Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2011 Issue 10
Geographic Routing Algorithm Based on Link Quality in Mobile Ad-hoc Networks
HONG Lei;HUANG Bo;ZHAO Chun-xia
..............page:51-54,83
Security Analysis of Access Control Policy Based on Predicate Abstract and Verification Space Division
WANG Chang-da;HUA Ming-hui;ZHOU Cong-hua;SONG Xiang-mei;JU Shi-guang
..............page:55-59
Novel Interval Valued Vague Sets and its Application in Pattern Recognition
ZHANG Zhen-hua;YANG Jing-yu;YE You-pei;ZHANG Qian-sheng
..............page:194-198
Fading Memory Discrete GM( 1,1 ) Model and its Recursive Algorithm
ZHAO Min;SUN Di-hua;FAN Wan-mei;LIU Wei-ning
..............page:252-255
Binary Image Hiding Algorithm Based on Multi-secret Sharing and DCT
CAO Ru-bing;Askar
..............page:270-272,284
Study of Decision Support Technology Based on Value-based Argumentation Framework
FU Yi-xing;QI Xue-tian;YAO Li;WANG Yah-juan
..............page:205-208,219
UbiCloud:A Cloud Computing System for Ubiquitous Terminals
CHEN Yuan-fei;CUI Li;ZHU Zhen-min;ZENG Yi;WU Yuan-kun
..............page:127-132
Delay Aware Power Management Scheme for WLANs
XU Lin;ZHU Yi-hua;HU Hua
..............page:113-116
Image Retrieval Based on Improved PSO Algorithm and Relevance Feedback
TANG Zhao-xia;ZHANG Hui;XU Dong-mei
..............page:278-280
Automatic Face Detection in Video Sequences in Complex Lighting Environments
XIE Qian-ru;GENG Guo-hua
..............page:267-269
Access Control Rule Description Based on Logic Unify
HAN Dao-jun;HUANG Ze-long;ZHAI Hao-liang;LI Lei
..............page:140-144
Research on Dynamic Service Composition Based on QoS
WU Hai-bo;DENG Mu-shen;CHEN Xin-xi
..............page:78-80
Collision Detection and Response in Crop Visualization
WU Yan-lian;TANG Liang;CAO Wei-xing;ZHU Yan
..............page:263-266,284
Dynamic Deployment of Nodes in Wireless Sensor Networks
LIAO Zhuo-fan;WANG Jian-xin;LIANG Jun-bin
..............page:45-50
Improvement of Hierarchical Failure Detection Algorithm in Distributed Systems
XU Guang-xia;CHEN Shu-yu
..............page:72-74,99
Algorithm for Outlier Detection in Large Dataset Based on Weighted KNN
WANG Qian;YANG Zheng-kuan
..............page:177-180
Research of Unequal Weighted Universal Average Operation Model
JIA Peng-tao;HE Hua-can
..............page:215-219
Topological Structure of Rough Sets in Infinite Universes
QIAO Quan-xi;QIN Ke-yun
..............page:228-230
Backward P-reasoning and Attribution Residual Discovery-Application
LIN Hong-kang;FAN Cheng-xian;SHI Kai-quan
..............page:189-193,198
Improved Design and Implementation of T-CBESD Based on On-the-Fly Verification Methods
GUO Li-juan;HU Jun;ZHANG Jian
..............page:145-151
Survey of the P2P Trffic Identification Techniques
LIU San-min;SUN Zhi-xin
..............page:6-12
Effective Approach to Deep Web Entries Identification
WU Chun-ming;XIE De-ti
..............page:199-201,230
V Orthonormal Basis Neural Network
XIONG Gang-qiang;QI Dong-xu
..............page:211-214
Improved Mixed Video Watermarking Scheme
WU Geng-rui;YANG Xiao-yuan;NIU Ke
..............page:84-86,109
Wave Simulation Based on Geometric Modeling
WANG Xiang-hai;LI Ting-ting
..............page:259-262
Applications of Graphical Models in Color Texture Classification
YANG Guan;ZHANG Xiang-dong;FENG Guo-can;ZOU Xiao-lin;LIU Zhi-yong
..............page:273-277
xin xi dong tai
..............page:294
Threshold Signature Scheme with Tracking Identity
ZOU Xiu-bin;HAN Lan-sheng;FU Cai
..............page:123-126
Id-based Private-key Management Scheme in Distributed Satellite Network
WU Yang;JIAO Wen-cheng;PAN Yan-hui;LI Hua
..............page:96-99
Failure Rate Function of Heuristic-based Active Queue Management
FAN Xun-li;WANG Jie;GUAN Lin;ZHAO Jian;GAO Li
..............page:110-112,151
Security Vulnerabilities Analysis Technology Based on Multi-core Architecture
JIAO Wan-hi;WU Kai-gui
..............page:117-120
Executing Method of Time and Energy Optimization in Heterogeneous Computing
YU Li-hua;ZENG Guo-sun
..............page:285-290
Relevance Feedback Algorithm Based on Memory Support Vector Machines
SUN Shu-liang;LIN Xue-yun
..............page:256-258
Organizational Evolution-based ABC Supported Unicast Routing Scheme
WANG Xing-wei;SUN Yong-jian;JIANG Ding-de;HUANG Min
..............page:34-38
Survey on Access Control Technology of Web Services Composition
SHANG Chao-wang;ZHAO Cheng-ling;LIU Qing-tang;WANG Yan-feng
..............page:13-15,22
Survey of Steiner Tree Problem
ZHENG Ying;WANG Jian-xin;CHEN Jian-er
..............page:16-22
MXDR:Distributed Information Retrieval for Multi-XML Document Based on Keywords
LI Xia;LI Zhan-huai;ZHANG Li-jun;CHEN Qun;LI Ning
..............page:152-156
Secure E-commerce Payment Protocol Based on Four Parties
GAN Zao-bin;XIAO Shi-cheng;LI Kai;XIAO Guo-qiang
..............page:39-44
Parallel Text Categorization of Massive Text Based on Hadoop
XIANG Xiao-jun;GAO Yang;SHANG Lin;YANG Yu-bin
..............page:184-188
Research on the Missing Attribute Value Data-oriented Decision Tree
QIU Yun-fei;LI Xue;WANG Jian-kun;SHAO Liang-shan
..............page:174-176
Research of MPI Programs Optimization Technology on Multi-core Clusters
WANG Jie;ZHONG Lu-jie;ZENG Yu
..............page:281-284
Region Matching Algorithm Based on Historical Information Sorting in DDM
WANG Zhuo;FENG Xiao-ning;LIU Ting-bao
..............page:202-204,214
From the Definition of Aspect-oriented Programming to Aspect-oriented Programming Languages
GU Si-shan;CAI Shu-bin;LI Shi-xian
..............page:133-139
Shadowed Sets Based Threshold Selection in Rough Clustering
GUO Jin-hua;MIAO Duo-qian;ZHOU Jie
..............page:209-210,227
Formal Approaches for Analyzing Timing Attacks
WANG Yin-long;ZHAO Qiang;LIN Ke-cheng;LI Zhi-xiang;WANG Xi-wu;DENG Gao-ming
..............page:100-102,144
Towards a Logical Framework of Composing Attribute-based Access Control Policies
KE Ke;LI Ou;XU Chang-zheng
..............page:91-95,139
Distributed Key Management for Ad-hoc Network Based on CPK
ZHANG Yu-chen;WANG Ya-di;HAN Ji-hong;FAN Yu-dan
..............page:75-77
Pseudo Random Generator Based on Chaotic Maps
QIU Jing;WANG Ping;XIAO Di;LIAO Xiao-feng
..............page:81-83
Multi-watermarks Technology in Software Copyright Management
LUO Yang-xia;FANG Ding-yi
..............page:103-109
P2P Network Virus Detection Model Based on Immune Collaboration
CHENG Chun-ling;CHAI Qian;XU Xiao-long;XIONG Jing-yi
..............page:60-63
Prefetching T-Tree: A Cache-optimized Main Memory Database Index Structure
YANG Zhao-hui;WANG Li-song
..............page:161-165
Security Protocol for Protecting the P2P Trust Information Management
HUJian-li;ZHOU Bin;WU Quan-yuan
..............page:64-67,90
Dynamic Negotiation Model under the Influence of Uncertain Competition and Cooperation Environment
CHENG Zhao-qian;WANG Hong-guo;SHAO Zeng-zhen;YANG Yi
..............page:231-235,251
Protein Secondary Structure Prediction Algorithm Based on Mixed-SVM Method
SUI Hai-feng;QU Wu;QIAN Wen-bin;YANG Bing-ru
..............page:169-173,188
Δ-tree Based Similarity Join Algorithm for High-dimensional Data
LIU Yan;HAO Zhong-xiao
..............page:157-160
Large Ontology Partition and Mapping Based on Module Extraction
WANG Run-mei;XU De-zhi;LAI Ya;YAO Xue-cong
..............page:248-251
Attribute Reduction Based on Ordered Discernibility Set and Significance of Attribute
ZHANG Ying-chun;WANG Yu-xin;GUO He
..............page:243-247
GEP Classification Based on Clonal Selection and Quantum Evolution
WANG Wei-hong;DU Yan-ye;LI Qu
..............page:236-239,262
Capturing Human Interaction Semantics in Meetings
FAN Xiang-chao;YU Zhi-wen;MA Hui
..............page:240-242,258
Variable Granulation Rough Set
ZHANG Ming;TANG Zhen-min;XU Wei-yan;YANG Xi-bei
..............page:220-222,247
Survey on the Networks-on-Chip Interconnection Topologies
WANG Wei;QIAO Lin;TANG Zhi-zhong
..............page:1-5,12
Research on Fault Analysis against RSA Based on Fault in CRT Combination Operation
CHEN Cai-sen;WANG Tao;KOU Ying-zhan;ZHANG Jin-zhong
..............page:68-71
Research on Progress of Fuzzy Cognitive Map
MA Nan;YANG Bing-ru;BAO Hong;GUO Jian-wei
..............page:23-28,50
Analysis about Parameters Selection of PSO Based on Cluster-degree
DOU Quan-sheng;SHI Zhong-zhi;JIANG Ping;LI Guo-jiang
..............page:181-183
Research on Parallel k-means Algorithm Design Based on Hadoop Platform
ZHAO Wei-zhong;MA Hui-fang;FU Yan-xiang;SHI Zhong-zhi
..............page:166-168,176