Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2012 Issue 2
Formal Verification Approach for False Route in MANET
ZHANG Yu-sen;GUI Jing-jing;WANG Jin-shuang;SUO Yan;YANG Li;JIN Xin
..............page:118-121
Automatic Liver Segmentation Using Graph Cuts and Probabilistic Atlas
LIU Ji;KANG Xiao-dong;JIA Fu-cang;LIU Ling-ling;WANG Hao
..............page:288-290
Region-based Graph Cut Algorithm for Mumford-Shah Image Segmentation Model
ZHANG Wen-juan;FENG Xiang-chu
..............page:297-301
Adaptive Fault-tolerant Routing in Torus Networks
DUAN Xin-ming;WU Ji-gang;ZHANG Da-kun
..............page:115-117,153
Simulation Platform for Differential Power Analysis Attack on DES
WU Ke-shou;LI Ren-fa;WANG Xiao-dong;CHEN Yu-ming
..............page:59-60,65
Research on the Web Sequence Pattern Based on the Improved Wap Algorithm
WANG Hui;ZHANG Jun-wen
..............page:206-208,239
Research of Data Stream Clustering Algorithms Based on Artificial Immune Principle
HU Wei;XU Fu-yuan;MA Qing-guo
..............page:195-197
Automatic Test for Web Services
MA Chun-yan;ZHU Yi-an;LU Wei
..............page:162-169
New Adaptive Active Queue Management Algorithm with Kalman Filter
YAN Qiao;HU Xiao-juan;LEI Qiong-yu
..............page:88-91,125
Friend Cluster Based Delay Tolerant Routing Protocol in Social Networks
LI Zhi;ZHANG Hong;LIU Feng-yu
..............page:26-28,55
Composition of Web Services Based on Dynamic QoS
KONG Wei-liang;LIU Qing-tang;YANG Zong-kai;HAN Shu-yun
..............page:268-272
Application of the Molecular Algorithm in Public Transport Network Problem
ZHANG Qian;WANG Zhen-ye;DONG Ya-fei
..............page:258-261,267
Entropy-based Algorithmin for Noise Detection in Multi-dimensional Stream Data
Ll Wen-zhong;ZUO Wan-li;HE Feng-ling
..............page:191-194
Algorithm for Authenticated Hash Join Processing in Outsourced Database
MA Sha;YANG Bo;LI Kang-shun
..............page:198-202,221
Final Coalgebraic Semantics for Behavioral Equality of Objects
YU Shan-shan;LI Shi-xian;SU Jin-dian
..............page:179-182,190
Anomaly Traffic Detection Based on Multi-resolution Feature Fusion
CHEN Hong-chang;CHENG Guo-zhen;YI Peng
..............page:42-46
Generalization of Rough Set Model Based on Molecular Lattices
ZHAO Tao;QIN Ke-yun
..............page:255-257
Fast and Automatic Registration Method for Large Multi-spectral Remote Sensing Images
XU Li-yan;ZHANG Jie-yu;SUN Wei-wei;SUN Quan-sen;XIA De-shen
..............page:61-65
Research on Embedded Software Dynamic Reconfigurable Technology Based on Mode
QIN Yang-sen;DONG Yun-wei
..............page:175-178,194
Preliminary Study on a Kind of Place Perception System Based on IOT Technology
ZHU Bo;DAI Xian-zhong;LI Xin-de
..............page:216-221
Resources Capabilities Modeling for Cyber-Physical Systems
WANG Xiao-le;HUANG Hong-bin;DENG Su;CHEN Li-na
..............page:227-231
Policy Description Language for Exception Handling in Service-oriented Processes
WANG Quan-yu;YING Shi;LV Guo-bin;LUO Jun-feng;WEN Jing
..............page:148-153
Chemical Semantics of Object Oriented Languages
YAN Wei;LU Yan-sheng
..............page:136-142,174
Application of an Improved Multi-pattern Matching Algorithm in Snort
WANG Pei-feng;LI Li
..............page:72-74,79
DBMS Security Independence Test Framework Design and Implementation
LIU Bo-ling;YE Xiao-jun;XIE Feng;LI Bin
..............page:183-186
Method of New Chinese Word Detection Based on Statistical Learning Framework
ZHANG Hai-jun;LUAN Jing;LI Yong;QI Xiang-wei
..............page:232-235
Condensed Nearest Neighbor Rules Based on Rough Set Technique
ZHAI Jun-hai;LI Sheng-jie;WANG Xi-zhao
..............page:236-239
Research on Distribution Multidimensional Scaling Localization Algorithm
WANG Xin-sheng;HU Yu-lan
..............page:80-83,87
Application Research of LMD Method in EEG Signal Processing
ZHU Xiao-jun;FAN Liu-juan;LV Shi-qin;YU Xue-li
..............page:273-275,313
Research on Urban Traffic Emergency Detection Based on IoT
WANG Hao;TAN Guo-zhen;YANG Ji-xiang
..............page:262-267
Design and Implementation of a RFID Based Positioning Method for Indoor Vehicle Monitoring System
JIANG Hao;GAO Chun-hua;ZHANG Lin;YE Bao-liu;LU Sang-lu
..............page:29-33
Extended VIKOR Method for Dynamic Intuitionistic Fuzzy Multi-attribute Decision Making
ZHANG Shi-fang;LIU San-yang;ZHAI Ren-he
..............page:240-243
Generation Approach of Error Locating Arrays to Locate One Interaction Fault
ZHOU Wu-jie;ZHANG De-ping
..............page:154-158
Measurement and Analysis to Wireless Sensor Network Node Energy Consumption
NIU Xing;LI Jie;ZHOU Xin-yun;ZHAO Zhong-hua
..............page:84-87
Research of the Battlefield Tracking Information Sharing Based on Ontology
QIN Guang-cheng;LI Zhen;YIN Hao;CHEN Qiang
..............page:22-25
Research on Verification Method of AADL Behavior Model Based on UPPAAL
LI Zhen-song;GU Bin
..............page:159-161,169
Ontology Based Semantic Similarity and Relatedness Measures Review
LIU Hong-zhe;XU De
..............page:8-13
Request Routing in Content Delivery Networks
HUI Wen;YIN Hao;LIN Chuang;YANG Yang
..............page:1-7,33
Fraud Against Model for Seller\'s Reputation of C2C
XIONG Jian-ying;ZHONG Yuan-sheng
..............page:68-71
Algorithm for MFSK Symbol Rate Estimation Based on Signal Decomposition
XU Jian-fei;WANG Fu-ping;WANG Zan-ji
..............page:66-67,71
High-effect Resource Management Strategy in Cloud Computing Environment
ZHAO Hong-wei;SONG Bao-yan;SHAO Yi-chuang
..............page:212-215
Research on Developing Social Role Ontology of Social Groups
JIANG Li-ping;CAO Cun-gen;ZHANG Zai-yue
..............page:222-226,249
Analysis on Time Shift Mechanism\'s Typical Application Algorithm in Parallel System
WANG Wen-yi;LIANG Fu-guang
..............page:311-313
Implementation of a File-level Continuous Data Protection System and its Survivability Quantification
WU Shi-zhong;XIONG Qi;LIU Hui;LIU Lin;WANG Li-na
..............page:109-114,158
Fast Neighbor Discovery in Cognitive Radio Ad-hoc Networks
ZHANG Jian-zhao;YAO Fu-qiang;ZHAO Hang-sheng;LIU Yong-xiang
..............page:52-55
Model-driven Development Methodology for Complex Self-adaptive Multi-agent Systems
CAO Jiang;MAO Xin-jun;WANG Huai-min;LU Xi-cheng
..............page:126-131
Reverse Top-k Query on Uncertain Data
WANG Xiao-wei;JIA Yan
..............page:187-190
Model and Application of Vehicle Routing Problem with Variable Network Structure
CHEN Sen;LI Meng-jun;LI Ben-xian;WANG Peng
..............page:14-17
Edge-based Lifting Schemes for Image Compression
ZHU Jie-ying;WANG Neng-chao
..............page:291-296
E-Learning Services Discovery Algorithm Based on Context Aware
ZHU Zheng-zhou
..............page:132-135,147
Reliable Zone Routing Protocol in Ad-hoc Networks
WU Jing;HOU Guo-zhao;ZHAO Yun-long
..............page:101-104,131
Research on Collaborative Semantic Feature Modeling System
JIN Ying-hao;SUN Li-juan
..............page:280-282,296
Timed Petri and ZBDD Based Approach for Assembly Sequence Planning
LI Feng-ying;GU Tian-long;CHANG Liang;XU Zhou-bo
..............page:170-174
Study of Large-scale WSN Routing Model Based on P2P
LUO Qiao;CHEN Jing;GUO Yi-chen;HUANG Cong-hui
..............page:122-125
Code Query Technology Based on Program Analysis
ZENG Zeng;ZHAO Jian-hua
..............page:143-147
xin xi dong tai
..............page:封2-封3
Predictive Modeling & Simulation for Propagation of Internet Public Opinion
FANG Wei;HE Liu-jin;SONG Liang-tu
..............page:203-205,235
Task Scheduling in Grid Environment Based on Hybrid PSO Algorithm
WANG Cheng-chang;CHEN Hong-zhong;FANG Yu;DENG Rong
..............page:18-21
Correlation Power Analysis on ARIA Block Cipher
JI Feng;WANG Tao;ZHAO Xin-jie;ZHANG Jin-zhong
..............page:92-94,108
Subarea Crossover Differential Evolution Algorithm and its Constrained Optimization
LIU Rong-hui;ZHENG Jian-guo
..............page:283-287,304
Graph Method of Rough Set Attribute Reduction
LU Peng;XIAO Jian-mei;WANG Xi-huai
..............page:250-254,272
Group Trust Algorithm Based on Social Network
BAO Jie;CHENG Jiu-jun
..............page:38-41,51
Reversible Data Hiding Based on Reference Pixel of Block
ZENG Xian-ting;LI Zhuo;PING Ling-di
..............page:47-51
Improved Power Control Game Algorithm in Cognitive Wireless Networks
HU Tu;JING Zhi-hong;LI Feng-jing
..............page:75-79
Data Regroup and Alignment Optimization Based on SIMD
WEI Shuai;ZHAO Rong-cai;YAO Yuan;HOU Yong-sheng
..............page:305-310