Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2012 Issue 8
Security analysis of two efficient certificateless signature schemes
ZONG Zhi-xiong;HU Guo-zheng;CHEN Jia-zhong;HAN Lan-sheng
..............page:3046-3047,3052
Study and implementation of software guards' security dynamic testing model
WU Shao-jie;HE Rong-yu;XUE Chang-song;XIE Jiang-tao
..............page:3008-3011,3017
Improved fusion method of conflict evidence based on evidence vector dissimilarity
XIONG Qiu-yan;YANG He-biao
..............page:2952-2955
Weighted cooperative spectrum sensing algorithm based on trust
YANG Tie-jun;SI Chun-li
..............page:3124-3127
Clustering uncertain graphs through energy function and modularity optimization
DING Yue;ZHANG Yang;WANG Yong;LI Wei-wei
..............page:3173-3175
DML-Diff: content-based change detection algorithm for XML documents
LIU Bo-yun;XIE Jian-jun;NAN Kai
..............page:3000-3003
Cluster analysis methods based on Fourier transform and graph theory
JU Yu-fang;LEI Xiao-feng;DAI Bin;ZHUANG Wei;SONG Feng-tai
..............page:2837-2840
Novel gateway discovery mechanism in VANET
WANG Lei;YANG Yang;WANG Ning
..............page:3085-3087,3095
Forecasting network security threat situation based on ARIMA model
LI Kai;CAO Yang
..............page:3042-3045
Research of proxy-based Cookie protection technology
XU Lu;ZHOU An-min;LIU Liang;ZHOU Yan
..............page:3036-3038
Extreme learning machine on robust estimation
HU Yi-han;ZHANG Xiao-gang;CHEN Hua;LI Jing-hui
..............page:2926-2930
Scheme research of congestion management in DiffServ networks based on feedback
LI Xin;CHEN Hao;CHEN Jian
..............page:3088-3090,3115
Modeling and forecasting for network traffic based on wavelet decomposition
ZHANG Han;WANG Xia
..............page:3134-3136
Dynamics modeling of manufacturing information system and analysis of chaos
ZHANG Xiao-hua;CHEN Wei
..............page:2978-2981
Emergency resource location and allocation model and algorithm for graded response
WANG Jing;ZHU Jian-ming
..............page:2872-2875
Research on self-healing framework for Web service based on connectors
REN Hong-min;LIU Jin
..............page:3004-3007
Fast X-ray image inpainting based on coherence transport
LI Jin;WANG Yan-wei;WANG Da-da;WEI Jie;YU Hong;ZHANG Shao-quan
..............page:3154-3156
Gray coded hybrid genetic algorithm for 0-1 knapsack problem
WANG Ze-lin;WU Zhi-jian
..............page:2906-2908
Possibilistic C-means clustering algorithm based on hybrid kernel function
HANG Xin;LI Lei
..............page:2852-2853,2885
STFT time-frequency analysis method of fractional lower-order alpha stable distribution
YANG Bao-hai;ZHU Ya-jun;ZHA Dai-feng;XIONG Mei-ying
..............page:2915-2917,2920
CSDTW: constrained dynamic time warping distance in stream context
CHEN Shu-guang;LI Jun-kui;CHEN Sheng-li
..............page:2939-2942
Improved ID3 algorithm based on new attributes selection criterion
YU Jin-ping;HUANG Xi-mei;LI Kang-shun
..............page:2895-2898,2908
On quality evaluation of QChat service based on quality of experience
ZHU Zhe-ran;ZHANG Gao-ji;FAN Jiu-lun
..............page:3140-3144
Image super-resolution algorithm based on SVM pre-classified learning
TANG Jia-li;ZUO Jian-min;HUANG Chen-rong
..............page:3151-3153,3175
Fuzzy C-means clustering based on self-adaptive weight
REN Li-na;QIN Yong-bin;XU Dao-yun
..............page:2849-2851
Research of multi-type data fusion in sensor networks
ZHAO Ji-jun;WEI Zhong-cheng;LI Zhi-hua;LIU Hao;LIAN Bin
..............page:2811-2816
Research on coverage optimization of wireless sensor networks based on mobile sensors
DENG Ya-ping;WU Chuan-ping
..............page:3137-3139,3144
Path sorting optimization of painting robots using estimation of distribution algorithms
FAN Shuai-quan;ZHOU Bo;MENG Zheng-da;DAI Xian-zhong
..............page:2935-2938
Blind watermarking algorithm for color images based on DWT-SVD and Fibonacci transformation
CAI Yi-jia;NIU Yu-gang;SU Qing-tang
..............page:3025-3028
Novel semi-supervised clustering algorithm based on active data selection
WEN Ping;LENG Ming-wei;CHEN Xiao-yun
..............page:2841-2844
Implementation method for transmission fault diagnosis based on order analysis
ZHOU Xiao-feng;SHI Hai-bo;SHANG Wen-li;YAN Yi-gong;GAO Ming-shan
..............page:2967-2969,2981
Image enhancement masks based on fractional differential
ZHANG Yong;PU Yi-fei;ZHOU Ji-liu
..............page:3195-3197
Improved Landweber algorithm for image reconstruction in electrical resistance tomography system
XIAO Li-qing;WANG Hua-xiang;XU Xiao-ju
..............page:3157-3159
Secure data aggregation scheme for wireless sensor networks based on one-way function
GUO Jiang-hong;LIU Zhi-hong;WU Xi-hong
..............page:3067-3070
New fractional order differential based image edge detection operator
WANG Bin;PU Yi-fei;ZHOU Ji-liu
..............page:3160-3162,3184
Routing design for bandwidth-aware multi-channel wireless mesh networks
XIANG Kai;ZENG Yuan-yuan
..............page:3081-3084
Phylogenetic tree-building based on chaos game representation
CHEN Bo;JI Ping
..............page:2956-2960
Multi-objective characteristics evaluation model of radar emitter signal
DUAN Mei-jun;JIN Wei-dong;YANG Zhi-xin
..............page:2912-2914,2947
Research on centralized channel assignment strategies of wireless Mesh networks
FU Qi;CHEN Zhi-gang;JIANG Yun-xia
..............page:2821-2825
Theory research based on microblog of six degrees space
LIU Hong-jie;LU Hao;ZHANG Nan;ZHENG Xiao-long
..............page:2826-2829
Application of BSP two dimensional block interleaving algorithm and RS coding in digital watermark
YI Chen;ZHANG Tian-qi;HU Ran;CAO Liang
..............page:3029-3032
Agents behavior based modeling and simulation for low-carbon supply chain
LI Hao;ZHAO Dao-zhi
..............page:2982-2984
Method of generalized sitemaps with emergency hot degree
CHEN Han;HAN Yong-feng;LI Bi-cheng
..............page:2943-2947
Adaptive image denoising method based on wavelet transform and ridgelet transform
LI Gen-qiang;HUANG Yong-dong;JIANG Xiao
..............page:3192-3194
Hierarchical clustering-based semantic retrieval of RDF graph
LIU Ning;ZUO Feng-hua;ZHANG Jun
..............page:2858-2861,2955
Monocular pose determination from coplanar two points and one line features
LIU Chang;ZHU Feng;XIA Ren-bo
..............page:3145-3147
Fax image layout analysis based on connect components
GUO Xiao-yu;PING Xi-jian;ZHOU Lin
..............page:3198-3200
Research on energy balancing of wireless sensor network for transmission line monitoring
LIN Jun-ru;ZHU Bao-hui;WANG Qiu-shi;ZENG Peng;YU Hai-bin
..............page:3111-3115
Community relationship mining method based on users' cognition degree
MENG Cong;HUANG Yong-feng;YING Li-zhi
..............page:2833-2836
Optimizing fast scalar multiplication in elliptic curves
ZHOU Meng;ZHOU Hai-bo
..............page:3056-3058,3061
Mission reliability analysis based on Monte-Carlo simulation of stochastic PERT network
TANG Jian;YAN Jun;LING Hai-feng;JIANG Xun-lin
..............page:2948-2951
Application of data-driven technique to multiple faults diagnosis in grounding grids
LIU Xian-feng;PENG Min-fang
..............page:2970-2972
Review on visual odometry technology
LI Yu-bo;ZHU Xiao-zhou;LU Hui-min;ZHANG Hui
..............page:2801-2805,2810
New chaos genetic algorithm applied in multi-constrained QoS routing
FANG Shi-yong;ZOU En;XIN Jian-tao;LIN Jin-qian;LIN Lan
..............page:3078-3080
Distribution computer network intelligence frame model
JIAO Jian;LI Qi;LI Xiao-jian
..............page:3053-3055
Diffusion model and top-k nodes mining for mobile social networks
SHI Wen-guo;WANG Yu
..............page:2830-2832,2844
Wigner-Ville distribution analysis method of fractional lower-order alpha stable distribution
CHEN Ding;ZHU Ya-jun;JIANG Jin-long;GAO Yu-bao
..............page:2918-2920
Research and implementation of distributed database synchronization protocol based on snapshot isolation
WANG Jue;LI Li-xin;ZHANG Shao-yue;YANG Meng-meng;FU Jian-dan
..............page:3012-3017
Outer contour extraction of CT skull based on curve evolution
SHANG Peng;LI Kang;WANG Ke-gang;ZHOU Ming-quan;HAN Yi
..............page:3163-3165,3194
Review of reliability of urban network transportation system
LIN Xu-xun;JUAN Zhi-cai;NI An-ning
..............page:2817-2820
Location-cloaking algorithm based on grid-divided space
ZOU Yong-gui;ZHANG Yu-han
..............page:3059-3061
Scheduling algorithm of multi-processor based on task clustering and duplication
XU Cheng;ZHAO Lin-xiang;YANG Zhi-bang
..............page:2931-2934
Modeling and verifying DPU system based on BIP framework
HUANG Chong-di;WAN Hai;GU Ming;CHEN Rui
..............page:2961-2966
Computer virus detection method based on immune theory and D-S evidence theory
QIN Ren-chao;LIU nian;HUANG Xiao-fang
..............page:3062-3066
Data aggregation node election algorithm based on average residual energy for wireless sensor networks
ZHAO Feng;WEI Kai;CHEN Hong-bin
..............page:3096-3097,3102
Spatial reused bandwidth reservation in satellite networks using directional antennas
LI Yuan;SUN Bao-lin;LUO Xing
..............page:3103-3107
Sensor scheduling algorithm for connected coverage in wireless sensor networks
ZHU Meng-bei;ZHANG Xi-huang
..............page:3091-3095
Two-stage feature selection algorithm based on mutual information and genetic algorithm
QIU Guo-yong;WANG Na;WANG Wan-zi
..............page:2903-2905
Incremental clustering algorithm based on representative points
MENG Fan-rong;LI Xiao-cui;ZHOU Yong
..............page:2865-2867
Digital watermarking based on object
BIAN Yun;WEN Ting;HE Kun;ZHOU Ji-liu
..............page:3022-3024,3028
Security method of wireless physical layer security based on multipath channel random delay
PANG Hong-wei;WANG Xue-ming;JI Jiang;LI Xiang-yu;JIN Liang
..............page:3039-3041,3045
Research on generalized differential evolution algorithm based on adaptive controlling parameter
JIAN Ping;ZOU Peng;XIONG Wei;CHEN Zhi-ke
..............page:2899-2902
Influence analysis of transport capacity loss for out-of-gauge trains running on double-track railway
WANG Xin-yu;CHEN Zhi-ya;LEI Ding-you;ZHANG Ying-gui
..............page:2886-2890,2894
Multi-tenant oriented application-level concurrency control approach
ZHAO Zhan-ping;WANG Wei;ZHANG Wen-bo;PU Wei;FAN Guo-chuang
..............page:2996-2999,3007
DiffServ-based topology aggregation algorithm
JIA Zhi-juan;HU Ming-sheng;LIU Si;HONG Liu
..............page:3071-3073
High dimensional subspace clustering algorithm WM-FCM based on variance weight matrix
JIANG Yi-zhang;WANG Shi-tong
..............page:2868-2871,2881
Algorithm for dim target tracking in infrared image based on adaptive tracking window
WANG Lu-cai;YI Xi-nian;CHEN Xiao-tian
..............page:3185-3188
Automatic focusing method based on gray segmentation
YAO Jun;ZHANG Jun-ju;CHANG Ben-kang
..............page:3148-3150,3172
Overview of deep learning
SUN Zhi-jun;XUE Lei;XU Yang-ming;WANG Zheng
..............page:2806-2810
Improved decision tree based method for English prosodic phrase boundary prediction
ZHANG Yuan-ping;LING Zhen-hua;DAI Li-rong;LIU Qing-feng
..............page:2921-2925
Improved dynamic target detection algorithm based on KGMM
GUO Chun-feng;HE Jian-nong
..............page:3189-3191
Representative-based distribute data stream clustering algorithm
GAO Bing;ZHANG Jian-pei;YANG Jing
..............page:2845-2848
Heuristic detection model of covert channel based on quantum neural network
TANG Zhang-guo;LI Huan-zhou;ZHONG Ming-quan;ZHANG Jian
..............page:3033-3035,3038
Multi-channel media access control protocol for real-time traffic
WANG Ye-qun;YANG Feng;YE Xiang-yang;HUANG Guo-ce;ZHANG Heng-yang
..............page:3098-3102
Study on diagnosis model for support process based on FMEA and fuzzy reasoning Petri nets
SUN Bao-chen;JIA Xi-sheng;CHENG Zhong-hua
..............page:2973-2977,2984
Traffic sign recognition based on stable SURFs
HU Jin-cheng;LI Shi-ying;LI Ren-fa
..............page:3179-3181
Improved pre-encrypted verifiable electronic voting scheme
YUAN Hao;YANG Bao-lin
..............page:3048-3052
Rough kernel clustering algorithm based on particle swarm optimization
YAO Li-juan;LUO Ke
..............page:2854-2857,2902
Cognitive radar MIMO-STAP based on joint transmit and receive weight optimization
ZHANG Xin;CUI Chen;WANG Xing
..............page:3116-3119,3127
Scheme to reduce broadcast storm of PREQ in IEEE 802.11 s tree network
YOU Bo;MU Rong-zeng;YAN Yue-peng
..............page:3108-3110
Study on tracking before detecting method based on FastICA for weak radar target
NIU De-zhi;CHEN Chang-xing;WANG Bo;BIAN Dong-liang;FU Hui
..............page:3120-3123
Black block skipping lossless compression algorithm for dither halftone image
HU Xiao-peng;KONG Yue-ping;JIANG Yong-lin
..............page:3182-3184
Research of traffic flow assignment model on intelligent transportation based on network calculus
PENG Ya-li;ZHANG Zhi-ming;SONG Yan-ting
..............page:2891-2894
Formal method of MARTE model based on MDA
XU Hai-yang;WANG Ping
..............page:3018-3021
Adaptive region growing algorithm combined hue statistical characters
LIU Jia-wen;LIANG Guang-ming;LIU Ren-ren;XIE Ya-ting;DING Jian-wen
..............page:3176-3178
Human action recognition based on multi-features fusion
ZHAO Hai-yong;LI Cheng-you
..............page:3169-3172
Pilot jamming scheme against OFDM/OFDMA
XIE Si-rui;HUANG Kai-zhi;JI Jiang;LI Zhi-gang
..............page:3131-3133,3136
Unequal clustering routing protocol for wireless sensor networks based on PSO algorithm
JIANG Chang-jiang;TANG Xian-lun;XIANG Min
..............page:3074-3077,3084
Address configuration scheme for MANET
WANG Xiao-nan;QIAN Huan-yan
..............page:3128-3130