Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application Research of Computers
1001-3695
2013 Issue 2
Design of routing protocol for WSNs based on ant colony algorithm and TinyOS2.x
LU Tian-long;LU Jun-ling;WANG Xiao-ming;DUAN Zhuo-jun
..............page:541-543
Reconstruction algorithm of spatial complexity of surface based on constraints of boundary
NIE Xiao-yan;LU Cai;CHEN Kai-yun
..............page:588-590,600
Media distribution system based on transcoding and multicast
ZENG Shuai;LI Le-min;LIAO Dan
..............page:521-524
Research on hierarchical orthogonal variability model
LIU Wei-sheng;YANG Guan-zhong
..............page:476-479
Matrix Pencil joint TOA/AOA positioning algorithm for OFDM
CHEN Kui;HUANG Wei-yong;TIAN Chuan-geng
..............page:534-536,540
Fusion of Snake model and topological alignments algorithm for image segmentation
BAI Kai;LI Min;XIONG Jing
..............page:610-612
Path planning for biped robots based on environment stratification
MIN Wei-wei;LIU Guo-dong;MO Dong-cheng
..............page:389-391
Detecting App-DDoS attacks based on flow analysis
LI Jin-ling;WANG Bin-qiang;ZHANG Zhen
..............page:487-490
Research of improvement selection algorithm in cloud-computing Web data mining based on Map/Reduce
FANG Shao-qing;ZHOU Jian;ZHANG Ming-xin
..............page:377-379,395
Algorithm review of vehicle routing problem with simultaneous delivery and pickup
WANG Ke-feng;YE Chun-ming;LI Yong-lin
..............page:334-340
Analysis method of control system requirement
ZHANG Li-yun;PU Ge-guang;WANG Zheng;LI Jian-wen
..............page:465-468,475
Quantum key relay protocols between any terminals in Internet
XU Ren-feng;XIAO Zheng-xing;LI Yue-ping;NIE Zhe;WEN Xiao-jun
..............page:507-509,512
Study of alarm pretreatment based on double constraint sliding time window
LI Tong-yan;LI Xing-ming
..............page:582-584
Completing data algorithm based on similarity relation vector
DING Chun-rong;LI Long-shu
..............page:383-385
Storage architecture of mass MP3 files using acoustic fingerprint deduplication
ZHAO Xiao-yong;YANG Yang;SUN Li-li
..............page:472-475
Authentication scheme for roaming in aeronautical Ad hoc networks
HUANG Hou-biao;LUO Chang-yuan;SONG Yu-long
..............page:500-502,506
Survey on post-silicon debug for multi-core processor
GAO Jian-liang;HAN Yin-he
..............page:321-324
Algorithm named SHFSM about multi-camera moving object matching in overlapping fields of view
HUO Kuo;LI Chang-yun;LI Yan;ZHAO Yang
..............page:619-622
Research and comparison of video shot detection techniques
NIU Hao;DING Chun-li;ZHANG Ming;TANG Bo
..............page:631-634
Application of anisotropic filtering algorithm in seismic curvature attribute
ZHANG Qun-hui;GAO Xiang
..............page:638-640
Persuasion and evaluation model of agent with acquaintance relationship
WU Jing-hua;SUN Hua-mei
..............page:386-388
Novel constrained optimization genetic algorithm and its engineering applications
WU Hua-wei;CHEN Te-fang;HUANG Wei-ming;XU Bing;HU Chun-kai
..............page:367-370
Takeoff scheduling of carrier plane based on multi-colonies cooperation and CLS intelligence algorithm
SI Wei-chao;HAN Wei;SONG Yan;SHI Wei-wei
..............page:454-457
Target classification by surveillance radar based on multifractal features
LI Qiu-sheng;XIE Wei-xin
..............page:405-409
Fast tone mapping operator implementation based on GPUs
QIAN Yin-ling
..............page:595-597,626
Resource scheduler algorithm based on statistical optimization under Hadoop
DENG Chuan-hua;FAN Tong-rang;GAO Feng
..............page:417-419,422
Mixed features based improved human action recognition algorithm
GUO Li;JI Xiao-fei;LI Ping;CAO Jiang-tao
..............page:601-604
Location algorithm based on virtual tag constructed by historical data
ZHAO Jin;GAO Qiang;YANG Kai-wen;LIU Shu
..............page:440-442
Fuzzy-based methods for privacy preserving
WANG Qian;YANG Chuan-dong;LIU Hong
..............page:518-520
Noise color image edge detection based on improved morphology in HSI space
MAO Ruo-yu;CHEN Xiang-ning
..............page:635-637
Research of row-column mixed storage DBMS
SUN Lin-chao;CHEN Qun;XIAO Yu-ze;BAI Song
..............page:480-482,486
Real-time navigation algorithm based on multi-step travel time prediction
LI Jin-yan;ZHU Zheng-yu;LIU Lin;LIU Wei
..............page:346-349,353
Semi-blind OFDM frequency domain joint equalization algorithm
LI Qi;LI Hong-wei;CAI Bin;YANG Jie;GENG Geng
..............page:574-576
Two-dimensional Otsu image segmentation algorithm based on adaptive weighted median filter
NI Lin;GONG Qu;CAO Li;LIAO Wu-zhong
..............page:598-600
Congestion adaptive travel planning for vehicular Ad hoc network
YU Ling-fei;SHE Kun;SONG Chao;LIU Bin
..............page:562-565
Modeling and application of clinical pathway based on HTCPN for stomach cancer
TIAN Yan;ZHANG Ting;WU Yang-dong;ZHANG Xin-gang
..............page:458-461,464
Survey of energy-efficient strategy for wireless body area network
LU Xian-ling;PENG Neng-ming;LU Sheng-nan;XU Bao-guo
..............page:325-329
Cooperative ARQ protocol based on GOP and distance aware in video sensor networks
JIN Yong;BAI Guang-wei;LI Ming-jie
..............page:529-533
Forward prediction data scheduling mechanism for MPTCP
HU Qing;ZOU Ran;ZHOU Li
..............page:560-561,565
Local outlier detection based on ellipsoids for wireless sensor networks
WANG Yu-lin;XUE An-rong
..............page:547-550
New compressive sampling matching pursuit algorithm
JIANG Liu-bing;HUANG Tao
..............page:402-404
Topology maintenance for wireless sensor networks
WANG Chu-hang;HU Huang-shui
..............page:330-333,345
New feature extraction method in high-dimensional data mining based on median regression
LI Ze-an;CHEN Jian-ping;ZHAO Wei-hua
..............page:374-376,413
ABox consistency decision algorithm for description logic SHIF
PENG Li;YANG Heng-fu
..............page:423-428
Anchor-based large-scale ontologies partitioning and mapping
LAI Ya;WANG Run-mei;XU De-zhi
..............page:469-471
Review of person de-identification techniques
CHE Lin-lin;HAN Dong-sheng
..............page:341-345
New network security model based on degree of dissatisfaction
WANG Hai-sheng;GUI Xiao-lin
..............page:566-569
Efficient algorithm of continuous uncertain XML twig pattern matching
ZHANG Xiao-lin;LV Qing;LIU Li-xin;ZHENG Chun-hong
..............page:364-366,370
Attribute based access control strategy for enterprise cloud storage
XIONG Zhi;WANG Ping;XU Jiang-yan;CAI Wei-hong
..............page:513-517
Measurement method for aspect-oriented software architecture based on scenario
CHEN Jia-li;ZHANG Lin-lin;ZHANG Ya-hong;ZHAO Kai;FENG Zai-wen;NI You-cong
..............page:483-486
Proactive secret sharing scheme without trusted party
HE Er-qing;HOU Zheng-feng;ZHU Xiao-ling
..............page:491-493
Hybrid heuristic algorithm for two-echelon vehicle routing problem
HE Jiang;HUANG Han
..............page:350-353
Method of performance evaluation for wireless mesh network
LI Fang-fang;WANG Jing;CHEN Cun-xiang
..............page:551-553,556
Optimal mean quantization blind image watermarking algorithm based on DCT domain
QIU Li-hong;ZHANG Li-yan
..............page:497-499
Research on fuzzy twin support vector machine based on hybrid fuzzy membership
DING Sheng-feng;SUN Jin-guang
..............page:432-435
Adaptive P2P trust aggregation method for resisting collusion attack
ZHOU Shen;ZHU Yue-fei
..............page:494-496
Quickly matching pursuit algorithm based atom clusters
CUI Xian-jun;ZHAO Xin-bo;LIN Zeng-gang;ZHANG Yan-ning
..............page:396-398,409
Multi-scales saliency detection algorithm based on HVS
WEI Wei;ZHANG Gong-xuan
..............page:623-626
Satellite communication network evaluation ontology
YUAN Wei-wei;DUAN Yi-feng;HU Gu-yu;NI Gui-qiang
..............page:577-581
Cloud resources locating algorithm based on peer-to-peer network
LI Pu;CHEN Shi-ping;LI Jian-feng
..............page:570-573
Research on integrated framework for manufacturing industrial chain
PAN Hua;SUN Lin-fu;LIU Shu-ya
..............page:447-449
Multi-oriented text lines extraction from offline Nǚshu characters image
HEI Guang-yue;WANG Jiang-qing;SUN Yang-guang
..............page:627-630
Research on streaming distribution of cloud assisted P2P video-on-demand
GUO Hong-fang;LIN Yu-song;WANG Zong-min
..............page:525-528,533
Research on fast feature match method for mobile devices
LUO Ya-wei;WEI Ben-chang;GUAN Tao;YAN Ka;ZHANG Yan
..............page:591-594,604
Load bypassing memory access scheduling for static superscalar MCU-DSP core
LIU Bo;ZHANG Sheng-bing;HUANG Song-ren
..............page:450-453
Adaptive word grouping algorithm based on mutual information in Uyghur language
Turdi TOHTI;Akbar PATTAR;Askar HAMDULLA
..............page:429-431,435
Research on multi-path QoS routing protocol in Ad hoc mobile network
PENG Ge-gang;LI Xin-yu;SONG Ying;XIANG Li-sheng;SHEN Qing;LI Ren-fa
..............page:544-546,584
Research on benefit evaluation from CBM execution oriented to production process
MA Lun;KANG Jian-she;ZHAO Chun-yu;LIU Kai-dong
..............page:436-439
Sparse representation perspective for source localization based on JSL0-SVD
FENG Ying-ying;CHENG Xiang-yang;DENG Ming
..............page:537-540
Model of combining and optimizing maintenance specialties based on improved association rule
SUN Zhi-gang;ZHU Xiao-dong;WANG Yi-gang
..............page:410-413
Video semantic annotation based on correlative kernel linear neighborhood propagation
ZHANG Jian-ming;YAN Ting;SUN Chun-mei
..............page:605-609,630
Immune genetic path planning algorithm based on track safety evaluation
ZHU Xue-fen;TU Gang-yi
..............page:354-356
Threshold group signcryption scheme with high security
FENG Jun;WANG Xue-ming
..............page:503-506
Image fusion algorithm based on Bayesian compressive sensing
ZHOU Hong-zhi;FENG Ying-ying;WANG Dai-mu
..............page:613-615
Game theory based task allocation algorithm for multi-robot systems
LI Ping;YANG Yi-min
..............page:392-395
Algorithm of indoor location based on Voronoi graph and ray-tracing
YUAN Zheng-wu;WANG Dan-dan
..............page:399-401
Improved multiple ant colony algorithm for emergency evacuation in large building
DUAN Peng-fei;XIONG Sheng-wu;LI Hui
..............page:357-359,363
Estimation of non-stationary network internal loss based on temporal and spatial correlation
ZHOU Wei;CHEN Kai-yun;FEI Gao-lei;HU Guang-min
..............page:557-559,581
Study of dynamically reconfigurable algorithm for low-power cache
REN Xiao-xi;LIU Qing
..............page:414-416