Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2010 Issue 8
Bi-swarm particle swarm optimization based on diffusion mechanism
xu xing ; li yuan xiang ; wu zuo
..............page:2882-2885,2898
Free search algorithm for scheduling single batch processing machine with non-identical job sizes
wu guang hui ; chen hua ping
..............page:2861-2864,2868
Hybrid differential evolution optimization algorithm for no-wait flow shop problem with total flow time criterion
dong bin ; gao kai zhou ; pan quan ke ; sun qiang qiang
..............page:2875-2877,2894
Cross-layer resource management in CDMA cellular systems with successive interference cancellation
zhou chao rong ; zhang yi de ; feng gang ; li le min
..............page:2828-2833
Adaptive mobile Ad hoc greedy geographical routing protocol
wu mou ; zhang qing
..............page:3124-3126
Video-based discriminant model of traffic congestion
liu wei ning ; zeng heng ; sun zuo hua ; zhao min
..............page:3006-3008
Conductive knowledge mining based on stock market affected by refined oil tax reform
li xiao mei ; yang chun yan ; li wei hua
..............page:2865-2868
Hydrological forecasting system model based on AFSVM
zhang ya ping ; lu xian hua ; jin mei
..............page:2902-2905,2917
Online split-and-merge EM training of GMM for pattern classification
zhang yong zuo ; ran zuo
..............page:2906-2908
Research on data sample combination of Fuzzing technology
wang hong chuan ; wu zhi yong ; sun le chang ; zhang ; liu jing ju
..............page:3067-3069
043Expert system-based geocoding method for national economic census application
yu bin ; cheng chang xiu ; zuo ting ying
..............page:2976-2979
Trustworthy software evaluation based on QFD
xiong wei ; wang juan li ; cai ming
..............page:2991-2994
Research on strategy of software architecture refactoring based on clustering of component dependency relation
zhong lin hui ; yao zuo fan ; xu jing ; li zuo
..............page:2987-2990
Grid workflow scheduling algorithm under constraints of trust
hu zhi gang ; han juan
..............page:2936-2938
Survey of vision-based approach to simultaneous localization and mapping
he jun xue ; li zhan ming
..............page:2839-2844
Multi-agent-based simulation research on China core-structure cluster innovation network
fu zuo ; zhang yong an
..............page:3002-3005,3008
Reinforcement learning: survey of recent work
chen xue song ; yang yi min
..............page:2834-2838,2844
Domain-oriented semantic integration method using virtual views
li hua zuo ; hu chang jun ; ou yang chun ping ; ye yin zhu
..............page:2967-2971
Research of bullet engraving automated comparison optimization method based on second moment invariants
he cheng gang ; zhang yan ping ; zhao zuo
..............page:2895-2898
Research of multi-line optimal simulation model for urban traffic control
li xiao dong ; zeng fan zhi ; chen guang yi ; ding wei xiong
..............page:2995-2998
Medical image registration based on hybrid optimization algorithm
shen xiao wei ; he ming yi
..............page:3159-3161
Matching unorganized points data under different viewpoints based on improved evolution algorithm
wei qi ming ; wu wei yong ; deng chang shou
..............page:3156-3158
New multi-proxy multi-signature scheme
ding zuo ; zhang jian zhong
..............page:3081-3082
Research on privacy preserving distributed decision-tree classification algorithm
shen yan guang ; shao hui ; zhang yong qiang
..............page:3070-3072
Method for requirements prioritizing based on risks
hu lei wan cheng ; xie li zi ; yang qiu song
..............page:2953-2958
Research on classification model in user-defined feature library
sun li zuo ; wang zhan bo ; zhang hui
..............page:3182-3184,3187
Downlink channel dynamic contention free access mechanism based on IEEE 802.11e EDCA
feng zheng yong ; wen guang jun ; zhang wen bin ; deng yun kai
..............page:3083-3085,3095
Communication-cost based task scheduling method in global software development
zhong nan hai ; liu da peng ; xiao jun chao
..............page:2942-2947
Image fusion algorithm based on PCA & self-adaptive region variance
niu xiao zuo ; jia ke bin
..............page:3179-3181
USAN-AAM method for fast human facial features location
lu peng ; chen yi song ; chen wen guang
..............page:3188-3190
Loss proportional differentiated service and its implementation
ma hong wei ; qin song ; yuan wei hua
..............page:3127-3131
Research of link prediction algorithmic based on semi-supervisor learning
yang ; yang bing ru ; tang zhi gang
..............page:2848-2852
Question classification based on self-learning rules and modified Bayes
tian wei dong ; gao yan ying ; zu yong liang
..............page:2869-2871
Research of fuzzy job-shop scheduling problem based on hybrid DEA-GA algorithm
lu bing yuan ; cheng ba yi
..............page:2933-2935
De-interlacing with weighted edge adaptive intra-field interpolation
ma bin ; ding yong ; zhou sheng ; yan xiao lang
..............page:3168-3170,3175
Image segmentation based on non-parametric mixture model of Legendre orthogonal polynomial
liu zhe ; xiao jian guo ; song yu qing
..............page:3165-3167
QoS-aware subcarrier allocation agorithm for cooperative relay-based OFDM cellular networks
huang xiao yan ; mao yu ming ; wu fan
..............page:3086-3089,3099
Design of predictive PID controller and analysis on robust stability for auto-unbalance plus time delay process
zhang yun ; liu hong bo ; wang si jun
..............page:3020-3023,3030
Modeling and simulation of TDD components selection using stochastic process algebra
su feng ; di jian ; yang qiu song
..............page:2948-2952,2958
Analysis on PN code acquisition performance in DS-SS over multipath environment
du xiao hua ; zhang tian zuo ; pang tong ; gao yong sheng
..............page:2913-2917
Dynamic simulation of large-scale grassland in wind
qiu hang ; chen lei zuo ;chen jim x
..............page:3171-3175
Stereo image matching approach based on pair-wise sequence alignment algorithm
shi wan li ; wang hong yong
..............page:3176-3178
Multi-object segmentation based on Multiway cut
sun tong feng ; ding shi fei ; ren zi zuo
..............page:3138-3140,3149
Improved algorithm enhancing queue fairness based on Bloom filter
he jian xin ; wang jian xin
..............page:3100-3103
Adaptive blind source separation algorithm based on vicinal risk minimizing PDF estimation
zuo hai zuo ; jiang zuo ; luo jun
..............page:3096-3099
Craniofacial similarity comparison in craniofacial reconstruction
zhu xin zuo ; geng guo hua
..............page:3153-3155
t-mixture model clustering based on genetic K-means initialization for medical images
dai li li ; song yu qing ; chen jian mei ; xie cong hua
..............page:3150-3152,3155
Performance evaluation of DTN routing protocols based on message ferries
zuo xiao rong ; peng wei ; song zi ming
..............page:3120-3123,3126
Research of distributed aspect-components model and collaboration framework for DCAM
wang bin ; ding jian ; sheng jin fang
..............page:2959-2961,2998
High-level low power method for control flow intensive circuit
sun qiang ; fan chi jie ; si qiao mei
..............page:3027-3030
Research of soil evaluation based on cloud model and multi-parameter chart presentation
li zuo ; hong wen xue ; song yan dong ; cao jing ; ma li
..............page:3024-3026
Relation mining on service network
wang hui ; feng zhi yong ; chen shi zhan
..............page:2962-2966
Keywords extraction algorithm based on combined word and synset
jiang chang jin ; peng hong ; chen jian chao ; ma qian li ; yan gui duo
..............page:2853-2856
Specification based on adaptive DoS attacks detection in WLAN
zhang ming lei ; guo yuan bo ; zhang lai shun ; li ya zuo
..............page:3038-3041,3044
Algorithm of multi-dimensional flow classification based on intersecting bitmap
hu mao fu ; hou zheng feng ; han jiang hong ; he ling
..............page:3058-3060,3063
Noisy blind source separation algorithm based on new threshold function of wavelet transform
zhao tian jiao ; he xuan sen ; chen li
..............page:2886-2888
Design and implementation of efficient and energy-saving routing protocol for wireless sensor networks
wang xiao zuo ; gao de min ; xu jiang
..............page:3107-3109
Handoff decision algorithm based on prediction in SAE network
yang sen ; tang hong bo ; bai yi
..............page:3104-3106,3109
Improvement on negative selection algorithm with point estimate
hu bo ; hu min
..............page:2931-2932,2938
New method of nonlinear time series clustering
zhang bei bei
..............page:2918-2922,2925
Bilinear-pairing based hybrid threshold signature scheme in Ad hoc network
huang su shan ; qian hai feng
..............page:3064-3066
Integration regional area division for emergency resources reserving based on spatial clustering
wang jing ; huang jun ; zhu jian ming ; tang feng
..............page:2999-3001
Transshipment nodes location-allocation problem of interregional relief materials
li zhou qing ; ma zu jun
..............page:2872-2874,2881
Research of end-to-end admission control schemes on IP networks
wang shu juan ; liang man gui
..............page:2801-2809
Research on tracking visually moving target: status and future directions
li gu quan ; chen zhong ze
..............page:2814-2821
Oblivious transfer protocols over braid groups
zuo yun ; xiong guo hua ; zhang xing kai ; bao wan su
..............page:3042-3044
Research and implementation on negative disjunction constraints in FLUX
liu yi song ; zhu hui juan ; zhu mang ; xu yan qun
..............page:2980-2983
Trusted lightweight VMM based security architecture
cheng ge ; zou de qing ; li min ; ji cheng
..............page:3045-3049
Improved naive Bayesian algorithm based on GATS optimization
jiang pei pei ; liu pei yu ; yang yu zhen
..............page:2892-2894
Shuffled frog-leaping algorithm for lot-streaming no-wait flowshop scheduling problem
xie sheng xian ; pan quan ke ; pan yu xia ; jia bao xian
..............page:2909-2912
Research of intrusion detection technology based on ant colony clustering
xie hui ; wu xiao ping ; zhang zhi gang ; wang li min
..............page:3050-3052
Optimization model of motion search algorithm
shi jiu gen ; zhang chao ; xu lin
..............page:3147-3149
Research on novel DRM usage control protocol model
chen ming jie ; fan ke feng ; zhang su bing ; mo zuo
..............page:3073-3077,3080
Research on constraint of conditions and periodic in user activity in RBAC
yin xiao ling ; huang hai sheng ; wang ru chuan
..............page:3034-3037,3052
Research and application of tag-based recommendation algorithm based on reinforcement learning
li yi qun ; zhang wen sheng ; yang liu ; liu zuo qiong
..............page:2845-2847,2852
Survey of multi-dimensional Fuzzing technology
wu zhi yong ; xia jian jun ; sun le chang ; zhang
..............page:2810-2813
Location allocation strategy for rear yard based on genetic algorithm
wang zhi ming ; fu yun qing
..............page:2939-2941
Method for time series clustering based on Normal matrix
jiang rong ; zhao feng xia ; xie fu ding ; zhang yong
..............page:2926-2928
Fast motion estimation algorithm based on hybrid search strategy
wang chun ; sun zhong hua ; jia ke bin
..............page:2857-2860
Design and application of dynamic adoptive network storage system
zhu lv lv ; yang xiao yuan ; zhang zuo
..............page:3132-3134
Modified dissipation QPSO algorithm and its application
li zhuang kuo ; li ning
..............page:2923-2925
Algorithm for moving object tracking based on Kalman filter
li jing ; fan jiu lun
..............page:3162-3164
Mining product features and sentiment orientation from Chinese customer reviews
li shi ; ye qiang ; li yi jun ; luo si qing
..............page:3016-3019
Dynamic address configuration based on threshold in mobile Ad hoc network
yi shuang feng ; qian hai feng ; zhou yuan
..............page:3090-3095
Improved dynamic genetic Apriori mining algorithm
zhan qin ; zhang you ming
..............page:2929-2930,2935
Algorithm of moving human skeleton extraction in complex environment
lei tao ; luo zuo zuo ; fan yang yu ; shen zuo
..............page:3194-3197,3200
Application of Lab spaces color segmentation in fast vehicle license plate location
chen chang tao ; chou guo qing ; yang ping ; hu nai qing ; cheng ming
..............page:3191-3193
Timeout retransmission strategy based on dynamic threshold
zuo er hui ; zhu min ; mao ming min
..............page:3135-3137
Survey of study on privacy-preserving data publishing
lan li hui ; ju shi guang ; jin hua ; liu shan cheng
..............page:2822-2827
Study of open source license tracking process
xu hong bo ; yang hui hui ; li de jie ; li pei zuo ; zhang hui
..............page:2972-2975,2979
Design of tire monitoring and auto-control system based on ARM
huang zuo ; zhang jing
..............page:3031-3033
Algorithm of isoline tracing with fault lines
chen xue gong ; zhang kun
..............page:3144-3146,3164
Unified product BOM model oriented to concurrent engineering
wang yang ; liu xiao bing
..............page:2984-2986,2990
Density-based dynamic collaborative filtering books recommendation algorithm
wu jian wei ; yu xiao hong ; chen wen qing
..............page:3013-3015
Fast moving object detecting method based on video streaming continuity
zhang juan ; mao xiao bo ; chen tie jun ; wu min
..............page:3198-3200
Study on policy-oriented multi-agent cooperation system
hu jun ; li zheng tong
..............page:3009-3012,3015
Image texture feature mining
xue li xia ; ji zhi min ; wang zuo cheng
..............page:3185-3187
Hash scheme based on human visual system for image authentication
gong su ling ; kang zhi wei ; han jia
..............page:3061-3063
Higher-order logic-based knowledge representation and clustering algorithm
xu zuo ; yang ; tang zhi gang ; li lin na ; yang bing ru
..............page:2878-2881
One-dimensional regional coverage study towards wireless sensor network
tang zuo fang ; mu zhi chun ; zhong da fu
..............page:3110-3111,3131
Rapid Anhui styled architecture modeling based on MSSR
xue feng ; cao shi wei
..............page:3141-3143,3161