default search action
Journal of Digital Content Technology and its Applications, Volume 4
Volume 4, Number 1, February 2010
- Zenon Chaczko, Jenny Quang, Bruce Moulton:
Knowledge Transfer Model for the Development of Software Requirements Analysis CASE Tools to Be Used in Cross Time-Zone Projects. 10-15 - Ali Alqahtani, Hussein Zedan:
Agile Service-Oriented Applications: Rule-based Foundation with Runtime Adaptability. 16-25 - Rerkchai Fooprateepsiri, Werasak Kurutach:
A Highly Robust Approach Image Identification based-on Hausdorff-Trace Transform. 26-31 - Chaohong Song, Feng Shi:
Prediction of Subcellular Localization of Apoptosis Proteins by Dipeptide Composition. 32-36 - Ali Hadian, Mahdi Nasiri, Behrouz Minaei-Bidgoli:
Clustering Based Multi-Objective Rule Mining using Genetic Algorithm. 37-42 - Yini Bao, Erwin M. Bakker:
Content Based Web Sampling. 43-68 - Timo Koskela, Janne Julkunen, Otso Kassinen, Mika Ylianttila:
User Evaluation of a Community-centric Music Voting Service. 69-78 - Alejandro Carrasco, M. C. Romero-Ternero, Francisco Sivianes, M. D. Hernández, J. I. Escudero:
Multi-Agent and Embedded System Technologies Applied to Improve the Management of Power Systems. 79-85 - Li Wei, Eung-Joo Lee:
3D Face Recognition Using Face Feature Points Based on Parallel Stereo Vision. 86-95 - Marini Othman, Abdullah Mohd Zain, Abdul Razak Hamdan:
A Review on Project Management and Issues Surrounding Dynamic Development Environment of ICT project: Formation of Research Area. 96-105 - Dong Wang, Jionghui Jiang, Shisheng Zhou:
Image Based Simulation for Pyrography Style Painting. 106-111 - Li Wei, Eung-Joo Lee:
Multi-pose Face Recognition Using Head Pose Estimation and PCA Approach. 112-122 - Potti Subbaraj, Pon S. Godwin Anand:
GA Optimized Knowledge Base of FLC for Complex Industrial Process. 123-136 - Yücel Batu Salman, Hong-In Cheng, Ji Young Kim, Patrick E. Patterson:
Medical Information System With Iconic User Interfaces. 137-148 - Marcelo de Carvalho Alves, Luiz Gonsaga de Carvalho, Edson Ampélio Pozza, Luciana Sanches Alves:
A Soft Computing Approach For Epidemiological Studies of Coffee And Soybean Rusts. 149-154
Volume 4, Number 2, April 2010
- Walter F. Witt III:
Keep Your Feet on the Ground When Moving Software into the Cloud. 10-17 - S. M. Riazul Islam, Kyung Sup Kwak:
On Channel Estimation in MB-OFDM UWB Systems with Time Varying Dispersive Fading Channel. 18-24 - Chi-Yen Yin, Yan-Ping Chi:
A Historical Review and Trend Analysis of Ubiquitous Computing Research Using Bibliometric Methodology During 1993 to 2009. 25-35 - Maha A. Al-Bayati, Karim Q. Hussein:
Comparison Between Modes of Communication for the Deaf and Dumb via e-Learning Through Case Study (sign language and finger spelling in review). 36-39 - Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-Cheon Yang:
Hand Mouse: Real Time Hand Motion Detection System Based on Analysis of Finger Blobs. 40-56 - Abdelhak Boubetra:
Knowledge Virtualization of Future Social System Behavior through Computer Simulation. 57-62 - Pedram Hajipour, Kolsoom Abbasi Shahkooh:
Characterizing MEGACO Security in the presence Diameter Server. 63-68 - Xun-Yi Ren, Ruchuan Wang, Qiang Kong:
P2P Replica-tree based Consistency Maintenance Strategy. 69-73 - Hyun Lee, Byoungyong Lee, Kyungseo Park, Ramez Elmasri:
Fusion Techniques for Reliable Information: A Survey. 74-88 - Daxing Zhang, Shiming Liang, Zhigeng Pan, Haihua Li, Xin Liu:
An Image Authentication Scheme Based on Correlation. 89-94 - Manisha Rathi, Anand Priyadarshini, Ankit Rastogi:
Predictive Analysis for Customer Relationship Management. 95-99 - Jianfeng Hu, Xiaofeng Li, Jinghai Yin:
Learning and Decision Making in Human During a Game of Matching Pennies. 100-108 - Zhengjun Cheng, Yuntao Zhang, Changhong Zhou, Wenjun Zhang, Shibo Gao:
Classification of Skin Sensitizers on the Basis of Their Effective Concentration 3 Values by Using Adaptive Boosting Method. 109-121 - Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali:
A Potent Model for Unwanted Traffic Detection in QoS Network Domain. 122-130 - Lilin Fan, Chunhong Liu, Qian Liu:
The Application Research of High-dimensional Mixed-attribute Data Clustering Algorithm. 131-134 - Guoqiang Cai, Limin Jia, Jianwei Yang, Haibo Liu:
Improved Wavelet Neural Network Based on Hybrid Genetic Algorithm Applicationin on Fault Diagnosis of Railway Rolling Bearing. 135-141 - Jianhong Zhang, Hua Chen, Shengnan Gao:
Efficient Blind Signature Scheme based on Modified Generalized Bilinear Inversion for Multiple Signers. 142-148
Volume 4, Number 3, June 2010
- Dongli Han, Xin Song, Kazuki Maeda:
Topic Presentation for a Free Conversation System Based on the Web Texts. 7-14 - Yuyu Yin, Ying Li, Jianwei Yin, ShuiGuang Deng:
Proof as Composition: An approach for the Large-granularity Web Services Composition. 15-34 - Yuntao Zhang, Wenbin Dai, Zhengjun Cheng:
QSPR Study Of Mineral Crystal Lattice Energy Based On Gene Expression Programming. 35-42 - Jianhua Wu, Zhaorong Wei, Youli Chang:
Color and Texture Feature For Content Based Image Retrieval. 43-49 - Tzu-Chih Chung, Li-Ya Tseng:
Advanced Interactive T-Learning System with Variable Remote Control. 50-60 - Saleh Ali Alomari, Putra Sumari, Sadik A. M. Al-Taweel, Ahmed M. Manasrah:
CUSTP: Custom Protocol for Audio and Video Conferencing System over P2P Networks. 61-74 - Najet Arous, Noureddine Ellouze:
On the Search of Organization Measures for a Kohonen Map Case Study: Speech Signal Recognition. 75-84 - Jingli Zhou, Ke Liu, Leihua Qin, Xuejun Nie:
Block-Ranking: Content Similarity Retrieval Based on Data Partition in Network Storage Environment. 85-94 - Hui Gao, Jun Jiang, Li She, Yan Fu:
A New Agglomerative Hierarchical Clustering Algorithm Implementation based on the Map Reduce Framework. 95-100 - Taifei Zhao, Xizheng Ke, Peilin Yang:
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks. 101-109 - Wen-Jye Shyr, Chia-Ming Lin, Wei-Ting Chiang:
WebAccess Based Remote Graphic Surveillance System for Mechatronics. 110-116 - Hai Guo, Jing-ying Zhao, Xiao Niu Li:
Preprocessing Method for NaXi Pictographs Character Recognition Using Wavelet Transform. 117-131 - Chunxue Wu, Fengna Zhang, Hongming Yang:
A Novel QoS Multipath Path Routing in MANET. 132-136 - Gengzhong Zheng, Sanyang Liu, Xiaogang Qi:
A Power Control Algorithm Based on Non-cooperative Game for Wireless CDMA Sensor Networks. 137-145 - Jin Liu, Jing Sun, Zhengquan Xu, Lu Gao:
Security Web Release and Visualization of Remote Sensing Images. 146-153 - Zhi-Qiang Cheng, Yi-Zhong Ma, Jing Bu:
Mean Shifts Identification Model in Bivariate Process Based on LS-SVM Pattern Recognizer. 154-170 - Chi-Man Pun, Xiaochen Yuan:
Robust and Geometric Invariant Watermarking Scheme using Block and Gray-Level Histograms. 171-183 - Xiaogang Qi, Lifang Liu, Sanyang Liu:
Experimental Study on Connectivity for Wireless Sensor Networks. 184-189 - Ali Cherif Chaabani, Atef Boujelben, Adel Mahfoudhi, Mohamed Abid:
An Automatic-Pre-processing Method For Mammographic Images. 190-201 - Jun Li, Youdong Ding, Yunyu Shi, Wei Li:
A Divide-And-Rule Scheme For Shot Boundary Detection Based on SIFT. 202-214 - Jinlong Wang, Can Wen, Shunyao Wu, Huy Quan Vu:
A Visual Mining System for Theme Development Evolution Analysis of Scientific Literature. 215-223 - Chyi-Lu Jang:
Measuring Electronic Government Procurement Success and Testing for the Moderating Effect of Computer Self-efficacy. 224-232 - Hamid Turab Mirza, Ling Chen, Gencai Chen:
Practicability of Dataspace Systems. 233-243
Volume 4, Number 4, July 2010
- Wenbo Shi, Injoo Jang, Hyeong Seon Yoo:
An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext. 7-14 - Jian Hu, Gangyan Li, Yeqiong Song:
Signal Framing Methods of Automotive Embedded Networked Control System for Bandwidth Consumption Optimization. 15-27 - Lu Lu, Xiuxia Quan:
Session-Based User Behavior Meta-Model of Web Applications for User-Level QoS Load Testing. 28-42 - Hongjun Guan:
WEB-based Modeling and Simulation Technology in the Training of Power Plant Application -A Set of Steam Turbine for Instance. 43-47 - Li Zhang, Guoxin Zheng:
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive Radio Networks. 48-57 - Hong Chen:
An Approach to Traffic Volume Forecasting Based on Ant Colony Neural Network. 58-63 - Zezhong Xu:
A Globally Consistent Solution to Multiview Image Registration. 64-74 - Syed Amjad Ali, Srinivasan Vathsal, K. Lal Kishore:
CT Image Denoising Technique using GA aided Window-based Multiwavelet Transformation and Thresholding with the Incorporation of an Effective Quality Enhancement Method. 75-87 - Yingkun Hou, Chunxia Zhao, Yong Cheng, Zhengli Zhu:
Image Watermarking Resynchronization to Geometric Attacks in DWT Domain. 88-98 - Zheng Chen:
An Error correcting scheme for Color-PDF417. 99-106 - Osama Hosam, Lincong Yang, Wei Liang, Xingming Sun:
Watermarking 3D Triangular Mesh with High Visual Quality. 107-116 - Chi-Man Pun, Jing-Jing Jiang:
Key-Selective Patchwork Method for Audio Watermarking. 117-126 - Jian-wei Yang, Dechen Yao, Guo-qiang Cai, Hai-bo Liu, Jiao Zhang:
A Method of Bearing Fault Feature Extraction Based on Improved Wavelet Packet and Hilbert Analysis. 127-139 - Jinjiang Li, Hui Fan, Da Yuan:
Fractal Digital Image Inpainting. 140-150 - Yunyu Shi, Youdong Ding, Jun Li:
A user-perceived video quality assessment metric using inter-frame redundancy. 151-160 - Ming-Hour Yang, Shiuhpyng Shieh:
Tracing Anonymous Mobile Attackers in Wireless Network. 161-173 - Xinwu Li:
A New Clustering Segmentation Algorithm of 3D Medical Data Field Based on Data Mining. 174-181 - Haiyan Li, Jihua Wang:
SH3 Domain Unfolding Pathway Studied by Protein Contact Network Model. 182-192 - Xun-Yi Ren, Zheng-Hua Qi, Ruchuan Wang, Xiaodong Ma:
Rough Set and A* based Tasks Scheduling in Gird Environment. 193-198 - Huang Zhi, Sanyang Liu, Xiaogang Qi:
Overview of Routing in Dynamic Wireless Sensor Networks. 199-206 - Fatemeh NasserEslami, Fatemeh Saghafi:
Safety technologies impacts survey in M-services security provision. 207-214 - Ying Wang, Daoping Wang, Guangli Liu, Di Li:
Data Integration Platform for Village Emergency. 215-217
Volume 4, Number 5, August 2010
- Sushma D. Ghode, S. A. Chhabria, Rajiv V. Dharaskar:
Computer Interaction System using Hand Posture Identification. 8-12 - Hee Wan Kim, Hee Suk Seo, Sun Ho Hong, Chul Kim:
Modeling of Energy-efficient Applicable Routing Algorithm in WSN. 13-22 - Anan Liu, Zhaoxuan Yang:
Watching, Thinking, Reacting: A Human-Centered Framework for Movie Content Analysis. 23-37 - Jing Lu, Dunlu Peng, Huan Huo, Liping Gao, Xiaodong Zhu:
Analyzing Triggers in XML Data Integration Systems. 38-45 - Junwu Zhu, Bin Li, Fei Wang, Sicheng Wang:
Mobile Ontology. 46-54 - Rongjie Liu, Guangsheng Cao, Jie Zhang, Pingjian Song, Binge Cui:
Research on Dynamic Web Services Management Based on QoS. 55-61 - Changjiang Zhang, Xiang Zhang, Bo Yang, Ying Li:
Segmentation for Eyed Typhoon Cloud Image by Curvature and Fractal Feature. 62-73 - Jun Li, Youdong Ding, Yunyu Shi, Jianfei Zhang:
Building a Large Annotation Ontology for Movie Video Retrieval. 74-81 - Fu-guo Dong, Yu-rong Li, Jin-jiang Li:
The Consistency Analysis of Addition Chains for Several Fast Algorithm of Modular Exponentiation. 82-88 - Yuhuan Zhou, Xiongwei Zhang, Jinming Wang, Yong Gong:
Research on SVDD Applied in Speaker Verification. 89-95 - Shifei Ding, Li Xu, Hong Zhu, Liwen Zhang:
Research and Progress of Cluster Algorithms based on Granular Computing. 96-104 - Tao Zhu, Jin-ming Wang, Xiong-wei Zhang, Peng Zhang:
Distortion Estimation Method for Coefficient Dropping of H, 264 Bit-stream. 105-111 - Zehui Qu, Deng Wei, Zhiguang Qin:
A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach. 112-117 - Jin-Cherng Lin, Kuo-Chiang Wu:
Analyze on the Learning Behavior of E-Learning. 118-123 - Jian-ming Cui:
Research on Data Fitting of key Model for Traffic Flow. 124-128 - Huey-Min Sun, Xing-Jun Tsai:
The Effect of Organizations Resources on Performance for Digital Content Industry. 129-142 - Anirban Kundu, Chandan Banerjee, Priya Saha:
Introducing New Services in Cloud Computing Environment. 143-152 - Jia Lee, Xin Huang, Qingsheng Zhu:
Decomposing Fredkin Gate into Simple Reversible Elements with Memory. 153-158 - Yun Her, Su-Kyoung Kim, YoungTaek Jin:
A Context-Aware Framework using Ontology for Smart Phone Platform. 159-167
Volume 4, Number 6, September 2010
- Xia Zhuge, Koji Nakano:
Halftoning via Error Diffusion using Circular Dot-overlap Model. 8-17 - Lingqiu Zeng, Hongchun Qu, Qingsheng Zhu, Youlan Wang:
Incorporating Graph Automata into Plant Growth Simulation with Nutrients Transport. 18-25 - Zhongzhi Li, Xuegang Wang:
Spatial Clustering Algorithm Based on Hierarchical-Partition Tree. 26-35 - Jinjiang Li, Zhi-Yonga An, Hui Fan, Yewei Li:
Multifocus Image Fusion Algorithms using Dyadic non-subsampled Contourlet Transform. 36-47 - Ming-Hour Yang:
Polymorphic Penetration Testcode Carrier. 48-61 - Pin Lv, Yuntao Wu:
Generalization Step Analysis for Privacy Preserving Data Publishing. 62-71 - Bingzhou Li:
Modelling for Cruise Two-Dimensional Online Revenue Management System. 72-78 - Fuguo Dong, Hui Fan, Da Yuan:
A Novel Image Median Filtering Algorithm based on Incomplete Quick Sort Algorithm. 79-84 - Lifeng Wu, Fuxue Zhang:
A Novel Non-driven Structural MEMS-based Gyroscope. 85-88 - Rongzhi Liu, Bei Hu:
Research on the Industrial Cluster Incubation System for Entrepreneurial Activities: the Construction and Functions. 89-93 - Peng Wang, Haiqi Dai, Shuliang Ding:
Computerized Adaptive Testing in Chinese Mainland: A Review. 94-99 - Siwar Zribi Boujelbene, Dorra Ben Ayed Mezghanni, Noureddine Ellouze:
Improving SVM by Modifying Kernel Functions for Speaker Identification Task. 100-105 - Thekra Abbas, Beiji Zou:
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image. 106-114 - Dongming Chen, Jing Wang, Xiaodong Chen, Xiaowei Xu:
A Search Algorithm for Clusters in a Network or Graph. 115-122 - Hui Zhao, Peiquan Jin, Puyuan Yang, Lihua Yue:
BPCLC: An Efficient Write Buffer Management Scheme for Flash-Based Solid State Disks. 123-133 - Guowei Xue, Yan Zhang:
A Parallel Backprojection Algorithm for Spiral Cone-Beam CT Exact Reconstruction. 134-143 - Di Jia, Fangfang Han, Jinzhu Yang, Yifei Zhang, Dazhe Zhao, Ge Yu:
A Synchronization Algorithm of MRI Denoising and Contrast Enhancement Based on PM-CLAHE Model. 144-149 - Xue Deng, Junfeng Zhao, Lihong Yang, Rongjun Li:
Possibilistic mean-variance utility to portfolio selection for bounded assets. 150-160 - Wenyong Xiao:
Multi-factor predication of diesel engine by using artificial neural networks. 161-167
Volume 4, Number 7, October 2010
- Eleonora Pantano, Vincenzo Corvello:
Digital contents management for improving consumers' experience. 8-10 - Massimo Franco, Francesca Di Virgilio, Loredana Di Pietro:
A Conceptual Representation of Consumer's Group Knowledge and the Possible Role of New Technologies. 11-22 - Pierpaolo Singer, Maria Antonella Ferri, Lucia Aiello, Claudia Cacia:
Internet as a "point of synergy" between communication and distribution: hypothesis of model applied to tourism. 23-37 - Francesco Sofo, Michelle Berzins, Salvatore Ammirato, Antonio Volpentesta:
Investigating the relationship between consumers' style of thinking and online victimization in scamming. 38-49 - Andrew Newman, Charles Dennis, Len-Tiu Wright, Tamira King:
Shoppers' Experiences of Digital Signage-a Cross-National Qualitative Study. 50-57 - Phoebe R. Apeagyei:
Application of 3D body scanning technology to human measurement for clothing Fit. 58-68 - Zan Gao, Marcin Detyniecki, Ming-yu Chen, Alexander G. Hauptmann, Howard D. Wactlar, Anni Cai:
The Application of Spatio-temporal Feature and Multi-Sensor in Home Medical Devices. 69-78 - Yiqun Li, Li Xiong, Rui Wang:
The Informatization Development of Foreign Trade Enterprise in China: Case in Proceeding Trade. 79-87 - Bo Meng, Wei Huang, Zimao Li, Dejun Wang:
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus. 88-107 - Liping Zhang, Fengyu Lei, Jin Chen:
The Larger Integer Library and the Diffie-Hellman Protocol based on XTR. 108-114 - Wei Wei, Bin Zhou:
Features Detection Based on a Variational Model in Sensornets. 115-127 - Junsheng Zhang, Yunchuan Sun:
An Analogy reasoning model for Semantic Link Network. 128-139 - Kaihong Guo, Wenli Li:
A C-OWA Operator-based Method for Aggregating Intuitionistic Fuzzy Information and Its Application to Decision Making under Uncertainty. 140-147 - Yiling Wen, Jianfeng Ma, Sang-Jae Moon:
Efficient and Identity-based Signcryption with Provably-secure. 148-153 - Ahmed Sallam, Zhiyong Li, Shaimaa Hassan:
Web Services Supervision System Based on Jade. 154-164 - Mehrnoush Shamsfard, Mahsa Arab Yarmohammadi:
A Semantic Approach to Extract the Final Answer in SBUQA Question Answering System. 165-176 - Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang:
Evolution Cipher against Differential Power Attack. 177-189 - Jianhong Zhang, Min Xu, Xue Liu, Xiuna Su:
On the Security of Convertible Multiauthenticated Encryption Scheme and Its Improved Scheme. 190-196 - Yu-rong Li, Fu-guo Dong:
A Novel Pixel Line Based Algorithm for Line Generation. 197-202 - Jianhua Dai, Xiaochun Liu, Qing Xu, Nenggan Zheng, Shaomin Zhang, Weidong Chen, Xiaoxiang Zheng:
Neural spike sorting by rough set method. 203-209 - Yingyuan Xiao, Guang Yang, Hua Zhang, Kevin Lü:
An Efficient Region Matching Method for Content-based Image Retrieval. 210-214 - Jianguo Chen, Stefan D. Bruda:
An Efficient Feedback-based Trust Model for Pervasive Computing. 215-225 - Jian Wang, Yanheng Liu, Wenbin Gao:
Securing Internet of Vehicles Using TCM. 226-233
Volume 4, Number 8, November 2010
- Wen Si, Zhuang-zhi Yan, Yi Li, Shu-Peng Liu:
The Crouch Start Modeling and Simulation Based on AnyBody Technology. 8-14 - Lingqiu Zeng, Hongchun Qu, Qingsheng Zhu, Youlan Wang:
Incorporating Graph Automata into Plant Growth Simulation with Nutrients Transport. 15-22 - Jia Mei, Huaikou Miao, Yihai Chen, Honghao Gao:
Verifying Web Services Composition Based on Interface Automata Using SPIN. 23-33 - Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression. 34-42 - Xiuzhi Shi, Bin Wang, Jinfang Sheng, Wei Zhu:
Holographic View Language HVL4DCAM For Aspectual Middleware Platform. 43-54 - Zhanmao Cao, Jianchao Tang, Shizhong Jiang, Huixuan Wu:
Optimization Multiple Sequence Alignment Scheme in DC-BTA. 55-64 - Bin Wang, Jinfang Sheng, Jian Ding:
DCAM: A Distributed Aspectual Middleware. 65-78 - Bing Liu, Ping Fu, Shengwei Meng, Lunping Guo:
Compressive Sensing Signal Detection Algorithm Based on Location Information of Sparse Coefficients. 79-85 - Si Li, Huiji Gao, Jingyi Guan, Weiran Xu, Jun Guo:
Faceted Blog Distillation System: Find an in-Depth Blog. 86-91 - Hongwei Wang, Lijuan Zheng, James N. K. Liu:
Measuring The Performance of Information Systems Using Data Envelopment Analysis. 92-101 - Ali Mohammed Noori Hasan, Robert Craig, Hanaa A. Hassan:
Implementation of Chaotic on Off Keying (COOK) Using a High Resolution Digital Chaotic Signal. 102-109 - Bo Jiang, Yun Ling, Jiale Wang:
Tag Recommendation Based on Social Comment Network. 110-117 - Masoomeh Zameni, Mahmood Fathy, Amin Sadri:
A Low Cost Algorithm for Expected Goal Events Detection in Broadcast Soccer Video. 118-125 - Weixin Si, Zhiyong Yuan, Ruixue Mao, Jianhui Zhao, Xiangyun Liao, Zhaoliang Duan:
Modeling and Realization of Virtual Acupuncture Training Simulation System. 126-136 - Mutian Li, Yongping Zhao, Qisong Wang:
Ignition Coil Insulation Fault Detection Algorithm. 137-142 - Anan Liu, Dong Han:
Spatiotemporal Sparsity Induced Similarity Measure for Human Action Recognition. 143-149 - Ang Gao:
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks. 150-163 - Yong-uk Park, Hyuk-chul Kwon:
An Efficient Syntactic Analyzer Using Semantic Connection Units. 164-171 - Xia Yin, Weiguo Zhang, Jianping Wu, Wei Zhang:
Can Longest Prefix Matching Make The Path Length Shorter? 172-181 - Xin-hua Zhu, Qing-ling Zeng, Qing-hua Cao:
A Complex XML Schema to Map the XML Documents of Distance Education Technical Specifications into Relational Database. 182-192 - Fuguo Dong:
Several Incomplete Sort Algorithms for Getting the Median Value. 193-198 - Lilin Fan, Huili Meng:
Application Research on Optimal Path Based on Genetic Algorithm. 199-202 - Xun-Yi Ren, Xiao-Dong Ma:
A* Algorithm Based Optimization for Cloud Storage. 203-208 - Ren Ya-fei, Ke Xi-zheng:
Selection of Wavelet Decomposition Level in Multi-Scale Sensor Data Fusion of MEMS Gyroscope. 209-215 - Jianhua Dai, Xiaochun Liu, Shaomin Zhang, Huaijian Zhang, Qing Xu, Weidong Chen, Xiaoxiang Zheng:
Continuous Neural Decoding Method Based on General Regression Neural Network. 216-221 - Jianwei Wang, Zhongxiao Hao:
Research on Querying Node Probability Method in Probabilistic XML Data Based on Possible World. 222-231 - Kezheng Lin, Ying Xu, Yuan Zhong:
Using Kernel Discriminant Analysis and 2DGabor Local Features Fusion for Face Recognition. 232-241 - Joseph K. Siror, Guanqun Liang, Kaifang Pang, Huanye Sheng, Dong Wang:
Use of RFID for Intelligent Pre-shipment Inspection. 242-251 - Gengxin Sun, Fengjing Shao Name, Sheng Bin:
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer. 252-259
Volume 4, Number 9, December 2010
- Pingshui Wang:
Survey on Privacy Preserving Data Mining. 1-7 - Yun Li, Lianglei Sun, Jiang Yin, Wenyan Bao, Mengyuan Gu:
Multi-Level Weighted Sequential Pattern Mining Based on Prime Encoding. 8-16 - Jiming Li, Chengqin Shi, ZhaoHua Wang:
The Impact of Debt Financing on Firm Investment Behavior: Evidence from China. 17-26 - Xiaowei Zhang, Bin Li, Junwu Zhu, Jun Wu:
Utility Based Optimal Task Scheduling Problem in a Multi-agent System. 27-35 - Wang Yu, Zhu Feng, Geng Hua, Zhuwang Jing:
The Partner Selection in Virtual Enterprise based on BDI Agent. 36-43 - Bin Wang, Gaofeng Pan, Xin Li, Chunyan Su:
The Design and Development of Testing Information System of Psychodiagnosis for Equestrianism Players. 44-50 - Hongyu Ma, Yun Chen, Hanying Tang:
Moderate Effect of Job Commitment on the Relationship between Employees' Emotional Labor and Burnout. 51-60 - Xiao Liang, Yong Gan, Lei Wan:
Motion Controller for Autonomous Underwater Vehicle Based on Parallel Neural Network. 61-67 - Yao Rong, Jiandong Wang:
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform. 68-79 - Liuyong Yang, Shensheng Mo, Anqi Zhou:
The Financial Structure and High-Tech Industries Development in China. 80-87 - Wenfa Zhan, Jun Ma, Shanshan Du, Jun Liu:
A LFSR Reseeding Scheme Based on Division by 2 to the Power of Integer. 88-96 - Xiujuan Li, Tao Cai, Shiguang Ju:
The Hash Postfix Table Based Metadata Management Algorithm for Mass Storage System. 97-105 - Zhimin Chen, Yi Jiang, Yao Zhao:
A Collaborative Filtering Recommendation Algorithm Based on User Interest Change and Trust Evaluation. 106-113 - Amin Jajarmi, Hamidreza Ramezanpour, Arman Sargolzaei, Pouyan Shafaei:
Optimal Control of Nonlinear Systems Using the Homotopy Perturbation Method: Infinite Horizon Case. 114-122 - Xin-feng Zhu, Jiandong Wang, Bin Li:
Using Multivariate Regression Methods to Resolve Overlapped Electrochemical Signals. 123-131 - Yuecheng Yu, Jiandong Wang, Guansheng Zheng, Bin Gu:
Semi-supervised Distributed Clustering with Mahalanobis Distance Metric Learning. 132-140 - Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Decryptable Public Key Encryption with Keyword Search Schemes. 141-150 - Liming Fang, Willy Susilo, Yongjun Ren, Chunpeng Ge, Jiandong Wang:
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. 151-160 - Xuelong Hu, Wei Tian, Yongai Zheng:
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor. 161-167 - Jiagen Sheng, Sifeng Liu:
A Knowledge Recommend System Based on User Model. 168-173 - Mojtaba Romoozi, Hossein Ebrahimpour-Komleh:
A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms. 174-179 - Ruixiang Liu:
The Sources of China's Economics Growth during 1997-2007: An Analysis based on Input-Output Approach. 180-185 - Zhengli Zhu, Chunxia Zhao, Yingkun Hou:
Texture Image Classification Based on Nonsubsampled Contourlet Transform and Local Binary Patterns. 186-193 - Qi Yang, Yuxiang Zhuang, Jianghong Shi:
An Evolutionary MAC Protocol based on FPRP for Decreasing Delay. 194-200 - Yajun Jiang, Bo Yang, Mingwu Zhang:
A Classified Credential Selection Scheme with Disclosure-minimizing Privacy. 201-211 - Fan Lin, Wenhua Zeng, Yi Jiang:
A Cloud Tracing and Filtering Framework for Defensing Against Denial of Service Attacks. 212-224 - Jianghua Huang, Junying Zhang:
Distributed Dual Cluster Algorithm Based on Grid for Sensor Streams. 225-233 - Kuang Haibo, Jian Wang:
Research on Single Port Investment Decision-making Optimization Model Based on Real Options. 234-241 - Jun Yin, Zhong Jin, Jingbo Zhou:
Normalized Direct Linear Discriminant Analysis with its Application to Face Recognition. 242-251 - Yongguo Liu, Jianrui Hao:
On Using Tabu Search for RNA Secondary Structure Prediction. 252-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.