG Xiao-jun
..............page:4457-4459
Deep Web complex matching method based on association mining and semantic clustering
CAO Qing-huang;JU Shi-guang;YANG Xiao-qin
..............page:4613-4616
Research and simulation of synchronization on FH-OFDM system
CUI Miao;YIN Jun-xun;HUANG Hua-tang;YANG Yu-cun;YAO Zhen
..............page:4656-4658
Intelligence-assisted system for technical examination of vehicles in accident
ZENG Chuan-hua;YANG Wei;LI Qing-song
..............page:4635-4637
Feedback process neural networks model with application in classification of dynamic signal
YU Yuan-yuan;XU Shao-hua;ZHANG Qiang
..............page:4481-4483
Efficient and secure certificateless key agreement protocol
ZHU Zhi-xin;DONG Xiao-lei
..............page:4787-4789
Graphical model for point pattern matching based on sampling of separator
WANG Wen;WANG Qing
..............page:4797-4799
Fingerprint texture matching based on Log Gabor filtering
DENG Hong-gui;WANG Long-feng
..............page:4847-4849,4858
Hierarchical and group-based resource selection algorithm
LI Fang-yun;LI Chun-lin;LI Hui
..............page:4439-4441
Research on M&S credibility evaluation based on FSE
WU Jing;WU Xiao-yan;GAO Zhong-chang;TENG Jiang-chuan
..............page:4509-4512
Global QoS optimizing and multi-objective Web service selection algorithm
FANG Qi-qing;LIU Qing-hua;PENG Xiao-ming;HU Ya-hui
..............page:4442-4445,4448
Image denoising based on non-local regularization
XU Da-hong;WANG Run-sheng
..............page:4830-4832
Research on update period estimate of satellite network topology based on characteristic of link
ZHAO Dong-jie;YANG Hai-tao;ZHAO Hong-li
..............page:4669-4671
Parallel remote homology detection approach based on semi-supervised support vector machine
WANG Dong;SUN Ji-zhou;LI Fu-chao
..............page:4624-4627
R&D on non-stationary signal analysis system based on parameter-sharing models
CHENG Fa-bin;WANG Ying
..............page:4610-4612
Study and analysis of entropy classification algorithm for K-anonymity
LIU Jian;LIU Hui
..............page:4728-4729,4743
Recognition algorithm for halftone image classification
KONG Yue-ping;DU Xu-miao
..............page:4850-4851
Research and application of efficient power attacks model
LI Lang;LI Ren-fa;XU Yu-ming;ZHANG Jing-jing
..............page:4722-4723,4727
Research of GABP neural network based on principal component analysis
HUANG Qin;LIU Yan-peng;LIU Yi-liang;CHANG Wei
..............page:4754-4757
Algorithm of attack graph generation based on simple status space
LI Si;WANG Zu-lin;ZHAO Yi-huan
..............page:4747-4750
Research on detecting and classifying Deep Web interfaces
ZHANG Liang;LU Yu-liang;LIU Jin-hong
..............page:4697-4700,4703
Data fusion strategies for small sample based on multi-class support vector machine
ZHONG Luo;LI Zhe;DING Zi-chun;SONG Hua-zhu;GUO Cui-cui
..............page:4488-4490,4508
Survey of particle swarm clustering algorithms
LI Jun-jin;XIANG Yang;LU Ying-ming;WU Shuo-tong
..............page:4423-4427
Research and realization on large scale IPv6 backbone network topology discovery
PAN Yuan-yong;LI Run-zhi;WANG Zong-min
..............page:4659-4661
Association rules mining based on discriminative concept lattice
WANG Pei-pei;SHEN Xia-jiong;WANG Qian;ZHOU Bo
..............page:4550-4552,4576
Study on domain knowledge reusing methods based on ontology
DONG Jun;WANG Suo-ping;XIONG Fan-lun
..............page:4546-4549,4561
Hierarchy AS-level network topology layout algorithm based on AS coreness
YANG Guo-zheng;LU Yu-liang;XIA Yang;HU Bo
..............page:4535-4538
Camera self-calibration method based on hybrid optimization algorithm
LIN Li-cai;LI Qi-shen;JIANG Ze-tao
..............page:4844-4846
Approach to image segmentation with spatial moments based on PCNN
JIN Wen-biao;SHEN Jing-jing;ZHANG Zhi-feng
..............page:4800-4802,4805
Study on replica consistency in unstructured P2P networks
LIAN Shu-juan;SUN Bo;WEI Yun-gang;XIAO Yong-kang;ZHU Xiao-ming
..............page:4415-4417
Energy balance routing algorithm based on ant colony optimization in wireless sensor networks
WANG Qing-zheng;MIN Lin;GUO Zheng-wei
..............page:4716-4718
Research on strategy for optimizing coverage of WSNs based on multi-particle PSO
LIN Zhu-liang;FENG Yuan-jing
..............page:4701-4703
New rational secret sharing
DONG Wei;XU Qiu-liang
..............page:4777-4779
Fast inter mode decision and motion estimation inH.264 frame-skipping transcoding
LV Zhuo-yi;JIA Ke-bin;SIU Wan-chi
..............page:4814-4817
Method of integrating image matting and compositing
LI Wen;HAN Guo-qiang;GU Guo-sheng;ZHANG Xiao-yuan;ZHANG Sheng-kai
..............page:4808-4810
Dynamic gain scheduling method for networked control systems with stochastic delay
YE Xiu-fen;LIU Shi-chao;DU Zhi-bo
..............page:4707-4709
Detection method of up and down vehicles with acoustic signal based on wideband array signal processing
LUO Xiang-long;NIU Guo-hong;WU Qi-sheng
..............page:4499-4501
Steganalysis for JPEG images based on weighting fusion and Markov matrix
HUI Mao-mao;ZHOU Zhi-ping
..............page:4790-4792
Research of security control testing and evaluation model based on fuzzy theory
QIN Zhi;ZHANG Shi-bin
..............page:4771-4773,4783
Research of policy defending against P2P worm based on benign worm
LUO Wei-min;LIU Jing-bo;FAN Cheng-yu
..............page:4764-4767
Dynamic contract net protocol with fault tolerance
WEI Zhao-wen;JIANG Hui-chao
..............page:4506-4508
Web text classification algorithm fused LSI and SVC
SHI Chang-qiong;HUANG Hui;WANG Da-wei;JIANG La-lin;FU Zong-wen
..............page:4523-4525
Traffic information based routing protocol in vehicular Ad hoc networks
SONG Chao;LIU Ming;GONG Hai-gang
..............page:4672-4675
Survey on biometrics technology
TIAN Qi-chuan;ZHANG Run-sheng
..............page:4401-4406,4410
Research of indoors channel fading model in wireless sensor networks
ZHANG Xian-yi;WANG Ying-long;GUO Qiang;ZHAO Hong-lei
..............page:4713-4715
Worm detection model based on propagation behavior for local networks
QI Rui;FANG Ding-yi;LUO Yang-xia
..............page:4774-4776,4779
Security analysis of station-to-station security protocol
CHEN Jian-xiong;SUN Le-chang;SHU Ni-na
..............page:4793-4796
Shared tree optical multicast algorithm based on distributing network coding
XIAO Hao-ming;ZHANG Min;YANG Xiao-long
..............page:4719-4721
Cross-layer design-based power control algorithms for Ad hoc networks
MEI Su-ping;XUE Xiao-ping;WEN De-long;PENG Tao
..............page:4418-4422
Spectrum sharing based on game theory in cognitive radio networks
HU Lin;TANG Lun;CHEN Qian-bin;LI Shi-qiu
..............page:4704-4706
Research and implementation on pluggable framework for access control
SHEN Li-min;XING Chang-yuan;SONG Cheng-zhong
..............page:4735-4739
Research on dynamic transition model of digital rights
HAN Li-long;LIU Qing-tang;YANG Zong-kai
..............page:4740-4743
WSNs random coverage control algorithm based on redundancy distinguishing by sampling
HUANG Jian;ZHU Min;NIU Hao;BAI Jun-ge;DING Chun-li
..............page:4710-4712,4715
Research of ADIDS based on adaptive immune system
ZHANG Zheng-qiu;YAO Zhi-qiang;YAN Xi-shan;ZHANG Jin-ying
..............page:4784-4786
Method for license plate detection based on improved AdaBoost algorithm
FANG Yi-qiu;LU Dao-bing;GE Jun-wei
..............page:4827-4829
DOA estimation of LFM signals based on compressed sensing
YANG Zhang;CHENG Wang-zong
..............page:4642-4644
Adaptive evolutionary strategy based on feedback and sharing mechanism
LI Guang-wen;JIA Qiu-ling;LIU Xiao-xiong;ZHANG Wei-guo
..............page:4491-4493,4501
Multi-agent revealed information auction model based on classification of information similarity
CHAI Yu-mei;ZHAO Yue;WANG Li-ming
..............page:4532-4534,4538
Research on MPI+OpenMP hybrid programming paradigm based on SMP cluster
PAN Wei;CHEN Liao-yuan;ZHANG Jin-hua;LI Yong-ge;PAN Li;XIA Fan
..............page:4592-4594
Placement system research for FPGA with fast carry-chain
CUI Xiu-hai;YANG Hai-gang;LIU Yang;XIONG Jin;LIU feng
..............page:4638-4641
New fuzzy clustering algorithm in text mining
LI Qing-feng;ZHOU Wei-lin;HE Jing;DING Xiao-ling
..............page:4453-4456
Implement Kirchhoff prestack time migration algorithm on CUDA architecture
LI Ken-li;PENG Jun-jie;ZHOU Shi-yong
..............page:4474-4477
Fast connect component labeling algorithm for solid and non-solid object
QIU Liu-dong;LI Zu-shu
..............page:4839-4840,4846
Improving on side information estimation for Wyner-Ziv video coding
YIN Ming;ZHANG Yun;CHENG Liang-lun;CAI Shu-ting
..............page:4818-4820,4832
Research on hierarchical text categorization using approach of multiple feature selection and multiple classifier fusion
JIA Mei-ying;YANG Bing-ru;ZHENG De-quan;CHEN Qing-xuan
..............page:4467-4470
Research on multi-granularity experience trust model
WANG Ying-long;TANG Jian-jun;HU Ya-ping;PENG Ying-qiong;YU Ying
..............page:4435-4438
Negotiation protocol for multi-issue based on proposal information shielded
ZHANG Zhen-wen;SONG Hai-gang;HONG Liu;CHEN Xue-guang
..............page:4602-4606,4627
Recognizing and predicting of strange interactive entity\'s behavior in pervasive environment
LIU Guang-bin;MAN Jun-feng;LI Chang-yun;WEN Xiang-bing
..............page:4562-4564,4571
Stagewise ridge pursuit of isolated singularities signals
LI Xiao-xin;QI De-yu
..............page:4449-4452,4456
Content extraction of Web pages based on characteristic symbols
WANG Shu;ZHU Min;ZHANG Ming;NIU Hao;ZHAO Yu
..............page:4539-4541
Cluster scheduling algorithm for distributed Kahn process networks
QIAN Zheng-ping;QI De-yu;ZENG Ming
..............page:4463-4466,4470
Feature extraction algorithm of wood cell image based on fractal dimension
REN Hong-e;GAO Ying;DONG Ben-zhi
..............page:4806-4807
Research on organizational structure mining based on workflow logs
GAO Ang;YANG Yang;WANG Yue-wei;HE Guang-jun
..............page:4558-4561
Extracting regions of interest in medical images based on visual attention mechanism
ZHANG Qiao-rong;LI Shu-hong;XIAO Hui-min
..............page:4803-4805
Data prefetch optimization in dynamic binary translation
LUO Qiong-cheng;WU Qiang
..............page:4572-4576
Blind estimation algorithm of multi-carrier CDMA sub-carrier frequencies and its performance analysis
YU Zhi-ming;GUO Li-li;ZHAO Bing
..............page:4478-4480,4483
Numeric and curve parameters for freeform surface feature models
SUN Li-juan;XIE Li-qiang;SUN Da-song
..............page:4855-4858
Enhanced TCP congestion control algorithm based on TCP Vegas
WANG Yun-tao;FANG Jian-an;ZHANG Xiao-hui;YAN Wei-feng
..............page:4645-4647
Immune genetic algorithm and applications in optimization
WANG Qiong;LV Wei;REN Wei-jian
..............page:4428-4431
Research on resistance to disassembly of software
SHANG Tao;GU Da-wu
..............page:4553-4557
Survey of object segmentation algorithms in vision-based monitoring system
YE Bing-wei;WU Chun-ming;JIANG Ming
..............page:4411-4414,4422
Research and design on object-oriented e-government system model
MAO Xiao-ling;ZHANG Peng-zhu
..............page:4599-4601
Method for P2P traffic classification based on decision-tree model
CHEN Yun-jing;ZHANG Yun;CHEN Jing-tao
..............page:4690-4693
Encrpyted and adaptive digital watermarking algorithm in DCT domain
DING Liu;CHENG Xian-yi;XU Bo
..............page:4768-4770
Hidden line removal algorithm in solid geometry teaching software
CHEN Rui;TANG Ning-jiu;LIN Tao;WANG Zeng-wu
..............page:4833-4835
New filtering algorithm based on correlation coefficient model
YU Wang-sheng;HOU Zhi-qiang
..............page:4811-4813
Topic event fusion based on event framework
XU Rong-hua;WU Gang;LI Pei-feng;ZHU Qiao-ming
..............page:4542-4545