Found: 76
Select item for more details and to access through your institution.
3D scene reconstruction based on OpenGL.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1276, doi. 10.3969/j.issn.1001-3695.2015.04.076
- By:
- Publication type:
- Article
Part appearance model based on R-SVM and SVDD.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1272, doi. 10.3969/j.issn.1001-3695.2015.04.075
- By:
- Publication type:
- Article
Heterogeneous wireless networks optimal access policy using game competition selecting.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1214, doi. 10.3969/j.issn.1001-3695.2015.04.060
- By:
- Publication type:
- Article
Optimal power control and Markov chain optimization for heterogeneous wireless networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1211, doi. 10.3969/j.issn.1001-3695.2015.04.059
- By:
- Publication type:
- Article
Method of adaptive cigarette mark character extraction.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1248, doi. 10.3969/j.issn.1001-3695.2015.04.069
- By:
- Publication type:
- Article
Web service quality spasity solving approach based on local link prediction.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1224, doi. 10.3969/j.issn.1001-3695.2015.04.063
- By:
- Publication type:
- Article
Method of model similarity measurement based on face matching.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1269, doi. 10.3969/j.issn.1001-3695.2015.04.074
- By:
- Publication type:
- Article
Color image segmentation based on multi-level graph partitioning using ant colony optimization.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1265, doi. 10.3969/j.issn.1001-3695.2015.04.073
- By:
- Publication type:
- Article
Improved non-rigid medical image registration algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1261, doi. 10.3969/j.issn.1001-3695.2015.04.072
- By:
- Publication type:
- Article
Study of weight for quadric NURBS curve and surface.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1253, doi. 10.3969/j.issn.1001-3695.2015.04.070
- By:
- Publication type:
- Article
Initialization approach for fuzzy C-means algorithm for color image segmentation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1257, doi. 10.3969/j.issn.1001-3695.2015.04.071
- By:
- Publication type:
- Article
Consensus filter algorithm with quantization communication.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1220, doi. 10.3969/j.issn.1001-3695.2015.04.062
- By:
- Publication type:
- Article
Novel active queue management algorithm designed for self-similar traffic.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1217, doi. 10.3969/j.issn.1001-3695.2015.04.061
- By:
- Publication type:
- Article
Chinese speech synchronized 3D lip animation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1244, doi. 10.3969/j.issn.1001-3695.2015.04.068
- By:
- Publication type:
- Article
Facial expression synthesis based on synthetic general head model.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1240, doi. 10.3969/j.issn.1001-3695.2015.04.067
- By:
- Publication type:
- Article
Microwave radiation interferometry inversion imaging method based on variable density sparse sampling.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1236, doi. 10.3969/j.issn.1001-3695.2015.04.066
- By:
- Publication type:
- Article
Method for special label retrieval based on shape matrix Fourier descriptor of object contour.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1231, doi. 10.3969/j.issn.1001-3695.2015.04.065
- By:
- Publication type:
- Article
Calculation method for image deformation based on 2D topology structures.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1227, doi. 10.3969/j.issn.1001-3695.2015.04.064
- By:
- Publication type:
- Article
Multiple radio channel allocation algorithm to minimize interference.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1207, doi. 10.3969/j.issn.1001-3695.2015.04.058
- By:
- Publication type:
- Article
Cluster algorithm for aeronautical Ad hoc network in highly dynamic environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1193, doi. 10.3969/j.issn.1001-3695.2015.04.055
- By:
- Publication type:
- Article
Vehicular location acquisition and verification method based on cooperative approach in nonline-of-sight.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1199, doi. 10.3969/j.issn.1001-3695.2015.04.056
- By:
- Publication type:
- Article
Joint source coding optimization algorithm for video stream in multi-hop wireless networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1203, doi. 10.3969/j.issn.1001-3695.2015.04.057
- By:
- Publication type:
- Article
FSM-based method for detecting state mechanism of protocol.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1188, doi. 10.3969/j.issn.1001-3695.2015.04.054
- By:
- Publication type:
- Article
Energy-efficient resource allocation in multi-cell LTE system.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1161, doi. 10.3969/j.issn.1001-3695.2015.04.048
- By:
- Publication type:
- Article
PEPA model approach for performance evaluation of dynamic resource provision in cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1179, doi. 10.3969/j.issn.1001-3695.2015.04.052
- By:
- Publication type:
- Article
Deployment of wireless sensor network based on packet reception evaluation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1175, doi. 10.3969/j.issn.1001-3695.2015.04.051
- By:
- Publication type:
- Article
Research on improved data replication strategy in wireless sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1169, doi. 10.3969/j.issn.1001-3695.2015.04.050
- By:
- Publication type:
- Article
Node deployment model of multi-objective optimization in wireless sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1166, doi. 10.3969/j.issn.1001-3695.2015.04.049
- By:
- Publication type:
- Article
Study on bat algorithm in cloud computing resources allocation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1184, doi. 10.3969/j.issn.1001-3695.2015.04.053
- By:
- Publication type:
- Article
Resource allocation schemes in OFDM-based cooperative cognitive radio network with real application environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1157, doi. 10.3969/j.issn.1001-3695.2015.04.047
- By:
- Publication type:
- Article
Establishment of reconfigurable security protocols based on matching policies.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1154, doi. 10.3969/j.issn.1001-3695.2015.04.046
- By:
- Publication type:
- Article
Secure and efficient key generation scheme for WMNs using self-certified public key.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1149, doi. 10.3969/j.issn.1001-3695.2015.04.045
- By:
- Publication type:
- Article
Research on vulnerability classification based on SVM with fuzzy entropy feature selection algorithm.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1145, doi. 10.3969/j.issn.1001-3695.2015.04.044
- By:
- Publication type:
- Article
Network security situation prediction mechanism based on complex network.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1141, doi. 10.3969/j.issn.1001-3695.2015.04.043
- By:
- Publication type:
- Article
Distributed network attack against model with self-immunity learning.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1138, doi. 10.3969/j.issn.1001-3695.2015.04.042
- By:
- Publication type:
- Article
Bit-level image encryption algorithm based on Josephus and Henon chaotic map.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1131, doi. 10.3969/j.issn.1001-3695.2015.04.041
- By:
- Publication type:
- Article
Method of detecting hidden process based on Xen virtualization.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1127, doi. 10.3969/j.issn.1001-3695.2015.04.040
- By:
- Publication type:
- Article
Cloning attack quickly identification based on multi-tree for RFID systems.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1123, doi. 10.3969/j.issn.1001-3695.2015.04.039
- By:
- Publication type:
- Article
Novel two-factor dynamic identity based remote user authentication scheme for multi-server environment.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1119, doi. 10.3969/j.issn.1001-3695.2015.04.038
- By:
- Publication type:
- Article
Bayes-based privacy disclosure analysis in location based services.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1114, doi. 10.3969/j.issn.1001-3695.2015.04.037
- By:
- Publication type:
- Article
Multi-factor decision making for software reliability evaluation.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1110, doi. 10.3969/j.issn.1001-3695.2015.04.036
- By:
- Publication type:
- Article
Gene expression programming based on condition cloud.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1107, doi. 10.3969/j.issn.1001-3695.2015.04.035
- By:
- Publication type:
- Article
Method to summary ontology's Abox in semantic Web of things.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1104, doi. 10.3969/j.issn.1001-3695.2015.04.034
- By:
- Publication type:
- Article
Identification of data stream vulnerabilities in satellite LTE uplink synchronization system with single event effects.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1100, doi. 10.3969/j.issn.1001-3695.2015.04.033
- By:
- Publication type:
- Article
Dynamic call graph based on OS kernel trace.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1095, doi. 10.3969/j.issn.1001-3695.2015.04.032
- By:
- Publication type:
- Article
Formalization of words describe degree of action in event ontology.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1091, doi. 10.3969/j.issn.1001-3695.2015.04.031
- By:
- Publication type:
- Article
Integrating articulatory information into stochastic segment models for continuous mandarin speech recognition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1087, doi. 10.3969/j.issn.1001-3695.2015.04.030
- By:
- Publication type:
- Article
Combining CRF and rule based medical named entity recognition.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1082, doi. 10.3969/j.issn.1001-3695.2015.04.029
- By:
- Publication type:
- Article
Simulation of water pollution transport based on complex agent.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1078, doi. 10.3969/j.issn.1001-3695.2015.04.028
- By:
- Publication type:
- Article
Based on multi-scale kernel function predict riveting pieces of corrosion fatigue.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2015, v. 32, n. 4, p. 1074, doi. 10.3969/j.issn.1001-3695.2015.04.027
- By:
- Publication type:
- Article