Homepage
Administrator Login
doi:
Name:
Journal of Computer Applications(计算机应用)
Publishing Units:
Period:
Monthly
CN:
51-1307/TP
ISSN:
1001-9081
total
879
year
2013
2012
2011
2010
2009
2008
issue
12
11
10
9
8
7
6
5
4
3
2
1
Accelerating hierarchical distributed latent Dirichlet allocation algorithm by parallel GPU
WEN La; RUI Jianwu; HE Tingting; GUO Liang;
2013 Vol. 33 (12): 3313-3316 doi
10.3724/SP.J.1087.2013.03313
Improved parallel simulation of silicon anisotropic etching based on GPU
CHEN Jinyuan; LI Jianhua; GUO Weibin;
2013 Vol. 33 (12): 3317-3320 doi
10.3724/SP.J.1087.2013.03317
Parallelism of adaptive Hungary greedy algorithm for biomolecular networks alignment
MA Jin; XIE Jiang; DAI Dongbo; TAN Jun; ZHANG Wu;
2013 Vol. 33 (12): 3321-3325 doi
10.3724/SP.J.1087.2013.03321
Energy saving and load balance strategy in cloud computing
QIAN Yurong; YU Jiong; WANG Weiyuan; SUN Hua; LIAO Bin; YANG Xingyao;
2013 Vol. 33 (12): 3326-3330 doi
10.3724/SP.J.1087.2013.03326
Energy-saving optimization in datacenter based on virtual machine scheduling
XIANG Jie; DING Enjie;
2013 Vol. 33 (12): 3331-3334 doi
10.3724/SP.J.1087.2013.03331
Architecture and scheduling scheme design of TsinghuaCloud based on OpenStack
ZHAO Shaoka; LI Liyao; LING Xiao; XU Cong; YANG Jiahai;
2013 Vol. 33 (12): 3335-3338 doi
10.3724/SP.J.1087.2013.03335
Approach of large matrix multiplication based on Hadoop
SUN Yuanshuai; CHEN Yao; GUAN Xinjun; LIN Chen;
2013 Vol. 33 (12): 3339-3344 doi
10.3724/SP.J.1087.2013.03339
Massive medical image retrieval system based on Hadoop
FAN Min; XU Shengcai;
2013 Vol. 33 (12): 3345-3349 doi
10.3724/SP.J.1087.2013.03345
Design and implementation of E-mail security service system with cloud computing
DAI Jin; LIU Bo; BIAN Haoyu;
2013 Vol. 33 (12): 3350-3353 doi
10.3724/SP.J.1087.2013.03350
Collaborative filtering model combining users and items predictions
YANG Xingyao; YU Jiong; TURGUN Ibrahim; LIAO Bin;
2013 Vol. 33 (12): 3354-3358 doi
10.3724/SP.J.1087.2013.03354
Analysis of characteristics of social networks in terms of microblog impact
LYU Feifei; XU Yabin; LI Zhuo; WU Zhuang;
2013 Vol. 33 (12): 3359-3362 doi
10.3724/SP.J.1087.2013.03359
Case study of achieving context-awareness based on predicate detection
FANG Chao; YANG Yiling; HUANG Yu;
2013 Vol. 33 (12): 3363-3367 doi
10.3724/SP.J.1087.2013.03363
Parallel recognition of illegal Web pages based on improved KNN classification algorithm
XU Yabin; LI Zhuo; CHEN Junyi;
2013 Vol. 33 (12): 3368-3371 doi
10.3724/SP.J.1087.2013.03368
Adaptive particle swarm optimization algorithm based on diversity feedback
TANG Kezong; WU Jun; ZHAO Jia;
2013 Vol. 33 (12): 3372-3374 doi
10.3724/SP.J.1087.2013.03372
Multi-objective optimization algorithm based on dynamic multiple particle swarms
LIU Bin; ZHANG Renjin;
2013 Vol. 33 (12): 3375-3379 doi
10.3724/SP.J.1087.2013.03375
Artificial fish swarm parallel algorithm based on multi-core cluster
LI Shuang; LI Wenjing; SUN Huanlong; LIN Zhongming;
2013 Vol. 33 (12): 3380-3384 doi
10.3724/SP.J.1087.2013.03380
Broadcast-based multiparty remote state preparation protocol
GENG Huantong; JIA Tingting; LIU Wenjie;
2013 Vol. 33 (12): 3385-3388 doi
10.3724/SP.J.1087.2013.03385
Optimization methods for application layer multicast
SHEN Ye; FENG Jing; YIN Min; MA Weijun; JIANG Lei;
2013 Vol. 33 (12): 3389-3393 doi
10.3724/SP.J.1087.2013.03389
Collection tree-based opportunistic routing protocol with low duty cycle
XU Dan; CHEN Xiaojiang; HUANG Junjie; YIN Xiaoyan; FANG Dingyi;
2013 Vol. 33 (12): 3394-3397 doi
10.3724/SP.J.1087.2013.03394
Interference characteristic simulation in CSMA/CA-based wireless multi-hop networks
TAN Guoping; TANG Luyao; HUA Zaijun; LIU Xiuquan;
2013 Vol. 33 (12): 3398-3401 doi
10.3724/SP.J.1087.2013.03398
Lightweight protocol with anonymity for Ad Hoc network based on bilinear pairings
LIANG Yumin; CAO Tianjie;
2013 Vol. 33 (12): 3402-3405 doi
10.3724/SP.J.1087.2013.03402
Directional simple auction aggregation protocol for wireless sensor and actor network
ZHENG Ruoqin; DU Jinglin; XIE Li;
2013 Vol. 33 (12): 3406-3409 doi
10.3724/SP.J.1087.2013.03406
Energy balanced uneven clustering algorithm based on ant colony for wireless sensor network
MIAO Congcong; CHEN Qingkui; CAO Jianwei; ZHANG Gang;
2013 Vol. 33 (12): 3410-3414 doi
10.3724/SP.J.1087.2013.03410
Heterogeneous node distribution clustering routing algorithm for wireless sensor network
QIAN Kaiguo; DAI Zucheng; SHEN Shikai;
2013 Vol. 33 (12): 3415-3418 doi
10.3724/SP.J.1087.2013.03415
Formal verification of railway interlocking system based on ladder logic
YU Lizhen; XU Zhongwei; CHEN Zuxi; ZHANG Shuqing;
2013 Vol. 33 (12): 3419-3422 doi
10.3724/SP.J.1087.2013.03419
Formal semantics of Agent-based distributed computing model
HOU Jinkui; WANG Lei;
2013 Vol. 33 (12): 3423-3427 doi
10.3724/SP.J.1087.2013.03423
Recovery method for high-level language control structures based on structural analysis
HUO Yuanhong; LIU Yi; JI Weixing;
2013 Vol. 33 (12): 3428-3431 doi
10.3724/SP.J.1087.2013.03428
Distributed data storage method based on consistent tree distribution
GUO Dong; WANG Wei; ZENG Guosun;
2013 Vol. 33 (12): 3432-3436 doi
10.3724/SP.J.1087.2013.03432
One-site multi-table and cross multi-table frequent item sets mining with privacy preserving
LIN Rui; ZHONG Cheng; HUA Bei;
2013 Vol. 33 (12): 3437-3440 doi
10.3724/SP.J.1087.2013.03437
Hyperspectral image classification based on active learning
HAO Zedong; YU Songsong; GUAN Jihong;
2013 Vol. 33 (12): 3441-3443 doi
10.3724/SP.J.1087.2013.03441
Vehicle navigation algorithm based on unscented Kalman filter sensor information fusion
LIANG Dingwen; YUAN Lei; CAI Zhihua; GU Qiong;
2013 Vol. 33 (12): 3444-3448 doi
10.3724/SP.J.1087.2013.03444
Building algorithm for tree-ring application layer multicast based on ant colony algorithm
XU Jianzhen; HE Tingting; HE Dan; ZHOU Tong;
2013 Vol. 33 (12): 3449-3452 doi
10.3724/SP.J.1087.2013.03449
Data compression and optimization algorithm for wireless sensor network based on temporal correlation
WANG Ling; SHI Weiren; SHI Xin; SONG Ningbo; RAN Qike;
2013 Vol. 33 (12): 3453-3456 doi
10.3724/SP.J.1087.2013.03453
Estimation algorithm for missing data in wireless sensor network
QIU Baozhi; ZHEN Qianqian; TANG Yaohua;
2013 Vol. 33 (12): 3457-3459 doi
10.3724/SP.J.1087.2013.03457
Geographic routing algorithm based on anchor nodes in vehicular network
ZHENG Zheng; LI Yunfei; YAN Jianfeng; ZHAO Yongjie;
2013 Vol. 33 (12): 3460-3464 doi
10.3724/SP.J.1087.2013.03460
Design of multi-carrier transceivers based on modified discrete fourier transform filter bank
JI Xiang; ZHUANG Ling; SHAO Kai; WANG Guangyu;
2013 Vol. 33 (12): 3465-3468 doi
10.3724/SP.J.1087.2013.03465
Fast DOA estimation for coherent wideband sources based on symmetrical spectrum
ZENG Yaoping; YANG Yixin; LU Guangyue;
2013 Vol. 33 (12): 3469-3472 doi
10.3724/SP.J.1087.2013.03469
Bit-flipping prediction acquisition algorithm of weak GPS signal
LI Weibin; ZHANG Yingxin; GUO Xinming; ZHANG Wei;
2013 Vol. 33 (12): 3473-3476 doi
10.3724/SP.J.1087.2013.03473
Design of multi-serial communication for micro-satellite simulation system
ZHANG Wenkai; GUAN Guixia; ZHAO Haimeng; WANG Mingzhi; WU Taixia; YAN Lei;
2013 Vol. 33 (12): 3477-3481 doi
10.3724/SP.J.1087.2013.03477
Performance of PCM/FM telemetry system based on multi-symbol detection and Turbo product code
WANG Li; YUAN Fu; XIANG Liangjun; ZHENG Linhua;
2013 Vol. 33 (12): 3482-3485 doi
10.3724/SP.J.1087.2013.03482
Protocol state machine reverse method based on labeling state
HUANG Xiaoyan; CHEN Xingyuan; ZHU Ning; TANG Huilin;
2013 Vol. 33 (12): 3486-3489 doi
10.3724/SP.J.1087.2013.03486
Recommendation-based anti-attack trust model on E-commerce
DENG Pan; ZHONG Jiang;
2013 Vol. 33 (12): 3490-3493 doi
10.3724/SP.J.1087.2013.03490
Polymorphic worms signature extraction based on improved ant colony algorithm
HUANG Hui; GUO Fan; XU Shufang;
2013 Vol. 33 (12): 3494-3498 doi
10.3724/SP.J.1087.2013.03494
Design of pseudorandom-number generator based on spatiotemporal chaos
TU Guangyou; HE Bo;
2013 Vol. 33 (12): 3499-3502 doi
10.3724/SP.J.1087.2013.03499
Construction of almost optimal resilient Boolean functions via concatenation
YUAN Hongbo; YANG Xiaoyuan;
2013 Vol. 33 (12): 3503-3505 doi
10.3724/SP.J.1087.2013.03503
Network security situational awareness method of multi-period assessment
LI Chun; ZHAO Jianbao; SHEN Xiaoliu;
2013 Vol. 33 (12): 3506-3510 doi
10.3724/SP.J.1087.2013.03506
Reconciliation technology based on low density parity check code
ZHANG Yanhuang; GUO Dabo; WANG Yunyan;
2013 Vol. 33 (12): 3511-3513 doi
10.3724/SP.J.1087.2013.03511
Leakage-resilient designated verifier signature scheme
HONG Xiaojing; WANG Bin;
2013 Vol. 33 (12): 3514-3518 doi
10.3724/SP.J.1087.2013.03514
Blind and certificateless verifiably encrypted signature scheme
LI Yanhong; GAO Dezhi; FENG Wenwen;
2013 Vol. 33 (12): 3519-3521 doi
10.3724/SP.J.1087.2013.03519
Automatic evaluation scheme for imperceptibility of natural language watermarking
WU Ruifeng; HE Lu; FANG Dingyi;
2013 Vol. 33 (12): 3522-3526 doi
10.3724/SP.J.1087.2013.03522
Secure multiparty computation solutions of collection member decision
DOU Yongli; WANG Haichun; KANG Jian;
2013 Vol. 33 (12): 3527-3530 doi
10.3724/SP.J.1087.2013.03527
Fast geometric resistant video watermarking scheme for gateway copyright protection
LIU Hongbin; DU Ling; JI Hongli;
2013 Vol. 33 (12): 3531-3535 doi
10.3724/SP.J.1087.2013.03531
Image inpainting algorithm based on double-cross curvature-driven diffusion model
ZHAI Donghai; ZUO Wenjie; DUAN Weixia; YU Jiang; LI Tongliang;
2013 Vol. 33 (12): 3536-3539 doi
10.3724/SP.J.1087.2013.03536
Real-time video super-resolution restruction based on GPU acceleration
CHEN Xiangji; HAN Guoqiang; ZHANG Zhiyuan;
2013 Vol. 33 (12): 3540-3543 doi
10.3724/SP.J.1087.2013.03540
Multi-region image reconstruction algorithm
WAN Jinliang; YE Long;
2013 Vol. 33 (12): 3544-3547 doi
10.3724/SP.J.1087.2013.03544
Corner detection algorithm using multi-channel odd Gabor gradient autocorrelation matrix
DENG Chao; LI Huoxing; WANG Zhiheng;
2013 Vol. 33 (12): 3548-3551 doi
10.3724/SP.J.1087.2013.03548
Fractal image coding method based on Fisher classification and space mapping
LIU Shuqun; PAN Zhangrong;
2013 Vol. 33 (12): 3552-3554 doi
10.3724/SP.J.1087.2013.03552
Lens distortion correction method based on collinear points
LIU Chao; LI Xingfei; GUO Jingbin; TAN Wenbin;
2013 Vol. 33 (12): 3555-3558 doi
10.3724/SP.J.1087.2013.03555
Microblog events detection and tracking with incremental hierarchical DBSCAN based on representative posts using cloud framework
FENG Yong; HAN Nan; JIA Dongfeng;
2013 Vol. 33 (12): 3559-3562 doi
10.3724/SP.J.1087.2013.03559
Identification method of spam comments in microblog based on AdaBoost
HUANG Ling; LI Xueming;
2013 Vol. 33 (12): 3563-3566 doi
10.3724/SP.J.1087.2013.03563
Protein-protein interaction network clustering based on artificial immune system
WANG Chong; LEI Xiujuan;
2013 Vol. 33 (12): 3567-3570 doi
10.3724/SP.J.1087.2013.03567
Artificial bee colony algorithm inspired by particle swarm optimization and differential evolution
LIN Jinhui; CAO Zhong; XU Dalin;
2013 Vol. 33 (12): 3571-3575 doi
10.3724/SP.J.1087.2013.03571
Improved genetic algorithm for solving permutation flow shop scheduling problem
LI Xiaobin; BAI Yan; GENG Linxiao;
2013 Vol. 33 (12): 3576-3579 doi
10.3724/SP.J.1087.2013.03576
Performance evaluation on open source cloud platform for high performance computing
LI Chunyan; ZHANG Xuejie;
2013 Vol. 33 (12): 3580-3585 doi
10.3724/SP.J.1087.2013.03580
Energy-aware resource management mechanism for virtualized cloud datacenter
LI Xiaoliu; ZHANG Xihuang;
2013 Vol. 33 (12): 3586-3590 doi
10.3724/SP.J.1087.2013.03586
Iteration MapReduce framework for evolution algorithm
JIN Weijian; WANG Chunzhi;
2013 Vol. 33 (12): 3591-3595 doi
10.3724/SP.J.1087.2013.03591
Path planning for multiple unmanned combat aerial vehicles based on improved artificial bee colony algorithm
CAO Lu; JIA Yinping; ZHANG An;
2013 Vol. 33 (12): 3596-3599 doi
10.3724/SP.J.1087.2013.03596
Precise train stopping method based on predictive control
WU Peng; WANG Qingyuan; LIANG Zhicheng; WU Jie;
2013 Vol. 33 (12): 3600-3603 doi
10.3724/SP.J.1087.2013.03600
Embedded motion controller design based on RTEX network
LIN Shiyao; WU Chongyang; LI Ruifeng;
2013 Vol. 33 (12): 3604-3607 doi
10.3724/SP.J.1087.2013.03604
Application of geometric moving average martingale algorithm in anomaly analysis before earthquake based on sliding window
CHEN Liping; KONG Xiangzen; ZHENG Zhi; LIN Xinqi; ZHAN Xiaoshan;
2013 Vol. 33 (12): 3608-3610 doi
10.3724/SP.J.1087.2013.03608