Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2013 Issue 4
Overview on Exception Handling in Service Oriented Software
GUAN Hua;YING Shi;JIA Xiang-yang;JIANG Cao-qing;WANG Yi-bing
..............page:1-8,21
Survey of P2P Network Security and Defense Mechanism
LIU Yue;LI Qiang;LI Zhou-jun
..............page:9-13
Research on Observation Mechanism for Congestion Control in InfiniBand Network Based on ibdump
CAO Guang-quan;ZHANG Zi-wen;SUN Zhi-gang;CHEN Hong-yi;XU Qing-jie
..............page:47-50
Multi-label Data Mining: A Survey
LI Si-nan;LI Ning;LI Zhan-huai
..............page:14-21
Study on Energy Optimization of Servers Based on States Management
XIAO Zhi-jiao;MING Zhong;CAI Shu-bin
..............page:22-25,30
Research and Design of Multiple Thread Mechanism in Matrix DSP
DENG Yu;SUN Yong-jie;WAN Jiang-hua
..............page:51-54
Reconfigurable Architecture Model Based on Layered Hypergraph
SHEN Lai-xin;ZENG Guo-sun;WANG Wei
..............page:26-30
Implement of Matrix Compiler's If-convertion Algorithm
LIU Fei;CHEN Yue-yue;SUN Hai-yan;YANG Liu
..............page:55-58,77
Design and Implementation of Leading-One Prediction
LI Xing;HU Chun-mei;LI Yong;LI Zhen-tao
..............page:31-34,50
Power Management of Idle Nodes in Clusters
LIU Yong-peng;LU Kai;CHI Wan-qing
..............page:59-63,95
Design and Implementation of Software Pipelined Loop Buffer
CHEN Ji-xiao;LI Yong
..............page:35-37
Design of Content-based Data Forwarding Network and Algorithm
ZHU Zhao-meng;ZHANG Gong-xuan;ZHANG Yong-ping;GUO Jian;ZHANG Wei
..............page:64-68,90
Self-adaptive Memory Dependence Predictor
BAN Dong-song;YAN Shi-yun;LI Li;YANG Jian-xin;LU Dong-dong
..............page:38-40,54
Research of Parallel SVM Algorithm Based on CUDA
ZHANG Wei;ZHANG Gong-xuan;WANG Yong-li;ZHANG Yong-ping;ZHU Zhao-meng
..............page:69-72,106
Evaluation and Analysis of Effects of Auto-vectorization in Typical Compilers
LI Chun-jiang;HUANG Juan-juan;XU Ying;DU Yun-fei;CHEN Juan
..............page:41-46
Hotspot-aware Data Storage Strategy for Wireless Sensor Networks
LI Qiao-qin;WU Lei;WANG Yan
..............page:73-77
Improved Minimum Hop Count Routing Protocol in Wireless Sensor Network
CHEN Zhi-bo;XU Xiao-cheng
..............page:83-85,114
Multi-topology Link Weight Optimizing Algorithm Based on Dynamic Traffic
CHEN Duo-long;MENG Xiang-ru;LIANG Xiao;WEN Xiang-xi
..............page:86-90
Hierarchical Scheduling of Large Scale Distributed Computation
QIN Gao-de;WEN Gao-jin
..............page:91-95
Cooperative Channel Allocation Strategy Based on Balancing Algorithm
LUO Qing-yun;CHEN Min;ZHAO Jin-guo
..............page:96-101
Research on RFID MAC Protocol under Dense Mobile Tag Environment
YANG Jian;WANG Yong-hua;CAI Qing-ling
..............page:102-106
Heterogeneity Based Algorithm for Scheduling Out-Tree Task Graphs
ZHANG Jian-jun;SONG Ye-xin;KUANG Wen
..............page:107-110,146
RABOLC-A New Methodology Used in SCNEO Building
YUAN Wei-wei;DUAN Yi-feng;HU Gu-yu;WANG Zhi-ming;ZHU Bao-shan
..............page:122-126,159
Analysis of Topic Models on Modeling MicroBlog User Interestingness
CHEN Wen-tao;ZHANG Xiao-ming;LI Zhou-jun
..............page:127-130,135
Imbalanced Data Classification Method and its Application Research for Intrusion Detection
JIANG Jie;WANG Zhuo-fang;GONG Rong-sheng;CHEN Tie-ming
..............page:131-135
Research on Formal Design of Multi-thread Mechanism Based on Microkernel Architecture
QIAN Zhen-jiang;LU Liang;HUANG Hao
..............page:136-141,163
ID-based Generalized Signcryption without Trusted Party
ZHOU Cai-xue
..............page:142-146
Commonsense Knowledge Analysis Approach Based on Event Preconditions and Effects
LI Shan-shan;CAO Cun-gen
..............page:185-192
Algebraic Immune Order of Correlation Immune Functions Satisfying Strict Avalanche Criterion
HUANG Jing-lian;WANG Zhuo;ZHANG Zhi-jie
..............page:147-151
Integrated Scheduling Algorithm of Two Workshops Based on ACPM
XIE Zhi-qiang;ZHOU Han-xiao;GUI Zhong-yan;ZHENG Fu-ping
..............page:193-198
Approach on Network Security Enhancement Strategies Based on Optimal Attack Path
LI Qing-peng;WANG Bu-hong;WANG Xiao-dong;ZHANG Chun-ming
..............page:152-154
Context-aware Knowledge Acquisition and Reasoning Based on Description Logic
HU Bo;WANG Zhi-xue;DONG Qing-chao;NIU Yan-jie
..............page:199-203
New Near Space Security Handoff Scheme Based on Context Transfer
XU Guo-yu;CHEN Xing-yuan;DU Xue-hui
..............page:160-163
Gear Fault Diagnosis Based on Margin Distribution Ensemble Optimization
HU Qing-hua;ZHU Peng-fei;ZUO Ming
..............page:204-208
Analysis of Cooperative Game in Repeated Prisoners' Dilemma Based on Reputation Mechanisms
LI Dong;JIANG Jun-li;TANG Xiao-jia
..............page:240-243
Internal P-reasoning Information Recovery and Attribute Hiding Reasoning Discovery
ZHAO Shu-li;WU Song-li;SHI Kai-quan
..............page:209-213
Reduction in Incomplete Hybrid Decision System Based on Generalized Neighborhood Relationship
XU Jiu-cheng;ZHANG Ling-jun;SUN Lin;LI Shuang-qun
..............page:244-248
Relevance Feedback-based Search of Topic Time Series Similarity in Micro-blogging
BAO Hong-yun;LI Qiu-dan;SONG Shuang-yong;GAO Heng
..............page:169-171,198
Layered Construction Algorithm and Application of Rough Concept Lattice
LIU Bao-xiang;CHEN Huan-huan;LIU Jie-bing
..............page:214-216
All Pairs Label-constraint Path Query in Large Graph
BAO Jia-jia;TIAN Wei
..............page:172-176,192
New Cooperative Multi-robot Path Planning Algorithm
XIAO Guo-bao;YAN Xuan-hui
..............page:217-220,248
Method of Inconsistent Database Opening Branches Repairs Based on tableau Node Closed Value
GAO Long;LIU Quan;FU Qi-ming;LI Jiao
..............page:177-180,208
Rough Approximations of Intuitions Fuzzy Sets in Fuzzy Approximation Space
XUE Zhan-ao;CHENG Hui-ru;HUANG Hai-song;XIAO Yun-hua
..............page:221-226,255
Research of Multi-objective and Multi-mode Project Scheduling Problem Based on Chaos Particle Swam Optimization
ZHOU Rong;YE Chun-ming;XIE Yang;CHEN Jun-lan
..............page:259-262,305
Similarity Measure for Time Series Based on Incremental Dynamic Time Warping
LI Hai-lin;YANG Li-bin
..............page:227-230
Adaptive Threshold Background Modeling Algorithm Based on Chebyshev Inequality
ZHANG Kun;WANG Cui-rong;WAN Cong
..............page:287-291,297
Property Patterns of Markov Decision Process Nondeterministic Choice Scheduler
HUANG Zhen-jin;LU Yang;YANG Juan;FANG Huan
..............page:263-266
SAR Image Matching Pretreatment Algorithm Based on Line Feature Histogram
ZHANG Hui-hui;LIN Wei;LV Quan-yi
..............page:267-270
Neighborhood Based Rough Sets in Incomplete Interval-valued Information System
WANG Tian-qing;XIE Jun
..............page:231-235
Method of Human Facial Feature Points Positioning Based on Improved ASM
HAN Yu-feng;WANG Xiao-lin
..............page:271-274
Articulation Points Extraction without Manual Intervention and 3D Reconstruction
WEI Wei;WANG Dan-dan;LIU Jing;LIU Ming
..............page:292-294
Wavelet Frame Based Blind Image Inpainting
LIU Chun-li;ZHANG Gong
..............page:295-297
Research on Dynamics Particles Modeling of Water into Vessel
SONG Chuan-ming;LI Ting-ting;WANG Xiang-hai;CHENG Chen
..............page:282-286
Transmission Lines Fitting and Towers Positioning in LiDAR Point Cloud
YOU An-qing;HAN Xiao-yan;LI Shi-ping;YAN Zhao-jin
..............page:298-300
2D-3D Medical Image Registration Based on GPU
DANG Jian-wu;HANG Li-hua;WANG Yang-ping;DU Xiao-gang
..............page:306-309
Study on Image Segmentation Complexity Measure
WEI Qing;LU Zhao-gan;SHAO Chao
..............page:310-313
Optimization Technique of 2D Texture Synthesis
DU Chang-qing;QIAN Wen-hua
..............page:314-316