Sciweavers

JDCTA
2010
225views more  JDCTA 2010»
12 years 11 months ago
Multi-Level Weighted Sequential Pattern Mining Based on Prime Encoding
Encoding can express the hierarchical relationship in the area of mining the multi-level sequential pattern, up to now all the algorithms of which find frequent sequences just acc...
Yun Li, Lianglei Sun, Jiang Yin, Wenyan Bao, Mengy...
JDCTA
2010
164views more  JDCTA 2010»
12 years 11 months ago
Session-Based User Behavior Meta-Model of Web Applications for User-Level QoS Load Testing
With the rapid development of Service-Oriented Architecture (SOA) and Service-Oriented Computing (SOC), the Quality of Service (QoS) is more and more essential than before. There ...
Lu Lu, Xiuxia Quan
JDCTA
2010
108views more  JDCTA 2010»
12 years 11 months ago
Optimization Multiple Sequence Alignment Scheme in DC-BTA
Zhanmao Cao, Jianchao Tang, Shizhong Jiang, Huixua...
JDCTA
2010
163views more  JDCTA 2010»
12 years 11 months ago
An Approach to Traffic Volume Forecasting Based on Ant Colony Neural Network
Combining the ant colony algorithm (ACA) and the neural network (NN), the present paper puts forward an approach to traffic volume forecasting based on the ant colony neural netwo...
Hong Chen
JDCTA
2010
125views more  JDCTA 2010»
12 years 11 months ago
User Evaluation of a Community-centric Music Voting Service
In this paper, we present the user evaluation results of a Community-centric Music Voting service that relies on a DHT-based P2P network. For each user community, an independent D...
Timo Koskela, Janne Julkunen, Otso Kassinen, Mika ...
JDCTA
2010
156views more  JDCTA 2010»
12 years 11 months ago
Incorporating Graph Automata into Plant Growth Simulation with Nutrients Transport
In this paper we model the growth of living plants in a discrete approach, the graph automata based plant model representing each metamer of the plant as node of the automata. The...
Lingqiu Zeng, Hongchun Qu, Qingsheng Zhu, Youlan W...
JDCTA
2010
152views more  JDCTA 2010»
12 years 11 months ago
An Image Authentication Scheme Based on Correlation
This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8
Daxing Zhang, Shiming Liang, Zhigeng Pan, Haihua L...
JDCTA
2010
146views more  JDCTA 2010»
12 years 11 months ago
Modelling for Cruise Two-Dimensional Online Revenue Management System
To solve the cruise two-dimensional revenue management problem and develop such an automated system under uncertain environment, a static model which is a stochastic integer progr...
Bingzhou Li
JDCTA
2010
102views more  JDCTA 2010»
12 years 11 months ago
A Novel Pixel Line Based Algorithm for Line Generation
Straight line is the most basic element of graphics, and it is of great significance to study fast algorithm of line generating. On the basis of Bresenham algorithm, this paper co...
Yu-rong Li, Fu-guo Dong