


default search action
Journal of Digital Content Technology and its Applications, Volume 4
Volume 4, Number 1, February 2010
- Zenon Chaczko, Jenny Quang, Bruce Moulton:

Knowledge Transfer Model for the Development of Software Requirements Analysis CASE Tools to Be Used in Cross Time-Zone Projects. 10-15 - Ali Alqahtani, Hussein Zedan:

Agile Service-Oriented Applications: Rule-based Foundation with Runtime Adaptability. 16-25 - Rerkchai Fooprateepsiri, Werasak Kurutach:

A Highly Robust Approach Image Identification based-on Hausdorff-Trace Transform. 26-31 - Chaohong Song, Feng Shi:

Prediction of Subcellular Localization of Apoptosis Proteins by Dipeptide Composition. 32-36 - Ali Hadian, Mahdi Nasiri, Behrouz Minaei-Bidgoli:

Clustering Based Multi-Objective Rule Mining using Genetic Algorithm. 37-42 - Yini Bao, Erwin M. Bakker:

Content Based Web Sampling. 43-68 - Timo Koskela, Janne Julkunen, Otso Kassinen, Mika Ylianttila:

User Evaluation of a Community-centric Music Voting Service. 69-78 - Alejandro Carrasco, M. C. Romero-Ternero, Francisco Sivianes, M. D. Hernández, J. I. Escudero:

Multi-Agent and Embedded System Technologies Applied to Improve the Management of Power Systems. 79-85 - Li Wei, Eungjoo Lee:

3D Face Recognition Using Face Feature Points Based on Parallel Stereo Vision. 86-95 - Marini Othman, Abdullah Mohd Zain, Abdul Razak Hamdan:

A Review on Project Management and Issues Surrounding Dynamic Development Environment of ICT project: Formation of Research Area. 96-105 - Dong Wang, Jionghui Jiang, Shisheng Zhou:

Image Based Simulation for Pyrography Style Painting. 106-111 - Li Wei, Eungjoo Lee:

Multi-pose Face Recognition Using Head Pose Estimation and PCA Approach. 112-122 - Potti Subbaraj, Pon S. Godwin Anand:

GA Optimized Knowledge Base of FLC for Complex Industrial Process. 123-136 - Yücel Batu Salman, Hong-In Cheng, Ji Young Kim, Patrick E. Patterson:

Medical Information System With Iconic User Interfaces. 137-148 - Marcelo de Carvalho Alves, Luiz Gonsaga de Carvalho, Edson Ampélio Pozza, Luciana Sanches Alves:

A Soft Computing Approach For Epidemiological Studies of Coffee And Soybean Rusts. 149-154
Volume 4, Number 2, April 2010
- Walter F. Witt III:

Keep Your Feet on the Ground When Moving Software into the Cloud. 10-17 - S. M. Riazul Islam, Kyung Sup Kwak:

On Channel Estimation in MB-OFDM UWB Systems with Time Varying Dispersive Fading Channel. 18-24 - Chi-Yen Yin, Yan-Ping Chi:

A Historical Review and Trend Analysis of Ubiquitous Computing Research Using Bibliometric Methodology During 1993 to 2009. 25-35 - Maha A. Al-Bayati, Karim Q. Hussein:

Comparison Between Modes of Communication for the Deaf and Dumb via e-Learning Through Case Study (sign language and finger spelling in review). 36-39 - Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-Cheon Yang:

Hand Mouse: Real Time Hand Motion Detection System Based on Analysis of Finger Blobs. 40-56 - Abdelhak Boubetra:

Knowledge Virtualization of Future Social System Behavior through Computer Simulation. 57-62 - Pedram Hajipour, Kolsoom Abbasi Shahkooh:

Characterizing MEGACO Security in the presence Diameter Server. 63-68 - Xun-Yi Ren, Ruchuan Wang, Qiang Kong:

P2P Replica-tree based Consistency Maintenance Strategy. 69-73 - Hyun Lee, Byoungyong Lee, Kyungseo Park, Ramez Elmasri:

Fusion Techniques for Reliable Information: A Survey. 74-88 - Daxing Zhang, Shiming Liang, Zhigeng Pan, Haihua Li, Xin Liu:

An Image Authentication Scheme Based on Correlation. 89-94 - Manisha Rathi, Anand Priyadarshini, Ankit Rastogi:

Predictive Analysis for Customer Relationship Management. 95-99 - Jianfeng Hu, Xiaofeng Li, Jinghai Yin:

Learning and Decision Making in Human During a Game of Matching Pennies. 100-108 - Zhengjun Cheng, Yuntao Zhang, Changhong Zhou, Wenjun Zhang, Shibo Gao:

Classification of Skin Sensitizers on the Basis of Their Effective Concentration 3 Values by Using Adaptive Boosting Method. 109-121 - Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali:

A Potent Model for Unwanted Traffic Detection in QoS Network Domain. 122-130 - Lilin Fan, Chunhong Liu, Qian Liu:

The Application Research of High-dimensional Mixed-attribute Data Clustering Algorithm. 131-134 - Guoqiang Cai, Limin Jia, Jianwei Yang, Haibo Liu:

Improved Wavelet Neural Network Based on Hybrid Genetic Algorithm Applicationin on Fault Diagnosis of Railway Rolling Bearing. 135-141 - Jianhong Zhang, Hua Chen, Shengnan Gao:

Efficient Blind Signature Scheme based on Modified Generalized Bilinear Inversion for Multiple Signers. 142-148
Volume 4, Number 3, June 2010
- Dongli Han, Xin Song, Kazuki Maeda:

Topic Presentation for a Free Conversation System Based on the Web Texts. 7-14 - Yuyu Yin, Ying Li, Jianwei Yin, ShuiGuang Deng:

Proof as Composition: An approach for the Large-granularity Web Services Composition. 15-34 - Yuntao Zhang, Wenbin Dai, Zhengjun Cheng:

QSPR Study Of Mineral Crystal Lattice Energy Based On Gene Expression Programming. 35-42 - Jianhua Wu, Zhaorong Wei, Youli Chang:

Color and Texture Feature For Content Based Image Retrieval. 43-49 - Tzu-Chih Chung, Li-Ya Tseng:

Advanced Interactive T-Learning System with Variable Remote Control. 50-60 - Saleh Ali Alomari, Putra Sumari, Sadik A. M. Al-Taweel, Ahmed Manasrah:

CUSTP: Custom Protocol for Audio and Video Conferencing System over P2P Networks. 61-74 - Najet Arous, Noureddine Ellouze:

On the Search of Organization Measures for a Kohonen Map Case Study: Speech Signal Recognition. 75-84 - Jingli Zhou, Ke Liu, Leihua Qin, Xuejun Nie:

Block-Ranking: Content Similarity Retrieval Based on Data Partition in Network Storage Environment. 85-94 - Hui Gao, Jun Jiang, Li She, Yan Fu:

A New Agglomerative Hierarchical Clustering Algorithm Implementation based on the Map Reduce Framework. 95-100 - Taifei Zhao, Xizheng Ke, Peilin Yang:

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks. 101-109 - Wen-Jye Shyr, Chia-Ming Lin, Wei-Ting Chiang:

WebAccess Based Remote Graphic Surveillance System for Mechatronics. 110-116 - Hai Guo, Jing-ying Zhao, Xiao Niu Li:

Preprocessing Method for NaXi Pictographs Character Recognition Using Wavelet Transform. 117-131 - Chunxue Wu, Fengna Zhang, Hongming Yang:

A Novel QoS Multipath Path Routing in MANET. 132-136 - Gengzhong Zheng, Sanyang Liu, Xiaogang Qi:

A Power Control Algorithm Based on Non-cooperative Game for Wireless CDMA Sensor Networks. 137-145 - Jin Liu, Jing Sun, Zhengquan Xu, Lu Gao:

Security Web Release and Visualization of Remote Sensing Images. 146-153 - Zhi-Qiang Cheng, Yi-Zhong Ma, Jing Bu:

Mean Shifts Identification Model in Bivariate Process Based on LS-SVM Pattern Recognizer. 154-170 - Chi-Man Pun, Xiaochen Yuan:

Robust and Geometric Invariant Watermarking Scheme using Block and Gray-Level Histograms. 171-183 - Xiaogang Qi, Lifang Liu, Sanyang Liu:

Experimental Study on Connectivity for Wireless Sensor Networks. 184-189 - Ali Cherif Chaabani, Atef Boujelben, Adel Mahfoudhi, Mohamed Abid:

An Automatic-Pre-processing Method For Mammographic Images. 190-201 - Jun Li, Youdong Ding, Yunyu Shi, Wei Li:

A Divide-And-Rule Scheme For Shot Boundary Detection Based on SIFT. 202-214 - Jinlong Wang, Can Wen, Shunyao Wu, Huy Quan Vu:

A Visual Mining System for Theme Development Evolution Analysis of Scientific Literature. 215-223 - Chyi-Lu Jang:

Measuring Electronic Government Procurement Success and Testing for the Moderating Effect of Computer Self-efficacy. 224-232 - Hamid Turab Mirza, Ling Chen, Gencai Chen:

Practicability of Dataspace Systems. 233-243
Volume 4, Number 4, July 2010
- Wenbo Shi, Injoo Jang, Hyeong Seon Yoo:

An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext. 7-14 - Jian Hu, Gangyan Li, Yeqiong Song:

Signal Framing Methods of Automotive Embedded Networked Control System for Bandwidth Consumption Optimization. 15-27 - Lu Lu, Xiuxia Quan:

Session-Based User Behavior Meta-Model of Web Applications for User-Level QoS Load Testing. 28-42 - Hongjun Guan:

WEB-based Modeling and Simulation Technology in the Training of Power Plant Application -A Set of Steam Turbine for Instance. 43-47 - Li Zhang, Guoxin Zheng:

Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive Radio Networks. 48-57 - Hong Chen:

An Approach to Traffic Volume Forecasting Based on Ant Colony Neural Network. 58-63 - Zezhong Xu:

A Globally Consistent Solution to Multiview Image Registration. 64-74 - Syed Amjad Ali, Srinivasan Vathsal, K. Lal Kishore:

CT Image Denoising Technique using GA aided Window-based Multiwavelet Transformation and Thresholding with the Incorporation of an Effective Quality Enhancement Method. 75-87 - Yingkun Hou, Chunxia Zhao, Yong Cheng, Zhengli Zhu:

Image Watermarking Resynchronization to Geometric Attacks in DWT Domain. 88-98 - Zheng Chen:

An Error correcting scheme for Color-PDF417. 99-106 - Osama Hosam, Lincong Yang, Wei Liang, Xingming Sun:

Watermarking 3D Triangular Mesh with High Visual Quality. 107-116 - Chi-Man Pun, Jing-Jing Jiang:

Key-Selective Patchwork Method for Audio Watermarking. 117-126 - Jian-wei Yang, Dechen Yao, Guo-qiang Cai, Hai-bo Liu, Jiao Zhang:

A Method of Bearing Fault Feature Extraction Based on Improved Wavelet Packet and Hilbert Analysis. 127-139 - Jinjiang Li, Hui Fan, Da Yuan:

Fractal Digital Image Inpainting. 140-150 - Yunyu Shi, Youdong Ding, Jun Li:

A user-perceived video quality assessment metric using inter-frame redundancy. 151-160 - Ming-Hour Yang, Shiuhpyng Shieh:

Tracing Anonymous Mobile Attackers in Wireless Network. 161-173 - Xinwu Li:

A New Clustering Segmentation Algorithm of 3D Medical Data Field Based on Data Mining. 174-181 - Haiyan Li, Jihua Wang:

SH3 Domain Unfolding Pathway Studied by Protein Contact Network Model. 182-192 - Xun-Yi Ren, Zheng-Hua Qi, Ruchuan Wang, Xiaodong Ma:

Rough Set and A* based Tasks Scheduling in Gird Environment. 193-198 - Huang Zhi, Sanyang Liu, Xiaogang Qi:

Overview of Routing in Dynamic Wireless Sensor Networks. 199-206 - Fatemeh NasserEslami, Fatemeh Saghafi:

Safety technologies impacts survey in M-services security provision. 207-214 - Ying Wang, Daoping Wang, Guangli Liu, Di Li:

Data Integration Platform for Village Emergency. 215-217
Volume 4, Number 5, August 2010
- Sushma D. Ghode, S. A. Chhabria, Rajiv V. Dharaskar:

Computer Interaction System using Hand Posture Identification. 8-12 - Hee Wan Kim, Hee Suk Seo, Sun Ho Hong, Chul Kim:

Modeling of Energy-efficient Applicable Routing Algorithm in WSN. 13-22 - Anan Liu, Zhaoxuan Yang:

Watching, Thinking, Reacting: A Human-Centered Framework for Movie Content Analysis. 23-37 - Jing Lu, Dunlu Peng, Huan Huo, Liping Gao, Xiaodong Zhu:

Analyzing Triggers in XML Data Integration Systems. 38-45 - Junwu Zhu, Bin Li, Fei Wang, Sicheng Wang:

Mobile Ontology. 46-54 - Rongjie Liu, Guangsheng Cao, Jie Zhang, Pingjian Song, Binge Cui:

Research on Dynamic Web Services Management Based on QoS. 55-61 - Changjiang Zhang, Xiang Zhang, Bo Yang, Ying Li:

Segmentation for Eyed Typhoon Cloud Image by Curvature and Fractal Feature. 62-73 - Jun Li, Youdong Ding, Yunyu Shi, Jianfei Zhang:

Building a Large Annotation Ontology for Movie Video Retrieval. 74-81 - Fuguo Dong, Yurong Li, Jinjiang Li:

The Consistency Analysis of Addition Chains for Several Fast Algorithm of Modular Exponentiation. 82-88 - Yuhuan Zhou, Xiongwei Zhang, Jinming Wang, Yong Gong:

Research on SVDD Applied in Speaker Verification. 89-95 - Shifei Ding, Li Xu, Hong Zhu, Liwen Zhang:

Research and Progress of Cluster Algorithms based on Granular Computing. 96-104 - Tao Zhu, Jin-ming Wang, Xiong-wei Zhang, Peng Zhang:

Distortion Estimation Method for Coefficient Dropping of H, 264 Bit-stream. 105-111 - Zehui Qu, Deng Wei, Zhiguang Qin:

A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach. 112-117 - Jin-Cherng Lin, Kuo-Chiang Wu:

Analyze on the Learning Behavior of E-Learning. 118-123 - Jian-ming Cui:

Research on Data Fitting of key Model for Traffic Flow. 124-128 - Huey-Min Sun, Xing-Jun Tsai:

The Effect of Organizations Resources on Performance for Digital Content Industry. 129-142 - Anirban Kundu, Chandan Banerjee, Priya Saha:

Introducing New Services in Cloud Computing Environment. 143-152 - Jia Lee, Xin Huang, Qingsheng Zhu:

Decomposing Fredkin Gate into Simple Reversible Elements with Memory. 153-158 - Yun Her, Su-Kyoung Kim, YoungTaek Jin:

A Context-Aware Framework using Ontology for Smart Phone Platform. 159-167
Volume 4, Number 6, September 2010
- Xia Zhuge, Koji Nakano:

Halftoning via Error Diffusion using Circular Dot-overlap Model. 8-17 - Lingqiu Zeng, Hongchun Qu, Qingsheng Zhu, Youlan Wang:

Incorporating Graph Automata into Plant Growth Simulation with Nutrients Transport. 18-25 - Zhongzhi Li, Xuegang Wang:

Spatial Clustering Algorithm Based on Hierarchical-Partition Tree. 26-35 - Jinjiang Li, Zhi-Yonga An, Hui Fan, Yewei Li:

Multifocus Image Fusion Algorithms using Dyadic non-subsampled Contourlet Transform. 36-47 - Ming-Hour Yang:

Polymorphic Penetration Testcode Carrier. 48-61 - Pin Lv, Yuntao Wu:

Generalization Step Analysis for Privacy Preserving Data Publishing. 62-71 - Bingzhou Li:

Modelling for Cruise Two-Dimensional Online Revenue Management System. 72-78 - Fuguo Dong, Hui Fan, Da Yuan:

A Novel Image Median Filtering Algorithm based on Incomplete Quick Sort Algorithm. 79-84 - Lifeng Wu, Fuxue Zhang:

A Novel Non-driven Structural MEMS-based Gyroscope. 85-88 - Rongzhi Liu, Bei Hu:

Research on the Industrial Cluster Incubation System for Entrepreneurial Activities: the Construction and Functions. 89-93 - Peng Wang, Haiqi Dai, Shuliang Ding:

Computerized Adaptive Testing in Chinese Mainland: A Review. 94-99 - Siwar Zribi Boujelbene, Dorra Ben Ayed Mezghanni, Noureddine Ellouze:

Improving SVM by Modifying Kernel Functions for Speaker Identification Task. 100-105 - Thekra Abbas, Beiji Zou:

A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image. 106-114 - Dongming Chen, Jing Wang, Xiaodong Chen, Xiaowei Xu:

A Search Algorithm for Clusters in a Network or Graph. 115-122 - Hui Zhao, Peiquan Jin, Puyuan Yang, Lihua Yue:

BPCLC: An Efficient Write Buffer Management Scheme for Flash-Based Solid State Disks. 123-133 - Guowei Xue, Yan Zhang:

A Parallel Backprojection Algorithm for Spiral Cone-Beam CT Exact Reconstruction. 134-143 - Di Jia, Fangfang Han, Jinzhu Yang, Yifei Zhang, Dazhe Zhao, Ge Yu:

A Synchronization Algorithm of MRI Denoising and Contrast Enhancement Based on PM-CLAHE Model. 144-149 - Xue Deng, Junfeng Zhao, Lihong Yang, Rongjun Li:

Possibilistic mean-variance utility to portfolio selection for bounded assets. 150-160 - Wenyong Xiao:

Multi-factor predication of diesel engine by using artificial neural networks. 161-167
Volume 4, Number 7, October 2010
- Eleonora Pantano, Vincenzo Corvello:

Digital contents management for improving consumers' experience. 8-10 - Massimo Franco, Francesca Di Virgilio, Loredana Di Pietro:

A Conceptual Representation of Consumer's Group Knowledge and the Possible Role of New Technologies. 11-22 - Pierpaolo Singer, Maria Antonella Ferri, Lucia Aiello, Claudia Cacia:

Internet as a "point of synergy" between communication and distribution: hypothesis of model applied to tourism. 23-37 - Francesco Sofo, Michelle Berzins, Salvatore Ammirato, Antonio Volpentesta:

Investigating the relationship between consumers' style of thinking and online victimization in scamming. 38-49 - Andrew Newman, Charles Dennis, Len-Tiu Wright, Tamira King:

Shoppers' Experiences of Digital Signage-a Cross-National Qualitative Study. 50-57 - Phoebe R. Apeagyei:

Application of 3D body scanning technology to human measurement for clothing Fit. 58-68 - Zan Gao, Marcin Detyniecki, Ming-yu Chen, Alexander G. Hauptmann, Howard D. Wactlar, Anni Cai:

The Application of Spatio-temporal Feature and Multi-Sensor in Home Medical Devices. 69-78 - Yiqun Li, Li Xiong, Rui Wang:

The Informatization Development of Foreign Trade Enterprise in China: Case in Proceeding Trade. 79-87 - Bo Meng, Wei Huang, Zimao Li, Dejun Wang:

Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus. 88-107 - Liping Zhang, Fengyu Lei, Jin Chen:

The Larger Integer Library and the Diffie-Hellman Protocol based on XTR. 108-114 - Wei Wei, Bin Zhou:

Features Detection Based on a Variational Model in Sensornets. 115-127 - Junsheng Zhang, Yunchuan Sun:

An Analogy reasoning model for Semantic Link Network. 128-139 - Kaihong Guo, Wenli Li:

A C-OWA Operator-based Method for Aggregating Intuitionistic Fuzzy Information and Its Application to Decision Making under Uncertainty. 140-147 - Yiling Wen, Jianfeng Ma, Sang-Jae Moon:

Efficient and Identity-based Signcryption with Provably-secure. 148-153 - Ahmed Sallam, Zhiyong Li, Shaimaa Hassan:

Web Services Supervision System Based on Jade. 154-164 - Mehrnoush Shamsfard, Mahsa Arab Yarmohammadi:

A Semantic Approach to Extract the Final Answer in SBUQA Question Answering System. 165-176 - Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang:

Evolution Cipher against Differential Power Attack. 177-189 - Jianhong Zhang, Min Xu, Xue Liu, Xiuna Su:

On the Security of Convertible Multiauthenticated Encryption Scheme and Its Improved Scheme. 190-196 - Yurong Li, Fuguo Dong:

A Novel Pixel Line Based Algorithm for Line Generation. 197-202 - Jianhua Dai, Xiaochun Liu, Qing Xu, Nenggan Zheng, Shaomin Zhang, Weidong Chen, Xiaoxiang Zheng:

Neural spike sorting by rough set method. 203-209 - Yingyuan Xiao, Guang Yang, Hua Zhang, Kevin Lü:

An Efficient Region Matching Method for Content-based Image Retrieval. 210-214 - Jianguo Chen, Stefan D. Bruda:

An Efficient Feedback-based Trust Model for Pervasive Computing. 215-225 - Jian Wang, Yanheng Liu, Wenbin Gao:

Securing Internet of Vehicles Using TCM. 226-233
Volume 4, Number 8, November 2010
- Wen Si, Zhuang-zhi Yan, Yi Li, Shu-Peng Liu:

The Crouch Start Modeling and Simulation Based on AnyBody Technology. 8-14 - Lingqiu Zeng, Hongchun Qu, Qingsheng Zhu, Youlan Wang:

Incorporating Graph Automata into Plant Growth Simulation with Nutrients Transport. 15-22 - Jia Mei, Huaikou Miao, Yihai Chen, Honghao Gao:

Verifying Web Services Composition Based on Interface Automata Using SPIN. 23-33 - Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:

Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression. 34-42 - Xiuzhi Shi, Bin Wang, Jinfang Sheng, Wei Zhu:

Holographic View Language HVL4DCAM For Aspectual Middleware Platform. 43-54 - Zhanmao Cao, Jianchao Tang, Shizhong Jiang, Huixuan Wu:

Optimization Multiple Sequence Alignment Scheme in DC-BTA. 55-64 - Bin Wang, Jinfang Sheng, Jian Ding:

DCAM: A Distributed Aspectual Middleware. 65-78 - Bing Liu, Ping Fu, Shengwei Meng, Lunping Guo:

Compressive Sensing Signal Detection Algorithm Based on Location Information of Sparse Coefficients. 79-85 - Si Li, Huiji Gao, Jingyi Guan, Weiran Xu, Jun Guo:

Faceted Blog Distillation System: Find an in-Depth Blog. 86-91 - Hongwei Wang, Lijuan Zheng, James N. K. Liu:

Measuring The Performance of Information Systems Using Data Envelopment Analysis. 92-101 - Ali Mohammed Noori Hasan, Robert Craig, Hanaa A. Hassan:

Implementation of Chaotic on Off Keying (COOK) Using a High Resolution Digital Chaotic Signal. 102-109 - Bo Jiang, Yun Ling, Jiale Wang:

Tag Recommendation Based on Social Comment Network. 110-117 - Masoomeh Zameni, Mahmood Fathy, Amin Sadri:

A Low Cost Algorithm for Expected Goal Events Detection in Broadcast Soccer Video. 118-125 - Weixin Si, Zhiyong Yuan, Ruixue Mao, Jianhui Zhao, Xiangyun Liao, Zhaoliang Duan:

Modeling and Realization of Virtual Acupuncture Training Simulation System. 126-136 - Mutian Li, Yongping Zhao, Qisong Wang:

Ignition Coil Insulation Fault Detection Algorithm. 137-142 - Anan Liu, Dong Han:

Spatiotemporal Sparsity Induced Similarity Measure for Human Action Recognition. 143-149 - Ang Gao:

Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks. 150-163 - Yong-uk Park, Hyuk-chul Kwon:

An Efficient Syntactic Analyzer Using Semantic Connection Units. 164-171 - Xia Yin, Weiguo Zhang, Jianping Wu, Wei Zhang:

Can Longest Prefix Matching Make The Path Length Shorter? 172-181 - Xin-hua Zhu, Qing-ling Zeng, Qing-hua Cao:

A Complex XML Schema to Map the XML Documents of Distance Education Technical Specifications into Relational Database. 182-192 - Fuguo Dong:

Several Incomplete Sort Algorithms for Getting the Median Value. 193-198 - Lilin Fan, Huili Meng:

Application Research on Optimal Path Based on Genetic Algorithm. 199-202 - Xun-Yi Ren, Xiao-Dong Ma:

A* Algorithm Based Optimization for Cloud Storage. 203-208 - Ren Ya-fei, Ke Xi-zheng:

Selection of Wavelet Decomposition Level in Multi-Scale Sensor Data Fusion of MEMS Gyroscope. 209-215 - Jianhua Dai, Xiaochun Liu, Shaomin Zhang, Huaijian Zhang, Qing Xu, Weidong Chen, Xiaoxiang Zheng:

Continuous Neural Decoding Method Based on General Regression Neural Network. 216-221 - Jianwei Wang, Zhongxiao Hao:

Research on Querying Node Probability Method in Probabilistic XML Data Based on Possible World. 222-231 - Kezheng Lin, Ying Xu, Yuan Zhong:

Using Kernel Discriminant Analysis and 2DGabor Local Features Fusion for Face Recognition. 232-241 - Joseph K. Siror, Guanqun Liang, Kaifang Pang, Huanye Sheng, Dong Wang:

Use of RFID for Intelligent Pre-shipment Inspection. 242-251 - Gengxin Sun, Fengjing Shao Name, Sheng Bin:

Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer. 252-259
Volume 4, Number 9, December 2010
- Pingshui Wang:

Survey on Privacy Preserving Data Mining. 1-7 - Yun Li, Lianglei Sun, Jiang Yin, Wenyan Bao, Mengyuan Gu:

Multi-Level Weighted Sequential Pattern Mining Based on Prime Encoding. 8-16 - Jiming Li, Chengqin Shi, ZhaoHua Wang:

The Impact of Debt Financing on Firm Investment Behavior: Evidence from China. 17-26 - Xiaowei Zhang, Bin Li, Junwu Zhu, Jun Wu:

Utility Based Optimal Task Scheduling Problem in a Multi-agent System. 27-35 - Wang Yu, Zhu Feng, Geng Hua, Zhuwang Jing:

The Partner Selection in Virtual Enterprise based on BDI Agent. 36-43 - Bin Wang, Gaofeng Pan, Xin Li, Chunyan Su:

The Design and Development of Testing Information System of Psychodiagnosis for Equestrianism Players. 44-50 - Hongyu Ma, Yun Chen, Hanying Tang:

Moderate Effect of Job Commitment on the Relationship between Employees' Emotional Labor and Burnout. 51-60 - Xiao Liang, Yong Gan, Lei Wan:

Motion Controller for Autonomous Underwater Vehicle Based on Parallel Neural Network. 61-67 - Yao Rong, Jiandong Wang:

Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform. 68-79 - Liuyong Yang, Shensheng Mo, Anqi Zhou:

The Financial Structure and High-Tech Industries Development in China. 80-87 - Wenfa Zhan, Jun Ma, Shanshan Du, Jun Liu:

A LFSR Reseeding Scheme Based on Division by 2 to the Power of Integer. 88-96 - Xiujuan Li, Tao Cai, Shiguang Ju:

The Hash Postfix Table Based Metadata Management Algorithm for Mass Storage System. 97-105 - Zhimin Chen, Yi Jiang, Yao Zhao:

A Collaborative Filtering Recommendation Algorithm Based on User Interest Change and Trust Evaluation. 106-113 - Amin Jajarmi, Hamidreza Ramezanpour, Arman Sargolzaei, Pouyan Shafaei:

Optimal Control of Nonlinear Systems Using the Homotopy Perturbation Method: Infinite Horizon Case. 114-122 - Xin-feng Zhu, Jiandong Wang, Bin Li:

Using Multivariate Regression Methods to Resolve Overlapped Electrochemical Signals. 123-131 - Yuecheng Yu, Jiandong Wang, Guansheng Zheng, Bin Gu:

Semi-supervised Distributed Clustering with Mahalanobis Distance Metric Learning. 132-140 - Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:

Decryptable Public Key Encryption with Keyword Search Schemes. 141-150 - Liming Fang, Willy Susilo, Yongjun Ren, Chunpeng Ge, Jiandong Wang:

Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. 151-160 - Xuelong Hu, Wei Tian, Yongai Zheng:

A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor. 161-167 - Jiagen Sheng, Sifeng Liu:

A Knowledge Recommend System Based on User Model. 168-173 - Mojtaba Romoozi, Hossein Ebrahimpour-Komleh:

A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms. 174-179 - Ruixiang Liu:

The Sources of China's Economics Growth during 1997-2007: An Analysis based on Input-Output Approach. 180-185 - Zhengli Zhu, Chunxia Zhao, Yingkun Hou:

Texture Image Classification Based on Nonsubsampled Contourlet Transform and Local Binary Patterns. 186-193 - Qi Yang, Yuxiang Zhuang, Jianghong Shi:

An Evolutionary MAC Protocol based on FPRP for Decreasing Delay. 194-200 - Yajun Jiang, Bo Yang, Mingwu Zhang:

A Classified Credential Selection Scheme with Disclosure-minimizing Privacy. 201-211 - Fan Lin, Wenhua Zeng, Yi Jiang:

A Cloud Tracing and Filtering Framework for Defensing Against Denial of Service Attacks. 212-224 - Jianghua Huang, Junying Zhang:

Distributed Dual Cluster Algorithm Based on Grid for Sensor Streams. 225-233 - Kuang Haibo, Jian Wang:

Research on Single Port Investment Decision-making Optimization Model Based on Real Options. 234-241 - Jun Yin, Zhong Jin, Jingbo Zhou:

Normalized Direct Linear Discriminant Analysis with its Application to Face Recognition. 242-251 - Yongguo Liu, Jianrui Hao:

On Using Tabu Search for RNA Secondary Structure Prediction. 252-262

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














