Abstract is missing.
- Interactive Exploration of Large Photo LibrariesGerald Schaefer. 3 [doi]
- Elderly People Daily Life Monitoring Based on GPS Trajectory with Non-uniform SamplingZhongmin Wang, Qing Wang. 6 [doi]
- iMathema: A Novel Online Intelligent Computing System Oriented to Common Scientific ComputationsLe Yang, Wei Su, Keju Wang, Lei Guan. 10 [doi]
- The Scheme Design of Image Processing BoardYahui Hu, Fangxin Chen, Liping Wei. 17 [doi]
- Construction of C Programming Language Based on Ontology Knowledge BaseYahui Hu, Yamin Hu, Lejiang Guo. 23 [doi]
- A Fast Static Index Pruning AlgorithmXiaofeng Liu. 26 [doi]
- Research on Capacity Decision in a Dual-channel Supply Chain under Random DemandLiang Xu, Xian Wang. 30 [doi]
- An Illumination Robust Algorithm for Face Recognition Via SRC and GradientfacesZipeng Yu, Zhendong Wu, Jianwu Zhang. 36 [doi]
- Research on Aided Decision-making System based on Data Mining for Disaster of Storm TideYanling Han, Shouqi Cao, Yun Zhang. 41 [doi]
- Analysis and Evaluation of Jammer Interference in LTEJiankai Xiao, Xiaoting Wang, Qianghua Guo, Hang Long, Song Jin. 46 [doi]
- A Large-scale Images Processing Model Based on Hadoop PlatformGongrong Zhang, Qingxiang Wu, Zhiqiang Zhuo, Xiaowei Wang, Xiaojin Lin. 51 [doi]
- A Novel Stopping Criterion for LTE-A High Speed Turbo DecoderLi Tan, Bin Hao, Gang Su. 55 [doi]
- Investigating the Feasibility of a Robot-Based Writing AgentRandy E. S. Harnarinesingh, Chanan S. Syan. 60 [doi]
- Human Organ Geometry Construction from Segmented ImagesKai Zhao, Mengyun Cheng, Pengcheng Long, Shengpeng Yu, Liqin Hu, Yican Wu. 65 [doi]
- Load Balancing Forest Topology Generation Algorithm in Wireless Mesh NetworksZimian Hao, Yingxia Li. 70 [doi]
- Turbo IC/Decoding for Coded Multi-Carrier DS-CDMAGuoxiong Xu. 74 [doi]
- A 2D Personalized Facial Expression Generation ApproachXinjuan Zhu, Xue Li, Lianjie Song. 78 [doi]
- Transition Learning by Negative Correlation LearningYong Liu. 83 [doi]
- A New Method for Age Estimation from Facial Images by Hierarchical ModelLi Zhang, Xianmei Wang, Yuyu Liang, Lun Xie. 88 [doi]
- Research of Environment Data in Coal Mining Analysis Based on the Association Rule MiningNan Zhang, Jun Huang, Taifeng Quan. 92 [doi]
- An Image Reconstruction Algorithm for Electrical Capacitance TomographyPai Wang, Jzau-Sheng Lin, Mei Wang, Yu-Lei Zhao. 96 [doi]
- Mathematical Modeling on Computer SimulationYanchun Zhao, Xiaofei Hu, Zefu Zhao. 102 [doi]
- Application of Mathematical Algorithm Concept in Computer Logic LanguageLili Huang, Junfang Hou. 105 [doi]
- Calculus Concept in Computer ProgrammingHongli Xiao. 108 [doi]
- Programming and Designing Essentials of C Language and Object-oriented LanguageJieyu Gao. 111 [doi]
- C Language Compiling Characteristics and Software Application DevelopmentNing Wan. 114 [doi]
- Management Issues with Cloud ComputingAkinlolu Olumide Akande, Nozuko Aurelia April, Jean-Paul Van Belle. 119 [doi]
- Dynamic Binary User-Splits to Protect Cloud Servers from DDoS AttacksHiroshi Fujinoki. 125 [doi]
- Study of Runoff Prediction Based on Cloud ModelHua Huang. 131 [doi]
- A Study on Linear Elastic FEM by Cloud ComputingHaiming Lin, Xiaohu Liu, Wei Fu, Kangyu Jia. 136 [doi]
- Web User Trust Relationship Prediction Based on Cloud ModelQian Zhang, Tianyi Zhang, Xianglin Zuo, Yuan Yao, Baoping Feng, Junhua Wang, WanLi Zuo. 143 [doi]
- A Novel Cost-Effective Interconnection Networks of Modular Datacenters for the Cloud ComputingXin Huang, Yuxing Peng, Bin Huang. 148 [doi]
- Speed-Scaling-based Job/Tasks Deployment for Energy-efficient Datacenters in Cloud ComputingKe Han, Xiaobo Cai. 154 [doi]
- CBSTM: Cloud-based Behavior Similarity Transmission Method to Detect Industrial WormsHuayang Cao, Peidong Zhu, Jinjing Zhao. 158 [doi]
- Adaptive Load Balancing Algorithm Based on Prediction Model in Cloud ComputingYingchi Mao, Daoning Ren, Xi Chen. 165 [doi]
- Technical Bottlenecks and Future Application Trend of Cloud ComputingShuying Liu. 171 [doi]
- Comparison and Analysis of various types of PON's Access Architectures for Cloud computing ApplicationsMukhiddinov Behzod, Mohamed Osman Adan. 174 [doi]
- Research on Meteorological Data Sharing Technology Based on Service Oriented ArchitectureJianhua Du, Jiwu Xin, Shenghong Wu. 181 [doi]
- Sirtio: Towards Scalable Virtual SSDsBoqun Feng, Jian Li. 185 [doi]
- The Balance Mechanism of Power and Performance in the VirtualizationQiao Chen, Jian Li. 189 [doi]
- Secured Utility Bill Data Storage via Wavefront-MultiplexingDonald C. D. Chang, Joe Lee, Steve K. Chen, Hen-Geul Yeh, Kung Yao. 193 [doi]
- Driver Pose Estimation Using a Mixture-model MethodGang Liu, Xinping Yan, Yufen Sun. 200 [doi]
- On Sport Informatization under the Perspective of Education InformatizationZhanqiang Teng. 205 [doi]
- A Trust Model Based on Reputation in P2P NetworkHuiting Wu, Huihui Dong. 208 [doi]
- SR-IOV based Virtual Network SharingJianglu Chen, Jian Li, Fei Hu. 213 [doi]
- Influence of 3D Computer Simulation Technology on Interior DesignLei Sun. 219 [doi]
- Application of QR Two-dimension Code Technology in Credits Certification SystemYaojun Shan, Jin Bai, Xiaoqian Ye, Wei Li. 222 [doi]
- Analysis of Computer Multi-angle Application and Its Technology DevelopmentLifang Lu. 225 [doi]
- Applied Research on Security of Computer Network TechnologyJianpeng Zhang. 228 [doi]
- Design and Implementation of Synchronization System Based on Web Service DatabaseHao Xu. 231 [doi]
- Security Protection Design and Multi-port Transport Technology in Computer NetworkLimin Huang. 234 [doi]
- Application and Development of Computer Technology in Quality EducationYanli Li. 237 [doi]
- Computer in Sports Scientific Research and EconomyYingming Xu, Shujuan Jin, Tianxing Jin. 240 [doi]
- Computer Network Technology in Modern Sports EducationShujuan Jin, Yingming Xu, Tianxing Jin. 243 [doi]
- Technology Development of Application Software in SportsYanhua Xu, Kefei Wei. 246 [doi]
- Application of Computer Technology in Sport Data StatisticsJian Lin. 248 [doi]
- Improvement of Computer Technology on Education ReformYu Bai. 251 [doi]
- Some Issues on Evaluation of the Theme Hotel with the Travelers' Experience FactorsPing Guo. 254 [doi]
- Analysis on Malicious Attack and Safety Protection on the Local Area Network of ComputersJianning Yang, Kun Lin. 258 [doi]
- Clustering Software Components for Component Reuse and Program RestructuringChintakindi Srinivas, Vangipuram Radhakrishna, C. V. Guru Rao. 261 [doi]
- A Community-Based Trust Management Framework in P2P SystemsSongxin Wang. 267 [doi]
- Mining Top-K Rank Frequent Patterns in Data Streams A Tree Based Approach with Ternary Function and Ternary Feature VectorM. S. B. PhridviRaj, C. V. Guru Rao. 271 [doi]