Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Computers

ISSN: 1796--203X
Publisher: ACADEMY PUBLISHER


ADD TO MY LIST
 
Measuring Software Component Reusability by Coupling and Cohesion Metrics

Author(s): Gui Gui | Paul D. Scott
Volume: 4
Issue: 9
Year: 2009
Development of Collaboration Environments for Web-Based Learning

Author(s): Taro Yabuki | Hiroshi Sakuta
Volume: 2
Issue: 9
Year: 2007
The Emotion Sign: Human Motion Analysis Classifying Specific Emotion

Author(s): Yuichi Kobayashi
Volume: 3
Issue: 9
Year: 2008
SOBIE:A Novel Super-node P2P Overlay Based on Information Exchange

Author(s): Zhigang Chen | Jiaqi Liu | Deng Li | Hui Liu | Athanasios Vasilakos
Volume: 4
Issue: 9
Year: 2009
Trust-Based Constraint-Secure Interoperation for Dynamic Mediator-Free Collaboration

Author(s): Lingli Deng | Ziyao Xu | Yeping He
Volume: 4
Issue: 9
Year: 2009
Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Author(s): Mianxiong Dong | Long Zheng | Kaoru Ota | Song Guo | Minyi Guo | Li Li
Volume: 4
Issue: 9
Year: 2009
Modeling a Hypothetical Chlorine Release on a College Campus

Author(s): Kerrie J. Long | Frank J. Zajaczkowski | Sue Ellen Haupt | L. Joel Peltier
Volume: 4
Issue: 9
Year: 2009
Modified CMOS Multiplication Algorithm Using Optimized Array Structure

Author(s): P. Assadee
Volume: 4
Issue: 9
Year: 2009
Sharing Biomedical Learning Knowledge for Social Ambient Intelligence

Author(s): Sabah Mohammed | Jinan Fiaidhi | Osama Mohammed
Volume: 4
Issue: 9
Year: 2009
Canonical Polygon Queries on the Plane: A New Approach

Author(s): S. Sioutas | D. Sofotassios | K. Tsichlas | D. Sotiropoulos | P. Vlamos
Volume: 4
Issue: 9
Year: 2009
Efficient Numerical Computations of Soft Constrained Nash Strategy for Weakly Coupled Large-Scale Systems

Author(s): Muneomi Sagara | Hiroaki Mukaidani | Toru Yamamoto
Volume: 3
Issue: 9
Year: 2008
A Method for Surface Reconstruction Based on Support Vector Machine

Author(s): Lianwei Zhang | Wei Wang | Yan Li | Xiaolin Liu | Meiping Shi | Hangen He
Volume: 4
Issue: 9
Year: 2009
Distribution Network Reconfiguration Based on Particle Clonal Genetic Algorithm

Author(s): Yemei Qin | Ji Wang
Volume: 4
Issue: 9
Year: 2009
Visually Lossless Accuracy of Motion Vector in Overcomplete Wavelet-based Scalable Video Coding

Author(s): Chuan-Ming Song | Xiang-Hai Wang | Fu-Yan Zhang
Volume: 4
Issue: 9
Year: 2009
Modeling Complex System Using T-subnet based Hierarchical Petri Nets

Author(s): Zhijian Wang | Dingguo Wei
Volume: 4
Issue: 9
Year: 2009
An Automated Mechanism for Secure Input Handling

Author(s): Jin-Cherng Lin | Jan-Min Chen
Volume: 4
Issue: 9
Year: 2009
Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks

Author(s): Jin Zheng | Weijia Jia | Guojun Wang
Volume: 4
Issue: 9
Year: 2009
ADE: Utility Driven Self-management in a Networked Environment

Author(s): Debzani Deb | M. Muztaba Fuad | Michael J. Oudshoorn
Volume: 2
Issue: 9
Year: 2007
Partially Dynamic Algorithms for Distributed Shortest Paths and their Experimental Evaluation

Author(s): Serafino Cicerone | Gianlorenzo D’Angelo | Gabriele Di Stefano | Daniele Frigioni | Alberto Petricola
Volume: 2
Issue: 9
Year: 2007
JETCAT – Japanese-English Translation Using Corpus-Based Acquisition of Transfer Rules

Author(s): Werner Winiwarter
Volume: 2
Issue: 9
Year: 2007
An Integrated Self-Testing Framework for Autonomic Computing Systems

Author(s): Tariq M. King | Alain E. Ramirez | Rodolfo Cruz | Peter J. Clarke
Volume: 2
Issue: 9
Year: 2007
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications

Author(s): Giovanni Agosta | Luca Breveglieri | Gerardo Pelosi | Martino Sykora
Volume: 2
Issue: 9
Year: 2007
Partially Reconfigurable Vector Processor for Embedded Applications

Author(s): Muhammad Z. Hasan | Sotirios G. Ziavras
Volume: 2
Issue: 9
Year: 2007
A Recommendation-Based Pricing System for Information Goods Versioning

Author(s): Wei-Lun Chang | Soe-Tsyr Yuan
Volume: 2
Issue: 9
Year: 2007
Introducing the New Editor-in-Chief of the Journal of Computers

Author(s): George J. Sun
Volume: 3
Issue: 9
Year: 2008
Logarithmic Edge Detection with Applications

Author(s): Karen A. Panetta | Eric J. Wharton | Sos S. Agaian
Volume: 3
Issue: 9
Year: 2008
Agent Learning in Relational Domains based on Logical MDPs with Negation

Author(s): Zhiwei Song | Xiaoping Chen | Shuang Cong
Volume: 3
Issue: 9
Year: 2008
A Study on the Relationships between Unsafe Driving Behaviors and Driver’s Inner Factors When Entering a Non-signalized Intersection

Author(s): Masanori Takemoto | Hiroaki Kosaka | Hirokazu Nishitani
Volume: 3
Issue: 9
Year: 2008
Relation Organization of SOM Initial Map by Improved Node Exchange

Author(s): Tsutomu Miyoshi
Volume: 3
Issue: 9
Year: 2008
Guest Editorial

Author(s): Huadong Ma | Guojun Wang | Guojun Wang
Volume: 4
Issue: 9
Year: 2009
An Optimal Inventory Control Model for a Supply Chain with Shortage Constraints

Author(s): Yinkuan Gu | Hongxia Zhang
Volume: 6
Issue: 9
Year: 2011
Variable Selection for Credit Risk Model Using Data Mining technique

Author(s): Kuangnan Fang | Hong Huang
Volume: 6
Issue: 9
Year: 2011
A Microcomputer-Based Predictive Digital Current Programmed Control System for Three-phase PWM Rectifier

Author(s): Zhongjiu Zheng | Guofeng Li | Ninghui Wang
Volume: 6
Issue: 9
Year: 2011
Economic Development and Financial Support for Coal Resource Cities

Author(s): Zuhuai Yuan | Li Yang | Jing Han | Keliang Wang
Volume: 6
Issue: 9
Year: 2011
Solving the Sparsity Problem in Recommender Systems Using Association Retrieval

Author(s): Yibo Chen | Chanle Wu | Ming Xie | Xiaojun Guo
Volume: 6
Issue: 9
Year: 2011
Integrated Structure and Control Design for Servo System Based on Genetic Algorithm and Matlab

Author(s): Dingzhen Li | Ruimin Jin
Volume: 6
Issue: 9
Year: 2011
A Model to Select System Core and Its Application

Author(s): Chongming Li | Yue Ding
Volume: 6
Issue: 9
Year: 2011
De-noise Comprehensive Research On Airplane Cockpit Signals Recorded by CVR

Author(s): Dao-Lai Cheng | Chui-Jie Yi | Hong-Yu Yao
Volume: 6
Issue: 9
Year: 2011
Fuzzy Support Vector Machines Control for 6-DOF Parallel Robot

Author(s): Dequan Zhu | Tao Mei | Lei Sun
Volume: 6
Issue: 9
Year: 2011
Parameters Optimization of Least Squares Support Vector Machines and Its Application

Author(s): Chunli Xie | Cheng Shao | Dandan Zhao
Volume: 6
Issue: 9
Year: 2011
The Expected Value Model of Multiobjective Programming and its Solution Method Based on Bifuzzy Environment

Author(s): Mingfa Zheng | Bingjie Li | Guangxing Kou
Volume: 6
Issue: 9
Year: 2011
A Method for Building Partially Connected Neural Network

Author(s): Gang Li | Xingsan Qian | Chunming Ye | Lin Zhao
Volume: 6
Issue: 9
Year: 2011
A Cooperative Co-evolution PSO for Flow Shop Scheduling Problem with Uncertainty

Author(s): Bin Jiao | Qunxian Chen | Shaobin Yan
Volume: 6
Issue: 9
Year: 2011
A Double Margin Based Fuzzy Support Vector Machine Algorithm

Author(s): Kai Li | Xiaoxia Lu
Volume: 6
Issue: 9
Year: 2011
A Modified Technique for Analysis of Synchronous Counters Constructed with Flip-flops

Author(s): Dangui Yan | Ruijun Tong | Chengchang Zhang | Changyong Li
Volume: 6
Issue: 9
Year: 2011
A New Method of Detecting Multi-component LFM Signals Based on Blind Signal Processing

Author(s): Qiang Guo | Yajun Li | Changhong Wang
Volume: 6
Issue: 9
Year: 2011
Research on Self-built Digital Resource Backup Systems

Author(s): Li-zhen Shen
Volume: 6
Issue: 9
Year: 2011
Configuration scheme for small scale Multi-FPGA systems

Author(s): Chengchang Zhang | Lisheng Yang | Dangui Yan | Changyong Li
Volume: 6
Issue: 9
Year: 2011
Guest Editorial

Author(s): Malin Song | Dingding Pan | Jie Wu | Li Yang | Hongping Zhou | Christopher Clemence
Volume: 6
Issue: 9
Year: 2011
The Developmental Analysis of China’s Information Technology Services

Author(s): Gao Wei | Wang Feng | Wang Li
Volume: 6
Issue: 9
Year: 2011
The research on the influencing factors of financing strategy of woman entrepreneurs in China

Author(s): Xiong Xiong | Rong Fu | Wei Zhang | Yongjie Zhang | Lin Xiong
Volume: 6
Issue: 9
Year: 2011
A Spatial Econometric Analysis of China’s Manufacturing Agglomeration based on Geoda and Matlab

Author(s): Huayin Yu | Weiping Gu
Volume: 6
Issue: 9
Year: 2011
Application of Computer Technology in Efficiency Analysis of China Life Insurance Company

Author(s): Hongling Wu | XiaoFei Zeng
Volume: 6
Issue: 9
Year: 2011
A Bayesian Belief Net Model to Evaluating Organizational Safety Risks

Author(s): Li Song | Li Yang | Jing Han | Jinkai Li
Volume: 6
Issue: 9
Year: 2011
Research and Application of J2EE and AJAX Technologies in Industry Report

Author(s): Min Hu | Ding-ding Pan | Pei-en Zhou
Volume: 6
Issue: 9
Year: 2011
The Analysis of China New Energy Vehicle Industry Alliance Status Based on UCINET Software

Author(s): Xiongfei Guo | Yingqi Liu
Volume: 6
Issue: 9
Year: 2011
Efficiency Evaluation Information System Based on Data Envelopment Analysis

Author(s): Jing Han | Malin Song
Volume: 6
Issue: 9
Year: 2011
Page Protection in Multithreaded Systems

Author(s): Lanfranco Lopriore
Volume: 5
Issue: 9
Year: 2010
Geometric Modeling of 3D-Face Features and Its Applications

Author(s): Vandana D. Kaushik | V. K. Pathak | P. Gupta
Volume: 5
Issue: 9
Year: 2010
Towards Topology-and-Trust-Aware P2P Grid

Author(s): Yingjie Xia | Mingzhe Zhu | Yang Li
Volume: 5
Issue: 9
Year: 2010
A Robust GA-based QoS Routing Algorithm for Solving Multi-constrained Path Problem

Author(s): Salman Yussof | Hang See Ong
Volume: 5
Issue: 9
Year: 2010
Real-Time Visualization and Interaction of Three-dimensional Human CT Images

Author(s): Zhanli Hu | Jing Zou | Jianbao Gui | Junyan Rong | Yanming Li | Dongxing Xi | Hairong Zheng
Volume: 5
Issue: 9
Year: 2010
An Outlier Robust Negative Selection Algorithm Inspired by Immune Suppression

Author(s): Guiyang Li | Tao Li | Jie Zeng | Haibo Li
Volume: 5
Issue: 9
Year: 2010
A Study on Roughness Coefficient Using BP Neural Network

Author(s): Changjun Zhu | Enhui Jiang | Lianjun Zhao
Volume: 5
Issue: 9
Year: 2010
Coal Mine Safety Evaluation with V-Fold Cross-Validation and BP Neural Network

Author(s): Li Yang | Malin Song
Volume: 5
Issue: 9
Year: 2010
A Combination of PSO and SVM for Road Icing Forecast

Author(s): Jian LI
Volume: 5
Issue: 9
Year: 2010
A Qualitative Study on the Value of Governmental Economic Service

Author(s): Shibing You | Bi Wu | Malin Song
Volume: 5
Issue: 9
Year: 2010
Testing Research of Liner Stress in Process of Side Pressing

Author(s): Xianzhang Feng
Volume: 5
Issue: 9
Year: 2010
Temporal Difference Learning Waveform Selection

Author(s): Bin Wang | Jinkuan Wang | Xin Song | Yinghua Han
Volume: 5
Issue: 9
Year: 2010
To Design Logic Circuits by Using Symmetrical Coordinate

Author(s): Yu SHEN | Cheng-Bo YU
Volume: 5
Issue: 9
Year: 2010
Numerical Simulation of River Water Pollution using Grey Differential Model

Author(s): Changjun Zhu | Shuwen Li
Volume: 5
Issue: 9
Year: 2010
A Stochastic Combinatorial Optimization Model for Test Sequence Optimization

Author(s): Shuai Wang | Yindong Ji | Shiyuan Yang
Volume: 5
Issue: 9
Year: 2010
Measurement System for Liquid Level based on Laser Triangulation and Angular Tracking

Author(s): Huanqi Tao | Wencong Liu
Volume: 5
Issue: 9
Year: 2010
A Novel Association Rules Method Based on Genetic Algorithm and Fuzzy Set Strategy for Web Mining

Author(s): Chunlai Chai | Biwei Li
Volume: 5
Issue: 9
Year: 2010
A Policy-driven Approach to Dynamic Composition of Authentication and Authorization Patterns and Services

Author(s): Judith E. Y. Rossebø | Rolv Bræk
Volume: 1
Issue: 8
Year: 2006
A Method of An Anonymous Authentication For Flat-rate Service

Author(s): Yoshio Kakizaki | Hiroshi Yamamoto | Hidekazu Tsuji
Volume: 1
Issue: 8
Year: 2006
Adaptive Thresholding Based On Co-Occurrence Matrix Edge Information

Author(s): Musa Mohd Mokji | S.A.R. Abu Bakar
Volume: 2
Issue: 8
Year: 2007
Direct Method for Transient Stability Assessment of a Power System with a SSSC

Author(s): Prechanon Kumkratug | Panthep Laohachai
Volume: 2
Issue: 8
Year: 2007
Web Service-Security Specification based on Usability Criteria and Pattern Approach

Author(s): Ricardo Mendoza González | Miguel Vargas Martin | Jaime Muñoz Arteaga | Francisco J. Álvarez Rodríguez | Carlos A. Ochoa Ortíz Zezzatti
Volume: 4
Issue: 8
Year: 2009
A Hybrid System Approach to Determine the Ranking of a Debutant Country in Eurovision

Author(s): Alberto Ochoa | Angel E. Muñoz-Zavala | Arturo Hernández-Aguirre
Volume: 4
Issue: 8
Year: 2009
Musical Recommendation on Thematic Web Radio

Author(s): Alberto Ochoa | Saúl González | Cynthia Esquivel | Girolama Matozzi | Abigaíl Maffucci
Volume: 4
Issue: 8
Year: 2009
A Hybrid System Based on a Filter Bank and a Successive Approximations Threshold for Microcalcifications Detection

Author(s): Humberto Ochoa | Osslan Vergara | Vianey Cruz | Efrén Gútierrez
Volume: 4
Issue: 8
Year: 2009
Development of a Discrete Event Controller Supervisor using a Hybrid Matrix Formulation with Fuzzy Logic Conflict Resolution

Author(s): Jose Mireles Jr. | Frank L. Lewis | Roberto C. Ambrosio | Edgar Martínez
Volume: 4
Issue: 8
Year: 2009
Resolution of a Combinatorial Problem using Cultural Algorithms

Author(s): Alberto Ochoa | Julio Ponce | Arturo Hernández | Liang Li
Volume: 4
Issue: 8
Year: 2009
Practical Anonymous Access Control Protocols for Ubiquitous Computing

Author(s): Kilho Shin | Hiroshi Yasuda
Volume: 1
Issue: 8
Year: 2006
Password-authenticated Key Exchange using Efficient MACs

Author(s): Maurizio A. Strangio
Volume: 1
Issue: 8
Year: 2006
Symmetric Active/Active High Availability for High-Performance Computing System Services

Author(s): Christian Engelmann | Stephen L. Scott | Chokchai (Box) Leangsuksun | Xubin (Ben) He
Volume: 1
Issue: 8
Year: 2006
Online Mutual Aid, “RAQ”: A Study of Anonymous and Traceable Interactions

Author(s): Akiko Orita
Volume: 1
Issue: 8
Year: 2006
Reconstruction of 3D Human Facial Images Using Partial Differential Equations

Author(s): Eyad Elyan | Hassan Ugail
Volume: 2
Issue: 8
Year: 2007
Deterministic Models of an Active Magnetic Bearing System

Author(s): Abdul Rashid Husain | Mohamad Noh Ahmad | Abdul Halim Mohd Yatim
Volume: 2
Issue: 8
Year: 2007
Modelling Internet End-to-End Loss Behaviors: A Congestion Control Perspective

Author(s): Vinh Bui | Weiping Zhu | Ruhul Sarker
Volume: 2
Issue: 8
Year: 2007
3D Soft Body Simulation Using Mass-spring System with Internal Pressure Force and Simplified Implicit Integration

Author(s): Jaruwan Mesit | Ratan Guha | Shafaq Chaudhry
Volume: 2
Issue: 8
Year: 2007
Spectral Interpolation on 3×3 Stencils for Prediction and Compression

Author(s): Lorenzo Ibarria | Peter Lindstrom | Jarek Rossignac
Volume: 2
Issue: 8
Year: 2007
Dynamic Nonuniform Data Approximation in Databases with Haar Wavelet

Author(s): Su Chen | Antonio Nucci
Volume: 2
Issue: 8
Year: 2007
A Neural Network Controller for Trajectory Control of Industrial Robot Manipulators

Author(s): Zhao-Hui Jiang | Taiki Ishita
Volume: 3
Issue: 8
Year: 2008
Neural Network-based Handwritten Signature Verification

Author(s): Alan McCabe | Jarrod Trevathan | Wayne Read
Volume: 3
Issue: 8
Year: 2008
A ZMP Feedback Control for Biped Balance and its Application to In-Place Lateral Stepping Motion

Author(s): Satoshi Ito | Shinya Amano | Minoru Sasaki | Pasan Kulvanit
Volume: 3
Issue: 8
Year: 2008
Extension Information-Knowledge-Strategy System for Semantic Interoperability

Author(s): Weihua Li | Chunyan Yang
Volume: 3
Issue: 8
Year: 2008
Design Overview Of Processor Based Implantable Pacemaker

Author(s): Santosh Chede | Kishore Kulat
Volume: 3
Issue: 8
Year: 2008
Discourse Analysis of Public Debates Using Corpus Linguistic Methodologies

Author(s): Hayeong Jeong | Shun Shiramatsu | Kiyoshi Kobayashi | Tsuyoshi Hatori
Volume: 3
Issue: 8
Year: 2008
Multi-Index Cooperative Mixed Strategy for Service Selection Problem in Service-Oriented Architecture

Author(s): Yimin Shen | Jing Zhang | Yushun Fan
Volume: 3
Issue: 8
Year: 2008
Selfish Constraint Satisfaction Genetic Algorithm for Planning a Long-distance Transportation Network

Author(s): Takashi Onoyama | Takuya Maekawa | Yoshitaka Sakurai | Setsuo Tsuruta | Norihisa Komoda
Volume: 3
Issue: 8
Year: 2008
Guest Editorial

Author(s): Alberto Ochoa O. Zezzatti | Alejandro Padilla
Volume: 4
Issue: 8
Year: 2009
Semi-automatic Generation of Subcategorization Frames for Spanish Verbs Using Ontologies and Verbs Functional Class

Author(s): Rodolfo A. Pazos R. | José A. Martínez F. | Javier González B. | María L. Morales-Rodríguez | Alberto Castro H.
Volume: 4
Issue: 8
Year: 2009
Improving Distributed Resource Search through a Statistical Methodology of Topological Feature Selection

Author(s): Claudia Gómez Santillán | Laura Cruz-Reyes | Eustorgio Meza | Tania Turrubiates López | Marco A. Aguirre Lam | Elisa Schaeffer
Volume: 4
Issue: 8
Year: 2009
Evolving Optimization to Improve Diorama’s Representation using a Mosaic Image

Author(s): Simonné Suarent | Alberto Ochoa | S. Jöns | Fernando Montes | Alessandra Spianetta
Volume: 4
Issue: 8
Year: 2009
Research on Running Time Behavior Analyzing and Trend Predicting of Modern Distributed Software

Author(s): Junfeng Man | Zhicheng Wen | Changyun Li | Xiangbing Wen
Volume: 4
Issue: 8
Year: 2009
Subtractive Clustering Based RBF Neural Network Model for Outlier Detection

Author(s): Peng Yang | Qingsheng Zhu | Xun Zhong
Volume: 4
Issue: 8
Year: 2009
Texture Image Classification Using Visual Perceptual Texture Features and Gabor Wavelet Features

Author(s): Muwei Jian | Haoyan Guo | Lei Liu
Volume: 4
Issue: 8
Year: 2009
Vehicle License Plate Detection Method Based on Sliding Concentric Windows and Histogram

Author(s): Kaushik Deb | Hyun-Uk Chae | Kang-Hyun Jo
Volume: 4
Issue: 8
Year: 2009
A Smart Targeting System for Online Advertising

Author(s): Weihui Dai | Xingyun Dai | Tao Sun
Volume: 4
Issue: 8
Year: 2009
A Practical Dynamic Frequency Scaling Solution to DPM in Embedded Linux Systems

Author(s): YuHua Zhang | LongHua Qian | Qiang Lv | Peide Qian | Shengchao Guo
Volume: 4
Issue: 8
Year: 2009
Recognizing Partially Occluded Object from a Line Drawing

Author(s): Guimei Zhang | Jun Chu
Volume: 6
Issue: 8
Year: 2011
Emergency Event: Internet Spread, Psychological Impacts and Emergency Management

Author(s): Weihui Dai | Xiqiong Wan | Xiaoyi Liu
Volume: 6
Issue: 8
Year: 2011
Learning the Classifier Combination for Image Classification

Author(s): Deyuan Zhang | Bingquan Liu | Chengjie Sun | Xiaolong Wang
Volume: 6
Issue: 8
Year: 2011
A Survey on Cloud Storage

Author(s): Jiehui JU | Jiyi WU | Jianqing FU | Zhijie LIN
Volume: 6
Issue: 8
Year: 2011
An Algorithm for Minimum Vertex Cover Based on Max-I Share Degree

Author(s): Shaohua Li | Jianxin Wang | Jianer Chen | Zhijian Wang
Volume: 6
Issue: 8
Year: 2011
A Cloud Computing Infrastructure on Heterogeneous Computing Resources

Author(s): Baomin XU | Ning Wang | Chunyan Li
Volume: 6
Issue: 8
Year: 2011
Guest Editorial

Author(s): Zhihua Cui | Zhongzhi Shi
Volume: 6
Issue: 8
Year: 2011
Particle Swarm Optimization for Automatic Parameters Determination of Pulse Coupled Neural Network

Author(s): Xinzheng Xu | Shifei Ding | Zhongzhi Shi | Hong Zhu | Zuopeng Zhao
Volume: 6
Issue: 8
Year: 2011
Multi-objective Particle Swarm Optimization for Robot Path Planning in Environment with Danger Sources

Author(s): Dun-wei Gong | Jian-hua Zhang | Yong Zhang
Volume: 6
Issue: 8
Year: 2011
A Mixed Algorithm for Nonlinear Complementarity Problems

Author(s): Xi-yun Wang | Ya Wang | Yu-yang Wang
Volume: 6
Issue: 8
Year: 2011
Recurrent High Order Neural Network Modeling for Wastewater Treatment Process

Author(s): Jun fei Qiao | wei wei Yang | Ming zhe Yuan
Volume: 6
Issue: 8
Year: 2011
Newman-Watts Particle Swarm Optimization with Group Decision

Author(s): Zhuanghua Zhu
Volume: 6
Issue: 8
Year: 2011
The Structure Optimization of Main Beam for Bridge Crane Based on An Improved PSO

Author(s): Chaoli Sun | Ying Tan | Jianchao Zeng | Jengshyang Pan | Yuanfang Tao
Volume: 6
Issue: 8
Year: 2011
Evolutionary Neural Networks with Mixed-Integer Hybrid Differential Evolution

Author(s): Yung-Chin Lin | Yung-Chien Lin | Wen-Cheng Chang | Kuo-Lan Su
Volume: 6
Issue: 8
Year: 2011
Fast Human Detection Using Motion Detection and Histogram of Oriented Gradients

Author(s): Hou Beiping | Zhu Wen
Volume: 6
Issue: 8
Year: 2011
Form Errors Evaluation Based on a Hybrid Optimization Algorithm

Author(s): Ke Zhang | Shiming Wang
Volume: 6
Issue: 8
Year: 2011
A Modified GSO Based on Limited Storage Quasi-Newton Method

Author(s): Juanyan Fang | Zhishui Zhong | Wu Li
Volume: 6
Issue: 8
Year: 2011
Mode III Stress Singularity Analysis of Isotropic and Orthotropic Bi-material near the Interface End

Author(s): Junlin Li | Jing Zhao | Wenting Zhao | Caixia Ren | Shuaishuai Hu
Volume: 6
Issue: 8
Year: 2011
Parameter Estimation of Conditional Random Fields Model By Improved Particle Swarm Optimizer

Author(s): Zengfa Dou | Lin Gao
Volume: 6
Issue: 8
Year: 2011
A Trust Evaluation Model based on Fuzzy Theory in P2P Networks

Author(s): Zhengzhen Zhou | Yongluo Luo | Liangmin Guo | Meijing Ji
Volume: 6
Issue: 8
Year: 2011
Topic Discovery based on LDA_col Model and Topic Significance Re-ranking

Author(s): Lidong Wang | Baogang Wei | Jie Yuan
Volume: 6
Issue: 8
Year: 2011
Improvement of Escape Time Algorithm by No-Escape-Point

Author(s): Shuai Liu | Xiangjiu Che | Zhengxuan Wang
Volume: 6
Issue: 8
Year: 2011
Moving Object Classification Method Based on SOM and K-means

Author(s): Jian Wu | Jie Xia | Jian-ming Chen | Zhi-ming Cui
Volume: 6
Issue: 8
Year: 2011
Analysis and Application of Petri Subnet Reduction

Author(s): Chuanliang Xia
Volume: 6
Issue: 8
Year: 2011
Using Multi-level Fuzzy Comprehensive Evaluation to Assess Reservoir Induced Seismic Risk

Author(s): Qiuwen Zhang | Ming Zhong
Volume: 6
Issue: 8
Year: 2011
Prediction of Futures Price Fluctuation: Modeling, Computing and Analysis System

Author(s): Weihui Dai | Xingyun Dai | Hua Ye | Jie Liu
Volume: 6
Issue: 8
Year: 2011
A Method for Certifying Code in Trust-By-Policy-Adherence

Author(s): Zeng Guo-Sun | Li Li
Volume: 6
Issue: 8
Year: 2011
Application of Singular Spectrum Analysis to the Noise Reduction of Intrusion Detection Alarms

Author(s): Jie Ma | Zhi Tang Li | Bing Bing Wang
Volume: 6
Issue: 8
Year: 2011
An Approach to Analyzing Time Constrained Service Composition

Author(s): Guisheng Fan | Huiqun Yu | Liqiong Chen | Tong Ruan
Volume: 6
Issue: 8
Year: 2011
An Improved Radius of Gyration Similarity Measure between Generalized Fuzzy Numbers and Its Application to Multisource Data Fusion

Author(s): Yong Deng | Dong Sun | Wen Jiang | Jianling Xu
Volume: 6
Issue: 8
Year: 2011
Guest Editorial

Author(s): Dan Zhang | Bale Reddy
Volume: 5
Issue: 8
Year: 2010
An Effective Adaptive Multi-objective Particle Swarm for Multimodal Constrained Function Optimization

Author(s): Yongquan Zhou | Shengyu Pei
Volume: 5
Issue: 8
Year: 2010
Research on Formal Verification Technique for Aircraft Safety-Critical Software

Author(s): Yongfeng Yin | Bin Liu | Duo Su
Volume: 5
Issue: 8
Year: 2010
Determination of Optimal SVM Parameters by Using GA/PSO

Author(s): Yuan Ren | Guangchen Bai
Volume: 5
Issue: 8
Year: 2010
Water Resources Allocation Effect Evaluation Based on Chaotic Neural Network Model

Author(s): Xianfeng Huang | Guohua Fang
Volume: 5
Issue: 8
Year: 2010
A Large-Scale Device Collaboration Performance Evaluation Approach Based-on Dynamics

Author(s): Xiaohui Rong | Feng Chen | Pan Deng | Shilong Ma
Volume: 5
Issue: 8
Year: 2010
Annotating Web Image using Parallel Graph Bipartition and Word Clustering

Author(s): Zheng Liu
Volume: 5
Issue: 8
Year: 2010
Power Aware Job Scheduling in Multi-Processor System with Service Level Agreements Constraints

Author(s): Congfeng Jiang | Jian Wan | Xindong You | Yinghui Zhao
Volume: 5
Issue: 8
Year: 2010
Transaction in Large-scale Device Collaborative System

Author(s): Feng Chen | Xiaohui Rong | Pan Deng | Shilong Ma
Volume: 5
Issue: 8
Year: 2010
The Entropy Model of Fractal Supply Chain Network System Based on Fuzzy AHP

Author(s): Xilong Qu | Zhongxiao Hao
Volume: 5
Issue: 8
Year: 2010
A Useful Anomaly Intrusion Detection Method Using Variable-length Patterns and Average Hamming Distance

Author(s): Ye Du | Ruhui Zhang | Youyan Guo
Volume: 5
Issue: 8
Year: 2010
Research on the Price Risk Management in China Agricultural Products

Author(s): Herui Cui
Volume: 5
Issue: 8
Year: 2010
Dynamic Investment under Asymmetric Information

Author(s): Ruxing Xu | Dan Wu | Shenghong Li
Volume: 5
Issue: 8
Year: 2010
Visual Mental Imagery Memory Model Based on Weighted Directed Graph

Author(s): Hongchang Ke | Hui Wang | Hongwei Zhao | Kaiyu Liang
Volume: 5
Issue: 8
Year: 2010
Applying Principal Component Analysis and Unascertained Method for the Analysis of Construction Accident Risk

Author(s): Huawang Shi | Wanqing Li | Yong Deng
Volume: 5
Issue: 8
Year: 2010
Grounding Grid Corrosion Diagnosis and Uncertainly Analysis of Branches

Author(s): Shuqi Wang | Jian Liu | Sen Wang | Zhizhong Li
Volume: 5
Issue: 8
Year: 2010
Effects of Substrate Permittivity on Planar Inverted-F Antenna Performances

Author(s): Yves-Thierry Jean-Charles | Vichate Ungvichian | Juciana A. Barbosa
Volume: 4
Issue: 7
Year: 2009
Biometric Gait Authentication Using Accelerometer Sensor

Author(s): Davrondzhon Gafurov | Kirsi Helkala | Torkjel Søndrol
Volume: 1
Issue: 7
Year: 2006
Allocation of Component Types to Machines in the Automated Assembly of Printed Circuit Boards

Author(s): Mehmet Bayram Yildirim | Ekrem Duman | Dilek Duman | Coskun Cetinkaya
Volume: 2
Issue: 7
Year: 2007
Learning by Discrimination: A Constructive Incremental Approach

Author(s): Christophe Giraud-Carrier | Tony Martinez
Volume: 2
Issue: 7
Year: 2007
A High Density and Low Power Cache Based on Novel SRAM Cell

Author(s): Arash Azizi Mazreah | Mohammad Taghi Manzuri | Ali Mehrparvar
Volume: 4
Issue: 7
Year: 2009
CF-GeNe: Fuzzy Framework for Robust Gene Regulatory Network Inference

Author(s): apadmMuhammad Shoaib B. Sehgal | Iqbal Gondal | Laurence S. Dooley
Volume: 1
Issue: 7
Year: 2006
A Local Enumeration Protocol in Spite of Corrupted Data

Author(s): Brahim Hamid | Mohamed Mosbah
Volume: 1
Issue: 7
Year: 2006
Learning a Classification-based Glioma Growth Model Using MRI Data

Author(s): Marianne Morris | Russell Greiner | Jörg Sander | Albert Murtha | Mark Schmidt
Volume: 1
Issue: 7
Year: 2006
Parameter Optimization of Kernel-based One-class Classifier on Imbalance Learning

Author(s): Ling Zhuang | Honghua Dai
Volume: 1
Issue: 7
Year: 2006
Using LDA Method to Provide Mobile Location Estimation Services within a Cellular Radio Network

Author(s): Junyang Zhou | Joseph Kee-Yin Ng
Volume: 1
Issue: 7
Year: 2006
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture

Author(s): Cristina Satizábal | Rafael Páez | Jordi Forné
Volume: 1
Issue: 7
Year: 2006
Testing Event-Driven Business Processes

Author(s): Josef Schiefer | Gerd Saurer | Alexander Schatten
Volume: 1
Issue: 7
Year: 2006
Reliable Partial Replication of Contents in Web Clusters: Getting Storage without losing Reliability

Author(s): Jose Daniel Garcia | Jesus Carretero | Felix Garcia | Javier Fernandez | David E. Singh | Alejandro Calderon
Volume: 1
Issue: 7
Year: 2006
Algorithms and Applications for Estimating the Standard Deviation of AWGN when Observations are not Signal-Free

Author(s): Dominique Pastor | Asmaa Amehraye
Volume: 2
Issue: 7
Year: 2007
Optimization of FRM FIR Digital Filters Over CSD and CDBNS Multiplier Coefficient Spaces Employing a Novel Genetic Algorithm

Author(s): Patrick Mercier | Sai Mohan Kilambi | Behrouz Nowrouzian
Volume: 2
Issue: 7
Year: 2007
Two-Dimensional Digital Filters with Variable Magnitude Characteristics Obtained from a 1-D Monotonic Response

Author(s): Venkat Ramachandran | Christian S. Gargour | Ravi P. Ramachandran
Volume: 2
Issue: 7
Year: 2007
Cyclic Convolution Algorithm Formulations Using Polynomial Transform Theory

Author(s): Abraham H. Diaz-Perez | Domingo Rodriguez
Volume: 2
Issue: 7
Year: 2007
A Least-Squares Approach to Blind Source Separation in Multispeaker Environments

Author(s): Robert M. Nickel | Ananth N. Iyer
Volume: 2
Issue: 7
Year: 2007
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research

Author(s): Nasiroh Omar | Colin Higgins | Colin Harrison | Diego Campo Millan
Volume: 2
Issue: 7
Year: 2007
Discovery of Sequential Patterns Coinciding with Analysts’ Interests

Author(s): Shigeaki Sakurai | Youichi Kitahara | Ryohei Orihara | Koichiro Iwata | Nobuyoshi Honda | Toshio Hayashi
Volume: 3
Issue: 7
Year: 2008
RFID Technology and its Perspective Analysis with KERGM(1,1) Model

Author(s): Bin Liu | Rong Zhang | Sifeng Liu
Volume: 3
Issue: 7
Year: 2008
K-Cosine Corner Detection

Author(s): Te-Hsiu Sun
Volume: 3
Issue: 7
Year: 2008
Interacting Multiple Model Particle-type Filtering Approaches to Ground Target Tracking

Author(s): Ronghua Guo | Zheng Qin | Xiangnan Li | Junliang Chen
Volume: 3
Issue: 7
Year: 2008
Real-time System Identification of Unmanned Aerial Vehicles: A Multi-Network Approach

Author(s): Vishwas Puttige | Sreenatha Anavatti
Volume: 3
Issue: 7
Year: 2008
A New Information Fusion Method for Bimodal Robotic Emotion Recognition

Author(s): Meng-Ju Han | Jing-Huai Hsu | Kai-Tai Song | Fuh-Yu Chang
Volume: 3
Issue: 7
Year: 2008
Cluster-based Three-dimensional Localization Algorithm for Large Scale Wireless Sensor Networks

Author(s): Jian Shu | Ronglei Zhang | Linlan Liu | Zhenhua Wu | Zhiping Zhou
Volume: 4
Issue: 7
Year: 2009
Fuzzy Set Theoretical Analysis of Human Membership Values on the Color Triangle

Author(s): Naotoshi Sugano | Shou Komatsuzaki | Hiroyuki Ono | Yuko Chiba
Volume: 4
Issue: 7
Year: 2009
Increasing SLAM Performance by Integrating Grid and Topology Map

Author(s): Suhyeon Kim | Hyungrae Kim | Tae-Kyu Yang
Volume: 4
Issue: 7
Year: 2009
A Novel Video Content Understanding Scheme Based on Feature Combination Strategy

Author(s): Xinghao Jiang | Tanfeng Sun | Bin Chen | Rongjie Li | Bing Feng
Volume: 4
Issue: 7
Year: 2009
A New Signal Processing based Method for Reactive Power Measurements

Author(s): Adalet Abiyev
Volume: 4
Issue: 7
Year: 2009
A Replica Management Protocol in a Binary Balanced Tree Structure-Based P2P Network

Author(s): Hidehisa Takamizawa | Kazuhiro Saji | Masayoshi Aritsugi
Volume: 4
Issue: 7
Year: 2009
Modeling and Analysis of a Real-Time System Using the Networks of Extended Petri

Author(s): Mohammed Blej | Mostafa Azizi
Volume: 4
Issue: 7
Year: 2009
Detection of LSB Matching Steganography using the Envelope of Histogram

Author(s): Jun Zhang | Yuping Hu | Zhibin Yuan
Volume: 4
Issue: 7
Year: 2009
An Enhanced Quorum Selection Algorithm

Author(s): Samer Younes | Ramzi A. Haraty
Volume: 4
Issue: 7
Year: 2009
Password Generation and Search Space Reduction

Author(s): Kirsi Helkala | Einar Snekkenes
Volume: 4
Issue: 7
Year: 2009
Handwritten Signature Verification Using Complementary Statistical Models

Author(s): Alan McCabe | Jarrod Trevathan
Volume: 4
Issue: 7
Year: 2009
Multiresolution Subband Blind Source Separation: Models and Methods

Author(s): Hongwei Li | Rui Li | Fasong Wang
Volume: 4
Issue: 7
Year: 2009
Binary Relation, Basis Algebra, Approximation Operator Form and Its Property in L-Fuzzy Rough Sets

Author(s): Zhengjiang Wu | Xu Wenpeng
Volume: 6
Issue: 7
Year: 2011
Study of Modulation Recognition Algorithm Based on Wavelet Transform and Neural Network

Author(s): Yanfang Hou | Hongmei Feng
Volume: 6
Issue: 7
Year: 2011
The Research on the Application to Digital Image Technology in Hypoid Gear Contact Zone Detection

Author(s): Jing Zhang | Feng Wei | Mingxi Zhang | Qiang Gao
Volume: 6
Issue: 7
Year: 2011
3D Rapid Modeling for Headframe Foundation

Author(s): Wenpeng Xu | Xiaohuan Qiang | Bibo Lu | Zhiheng Wang
Volume: 6
Issue: 7
Year: 2011
Research of Thenar Palmprint Classification Based on Gray Level Co-occurrence Matrix and SVM

Author(s): zhu xi jun | Dazhuan Liu | Qiulin Zhang | Zhaoshan Zhou | Wenhua Liang
Volume: 6
Issue: 7
Year: 2011
ARAS-M: Automatic Resource Allocation Strategy based on Market Mechanism in Cloud Computing

Author(s): Xindong You | Jian Wan | Xianghua Xu | Congfeng Jiang | Wei Zhang | Jilin Zhang
Volume: 6
Issue: 7
Year: 2011
A New Test Data Compression Scheme

Author(s): Ling Zhang | Jishun Kuang
Volume: 6
Issue: 7
Year: 2011
EMD Based on Independent Component Analysis and Its Application in Machinery Fault Diagnosis

Author(s): Fengli Wang | Deyou Zhao
Volume: 6
Issue: 7
Year: 2011
An Efficient Buffer Scheme for Flash-based Databases

Author(s): Liang Huai Yang | Jing Wang | Zhifeng Huang | Weihua Gong | Lijun Chen
Volume: 6
Issue: 7
Year: 2011
A Study of Genetic Neural Network as Classifiers and its Application in Breast Cancer Diagnosis

Author(s): Yaoying Huang | Wanggen Li | Xiaojiao Ye
Volume: 6
Issue: 7
Year: 2011
Scaling Up the Accuracy of Decision-Tree Classifiers: A Naive-Bayes Combination

Author(s): Liangxiao Jiang | Chaoqun Li
Volume: 6
Issue: 7
Year: 2011
A Novel Image Denoising Algorithm Based on Riemann-Liouville Definition

Author(s): Jinrong HU | Yifei Pu | Jiliu Zhou
Volume: 6
Issue: 7
Year: 2011
An Approach of Chunk-based Task Runtime Prediction for Self-Scheduling on Multi-core Desk Grid

Author(s): Peifeng Li | Qiaoming Zhu | Qin Ji | Xiaoxu Zhu
Volume: 6
Issue: 7
Year: 2011
Runway Incursion Event Forecast Model Based on LS-SVR with Multi-kernel

Author(s): Guimei Xu | Shengguo Huang
Volume: 6
Issue: 7
Year: 2011
Research on Multipath-Caused MLS Angle-Measurement Error Using Main Lobe Gaussian Replacement Technology

Author(s): Huaxin Wu | Xiubin Zhao | Chuanjin Dai
Volume: 6
Issue: 7
Year: 2011
Quaternion-Based Iterative Solution of Three-Dimensional Coordinate Transformation Problem

Author(s): Huaien Zeng | Qinglin Yi
Volume: 6
Issue: 7
Year: 2011
Modeling and Simulation on Dynamic Allocation and Scheduling of Multi-resource problem

Author(s): Wenbin Hu | Zhengbing Hu | Yuheng Cheng | Hai Zhang | Wei Song
Volume: 6
Issue: 7
Year: 2011
Design of Panoramic Mosaic Camera Based on FPGA Using Optimal Mosaic Algorithm

Author(s): Sen Ma | Yuanyuan Shang | Weigong Zhang | Yong Guan | Qian Song | Dawei Xu
Volume: 6
Issue: 7
Year: 2011
Acquisition Performance Analysis of BOC Signal Considering the Code Search Step Size

Author(s): Zaixiu Yang | Zhigang Huang | Shengqun Geng
Volume: 6
Issue: 7
Year: 2011
Easing Instruction Queue Competition among Threads in RMT

Author(s): Jie Yin | Jianhui Jiang
Volume: 6
Issue: 7
Year: 2011
Factor Sensitivity Analysis with Neural Network Simulation based on Perturbation System

Author(s): Runbo Bai | Hailei Jia | Pingzhou Cao
Volume: 6
Issue: 7
Year: 2011
Two Hyperchaotic Systems with Four-wing Attractors and Their Synchronization

Author(s): Yandong Chu | Yingxiang Chang | Xinlei An | Jiangang Zhang
Volume: 6
Issue: 7
Year: 2011
TH3D: A Two-Handed Interaction Framework for Desktop Virtual Environment

Author(s): Fu Yonggang | Dai Guozhong
Volume: 6
Issue: 7
Year: 2011
Sunspot Forecasting by Using Chaotic Time-series Analysis and NARX Network

Author(s): Chuanjin Jiang | Fugen Song
Volume: 6
Issue: 7
Year: 2011
A Modified Genetic Algorithm(GA) for Optimization of Process Planning

Author(s): Jinfeng Wang | BiQiang Du | HaiMin Ding
Volume: 6
Issue: 7
Year: 2011
A Semi-Supervised Learning Algorithm Based on Modified Self-training SVM

Author(s): Yun Jin | Chengwei Huang | Li Zhao
Volume: 6
Issue: 7
Year: 2011
Shots Classification for Basketball Video Based on NERFC-Means Clustering

Author(s): Liu Yun | Chao Huang | Xueying Liu
Volume: 6
Issue: 7
Year: 2011
QoS-driven Global Optimization Approach for Large-scale Web Services Composition

Author(s): Minghui Wu | Xianghui Xiong | Jing Ying | Canghong Jin | Chunyan Yu
Volume: 6
Issue: 7
Year: 2011
Multi-agent Middleware for the Integration of Mobile Supply Chain

Author(s): Weidong Zhao | Haifeng Wu | Weihui Dai | Xuan Li | Fei Yu | Chen Xu
Volume: 6
Issue: 7
Year: 2011
An Improving MFCC Features Extraction Based on FastICA Algorithm plus RASTA Filtering

Author(s): Huan Zhao | Lian Hu | Xiujuan Peng | Gangjin Wang | Fei Yu | Cheng Xu
Volume: 6
Issue: 7
Year: 2011
Robot Self-localization with Optimized Error Minimizing for Soccer Contest

Author(s): Jianshen Liu | Baoyong Yin | Xinxing Liao
Volume: 6
Issue: 7
Year: 2011
A Modified Editing k-nearest Neighbor Rule

Author(s): Ruiqin Chang | Zheng Pei | Chao Zhang
Volume: 6
Issue: 7
Year: 2011
Local Features Based Image Sequence Retrieval

Author(s): Xiang Fu | Jie-xian Zeng
Volume: 5
Issue: 7
Year: 2010
Utility Maximization Model for Deep Web Source Selection and Integration

Author(s): Xuefeng Xian | Zhiming Cui | Pengpeng Zhao | Yuanfeng Yang | Guangming Zhang
Volume: 5
Issue: 7
Year: 2010
Research on Programming Algorithm of Trajectory for Hypersonic Vehicles Based on Particle Swarm Optimization

Author(s): Chuanfeng Li | Yongji Wang | Lingling Tang | Zongzhun Zheng
Volume: 5
Issue: 7
Year: 2010
An Improved Computational Approach for Salient Region Detection

Author(s): Qiaorong Zhang | Haibo Liu | Jing Shen | Guochang Gu | Huimin Xiao
Volume: 5
Issue: 7
Year: 2010
A Band Selection Method For Hyperspectral Images Using Choquet Fuzzy Integral

Author(s): Fengchen Huang | Jing Ling | Aiye Shi | Lizhong Xu
Volume: 5
Issue: 7
Year: 2010
An Algebraic Method for Estimating the Fundamental Matrix with Rank Constraint

Author(s): Yuanbin Wang | Bin Zhang | Tianshun Yao
Volume: 5
Issue: 7
Year: 2010
A Study on the Knowledge Diffusion of Communities of Practice Based on the Weighted Small-world Network

Author(s): Zhihong Li | Zhu Tao | Wendi Lai
Volume: 5
Issue: 7
Year: 2010
Automatic Pronunciation Assessment for Mandarin Proficiency Test Based on HMM

Author(s): Chunting Yang | Yang Liu | Jing Yu
Volume: 5
Issue: 7
Year: 2010
A Quad Tree Based Self-collision Detection Method for Cloth Simulation

Author(s): Bing He | Liu Cheng
Volume: 5
Issue: 7
Year: 2010
Generalized Hierarchical Identity-Based Signcryption

Author(s): Hao Wang | Qiuliang Xu | Xiufeng Zhao
Volume: 5
Issue: 7
Year: 2010
TAM/wrapper Co-optimization And Test Scheduling For SOCs Based On Hybrid Genetic Algorithm

Author(s): Chuan-pei Xu | Xue-yun Lu | Cong Hu
Volume: 5
Issue: 7
Year: 2010
Film Colorization, Using Artificial Neural Networks and Laws Filters

Author(s): Mohammad Reza Lavvafi | S. Amirhassan Monadjemi | Payman Moallem
Volume: 5
Issue: 7
Year: 2010
Fast Algorithm for Pseudoknotted RNA Structure Prediction

Author(s): Hengwu Li
Volume: 5
Issue: 7
Year: 2010
A New Multi-Objective Genetic Algorithm for Feature Subset Selection in Fatigue Fracture Image Identification

Author(s): Ling Li | Ming Li | Yuming Lu | YongLiang Zhang
Volume: 5
Issue: 7
Year: 2010
Fuzzy Clustering Ensemble with Selection of Number of Clusters

Author(s): Taoying Li | Yan Chen
Volume: 5
Issue: 7
Year: 2010
Research on the Problem of Privacy-Preserving Closest Pair

Author(s): Cheng Chao | Yonglong Luo | Wenjuan Cheng
Volume: 5
Issue: 7
Year: 2010
System Dynamic Simulation Approach for Supply Chain with Capability Limit

Author(s): Jianfeng Li | Jun Zhai | Yan Chen | Shuyong Liu
Volume: 5
Issue: 7
Year: 2010
An Emulator for Executing IA-32 Applications on ARM-Based Systems

Author(s): Wei Chen | Zhiying Wang | Dan Chen
Volume: 5
Issue: 7
Year: 2010
The Emergence of Autonomous Representations in Artificial Agents

Author(s): Argyris Arnellos | Spyros Vosinakis | Thomas Spyrou | John Darzentas
Volume: 1
Issue: 6
Year: 2006
Vocal Tract Area Function Estimation Using Particle Swarm

Author(s): Mahmoud A. Ismail
Volume: 3
Issue: 6
Year: 2008
Parallel Processing of Sequential Media Algorithms on Heterogeneous Multi-Processor System-on-Chip

Author(s): Peng Zhao | Dawei Wang | Ming Yan | Sikun Li
Volume: 4
Issue: 6
Year: 2009
Towards Compliance and Accountability: a Framework for Privacy Online

Author(s): Huanchun Peng | Jun Gu | Xiaojun Ye
Volume: 4
Issue: 6
Year: 2009
Research on On-card Bytecode Verifier for Java Cards

Author(s): Tongyang Wang | Pengfei Yu | Jun-jun Wu | Xin-long Ma
Volume: 4
Issue: 6
Year: 2009
Compression of Short Text on Embedded Systems

Author(s): Stephan Rein | Clemens Gühmann | Frank Fitzek
Volume: 1
Issue: 6
Year: 2006
A Framework for an Ontology-based E-commerce Product Information Retrieval System

Author(s): Liyi Zhang | Mingzhu Zhu | Wei Huang
Volume: 4
Issue: 6
Year: 2009
Provably Secure Certificate-based Proxy Signature Schemes

Author(s): Jiguo Li | Lizhong Xu | Yichen Zhang
Volume: 4
Issue: 6
Year: 2009
Research of Intelligent Rule-base Based on Multilayer Intrusion Detection

Author(s): Zhixin Sun | Lin Jiao
Volume: 4
Issue: 6
Year: 2009
Analysis of Attack Actions for E-Commerce Based on Stochastic Game Nets Model

Author(s): Yuanzhuo Wang | Chuang Lin | Kun Meng | Junjie Lv
Volume: 4
Issue: 6
Year: 2009
Axiomatic Systems for the Bisimilarity on Finite Fair Ambient Processes

Author(s): Han Zhu
Volume: 4
Issue: 6
Year: 2009
A Stochastic Approach to Predicting Performance of Web Service Composition

Author(s): Yuxiang Dong | Yunni Xia | Qingsheng Zhu | Ruilong Yang
Volume: 4
Issue: 6
Year: 2009
A Time and Mutable Attribute-Based Access Control Model

Author(s): Ran Yang | Chuang Lin | Fujun Feng
Volume: 4
Issue: 6
Year: 2009
Cybercrime & Cybercriminals: An Overview of the Taiwan Experience

Author(s): ChiChao Lu | WenYuan Jen | Weiping Chang | Shihchieh Chou
Volume: 1
Issue: 6
Year: 2006
On the Development of Knowledge Management Services for Collaborative Decision Making

Author(s): Christina E. Evangelou | Nikos Karacapilidis | Manolis Tzagarakis
Volume: 1
Issue: 6
Year: 2006
The Matching Predicate and a Filtering Scheme Based on Matroids

Author(s): Dimitris Magos | Ioannis Mourtos | Leonidas Pitsoulis
Volume: 1
Issue: 6
Year: 2006
Fault Tolerance in a Multi-Layered DRE System: A Case Study

Author(s): Paul Rubel | Joseph Loyall | Richard Schantz | Matthew Gillen
Volume: 1
Issue: 6
Year: 2006
Integrated Detection, Tracking and Recognition for IR Video-based Vehicle Classification

Author(s): Xue Mei | Shaohua Kevin Zhou | Hao Wu | Fatih Porikli
Volume: 2
Issue: 6
Year: 2007
Extraction of Unique Independent Components for Nonlinear Mixture of Sources

Author(s): Pei Gao | Li Chin Khor | Wai Lok Woo | Satnam Singh Dlay
Volume: 2
Issue: 6
Year: 2007
Adaptive-Gain Kinematic Filters of Orders 2-4

Author(s): Naum Chernoguz
Volume: 2
Issue: 6
Year: 2007
A Simple Algorithm for Defect Detection From a Few Radiographies

Author(s): Lionel Fillatre | Igor Nikiforov | Florent Retraint
Volume: 2
Issue: 6
Year: 2007
Computation of the Normalized Detection Threshold for the FFT Filter Bank-Based Summation CFAR Detector

Author(s): Sichun Wang | François Patenaude | Robert Inkol
Volume: 2
Issue: 6
Year: 2007
Toward The Use Of The Time–Warping Principle With Discrete–Time Sequences

Author(s): Arnaud Jarrot | Cornel Ioana | André Quinquis
Volume: 2
Issue: 6
Year: 2007
Low-Complexity Analysis of Repetitive Regularities for Biometric Applications

Author(s): Lei Wang | Niral Patel
Volume: 2
Issue: 6
Year: 2007
Intuitive Network Applications: Learning for Personalized Converged Services Involving Social Networks

Author(s): Robert Dinoff | Tin Kam Ho | Richard Hull | Bharat Kumar | Daniel Lieuwen | Paulo Santos | Haobo Ren
Volume: 2
Issue: 6
Year: 2007
A Genetic Algorithm Method to Assimilate Sensor Data for a Toxic Contaminant Release

Author(s): Sue Ellen Haupt | George S. Young | Christopher T. Allen
Volume: 2
Issue: 6
Year: 2007
Why do you need a reservation system?      Save time & money - Smart Internet Solutions