Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Wuhan University of Technology
1671-4431
2010 Issue 20
Image Based Geometry Simplification Method
WAN Fang1;3;HE Fa-zhi1;WAN Yuan2
..............page:41-45
Automation Trust Negotiation Model Based on the Petri Net
HE Yan1;2;ZHENG Chun-ying1
..............page:103-107
Efficient Password-based Authenticated Group Key Agreement Protocol
ZHENG Ming-hui1;2;CUI Guo-hua2
..............page:22-26,31
Research on Performance Optimization Approach of Data-intensive Application with MapReduce
LIU Chao;JIN Hai;JIANG Wen-bin;LI Hao
..............page:36-40,45
Twig Pattern Matching Algorithm Based on PSB Encoding
WU Wen-ying1;2;XIAO Ying-yuan1;2;JIANG Tao1;2;YUAN Xiao-jie3;Ministry of Education;Tianjin 300191;China;3.College of Information Technical Science;Nankai University;Tianjin 300071;China)
..............page:46-50
New Mass Mailing Tool for Academic Conference Organization
ZHANG Wei1;RUAN Xia2;YANG Xiao-bin1;LONG Jin-jiu3;JIANG Wen-bin3
..............page:123-127
Design and Implementation of Xen Virtual Cluster Monitor
LIU Yang;XIAO Nong;SHEN Li
..............page:184-188
Real Time Audit Model Based on Interactive Short Message
ZHANG Cheng-bin1;TU Xu-ping2;LIAO Zhen-song3
..............page:99-102,107
Modeling and Performance Analysis for 802.15.4 MAC Based on Advancing Sleep
CHENG Hong-bin1;WANG Hai-jun2
..............page:142-146
Multicast Joining Algorithm with QoS Constraints
LV Hui;HE Yan-xiang;TU Hang
..............page:200-204
Image Fusion Method Based on Wavelet Frame Transform
ZHANG Bin;ZHENG Yong-guo;DONGYE Chang-lei
..............page:156-159
Integrative Analysis Software System for MEAs Data
HUANG Yu;HU Bin;JING Xiu;WANG Jian-yong
..............page:164-168
Software Fault-proneness Prediction with Limited Labeled Data
LUO Yun-feng;BEN Ke-rong
..............page:178-183
Optimizing Behavior Model Building for Trusted Computing Dynamic Verification
YU Yue1;YU Fa-jiang1;2;KONG Ya-nan1
..............page:169-173
Error Control Scheme in Wireless Sensor Networks
YAO Wu-jun1;WEI Li-xian1;2;YANG Xiao-yuan1;3;ZHU Jun-jie1
..............page:88-93,98
Key Management Scheme Based on Threshold for Heterogeneous Wireless Networks
WANG Xin-ying;WU Zhao;LI Yong;XU Ge-jing
..............page:32-35
Decision Support-Oriented Selection Approach of Cube Materialization
JIN Xin1;2;GAN Liang2;LIU Jian2
..............page:16-21
Hybrid Genetic Algorithm Optimization for Aerospace Vehicle Fuel Consumption
WU Di;WANG Feng;YANG Sheng-yao
..............page:147-150,155
Incremental Updating Algorithm Based on Association Rules
WU Li-feng;HOU Rui;WANG Jiang-qing
..............page:151-155
Weighted Linear Normalization Method of Infrared Image
WU Shi-qian;LU Yu;FANG Zhi-jun;XIE Zhi-hua
..............page:1-5
Grbner-based Decoding Methods for Error-correct Codes
LI Yao-hui;WU Tao;ZHAO Hai-bao;Tigist K Mamo
..............page:51-54,60
Novel Hybrid Re-sampling Algorithm Based Imbalanced Data Sets
GU Qiong1;WANG Xian-ming2;LI Wen-xin1
..............page:55-60
Survivability Evaluation of Military Information Networks Based on Cloud Model
CAI Jun-ping;XIAO Zhi-ting;LI Xue-dong
..............page:11-15,21
Mobile Phone Malware Analysis System on the Mobile Gateway
YANG Jian-qiang;LI Xue-feng
..............page:61-64,68
Application of Cellular Automata in Protein Folding
WU Rui-chan1;HU Dao-chun2
..............page:65-68
Interactive Augmented Reality Method Based on Collision Detection
ZHAO Yuan-jie1;GUO He1;WANG Yi1;MA Xiao-gang2
..............page:160-163,168
Real-time Robust Embedding Algorithm Based on Spatial Domain for Digital Fingerprinting
ZHOU Jun1;WANG Shan-shan2;LING He-fei2;WANG Li-yun2
..............page:174-177,183
Information Security and Its Countermeasures of RFID System of Internet of Things Sensing Layer
LIU Li-min;XIAO De-bao;LI Lin;SHUI Hai-hong
..............page:79-81,87
Urban Traffic State Forecast Based on Internet of Things Sensors
WANG Yan-jun1;LV Zhi-yong2;HUANG Lei1
..............page:108-111
Research on an Improved Algorithm of Concept Semantic Similarity Based on Ontology
LIU Jing-fang1;ZOU Ping1;ZHANG Peng-zhu2;QI Feng3
..............page:112-117
Research on Based on Data Object Access Model
LIU Qun1;FENG Dan2;LI Jian2
..............page:118-122,127
Composition Model of Web Service Based on Requirement Transition
ZHANG Zhao-yu;SHEN Xiao-jin;SUN Li-ping
..............page:128-131,136
Requirement Recommended Approaches based on ReqWiki Metal Model
CHEN Sha;PENG Rong
..............page:132-136
A Weighted Block-DCT and Block-FLD Infrared Face Recognition Method Based on Blood Perfusion Image
XIE Zhi-hua1;2;WANG Zheng-zi1;HE Cui-qun3;LUO Gui-hua2;GAN Yun2
..............page:82-87
Implementation of the Speech Coding System Based on G.729A
WANG Yuan-li;FANG Cun-guo
..............page:74-78
Research on Key Technologies of the Computer Aided Rejoining of the Bones/Tortoise Shells with Inscriptions
WANG Ai-min1;2;ZHONG Luo2;GE Yan-qiang1;LIU Guo-ying1
..............page:194-199
Performance Simulation Model for Web Service Composition
WU Zhao;YUAN Lei;WANG Xin-ying;XIONG Wei
..............page:6-10
ERMF: Preventing Document from Leakage Via Extended Reference Monitor
MA Jun;WU Jiang-jiang;CHENG Yong;MEI Song-zhu;REN Jiang-chun;WANG Zhi-ying
..............page:27-31
Parallel Line-up Competition Algorithm and Its Application
SHI Bin;ZHANG He-feng;YAN Lie-xiang
..............page:69-73