Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2013 Issue 11
Research on Permutation Flow-shop Scheduling Problem
LIU Ying;GU Wen-xiang;LI Xiang-tao
..............page:1-7,22
Cloud Computing Resource Scheduling:Policy and Algorithm
CHU Ya;MA Ting-huai;ZHAO Li-cheng
..............page:8-13
Link-quality-aware Opportunistic Network Coding Mechanism in Wireless Networks
GE Qing;BAI Guang-wei;SHEN Hang;ZHANG Peng;CAO Lei
..............page:29-34
Crossover Based Ultra-lightweight RFID Authentication Protocol
DU Zong-yin;ZHANG Guo-an;YUAN Hong-lin
..............page:35-37,42
Indoor Positioning Algorithm for WLAN Based on Distribution Overlap and Feature Weighting
XIE Dai-jun;HU Han-ying;KONG Fan-zeng
..............page:38-42
PMIPv6 Based Fast Handover Scheme for Network Mobility
TANG Wei;TANG Hong-bo;CHEN Lu
..............page:43-47,51
Testing of Network Traffic Series in Reconstructed Phase Space Based on Recurrence Rate Feature
XIE Sheng-jun;YIN Feng;ZHOU Xu-chuan
..............page:48-51
Parallel Network Initialization Method for WIA-PA Network
XIAO Jin-chao;ZENG Peng;ZHANG Qiong;YU Hai-bin
..............page:52-57,80
Privacy-preserving Data Aggregation Algorithm with Integrity Verification
SHI Lu-sheng;QIN Xiao-lin
..............page:197-202
GML Parallel Query Based on MapReduce
XU Bin;GUAN Ji-hong
..............page:203-207
Mining Algorithm of Database Constraints Based on Characteristics Fuzzy Closer
WANG Yong;ZOU Sheng-rong
..............page:208-210,227
Semantic Web Service Discovery Based on Text Clustering and Similarity of Concepts
LIU Yi-song;YANG Yu-cheng
..............page:211-214
Research on Parallel Shared Decision Tree Algorithm Based on Hadoop
CHEN Xiang-tao;ZHANG Chao;HAN Qian
..............page:215-221
Function Semantic-based Web Service Description and Pre-filter Method
ZHAO Wen-dong;TAO Xiao-zhen;PENG Lai-xian;TIAN Chang
..............page:222-227
Research on Deep Web Query Interface Clustering Based on Latent Semantic Analysis
QIANG Bao-hua;LI Wei;ZOU Xian-chun;WANG Tian-tian;WU Chun-ming
..............page:228-230,247
Sentiment Analysis of Chinese Microblog Using Topic Self-adaptation
REN Yuan;CHAO Wen-han;ZHOU Qing;LI Zhou-jun
..............page:231-235,270
Forest Thinning via Contribution Gain
GUO Hua-ping;FAN Ming
..............page:236-241
Research of Software Complexity Metric Attributes Feature Selection Based on LASSO-LARS
ZHOU Yan-zhou;QIAO Hui;WU Xiao-ping;SHAO Nan;HUI Wen-tao
..............page:169-173
Process-driven Method of Semi-automatic Semantic Web Service Composition and its Application
XIONG Li-rong;YU Hui;FAN Jing;DONG Tian-yang
..............page:174-180,196
Framework for Model Checking CSP with Traces of Processes
ZHAO Ling-zhong;ZHAI Zhong-yi;QIAN Jun-yan
..............page:181-186,221
Lightweight Authentication Protocol for RFID Based on Model of Untraceability
CHEN Xiu-qing;CAO Tian-jie;GUO Yu
..............page:103-107
Method of Network Security Situation Prediction Based on IHS_RELM
CHEN Hong;WANG Fei;XIAO Zhen-jiu
..............page:108-111
Provably Secure and Efficient Certificateless Signcryption Scheme
SUN Hua;ZHENG Xue-feng
..............page:112-116,125
Multiple Pattern Algorithm for Chinese
HOU Zheng-feng;YANG Bo;ZHU Xiao-ling
..............page:117-121
Efficient Fair Pseudonym Management Model
ZHU Xiao-ling;LU Yang;ZHANG Ben-hong;HOU Zheng-feng
..............page:122-125
Analysis of News Diffusion in Recommender Systems Based on Multidimensional Tastes
WANG Guan-nan;CHEN Duan-bing;FU Yan
..............page:126-130
Multi-attribute Ranked Keyword Search over Encrypted Cloud Data
FENG Gui-lan;TAN Liang
..............page:131-136,157
Database as Service System for Business Database Application Hosting and its Privacy Preservation Mechanism
CHEN Ping;ZHANG Tao;ZHAO Min;YUAN Zhi-jian;YANG Lan-juan
..............page:140-142,146
Methods and Mechanisms on Transmission Control for M2M Communications
WANG Qun;QIAN Huan-yan
..............page:74-80
Identifying User's ID from Anonymous Mobility Trace Set via Asynchronous Side Information
ZHANG Hong-ji;LI Wen-zhong;LU Sang-lu
..............page:89-93
Construction of MAI Function Based on T-D Conjecture
ZHANG Zhe-lin;ZHOU Meng
..............page:94-97,111
Population Dynamics-based Optimization
HUANG Guang-qiu;LI Tao;LU Qiu-qin
..............page:280-286
Research on Evolution of Online Consensus Based on Opinion Leader's Guiding Role
ZHOU Er-zhong;ZHONG Ning;HUANG Jia-jin
..............page:287-290
Hierarchical Algorithm Solve Strong Cycle Planning
WANG Quan;WEN Zhong-hua;WU Xuan;TANG Jie
..............page:291-294
Routing Algorithm for Android Game Agents Based on Non-uniform Partition of Map
LI Hong-bo;ZHAO Kuan;WU Yu
..............page:316-318,封3
tou gao xu zhi
..............page:封2
Research on WMD Model in Military Simulation and Analysis System
YANG Shan-liang;ZHAO Xin-ye;YANG Mei;FU Yue-wen;ZHOU Yun
..............page:14-17,34
Research on Top-level Design of Architecture for Cyber-physical Systems
HE Ming;LIANG Wen-hui;CHEN Xi-liang;CHEN Qiu-li
..............page:18-22
GPU Parallel Algorithm Based on Power Evaluation Methods
WANG Zhuo-wei;CHENG Liang-lun;ZHAO Wu-qing
..............page:23-28
Real Time Force Feedback Data Transmission for Remote Haptic Collaboration System Based on TCP/IP Protocol
JIANG Zheng-zheng;GAO Zhan;GU Xiang;CHEN Xiang
..............page:58-60,69
New BoD Bandwidth Request Allocation Algorithm
LIU Lei;XIE Jun;HU Gu-yu;TANG Bin
..............page:61-64
New Clustering Algorithm Based on Data Field in Complex Networks
LIU Yu-hua;ZHENG Yi;XU Cui;JIN Jian-zhi
..............page:70-73,93
Research of Buffer Overflow Vulnerability Discovering Analysis and Exploiting
SHI Fei-yue;FU De-sheng
..............page:143-146
Performance Monitoring and Analysis of Heterogeneous Cloud Platforms
HUANG Xiao-fei;BAI Xiao-ying;YUAN Li-jie
..............page:147-151,163
Entropy Analysis of Testing-based Fault Localization and Similarity-aware Fault Localization
WANG Zhen-zhen;XU Bao-wen;ZHOU Yu-ming;CHEN Lin
..............page:152-157
Ripple-effect Analysis of Software Evolution Based on Component
YU Yong;WANG Li-xia;ZHAO Na
..............page:164-168
Research on Runtime Monitoring for Self-adaptive and Reconfigurable Software Systems
TANG Shan;LI Li-ping;TAN Wen-an
..............page:191-196
Term Importance Identification Method Based on Classification
QIU Yun-fei;BAO Li;SHAO Liang-shan
..............page:242-247
Hybrid Algorithm Based on Monkey Algorithm and Simple Method
CHEN Xin;ZHOU Yong-quan
..............page:248-254
GA-based Subspace Classification Algorithm for Support Vector Machines
JIANG Hua-rong;YU Xue
..............page:255-260,275
Improved Differential Evolution Algorithm Based on Dynamic Adaptive Strategies
WANG Cong-jiao;WANG Xi-huai;XIAO Jian-mei
..............page:265-270
Two-tier Clustering for Mining Imbalanced Datasets
HU Xiao-sheng;ZHANG Run-jing;ZHONG Yong
..............page:271-275
Research on Simplification Methods of Seismic Database for CTBT Based on Granular Membership Reduction
SUN Yu-wei;ZHENG Xue-feng;PAN Chang-zhou;JIN Ping
..............page:276-279
Study on Financial Crisis Prediction Model with Web Financial Information for Listed Companies
BIAN Hai-rong;WAN Chang-xuan;LIU De-xi;JIANG Teng-jiao
..............page:295-298,315
Dynamic Behavior Evolution for First-order Hybrid Petri Nets Based on Conflict Checking
LIAO Wei-zhi;LI Wen-jing;LU Jian-bo
..............page:299-303,封3
Multidimensional Data Recommender Algorithm Based on Random Walk
LI Fang;LI Yong-jin
..............page:304-307
Variable Endmember Unmixing Algorithm Based on Correction MCMC Method
HU Xia;SONG Xian-feng;NIU Hai-shan
..............page:308-311