Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2013 Issue S2
Formal semantics of component-based service specification
HouJinkui;Wang Lei;Zhang Kuiting;School of Computer Engineering;Weifang University;
..............page:1-5
Research on Web service composition based on relational database
Liu Jianxiao;Deng Yong;Liu Sicong;Zhang Xiuwei;Liu Feng;College of Science;Huazhong Agricultural University;NO.722 Research and Development Institute;China Shipbuilding Industry Corporation;State Key Lab of Software Engineering;Wuhan University;
..............page:6-9
Service composition method in mobile Ad Hoc network
Wu Xiaokun;Wu Jiyan;Cheng Bo;Chen Junliang;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:10-13
Machine learning based reputation evaluation for SPIT detection
Shuang Kai;Ma Jiao;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:14-17+47
Automatic code creation for workflow application system based on template
Wu Budan;Lin Rongheng;Chen Junliang;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:18-21
Web service dynamic composition based on event ontology
Tang Yingying;Liu Wei;Liu Feijing;Xin Mingjun;School of Computer Engineering and Science;Shanghai University;
..............page:22-25
Real-time transaction scheduling algorithm based on DVS technology
Xiang Jun;Wang Xiaofang;Li Yan;Xie Kunwu;Department of Information Engineering;Hubei University for Nationalities;
..............page:26-28
Service based realization framework of dynamic capability integration for military information system
Yu Xiaohao;Hu Dan;Li Yuanping;Li Li;Beijing Institute of System Engineering;General Research Institute;Equipment Academy of Air Force;Information and Navigation Institute of Air Force Engineering University;
..............page:29-32
Business process reengineering based on knowledge flow optimization
Cai Qiang;Han Dongmei;Li Haisheng;Mao Dianhui;School of Computer and Information;Beijing Technology and Business University;
..............page:33-37
Unified user authentication based on E-mail
Wang Hua;Huang Shaojian;Zhou Ke;Zhang Jia;Wuhan National Laboratory for Optoelectronics;Huazhong University of Science and Technology;
..............page:38-41
TBox-replication partition method for Web scaled RDF data
Meng Qingyi;Feng Zhiyong;Rao Guozheng;Wang Xin;School of Computer Science and Technology;Tianjin Key Laboratory of Cognitive Computing and Application;Tianjin University;
..............page:42-47
Dependent cloud data placement on geo-datacenters
Wang Yiwen;Su Sen;Xie Chenfu;Shuang Kai;State Key Lab of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:48-51
Research on resource scheduling of PaaS
Xu Peng;Zhang Yanjiang;Su Sen;State Key Lab of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:52-56
Cloud computing resource load balancing study based on ant colony optimization algorithm
Meng Fanchao;Zhang Haizhou;Chu Dianhui;School of Computer Science and Technology;Harbin Institute of Technology at Weihai;
..............page:57-62
Agile auto scaling for supporting large scale cloud service platform
Yang Yong;Zhao Xinkui;Lu Xingjian;Yin Jianwei;College of Compute Science and Technology;Zhejiang University;
..............page:63-67+99
Penetration of authority under cloud environment based on RBAC
Zou Jiashun;Zhang Yongsheng;Gao Yan;School of Information Science and Engineering;Shandong Normal University;Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology;Shandong Normal University;
..............page:68-71
Implementation of computer hardware remote laboratory based on cloud computing platform
Yang Longjun;Lu Hongyi;State Key Laboratory of High Performance Computing;School of Computer;National University of Defense Technology;
..............page:72-76
Privacy-preserving shortest distance computing in cloud environment
Zhang Yingguang;Su Sen;Chen Weifeng;Yang Fangchun;State Key Lab of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:77-80
A service recommended method based on extended FP-TREE
Mo Tong;Chu Weijie;Li Weiping;Wu Zhonghai;School of Software and Microelectronics;Peking University;
..............page:81-87
User security attribute preferences-based Web service assessment
Ma Cheng;Duan Youxiang;Ju Xinglong;Xu Fuchang;College of Computer and Communication Engineering;China University of Petroleum;
..............page:88-92
Bipartite graph-based service recommendation method study
Jiang Bo;Zhang Xiaoxiao;Pan Weifeng;Department of Computer Science and Information Engineering;Zhejiang Gongshang University;Department of Computer Science and Technology;Zhejiang University;State Key Laboratory of Software Engineering;Wuhan University;
..............page:93-99
A QoE-aware cluster visualization search service
Lin Rongheng;Wu Budan;Zhao Yao;Zhu Guangnan;State Key Lab of Networking and Switching;Beijing University of Posts and Telecommunications;
..............page:100-105
Ontology-based resource virtualization method in cloud manufacturing
Cheng Zhen;Zhan Dechen;Xu Hanchuan;School of Computer Science and Technology;Harbin Institute of Technology;
..............page:106-112
KNN and SVM Parallel algorithm
Li Shengdong;Lü Xueqiang;Shi Shuicai;Shi Juntao;Department of Computer Engineering;Langfang Yanjing Polytechinc Institute;Beijing Key Laboratory of Internet Culture and Digital Dissemination Research;Beijing Information Science and Technology University;
..............page:113-116
Topic/reports representation model based on two thresholds
Li Shengdong;Lü Xueqiang;Wei Zhen;Shi Shuicai;Department of Computer Engineering;Langfang Yanjing Polytechinc Institute;Beijing Key Laboratory of Internet Culture and Digital Dissemination Research;Beijing Information Science and Technology University;Department of Finance;Langfang Yanjing Polytechinc Institute;
..............page:117-120+130
Research of a distributed file system based on virtual disks block storage
Wang Zhen;Wang Lei;Wang Yu;College of Computer;Beihang University;
..............page:121-126
Design of data middleware for mobile campus based on OSGi and RESTful
Zhao Ying;Cheng Liang;College of Information Science Technology;Beijing University of Chemical Technology;
..............page:127-130
Research on multi-tenant-oriented multi-level scalable SaaS architecture
Zhou Xuequan;Zhan Dechen;Nie Lanshun;Meng Fanchao;School of Computer Science and Technology;Harbin Institute of Technology;School of Economy and Management;Harbin Institute of Technology at Weihai;School of Computer Science and Technology;Harbin Institute of Technology at Weihai;
..............page:131-136
A novel QoS prediction approach based on reversed and cross prediction
Hong Chaoqun;Chen Liang;Feng Yipeng;Wu Jian;School of Computer and Information Engineering;Xiamen University of Technology;College of Computer Science and Technology;Zhejiang University;
..............page:137-142
Research on the phishing detection technology based on SVM-RFE
Wang Ting;Peng Yong;Dai Zhonghua;Yi Shengwei;Han Lansheng;China Information Technology Evaluation Center;School of Computer Science and Technology;Huazhong University of Science and Technology;
..............page:143-146
Design of access control in E-government system based on cloud platforms
Hu Jun;Zhang Yi;Huang Chuanhe;School of Computer;Wuhan University;Management Office;Wuhan Government Affairs Service Center;
..............page:147-151
X:intra-node programming models for exascale systems
Yi Huizhan;Du Yunfei;Wang Feng;Yang Canqun;College of Computer;National University of Defense Technology;
..............page:152-157
Research on model of user behavior habit authentication in cloud computing
Guo Fuliang;Zhou Gang;Cui Liangzhong;College of Electronics Engineering;Naval University of Engineering;
..............page:158-161+166
Fingerprint information extraction method from hyperspectral images based on abundance sum to one constrained independent component analysis
Wang Nan;Du Bo;Zhang Liangpei;Hu Wenbin;State Key Laboratory of Information Engineering in Surveying;Mapping and Remote Sensing;Wuhan University;School of Computer;Wuhan University;
..............page:162-166
Government affairs cloud center data storage architecture and intelligent access technology
Hu Jun;Chen Lei;Chen Shihong;School of Computer;Wuhan University;Management Office;Wuhan Government Affairs Service Center;
..............page:167-171
Ad Hoc network routing protocol performance analysis and comparison
Song Ying;Lu Xiaocheng;Sun Baolin;Zhang Yun;School of Information Management;Hubei University of Economics;School of Computing;Wuhan Institute of Technology;
..............page:172-175
Skyline query based on damping-factor grid in cloud environments
Jiang Hansheng;Xiao Yingyuan;Li Yukun;Wang Xiaoye;Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology;Tianjin University of Technology;
..............page:176-180
Research and implement mobile cloud storage system based on Hadoop
Hu Tao;Zhou Bing;Zheng Minghui;Ji Zhongyuan;Information Engineering School;Hubei University for Nationalities;
..............page:181-183
Subscription partition-based multi-index parallel matching algorithm
Zou Zhiwen;Li Qiao;Wang Zhenghui;Fei Hongzhe;School of Computer Science and Communication Engineering;Jiangsu University;
..............page:184-187+191
A recommendation algorithm based on cyclic regression
Xu Yige;Zhang Ke;Ke Meng;Xie Qianqian;Zhang Wen;School of Computer;Wuhan University;School of Mathematics and Statistics;Wuhan University;
..............page:188-191
Research of QoC based reliable fusion method for uncertain context
Zheng Di;Wang Jun;Ben Kerong;Department of Computer Science;Naval University of Engineering;Key Research Laboratory;Wuhan Air force Radar Institute;
..............page:192-196+204
Methods to improve the applicability of WLAN-based indoor location estmation systems
Hu Qiaoling;China Ship Development and Design Center;
..............page:197-200
Tensor-based principal component analysis for face image compression and re-construction
Du Bo;Zhang Lefei;Zhang Mengfei;Xiong Wei;School of Computer;Wuhan University;
..............page:201-204
A Radix tree based database front-end cache system
Xiong Muzhou;School of Computer Science;China University of Geosciences;
..............page:205-208
Spatial color feature based pedestrian re-identification
Zhang Hua;Computer School;Wuhan University;
..............page:209-212+217
Research on simulation technology of vehicular ad hoc networks based on mobility model
Cai Jing;Wang Tengfei;School of Computer Science and Technology;Wuhan University of Technology;
..............page:213-217
Provably-secure certificateless proxy re-signature scheme
Lei Yu;Wu Liqiang;Key Laboratory of Network and Information Security Under the Armed Police Force;Engineering University of the Chinese Armed Police Force;
..............page:218-221+226
Example and ontology based machine translation for oracle bone inscriptions
Xiong Jing;Zhong Luo;Wang Aimin;School of Computer and Information Engineering;Anyang Normal University;School of Computer Science;Wuhan University of Technology;
..............page:222-226
Steganalysis algorithm of F5 based on the new calibration technology
Zhang Yan;Zhang Minqing;Lei Yu;Wu Xuguang;Key Laboratory of Network and Information Security Under the Armed Police Force;Engineering University of the Chinese Armed Police Force;
..............page:227-231
Research on tree kernel-based protein-protein interaction extraction
Liu Nian;Ma Changlin;Zhang Yong;Wang Meng;Central China Normal University;School of Computer;
..............page:232-236
Research on remote attestation communication mechanism in cloud GIS
An Yang;Su Hang;Zhao Bo;Wuhan University School of Computer;
..............page:237-241
A shortest delay first based VANET routing protocol for safety warning on highway
Xu Bo;Xu Shouzhi;Guo Pengfei;Qi Yonghua;College of Computer and Information Technology;China Three Gorges University;
..............page:242-246
Method to calculate performance indicators of routing protocols in MANET
Fan Xiying;Huang Chuanhe;Wang Xiaomao;Lü Yilong;Zhang Lianzhen;School of Computer Science;Wuhan University;
..............page:247-250
Outlier detection algorithm based on clustering in sensor network
Wu Zhongbo;Wang Min;Wu Zhao;Yuan Lei;School of Mathematics and Computer Science;Hubei University of Arts and Science;
..............page:251-254
A new trust evaluation mechanism in wireless Mesh networks
ChenJianmin;Ning Zhenhu;Xiao Peng;Fu Yingfang;College of Computer Science;Beijing University of Technology;National Computer Virus Emergency Response Center;School of Software Engineering;Beijing University of Technology;
..............page:255-258+269
A static detection of security defects between inter-components′communication
Fu Jianming;Li Pengwei;Yi Qiao;Huang Shiyong;Key Laboratory of Aerospace Information Security and Trusted Computing;Wuhan University;School of Computer;Wuhan University;State Key Laboratory of Software Engineering;Wuhan University;
..............page:259-264
Research on the basic technology of state control for system security
Lin Zhi;Qiao Mingfeng;Tan Yuan;No.4 Department;PLA Academy of National Defense Information;Military Agency Office of PLA in 710;
..............page:265-269
Research of ZigBee positioning algorithm based on energy
Xu Shouzhi;Qi Yonghua;Xu Bo;Chen Zehua;College of Computer and Information Technology;China Three Gorges University;
..............page:270-273+290
Improved active learning algorithm for hyperspectral images classification
Li Chong;Gu Qiong;Cai Zhihua;Wu Qiong;School of Mathematics and Computer Science;Hubei University of Arts and Science;School of Computer;China University of Geosciences;
..............page:274-278
A dynamic programming algorithm for continuous queries privacy preserving in location based services
Wang Yilei;Zhou Hao;Wu Yingjie;Sun Lan;College of Mathematics and Computer Science;Fuzhou University;
..............page:279-284
Location privacy protection algorithm for preventing replay attack in road networks
Sun Lan;Wu Yingjie;Luo Zhao;Wang Yilei;College of Mathematics and Computer Science;Fuzhou University;
..............page:285-290