


default search action
Journal of Computers, Volume 4
Volume 4, Numbers 1, January 2009
- Fei Yu, Chin-Chen Chang, Ben M. Chen, Jian Shu, Guangxue Yue:

Editorial. 1-2 - Qian Zhao, Tianjie Cao:

Collecting Sensitive Information from Windows Physical Memory. 3-10 - Chih-Chien Wang

, Chun-An Chen, Jui-Chin Jiang:
The Impact of Knowledge and Trust on E-Consumers' Online Shopping Activities: An Empirical Study. 11-18 - Yang Lu, Jiguo Li, Junmo Xiao:

Constructing Efficient Certificate-based Encryption with Paring. 19-26 - Shu Chen, Guo Qing Wu:

Modeling and Analysis of Workflow Based on TLA. 27-34 - Yun Wu, Yong Zhao, Ling Shen:

The Analysis and Design of Nearly-Orthogonal Symmetric Wavelet Filter Banks. 35-44 - Suying Yang, Jianzhe Tai, Cheng Shao:

Dynamic Partition of Elevator Group Control System with Destination Floor Guidance in Up-peak Traffic. 45-52 - Xiaojun Jia, Guangxue Yue, Fang Mei:

The Mathematical Model and Applications of Coded Structured Light System for Object Detecting. 53-60 - Tianjie Cao, Shi Huang, Hui Cui

, Yipeng Wu, Qihan Luo:
Controlled Secret Leakage. 61-68 - Zhibin Liu, Xiangsong Meng:

Integration of Improved BPNN Algorithm and Multistage Dynamic Fuzzy Judgement and Its Application on ESMP Evaluation. 69-76 - Dawei Wang, Peng Zhao, Sikun Li:

System Level Distributed Cooperative Design of Media SoC Using Application Profiling. 77-85 - Guang Zheng, Lian Li, Wenbo Chen, Anping He, Jinzhao Wu:

Process Algebra with Chaos Executing Policy for Unhealthy Systems. 86-93 - Bangzuo Zhang, Wanli Zuo:

Reliable Negative Extracting Based on kNN for Learning from Positive and Unlabeled Examples. 94-101
Volume 4, Numbers 2, February 2009
- Feng Xia

, Longhua Ma, Wenhong Zhao, Youxian Sun, Jinxiang Dong:
Enhanced Energy-Aware Feedback Scheduling of Embedded Control Systems. 103-111 - Yi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin, Yu-Hao Chang:

A Study on Parallel RSA Factorization. 112-118 - Mohammad Hossein Moaiyeri

, Reza Faghih Mirzaee
, Keivan Navi:
Two New Low-Power and High-Performance Full Adders. 119-126 - Chiang S. Jao, Cathy M. Helgason, Donna A. Zych:

Implementing a Computerized Charge Capture System to Improve Billing Work Flow and Reduce Errors in Data Entry. 127-134 - Asli Celikyilmaz

, I. Burhan Türksen:
A Genetic Fuzzy System Based On Improved Fuzzy Functions. 135-146 - Hazem M. Abbas

:
System Identification Using Optimally Designed Functional Link Networks via a Fast Orthogonal Search Technique. 147-153 - V. Amudha, B. Venkataramani, R. Vinoth Kumar, S. Ravishankar:

Software/Hardware Co-design of HMM Based Speaker Independent Isolated Digit Recognition System. 154-159 - Zhangjun Huang, Chengen Wang, Mingxu Ma:

A Robust Archived Differential Evolution Algorithm for Global Optimization Problems. 160-167 - Nuttaka Homsup, Terapass Jariyanorawiss, Wiroj Homsup:

FDTD Simulation of a Mobile Phone Operating Near a Metal Wall. 168-175
Volume 4, Numbers 3, March 2009
- Qi Luo, Ben K. M. Sim:

Editorial. 177-178 - Weixiang Wang, Youlin Shang:

A New T-F Function Approach for Discrete Global Optimization. 179-183 - Bo Meng:

A Formal Logic Framework for Receipt-freeness in Internet Voting Protocol. 184-192 - Wang Chu, Depei Qian:

Design Web Services: Towards Service Reuse at the Design Level. 193-200 - Youyao Liu, Jungang Han, Huimin Du:

DL(2m): A New Scalable Interconnection Network for System-on-Chip. 201-207 - Ling Chen, Lingjun Zou, Li Tu:

Stream Data Classification Using Improved Fisher Discriminate Analysis. 208-214 - Xinsheng Zhang, Xinbo Gao, Ying Wang:

MCs Detection with Combined Image Features and Twin Support Vector Machines. 215-221 - Wei-Peng Liu, Jun Hu, Xing Zhang:

A Novel Secure Terminal System Based on Trusted Hardware: U-Key. 222-229 - Yong Zhou, Youwen Li, Shixiong Xia:

An Improved KNN Text Classification Algorithm Based on Clustering. 230-237 - Yan Liu, Renfa Li, Cheng Xu, Fei Yu:

HW-SW Framework for Multimedia Applications on MPSoC: Practice and Experience. 238-244 - Jingtao Sun, Qiuyu Zhang

, Zhanting Yuan:
Application of Refined LSA and MD5 Algorithms in Spam Filtering. 245-250 - Xianfang Wang, Zhiyong Du, Jindong Chen, Feng Pan:

Dynamic Modeling of Biotechnical Process Based on Online Support Vector Machine. 251-258 - Xiaoqiang Yang, Huimin Du, Jungang Han:

Topology and Routing Algorithm Based on the Combination Gray Code with Johnson Code. 259-264 - Peide Liu, Zhongliang Guan:

Evaluation Research on the Quality of the Railway Passenger Service Based on the Linguistic Variables and the Improved PROMETHEE-II Method. 265-270 - Peiyu Liu, Li-Wei Zhang, Zhen-fang Zhu:

Research on E-mail Filtering Based On Improved Bayesian. 271-275 - Yongqing Wei, Peide Liu:

Risk Evaluation Method of High-technology Based on Uncertain Linguistic Variable and TOPSIS Method. 276-282
Volume 4, Numbers 4, April 2009
- Prechanon Kumkratug:

Application of UPFC to Increase Transient Stability of Inter-Area Power System. 283-287 - Ye Li, Barbara J. Lence, Sander M. Calisal:

Modeling the Energy Output from an In-Stream Tidal Turbine Farm. 288-294 - Qian Zhang, Yongfei Zhang, Shi-Yin Qin:

Modeling and Analysis for Obstacle Avoidance of a Behavior-Based Robot with Objected Oriented Methods. 295-302 - Mário J. G. C. Mendes

, Bruno M. S. Santos, José M. G. Sá da Costa:
Multi-agent Platform and Toolbox for Fault Tolerant Networked Control Systems. 303-310 - Thomas M. Hemmerling, Samer Charabati, Emile Salhab, David Bracco, Pierre A. Mathieu:

The Analgoscore: A Novel Score to Monitor Intraoperative Nociception and its Use for Closed-Loop Application of Remifentanil. 311-318 - Alexander M. Yemelyanov:

Modeling and Decision Support for Analysis of Operator Errors in Complex Systems. 319-329 - Jinyue Zhang:

SSWP: A Social Semantic Web Portal for Effective Communication in Construction. 330-337 - Chen-Wei Lin, Jiun-Lang Huang:

A Charge-Sensing-Capable Source Driver for TFT Array Testing in System-on-Panel Displays. 338-346 - Wenzhong Gao, Xi Chen:

Distributed Generation Placement Design and Contingency Analysis with Parallel Computing Technology. 347-354
Volume 4, Number 5, May 2009
- Luca Spalazzi, Ratan Guha:

Editorial. 355-356 - Matthias Becker

, Martin Drozda
, Sven Schaust, Sebastian Bohlmann, Helena Szczerbicka:
On Classification Approaches for Misbehavior Detection in Wireless Sensor Networks. 357-365 - Massimo Benerecetti, Nicola Cuomo, Adriano Peron:

TPMC: A Model Checker For Time-Sensitive Security Protocols. 366-377 - Massimo Bernaschi, Mauro Bisson, Emanuele Gabrielli, Simone Tacconi:

An Architecture for Distributed Dictionary Attacks to Cryptosystems. 378-386 - Angelo Biscotti, Gianluca Capuzzi, Egidio Cardinale, Francesco Pagliarecci, Luca Spalazzi:

An IPS for Web Applications. 387-394 - Jérémy Briffaut, Jean-François Lalande, Christian Toinard:

Security and Results of a Large-Scale High-Interaction Honeypot. 395-404 - Jianyong Dai, Ratan K. Guha, Joohan Lee:

Efficient Virus Detection Using Dynamic Instruction Sequences. 405-414 - Joni Hahkala, Henri Mikkonen, Mika Silander, John White:

A Pseudonymity System for Grids. 415-422 - Mathieu Blanc, Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard:

Classification of Malicious Distributed SELinux Activities. 423-432
Volume 4, Number 6, June 2009
- Li Ming, Mingwen Wang, Deng-Yi Zhang, Chin-Chen Chang, Fei Yu:

Editorial. 433-435 - Liyi Zhang, Mingzhu Zhu, Wei Huang:

A Framework for an Ontology-based E-commerce Product Information Retrieval System. 436-443 - Jiguo Li, Lizhong Xu, Yichen Zhang:

Provably Secure Certificate-based Proxy Signature Schemes. 444-452 - Zhixin Sun, Lin Jiao:

Research of Intelligent Rule-base Based on Multilayer Intrusion Detection. 453-460 - Yuanzhuo Wang, Chuang Lin, Kun Meng, Junjie Lv:

Analysis of Attack Actions for E-Commerce Based on Stochastic Game Nets Model. 461-468 - Han Zhu:

Axiomatic Systems for the Bisimilarity on Finite Fair Ambient Processes. 469-476 - Peng Zhao, Dawei Wang, Ming Yan, Sikun Li:

Parallel Processing of Sequential Media Algorithms on Heterogeneous Multi-Processor System-on-Chip. 477-484 - Yuxiang Dong, Yunni Xia, Qingsheng Zhu, Ruilong Yang:

A Stochastic Approach to Predicting Performance of Web Service Composition. 485-493 - Huanchun Peng, Jun Gu, Xiaojun Ye:

Towards Compliance and Accountability: a Framework for Privacy Online. 494-501 - Tongyang Wang, Pengfei Yu, Jun-jun Wu, Xin-long Ma:

Research on On-card Bytecode Verifier for Java Cards. 502-509 - Ran Yang, Chuang Lin, Fujun Feng:

A Time and Mutable Attribute-Based Access Control Model. 510-518 - Yefei Zhao, Zongyuan Yang, Jinkui Xie, Qiang Liu:

Formal Model and Analysis of Sliding Window Protocol Based on NuSMV. 519-526 - Qihai Zhou, Yujun Li, Zhuma Pudu, Xun Lin:

China's E-business Model Innovation Analysis. 527-534
- Mehdi Eghbal, Naoto Yorino

, Yoshifumi Zoka
:
Comparative Study on the Application of Modern Heuristic Techniques to SVC Placement Problem. 535-541 - Justin L. Rice, Khalid H. Abed

, Gerald R. Morris:
Design Heuristics for Mapping Floating-Point Scientific Computational Kernels onto High Performance Reconfigurable Computers. 542-553 - Evelyn Brannock, Michael Weeks, Robert W. Harrison

:
The Effect of Wavelet Families on Watermarking. 554-566
Volume 4, Number 7, July 2009
- Arash Azizi Mazreah, Mohammad Taghi Manzuri

, Ali Mehrparvar:
A High Density and Low Power Cache Based on Novel SRAM Cell. 567-575 - Wen-Shyong Yu:

H∞ Tracking Performance Design for Fuzzy-Model-Based Descriptor Systems Subject to Parameter Uncertainties. 576-584 - Jian Shu, Ronglei Zhang, Linlan Liu, Zhenhua Wu, Zhiping Zhou:

Cluster-based Three-dimensional Localization Algorithm for Large Scale Wireless Sensor Networks. 585-592 - Naotoshi Sugano, Shou Komatsuzaki, Hiroyuki Ono, Yuko Chiba:

Fuzzy Set Theoretical Analysis of Human Membership Values on the Color Triangle. 593-600 - Suhyeon Kim, Hyungrae Kim, Tae-Kyu Yang:

Increasing SLAM Performance by Integrating Grid and Topology Map. 601-609 - Yves-Thierry Jean-Charles, Vichate Ungvichian, Juciana A. Barbosa:

Effects of Substrate Permittivity on Planar Inverted-F Antenna Performances. 610-614 - Xinghao Jiang, Tanfeng Sun, Bin Chen, Rongjie Li, Bing Feng:

A Novel Video Content Understanding Scheme Based on Feature Combination Strategy. 615-622 - Adalet N. Abiyev:

A New Signal Processing based Method for Reactive Power Measurements. 623-630 - Hidehisa Takamizawa, Kazuhiro Saji, Masayoshi Aritsugi:

A Replica Management Protocol in a Binary Balanced Tree Structure-Based P2P Network. 631-640 - Mohammed Blej, Mostafa Azizi:

Modeling and Analysis of a Real-Time System Using the Networks of Extended Petri. 641-645 - Jun Zhang, Yuping Hu, Zhibin Yuan:

Detection of LSB Matching Steganography using the Envelope of Histogram. 646-653 - Samer Younes, Ramzi A. Haraty

:
An Enhanced Quorum Selection Algorithm. 654-662 - Kirsi Helkala

, Einar Snekkenes:
Password Generation and Search Space Reduction. 663-669 - Alan McCabe, Jarrod Trevathan

:
Handwritten Signature Verification Using Complementary Statistical Models. 670-680 - Hongwei Li, Rui Li, Fasong Wang:

Multiresolution Subband Blind Source Separation: Models and Methods. 681-688
Volume 4, Number 8, August 2009
- Carlos Alberto Ochoa Ortíz Zezzatti, Alejandro Padilla:

Guest Editorial. 689-690 - Humberto Ochoa

, Osslan Osiris Vergara-Villegas
, Vianey Guadalupe Cruz Sánchez, Efrén Gútierrez:
A Hybrid System Based on a Filter Bank and a Successive Approximations Threshold for Microcalcifications Detection. 691-696 - José Mireles, Frank L. Lewis, Roberto C. Ambrosio, Edgar A. Martínez-García:

Development of a Discrete Event Controller Supervisor using a Hybrid Matrix Formulation with Fuzzy Logic Conflict Resolution. 697-704 - Ricardo Mendoza González, Miguel Vargas Martin, Jaime Muñoz Arteaga, Francisco Álvarez Rodríguez, Carlos Alberto Ochoa Ortíz Zezzatti

:
Web Service-Security Specification based on Usability Criteria and Pattern Approach. 705-712 - Alberto Ochoa Ortíz

, Angel Eduardo Muñoz Zavala, Arturo Hernández Aguirre:
A Hybrid System Approach to Determine the Ranking of a Debutant Country in Eurovision. 713-720 - Rodolfo A. Pazos Rangel, José Antonio Martínez Flores, Javier González B., María Lucila Morales-Rodríguez, Alberto Castro H.:

Semi-automatic Generation of Subcategorization Frames for Spanish Verbs Using Ontologies and Verbs Functional Class. 721-726 - Claudia Gómez-Santillán

, Laura Cruz-Reyes
, Eustorgio Meza Conde, Tania Turrubiates López, Marco Antonio Aguirre Lam, Satu Elisa Schaeffer:
Improving Distributed Resource Search through a Statistical Methodology of Topological Feature Selection. 727-733 - Simonné Suarent, Carlos Alberto Ochoa Ortíz Zezzatti

, S. Jöns, Fernando Montes, Alessandra Spianetta:
Evolving Optimization to Improve Diorama's Representation using a Mosaic Image. 734-737 - Carlos Alberto Ochoa Ortíz Zezzatti

, Julio Ponce, Arturo Hernández, Liang Li:
Resolution of a Combinatorial Problem using Cultural Algorithms. 738-741 - Carlos Alberto Ochoa Ortíz Zezzatti

, Saúl González, Cynthia Esquivel, Girolama Matozzi, Abigaíl Maffucci:
Musical Recommendation on Thematic Web Radio. 742-746
- Junfeng Man, Zhicheng Wen, Changyun Li, Xiangbing Wen:

Research on Running Time Behavior Analyzing and Trend Predicting of Modern Distributed Software. 747-754 - Peng Yang, Qingsheng Zhu, Xun Zhong:

Subtractive Clustering Based RBF Neural Network Model for Outlier Detection. 755-762 - Muwei Jian

, Haoyan Guo, Lei Liu:
Texture Image Classification Using Visual Perceptual Texture Features and Gabor Wavelet Features. 763-770 - Kaushik Deb, Hyun-Uk Chae, Kang-Hyun Jo

:
Vehicle License Plate Detection Method Based on Sliding Concentric Windows and Histogram. 771-777 - Weihui Dai, Xingyun Dai, Tao Sun:

A Smart Targeting System for Online Advertising. 778-786 - Yuhua Zhang, Longhua Qian, Qiang Lv, Peide Qian, Shengchao Guo:

A Practical Dynamic Frequency Scaling Solution to DPM in Embedded Linux Systems. 787-793
Volume 4, Number 9, September 2009
- Huadong Ma, Guojun Wang:

Guest Editorial. 795-796 - Gui Gui

, Paul D. Scott:
Measuring Software Component Reusability by Coupling and Cohesion Metrics. 797-805 - Lianwei Zhang, Wei Wang, Yan Li, Xiaolin Liu, Meiping Shi, Hangen He:

A Method for Surface Reconstruction Based on Support Vector Machine. 806-812 - Yemei Qin, Ji Wang

:
Distribution Network Reconfiguration Based on Particle Clonal Genetic Algorithm. 813-820 - Chuanming Song, Xiang-Hai Wang, Fuyan Zhang:

Visually Lossless Accuracy of Motion Vector in Overcomplete Wavelet-based Scalable Video Coding. 821-828 - Zhijian Wang, Dingguo Wei:

Modeling Complex System Using T-subnet based Hierarchical Petri Nets. 829-836 - Jin-Cherng Lin, Jan-Min Chen:

An Automated Mechanism for Secure Input Handling. 837-844 - Jin Zheng, Weijia Jia

, Guojun Wang:
Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks. 845-852 - Zhigang Chen, Jiaqi Liu, Deng Li, Hui Liu, Athanasios V. Vasilakos

:
SOBIE: A Novel Super-node P2P Overlay Based on Information Exchange. 853-861 - Lingli Deng, Ziyao Xu, Yeping He:

Trust-Based Constraint-Secure Interoperation for Dynamic Mediator-Free Collaboration. 862-872 - Mianxiong Dong

, Long Zheng, Kaoru Ota
, Song Guo, Minyi Guo, Li Li:
Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment. 873-880
- Kerrie J. Long, Frank J. Zajaczkowski, Sue Ellen Haupt, Leonard Joel Peltier:

Modeling a Hypothetical Chlorine Release on a College Campus. 881-890 - P. Assadee:

Modified CMOS Multiplication Algorithm Using Optimized Array Structure. 891-895 - Ashok Kumar Das:

A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks. 896-904 - Sabah Mohammed

, Jinan Fiaidhi, Osama Mohammed:
Sharing Biomedical Learning Knowledge for Social Ambient Intelligence. 905-912 - Spyros Sioutas, Dimitrios Sofotassios, Kostas Tsichlas, Dimitrios Sotiropoulos

, Panayiotis M. Vlamos
:
Canonical Polygon Queries on the Plane: A New Approach. 913-919
Volume 4, Number 10, October 2009
- Abdul Kadir Kureshi, Mohd. Hasan:

DTMOS Based Low Power High Speed Interconnects for FPGA. 921-926 - Muhammad Yasir Qadri, Hemal S. Gujarathi, Klaus D. McDonald-Maier

:
Low Power Processor Architectures and Contemporary Techniques for Power Optimization - A Review. 927-942 - Ryotaro Kamimura:

Feature Discovery by Information Loss. 943-953 - László Horváth, Imre J. Rudas:

Human Intent Representation in Knowledge Intensive Product Model. 954-961 - Toshiro Kubota:

Designs of Second-Order Associated Memory Networks with Threshold Logics: Winner-Take-All and Selective Voting. 962-974 - Kristopher M. Thornburg, Geb W. Thomas

:
Robotic Exploration Utility for Urban Search and Rescue Tasks. 975-980 - José R. Celaya, Alan A. Desrochers, Robert J. Graves:

Modeling and Analysis of Multi-agent Systems using Petri Nets. 981-996 - Mamoru Yoshida, Hirokazu Tatano

:
Payment Plan for the Delegation of One or Two Inspection Agencies. 997-1004 - Ming-Yih Lee, Kok Soon Soon, Chih-Feng Lin:

New Computer Protocol with Subsensory Stimulation and Visual/Auditory Biofeedback for Balance Assessment in Amputees. 1005-1011 - Yukio Ohsawa

, Yusuke Maeda:
Eyes Draw Auxiliary Lines in Interpreting Images. 1012-1021 - Qing Wu, Mehrdad Saif

:
Model-based Robust Fault Diagnosis for Satellite Control Systems Using Learning and Sliding Mode Approaches. 1022-1032 - Marek Makowski

:
Management of Attainable Tradeoffs between Conflicting Goals. 1033-1042 - John T. Boardman, Brian J. Sauser, Dinesh Verma:

In Search of Systems "DNA". 1043-1052 - Sinan Kockara, Tansel Halic, Coskun Bayrak, Kamran Iqbal, Richard Rowe:

Contact Detection Algorithms. 1053-1063 - Haijun Zhang, Jingjun Zhang, Ruizhen Gao:

A Novel Method of Phase Current Compensation for Switched Reluctance Motor System Based on Finite Element. 1064-1071
Volume 4, Number 11, November 2009
- Qi Luo, Ben K. M. Sim:

Guest Editorial. 1073-1074 - Lin Sun, Hongjun Xiao, Shouju Li, Dequan Yang:

Forecasting Fish Stock Recruitment and Planning Optimal Harvesting Strategies by Using Neural Network. 1075-1082 - Chunguang Wang, Jingfeng He, Guixian Li, Junwei Han:

An Automated Test System for Flight Simulator Fidelity Evaluation. 1083-1090 - Shubo Liu, Jing Sun, Zhengquan Xu:

An Improved Image Encryption Algorithm based on Chaotic System. 1091-1100 - Ickjai Lee, Kyungmi Lee, Christopher Torpelund-Bruin:

Voronoi Image Segmentation and Its Applications to Geoinformatics. 1101-1108 - Li Yang, Malin Song:

Formation Mechanism of Green Strategic Alliances and Its Cooperative System for Coal-Mining Eco-Industrial Parks Based on Synthetic Decision Support System. 1109-1116 - Jimin Li, Zhen Li, Kunlun Li:

Detection and Classification of Non-self Based on System Call Related to Security. 1117-1124 - Jiaxin Li, Feng Shi, Ning Deng, Qi Zuo, Zuo Wang, Mengxiao Liu:

Intelligent Trace and Evaluation for Parallel Programming Based on Architectural Details. 1125-1132 - Minqiang Pan, Dehuai Zeng, Yong Tang, Dongqing Chen:

CFD-based Study of Velocity Distribution among Multiple Parallel Microchannels. 1133-1138 - Zhibin Liu, Haifen Yang, Shaomei Yang:

Integration of Multi-layer SVM Classifier and Multistage Dynamic Fuzzy Judgement and Its Application in SCDA Measurement. 1139-1144 - Shaomei Yang, Donglei Liu, Zhibin Liu:

Evaluating the Network and Information System Security Based on SVM Model. 1145-1150 - Zhi-Hua Hu

:
A Hybrid System Based on Neural Network and Immune Co-Evolutionary Algorithm for Garment Pattern Design Optimization. 1151-1158 - Chunlai Chai:

Efficient Intelligent Localization Scheme for Distributed Wireless Sensor Networks. 1159-1166 - Gang Liu, Wei Chen, Jun Guo:

A Research on Mixture Splitting for CHMM Based on DBC. 1167-1174 - Rongdi Yuan, Huizong Feng, Ming Cen:

Modeling and Simulation of Crush Natural Gas Turbo Engine. 1175-1181 - Yanduo Zhang, Kun Wang:

The Application of Liquid State Machines in Robot Path Planning. 1182-1186
Volume 4, Number 12, December 2009
- Jinrong Zhu:

Guest Editorial. 1187 - Dongxiao Niu, Jianjun Wang:

Combination of Text Mining and Corrective Neural Network in Short-term Load Forecasting. 1188-1194 - Jicheng Ding, Lin Zhao, Weiquan Huang:

Design of a General Single Frequency GPS Receiver Research Platform for High Dynamic and Weak Signal. 1195-1201 - Yazao Yang, Wenzhou Jin, Xiaoni Hao:

Dynamic Pool Segmentation Model and Algorithm in the Car Rental Industry. 1202-1208 - Yongxiu He, Weihong Yang, Yu Zhang, Dezhi Li, Furong Li

:
Urban Electric Load Forecasting Using Combined Cellular Automata. 1209-1215 - Xiaochu Liu, Qitao Huang

, Dacheng Cong, Junwei Han, Lin Xiao:
Analysis of Performance Effect Factors of Three-Stage Electro-Hydraulic Servo Valve. 1216-1222 - Hua Jiang, Junhu Ruan:

The Application of Genetic Neural Network in Network Intrusion Detection. 1223-1230 - Jinrong Zhu:

A Modified Particle Swarm Optimization Algorithm. 1231-1236 - Liu-Juan Zhu, Wen-Zhong Cai, Shan-Tung Tu:

Computational Micromechanics of Particle-reinforced Composites: Effect of Complex Three-dimensional Microstructures. 1237-1242 - Lin Xu, Xiaoming Wu, Yanru Zhang, Hengxin Yuan:

The Optimization Study on Time Sequence of Enhanced External Counter-Pulsation in AEI-CPR. 1243-1248 - Jun Yuan, Yongchao Zhu, Minzhe Wu:

Vibration Characteristics and Effectiveness of Floating Slab Track System. 1249-1254
- Douglas R. Isenberg, Y. P. Kakad:

Simulating the Effects of a Non-Uniform Gravitational Field on a Space Robot. 1255-1262 - Mohammad Masumuzzaman Bhuiyan, Abu Sayed Md. Latiful Hoque:

High Performance SQL Queries on Compressed Relational Database. 1263-1274 - Carlos E. Otero

, Antonio Velazquez, Ivica Kostanic, Chelakara Subramanian
, Jean-Paul Pinelli
, Larry Buist:
Real-Time Monitoring of Hurricane Winds using Wireless and Sensor Technology. 1275-1285 - Hicham Hihi

:
Structural Controllability of Switching Linear Systems. 1286-1293 - Wei Pan, Guowei Hua, Lean Yu, Jinlong Zhang, Gang Xie, Shouyang Wang

:
Determining Optimal Selling Price, Order Size and the Number of Price Changes with Weibull Distribution Deterioration. 1294-1300 - Xu Xu, Jie Lin:

A Novel Time Advancing Mechanism for Agent-Oriented Supply Chain Simulation. 1301-1308 - Jimmie Wiklander, Jens Eliasson, Andrey Kruglyak, Per Lindgren, Johan Nordlander:

Enabling Component-Based Design for Embedded Real-Time Software. 1309-1321 - Lanfranco Lopriore:

Key-Lock Mechanisms for Object Protection in Single-Address-Space Systems. 1322-1331 - Zhengbing Hu

, Kai Du:
Towards High Availability and Performance Database Clusters for Archived Stream. 1332-1339

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














