Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2010 Issue 6
New complex network clustering algorithm
li jun jin ; xiang yang ; niu peng ; liu li ming ; lu ying ming
..............page:2097-2099
Impulse noise adaptive removal based on fuzzy logic
wen zuo ; zhou ji liu ; he kun
..............page:2377-2379,2383
Topology control algorithm for Ad hoc networks using switched beam antennas
lv guan qun ; wang dong ; li xiao hong
..............page:2257-2259,2263
Method of nonlinear character extraction in communication traffic based on KPCA
zhong bing xiang ; li tai fu ; wang de biao ; su ying ying
..............page:2189-2191
New description method of granular and its distance computing
xu jiu cheng ; cheng wan li ; sun lin
..............page:2034-2036,2046
High energy-efficient cluster-based routing protocol for WSN
dai shi zuo ; li le min
..............page:2201-2203
Timed automated trust negotiation
yang qiu wei ; zhou jie ; tang zhuo ; liu ling
..............page:2304-2308
Applying genetic programming to analyze moving average and long & mid-term trends of stock prices
zhao er bo ; ma huan ; han zhan gang
..............page:2166-2169
Switching vector median filter with two thresholds
zhong ling ; zhang yun
..............page:2367-2369
Bitemporal relational algebra with temporal variables based on BCDM
wang lu bang ; qian sheng san
..............page:2071-2074
Extending probabilistic packet marking algorithm to detect DDoS in WSN
liu gang ; liu jun li ; yan jun song ; jiao xin tao
..............page:2324-2326
Mobile agent routing algorithm for 3D space based on APIT
xu yun jian ; guo ai yin
..............page:2246-2248,2253
New protocol transfer module for remote attestation and generic secure communication protocol
shi guang yuan ; gong bei ; feng zuo meng
..............page:2309-2312,2320
Research on resource reservation strategy in multi-domain ASON
wang xiao qiang ; xiao shang de
..............page:2254-2256
High-performance license plate recognition method based on shape feature of characters
hu jin rong ; zhou ji liu ; wang ling ; zheng xiu qing
..............page:2398-2400
Time series similarity matching algorithm based on extreme points
wu xue yan ; huang dao ping ; mo zan
..............page:2068-2070,2074
Simulation algorithm for flying trail fire based on multi-level particle system and new particle shape
chen zuo ; nie jun zuo ; wang yan fen
..............page:2387-2390
Immune-based model for malware detection
zhang fu yong ; qi de zuo ; hu jing lin
..............page:2313-2315
Aspect-oriented model transformation language AOMTL
fang yi qiu ; he lei ; ge jun wei
..............page:2150-2152
Hybrid streaming media distribution model based on P2P and CDN
zuo yun gang ; chen guang xi
..............page:2208-2210,2214
Adaptive delay-based congestion control mechanism
zuo ye zhou ; xing wei ; lu dong ming
..............page:2215-2218
Ant colony algorithm based on new pheromone updated strategy
zuo yu sen ; xiong fang min ; zeng bi qing
..............page:2080-2083
Optimal coverage configuration based on artificial fish swarm algorithm in WSNs
zhou li min ; yang ke hua ; zhou pan
..............page:2276-2279
Effective data gathering scheme in heterogeneous energy WSN
liu zhen ; mao zuo chi ; dong chen
..............page:2267-2270
Eigenspace-based beamformers based on subspace approximation
ni shu yan ; cheng nai ping ; ni zheng zhong
..............page:2264-2266
Effective estimation method to residual carrier frequency offset for LTE downlink
wei zi heng ; li bi ; lin tu sheng
..............page:2290-2293
IPv6 attack source traceback scheme based on extension header probabilistic marking
yang jun ; wang zhen xing ; guo hao ran
..............page:2335-2337,2340
Cyclic codes over ring Fpk+uFpk
liang hua ; tang yuan sheng
..............page:2026-2027
Approach to automatic analysis for relevance among software bug reports
li zuo ; wang xiao bo ; liu chao
..............page:2134-2139
k-error linear complexity of 2n-periodic sequences with linear complexity 2n-2m
yang ming hui ; zhu shi xin
..............page:2299-2300,2326
Dynamic program analysis based on partitioning and summarization
feng hui ning
..............page:2130-2133,2146
Highly effective intrusion detection model adopting condensed nearest neighbor rules
jia wei feng ; du bao jian ; tong bin ; zhang feng li
..............page:2341-2343
Quantum-behaved particle swarm optimization based on Gaussian disturbance
wang xiao gen ; long hai xia ; sun jun
..............page:2093-2096
Based-priority QoS model for Ad hoc network
liang zi yuan ; yu jing dong
..............page:2280-2282,2286
Survey on scheduling algorithms for robotic cells
zhou zhen ; che a da
..............page:2001-2005
Improved quantum genetic algorithm with double chains and its application
xu shao hua ; xu chen ; hao xing ; wang ying ; li pan chi
..............page:2090-2092
Load balancing dynamic source routing protocol based on multi-path routing
ding xiong ; xie zuo
..............page:2249-2253
Fast intra mode decision algorithms of downscaling video transcoding for H.264
chen bu zhen ; kang zhi wei ; zhang min
..............page:2356-2358
Mining Chinese comparative sentences and relations based on CRF algorithm
huang gao hui ; yao tian ; liu quan sheng
..............page:2061-2064
Particle swarm optimization based on division and union strategy
chen jian chao ; hu gui wu
..............page:2024-2025,2027
Novel virus active defense technique and detection algorithm
chen zuo zuo ; wang zhi ying ; ren jiang chun ; zheng zhong ; huang yu
..............page:2338-2340
Evaluation model for quality of k-anonymity data oriented to microaggregation
chen jian ming ; han jian min
..............page:2344-2347
Weighted rectangle method for expression feature extraction
lin qing ; zhao xiang ; hu rui rui ; zhan yong zhao ; wang shi tong
..............page:2364-2366
Energy-efficient routing algorithm for wireless sensor networks
peng li min ; liu hao
..............page:2198-2200
Serial multiple relay selection method based on instantaneous CSI
han wei jia ; chen qian bin ; tang lun
..............page:2211-2214
Comparative analysis on TCP and UDP network traffic
zhang yi bin ; zhang zhi bin ; zhao yong ; guo li
..............page:2192-2197
Optimal contention-based access strategy for wireless communication network based on IEEE 802.16d
yao zhi ping ; zhang lin ; liu yu heng
..............page:2229-2231
New trust model based on preference recommendation in P2P network
wei feng ; li jie ; hu jiang ming
..............page:2271-2272,2279
Kernel-based learning machines research overview
wang tao ; li ai hua ; cai yan ping ; wang sheng cai
..............page:2011-2015
Image segmentation active contour model based on nonlocal total variation
zhang wen juan ; feng xiang chu
..............page:2373-2376
One virus detection model based on probability training
chen dan wei ; liu jie ; sun guo zuo ; han jun
..............page:2316-2320
Neighbors table updating algorithm for Ad hoc networks
wen wei ; wang ling ; zhang heng yang
..............page:2243-2245
Research on complex product 3D-CAPP process planning simulation plat and key technology
jiang cun xue ; cai li gang ; hu yu jin
..............page:2163-2165
Hybrid sensor networks coverage-enhancing approach based on particle swarm optimization
xiang xi xi ; huang hong guang ; li yu dong
..............page:2273-2275
Implementation of SigComp in heterogeneous networks
wu yan ling ; liu yun cheng ; wang li li ; li ming
..............page:2287-2289
Neural branch prediction with alias reducing between function calls
sha zi yan ; meng jian zuo ; yan xiao lang ; ge hai tong
..............page:2047-2050
Signal structure and ambiguity function features of mobile iMAX based passive radar
wang qing ; hou chun ping ;lu yi-long
..............page:2226-2228,2231
Fuzzy kernel covering classifier and its application
duan zhen ; cheng jia xing ; zhang ling
..............page:2043-2046
Analysis of stability for networked control systems with large delays and packet losses
jiang lian lian ; yang guang hong ; dan yu fang ; wang hai lang
..............page:2283-2286
Cryptanalysis of chaotic block cipher
zhang tao
..............page:2294-2296
Research on content-based recommendation based on Vague sets
cui chun sheng ; wu qi zong
..............page:2109-2111
Dynamic programming algorithm for generating optimal layer patterns of rectangular blanks
wang xiao qing ; li shang fang ; cui yao dong
..............page:2040-2042,2067
TCP-based real-time video transmission delay prediction model
xiong yong hua ; wu min ; jia wei jia
..............page:2239-2242
State-extended based verification mechanism for security protocols
huang qing ; wang ya di ; han ji hong ; fan zuo dan ; huang he
..............page:2327-2330
Improved time-frequency representation method using exponential kernels
ning jing ; zhu chang zuo ; zhu zhao kun
..............page:2078-2079,2083
Palmprint segmentation algorithm based on geometric features
li zi liang ; tian qi chuan ; zhu yan chun ; li lin sheng
..............page:2370-2372,2376
System of computer-aided detection and positioning for lung nodules
li bin ; ou shan xing ; tian lian fang ; qi yan ; liu si wei ; zhang zuo
..............page:2184-2188
Mixed-coding-based differential evolution algorithm for 0-1 knapsack problem
deng chang shou ; zhao bing yan ; liang chang yong
..............page:2031-2033
Improved Mean-Shift tacking algorithm based on spatial histogram
hu bin ; zhao huan ; zheng min
..............page:2394-2397
Recursive robust adaptive beamforming
wang zhi qiao ; huang hua
..............page:2260-2263
Binary image authentication algorithm based on digital signature
du min ; gao bao jian ; dong jian e
..............page:2348-2351
Moving target detection method based on spatio-temporal saliency perception
li zheng zhou ; li wen yan ; tan ju ; liu guo jin
..............page:2391-2393
Parallel computing research on preprocessing of numerical simulation for laser propulsion
du yang ; zhao jun ; zhao wen tao
..............page:2054-2056
Hybrid algorithm with artificial fish swarm algorithm and PSO
yao xiang guang ; zhou yong quan ; li yong mei
..............page:2084-2086,2102
Study of distributed topology based representation model of P2P vector geography data
wu jia gao ; huang lin ; zou zhi qiang ; feng jia li ; hu bin
..............page:2170-2172,2180
Model of accelerating MATLAB computation based on CUDA
liu shao bo ; liu ming gui ; zhang guo hua
..............page:2140-2143
PLR based on time series tendency turning point
shang fu hua ; sun da chen
..............page:2075-2077,2092
Interaction-based speculative thread-level parallelization
li ying ; sun zuo xue ; yuan xin yu ; xu yin cheng
..............page:2123-2126,2139
Research on non-redundant identifier scheme and its key technologies
yang hong jie ; huang kai zhi ; wang yu hong ; zhao hua ; ji xin sheng
..............page:2219-2221,2225
Security research and improvement of SPINS protocol
zhu lei ; wu zuo ; wang qing xian
..............page:2331-2334
High-performance license plate recognition method based on shape feature of characters
hu jin rong ; zhou ji liu ; wang ling ; zheng xiu qing
..............page:2398-2400
New protocol transfer module for remote attestation and generic secure communication protocol
shi guang yuan ; gong bei ; feng zuo meng
..............page:2309-2312,2320
Mobile agent routing algorithm for 3D space based on APIT
xu yun jian ; guo ai yin
..............page:2246-2248,2253
Extending probabilistic packet marking algorithm to detect DDoS in WSN
liu gang ; liu jun li ; yan jun song ; jiao xin tao
..............page:2324-2326
Bitemporal relational algebra with temporal variables based on BCDM
wang lu bang ; qian sheng san
..............page:2071-2074
Switching vector median filter with two thresholds
zhong ling ; zhang yun
..............page:2367-2369
Applying genetic programming to analyze moving average and long & mid-term trends of stock prices
zhao er bo ; ma huan ; han zhan gang
..............page:2166-2169
Fast intra mode decision algorithms of downscaling video transcoding for H.264
chen bu zhen ; kang zhi wei ; zhang min
..............page:2356-2358
Timed automated trust negotiation
yang qiu wei ; zhou jie ; tang zhuo ; liu ling
..............page:2304-2308
Improved quantum genetic algorithm with double chains and its application
xu shao hua ; xu chen ; hao xing ; wang ying ; li pan chi
..............page:2090-2092
High energy-efficient cluster-based routing protocol for WSN
dai shi zuo ; li le min
..............page:2201-2203
New description method of granular and its distance computing
xu jiu cheng ; cheng wan li ; sun lin
..............page:2034-2036,2046
Method of nonlinear character extraction in communication traffic based on KPCA
zhong bing xiang ; li tai fu ; wang de biao ; su ying ying
..............page:2189-2191
Topology control algorithm for Ad hoc networks using switched beam antennas
lv guan qun ; wang dong ; li xiao hong
..............page:2257-2259,2263
Impulse noise adaptive removal based on fuzzy logic
wen zuo ; zhou ji liu ; he kun
..............page:2377-2379,2383
k-error linear complexity of 2n-periodic sequences with linear complexity 2n-2m
yang ming hui ; zhu shi xin
..............page:2299-2300,2326
Approach to automatic analysis for relevance among software bug reports
li zuo ; wang xiao bo ; liu chao
..............page:2134-2139
Cyclic codes over ring Fpk+uFpk
liang hua ; tang yuan sheng
..............page:2026-2027
IPv6 attack source traceback scheme based on extension header probabilistic marking
yang jun ; wang zhen xing ; guo hao ran
..............page:2335-2337,2340
Effective estimation method to residual carrier frequency offset for LTE downlink
wei zi heng ; li bi ; lin tu sheng
..............page:2290-2293
Eigenspace-based beamformers based on subspace approximation
ni shu yan ; cheng nai ping ; ni zheng zhong
..............page:2264-2266
Kernel-based learning machines research overview
wang tao ; li ai hua ; cai yan ping ; wang sheng cai
..............page:2011-2015
New complex network clustering algorithm
li jun jin ; xiang yang ; niu peng ; liu li ming ; lu ying ming
..............page:2097-2099
Effective data gathering scheme in heterogeneous energy WSN
liu zhen ; mao zuo chi ; dong chen
..............page:2267-2270
Optimal coverage configuration based on artificial fish swarm algorithm in WSNs
zhou li min ; yang ke hua ; zhou pan
..............page:2276-2279
Ant colony algorithm based on new pheromone updated strategy
zuo yu sen ; xiong fang min ; zeng bi qing
..............page:2080-2083
Adaptive delay-based congestion control mechanism
zuo ye zhou ; xing wei ; lu dong ming
..............page:2215-2218
Aspect-oriented model transformation language AOMTL
fang yi qiu ; he lei ; ge jun wei
..............page:2150-2152
Immune-based model for malware detection
zhang fu yong ; qi de zuo ; hu jing lin
..............page:2313-2315
Simulation algorithm for flying trail fire based on multi-level particle system and new particle shape
chen zuo ; nie jun zuo ; wang yan fen
..............page:2387-2390
System design and simulation with composing models of computation
feng hui ning
..............page:2116-2118,2122
Using.NET framework\'s namespace in Web application automatic testing
lei lei ; lu xin quan ; li zuo ; hong yu
..............page:2160-2162
Face recognition based on unsupervised optimal discriminant plane
cao su qun ; wang shi tong ; wang jun
..............page:2352-2355
Wireless image and video surveillance based on compressive sensing
zhou yan ; wang dong ; zhong yong ; huo ying zuo
..............page:2173-2175
Adaptive threshold algorithm for extracting moving objects
sun ming yu ; ding ying ; li wen hui ; jiang zuo ; xu chang qing
..............page:2380-2383
Model of personalized online shopping search engine
li shi wei ; qian xiao dong
..............page:2176-2180
Hybrid FCM algorithm to grid resource clustering
xue sheng jun ; nie jing
..............page:2153-2155
Robot path planning based on positive feedback adaptive genetic algorithm
hu xi ling ; guo hai tao
..............page:2037-2039,2050
Complexity of periodic sequences S∞ and S*∞over Fp
wang jun ; zhu shi xin
..............page:2297-2298,2308
Hushen 300 index forecasting approach based on ISNN and HGA
zhang zuo ; lu jun
..............page:2156-2159
Dynamic identify algorithm for H.223 protocol identifier based on neural network
kong fan zeng ; ji zhong mei ; wang jian hui ; song wen zheng
..............page:2112-2115
Integrating reputation and subjective logic to analyze trust network in SNS
lei huan ; peng jian
..............page:2321-2323
Detecting traffic anomalies at application layer in metro area network
pei wei ; yuan xiao fang ; wang dong ; dong zhi chao ; xie gao gang
..............page:2222-2225
Cartoon hair generation by combining geometric kinematics
ren yang chun ; zhao hong de ; geng wei dong
..............page:2384-2386,2390
Space complexity preserving algorithms composition
shi fu song ; qin zhi guang
..............page:2020-2023
Progress of research on anonymization privacy-preserving techniques
wang ping shui ; wang jian dong
..............page:2016-2019
Research on technologies in solar blind ultraviolet Ad hoc network
zhao tai fei ; ke xi zheng
..............page:2204-2207
Clustering ensemble algorithm based on prior knowledge and spectral analysis
hou juan ; fei yao ping ; hu xiao xia ; li jue run
..............page:2103-2105
Improved ant colony algorithm for solving TSP
hou wen jing ; ma yong jie ; zhang yan ; shi yu jun
..............page:2087-2089
Design of real-time ECG monitoring system based on smart-phone
guo xing ming ; chen li shan ; chen ; peng cheng lin
..............page:2181-2183,2191
Analog circuit fault identification approach based on wavelet analysis and hierarchical decision
song guo ming ; wang hou jun ; jiang shu yan ; liu hong
..............page:2057-2060,2064
Research of acquisition algorithm in Chirp code-orthogonalized transmitted-reference UWB based active spectrum compression
wan lei ; kang rong zong ; zhang jian ; liu luo zuo
..............page:2236-2238,2256
Fast macroblock mode decision for arbitrary downsizing video transcoder based on H.264
wang yu ; zhang cai ming
..............page:2359-2363,2366
Active measurement on BitTorrent network and characteristics analysis
yang ming liang ; chen xing shu ; wang wen xian ; wu zuo ; dong zheng feng
..............page:2232-2235
Approach to Web services selection under uncertain user preferences
wen jun hao ; qin jia ; liu ling
..............page:2147-2149
Kind of automated analysis method of security protocol
wu xiao ying ; zhou qing lei
..............page:2301-2303
Web remote real-time monitoring client based on scalable vector graphics
yang bin ; zhang li xin ; zhang li jun ; shi peng
..............page:2144-2146
Content analysis method used for ontology ranking
xu de zhi ; liu zuo jing
..............page:2127-2129
Effective strategy of topic distillation and retrieval
wang yu xin ; liu hai feng ; guo he ; chen zuo
..............page:2106-2108
Solving minimum spanning tree with reduction technology
xiong xiao hua ; ning ai bing ; ma liang
..............page:2051-2053
Time series similarity matching algorithm based on extreme points
wu xue yan ; huang dao ping ; mo zan
..............page:2068-2070,2074
Dynamic program analysis based on partitioning and summarization
feng hui ning
..............page:2130-2133,2146
Highly effective intrusion detection model adopting condensed nearest neighbor rules
jia wei feng ; du bao jian ; tong bin ; zhang feng li
..............page:2341-2343
Quantum-behaved particle swarm optimization based on Gaussian disturbance
wang xiao gen ; long hai xia ; sun jun
..............page:2093-2096
Based-priority QoS model for Ad hoc network
liang zi yuan ; yu jing dong
..............page:2280-2282,2286
Survey on scheduling algorithms for robotic cells
zhou zhen ; che a da
..............page:2001-2005
Load balancing dynamic source routing protocol based on multi-path routing
ding xiong ; xie zuo
..............page:2249-2253
Mining Chinese comparative sentences and relations based on CRF algorithm
huang gao hui ; yao tian ; liu quan sheng
..............page:2061-2064
Neighbors table updating algorithm for Ad hoc networks
wen wei ; wang ling ; zhang heng yang
..............page:2243-2245
Research on complex product 3D-CAPP process planning simulation plat and key technology
jiang cun xue ; cai li gang ; hu yu jin
..............page:2163-2165
Hybrid sensor networks coverage-enhancing approach based on particle swarm optimization
xiang xi xi ; huang hong guang ; li yu dong
..............page:2273-2275
Implementation of SigComp in heterogeneous networks
wu yan ling ; liu yun cheng ; wang li li ; li ming
..............page:2287-2289
Research on resource reservation strategy in multi-domain ASON
wang xiao qiang ; xiao shang de
..............page:2254-2256
Neural branch prediction with alias reducing between function calls
sha zi yan ; meng jian zuo ; yan xiao lang ; ge hai tong
..............page:2047-2050
Signal structure and ambiguity function features of mobile iMAX based passive radar
wang qing ; hou chun ping ;lu yi-long
..............page:2226-2228,2231
Particle swarm optimization based on division and union strategy
chen jian chao ; hu gui wu
..............page:2024-2025,2027
Novel virus active defense technique and detection algorithm
chen zuo zuo ; wang zhi ying ; ren jiang chun ; zheng zhong ; huang yu
..............page:2338-2340
Evaluation model for quality of k-anonymity data oriented to microaggregation
chen jian ming ; han jian min
..............page:2344-2347
Hybrid streaming media distribution model based on P2P and CDN
zuo yun gang ; chen guang xi
..............page:2208-2210,2214
Weighted rectangle method for expression feature extraction
lin qing ; zhao xiang ; hu rui rui ; zhan yong zhao ; wang shi tong
..............page:2364-2366
Energy-efficient routing algorithm for wireless sensor networks
peng li min ; liu hao
..............page:2198-2200
Serial multiple relay selection method based on instantaneous CSI
han wei jia ; chen qian bin ; tang lun
..............page:2211-2214
Comparative analysis on TCP and UDP network traffic
zhang yi bin ; zhang zhi bin ; zhao yong ; guo li
..............page:2192-2197
Optimal contention-based access strategy for wireless communication network based on IEEE 802.16d
yao zhi ping ; zhang lin ; liu yu heng
..............page:2229-2231
New trust model based on preference recommendation in P2P network
wei feng ; li jie ; hu jiang ming
..............page:2271-2272,2279
Image segmentation active contour model based on nonlocal total variation
zhang wen juan ; feng xiang chu
..............page:2373-2376
One virus detection model based on probability training
chen dan wei ; liu jie ; sun guo zuo ; han jun
..............page:2316-2320
Hushen 300 index forecasting approach based on ISNN and HGA
zhang zuo ; lu jun
..............page:2156-2159
Parallel computing research on preprocessing of numerical simulation for laser propulsion
du yang ; zhao jun ; zhao wen tao
..............page:2054-2056
Cartoon hair generation by combining geometric kinematics
ren yang chun ; zhao hong de ; geng wei dong
..............page:2384-2386,2390
Hybrid algorithm with artificial fish swarm algorithm and PSO
yao xiang guang ; zhou yong quan ; li yong mei
..............page:2084-2086,2102
Model of accelerating MATLAB computation based on CUDA
liu shao bo ; liu ming gui ; zhang guo hua
..............page:2140-2143
Research on non-redundant identifier scheme and its key technologies
yang hong jie ; huang kai zhi ; wang yu hong ; zhao hua ; ji xin sheng
..............page:2219-2221,2225
Security research and improvement of SPINS protocol
zhu lei ; wu zuo ; wang qing xian
..............page:2331-2334
Fast macroblock mode decision for arbitrary downsizing video transcoder based on H.264
wang yu ; zhang cai ming
..............page:2359-2363,2366
System design and simulation with composing models of computation
feng hui ning
..............page:2116-2118,2122
Using.NET framework\'s namespace in Web application automatic testing
lei lei ; lu xin quan ; li zuo ; hong yu
..............page:2160-2162
Adaptive threshold algorithm for extracting moving objects
sun ming yu ; ding ying ; li wen hui ; jiang zuo ; xu chang qing
..............page:2380-2383
Complexity of periodic sequences S∞ and S*∞over Fp
wang jun ; zhu shi xin
..............page:2297-2298,2308
Solving minimum spanning tree with reduction technology
xiong xiao hua ; ning ai bing ; ma liang
..............page:2051-2053
Robot path planning based on positive feedback adaptive genetic algorithm
hu xi ling ; guo hai tao
..............page:2037-2039,2050
Hybrid FCM algorithm to grid resource clustering
xue sheng jun ; nie jing
..............page:2153-2155
Cryptanalysis of chaotic block cipher
zhang tao
..............page:2294-2296
Analysis of stability for networked control systems with large delays and packet losses
jiang lian lian ; yang guang hong ; dan yu fang ; wang hai lang
..............page:2283-2286
Detecting traffic anomalies at application layer in metro area network
pei wei ; yuan xiao fang ; wang dong ; dong zhi chao ; xie gao gang
..............page:2222-2225
Fuzzy kernel covering classifier and its application
duan zhen ; cheng jia xing ; zhang ling
..............page:2043-2046
Moving target detection method based on spatio-temporal saliency perception
li zheng zhou ; li wen yan ; tan ju ; liu guo jin
..............page:2391-2393
Recursive robust adaptive beamforming
wang zhi qiao ; huang hua
..............page:2260-2263
Web remote real-time monitoring client based on scalable vector graphics
yang bin ; zhang li xin ; zhang li jun ; shi peng
..............page:2144-2146
Improved Mean-Shift tacking algorithm based on spatial histogram
hu bin ; zhao huan ; zheng min
..............page:2394-2397
Mixed-coding-based differential evolution algorithm for 0-1 knapsack problem
deng chang shou ; zhao bing yan ; liang chang yong
..............page:2031-2033
System of computer-aided detection and positioning for lung nodules
li bin ; ou shan xing ; tian lian fang ; qi yan ; liu si wei ; zhang zuo
..............page:2184-2188
Wireless image and video surveillance based on compressive sensing
zhou yan ; wang dong ; zhong yong ; huo ying zuo
..............page:2173-2175
Face recognition based on unsupervised optimal discriminant plane
cao su qun ; wang shi tong ; wang jun
..............page:2352-2355
Palmprint segmentation algorithm based on geometric features
li zi liang ; tian qi chuan ; zhu yan chun ; li lin sheng
..............page:2370-2372,2376
Improved time-frequency representation method using exponential kernels
ning jing ; zhu chang zuo ; zhu zhao kun
..............page:2078-2079,2083
State-extended based verification mechanism for security protocols
huang qing ; wang ya di ; han ji hong ; fan zuo dan ; huang he
..............page:2327-2330
TCP-based real-time video transmission delay prediction model
xiong yong hua ; wu min ; jia wei jia
..............page:2239-2242
Dynamic programming algorithm for generating optimal layer patterns of rectangular blanks
wang xiao qing ; li shang fang ; cui yao dong
..............page:2040-2042,2067
Active measurement on BitTorrent network and characteristics analysis
yang ming liang ; chen xing shu ; wang wen xian ; wu zuo ; dong zheng feng
..............page:2232-2235
Approach to Web services selection under uncertain user preferences
wen jun hao ; qin jia ; liu ling
..............page:2147-2149
Kind of automated analysis method of security protocol
wu xiao ying ; zhou qing lei
..............page:2301-2303
Binary image authentication algorithm based on digital signature
du min ; gao bao jian ; dong jian e
..............page:2348-2351
Content analysis method used for ontology ranking
xu de zhi ; liu zuo jing
..............page:2127-2129
Dynamic identify algorithm for H.223 protocol identifier based on neural network
kong fan zeng ; ji zhong mei ; wang jian hui ; song wen zheng
..............page:2112-2115
Integrating reputation and subjective logic to analyze trust network in SNS
lei huan ; peng jian
..............page:2321-2323
Space complexity preserving algorithms composition
shi fu song ; qin zhi guang
..............page:2020-2023
Research on technologies in solar blind ultraviolet Ad hoc network
zhao tai fei ; ke xi zheng
..............page:2204-2207
Model of personalized online shopping search engine
li shi wei ; qian xiao dong
..............page:2176-2180
Effective strategy of topic distillation and retrieval
wang yu xin ; liu hai feng ; guo he ; chen zuo
..............page:2106-2108
Analog circuit fault identification approach based on wavelet analysis and hierarchical decision
song guo ming ; wang hou jun ; jiang shu yan ; liu hong
..............page:2057-2060,2064
Design of real-time ECG monitoring system based on smart-phone
guo xing ming ; chen li shan ; chen ; peng cheng lin
..............page:2181-2183,2191
Interaction-based speculative thread-level parallelization
li ying ; sun zuo xue ; yuan xin yu ; xu yin cheng
..............page:2123-2126,2139
PLR based on time series tendency turning point
shang fu hua ; sun da chen
..............page:2075-2077,2092
Research on content-based recommendation based on Vague sets
cui chun sheng ; wu qi zong
..............page:2109-2111
Study of distributed topology based representation model of P2P vector geography data
wu jia gao ; huang lin ; zou zhi qiang ; feng jia li ; hu bin
..............page:2170-2172,2180
Progress of research on anonymization privacy-preserving techniques
wang ping shui ; wang jian dong
..............page:2016-2019
Clustering ensemble algorithm based on prior knowledge and spectral analysis
hou juan ; fei yao ping ; hu xiao xia ; li jue run
..............page:2103-2105
Improved ant colony algorithm for solving TSP
hou wen jing ; ma yong jie ; zhang yan ; shi yu jun
..............page:2087-2089
Research of acquisition algorithm in Chirp code-orthogonalized transmitted-reference UWB based active spectrum compression
wan lei ; kang rong zong ; zhang jian ; liu luo zuo
..............page:2236-2238,2256