Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2006 Issue 10
Reader's Columns
..............page:1723
Research & Development News
..............page:封三
Fault Tolerance with Virtual Disk Replicas in the Mass Storage Network
Wang Di;Xue Wei;Shu Jiwu;Shen Meiming
..............page:1849-1854
Research on a Covering Rough Fuzzy Set Model
Wei Lai;Miao Duoqian;Xu Feifei;Xia Fuchun
..............page:1719-1723
SEFNN-A Feed-Forward Neural Network Design Algorithm Based on Structure Evolution
Li Ning;Xie Zhenhua;Xie Junyuan;Chen Shifu
..............page:1713-1718
An Example Selection Method for Active Learning Based on Embedded Bootstrap Algorithm
Tian Chunna;Gao Xinbo;Li Jie
..............page:1706-1712
Proximal Support Vector Machine Based on Prototypal Multiclassfication Hyperplanes
Yang Xubing;Chen Songcan
..............page:1700-1705
A Fuzzy Clustering Technology Based on Hierarchical Neural Networks for Web Document
Lei Jingsheng;Ma Jun;Jin Ting
..............page:1695-1699
Research on the Algorithm of Feature Selection Based on Gini Index for Text Categorization
Shang Wenqian;Huang Houkuan;Liu Yuling;Lin Yongmin;Qu Youli;Dong Hongbin
..............page:1688-1694
A Text Classification Method Based on Term Frequency Classifier Ensemble
Jiang Yuan;Zhou Zhihua
..............page:1681-1687
A Persistent Out-of-Band Virtualization System
Zhang Guangyan;Shu Jiwu;Xue Wei;Zheng Weimin
..............page:1842-1848
Formal Verification of Godson-2 Microprocessor Floating-Point Division Unit
Chen Yunji;Ma Lin;Shen Haihua;Hu Weiwu
..............page:1835-1841
Study on Modeling MIPS Processors for Static WCET Analysis
Bian Xiaofeng;Zhou Xuehai
..............page:1828-1834
A Survey of Identity-Based Cryptography Using Pairing
Tian Ye;Zhang Yujun;Li Zhongcheng
..............page:1810-1819
PKI-Based Mutual Connections Constrained with Discrepancy of Trust Domains
Zhu Pengfei;Dai Yingxia;Bao Xuhua
..............page:1804-1809
A Sub-Tuple-Partition-Based Fast Two-Dimensional Packet Classification Algorithm
Liu Tong;Li Huawei;Li Xiaowei;Gong Shuguang
..............page:1797-1803
An Algorithm for Internet AS Graph Betweenness Centrality Based on Backtrack
Zhang Guoqiang;Zhang Guoqing
..............page:1790-1796
Agent-Oriented Software Engineering: Status and Challenges
Mao Xinjun;Chang Zhiming;Wang Ji;Wang Huaimin
..............page:1782-1789
A Hierarchical Group Communication Protocol for Scalable Total Ordering
Wang Wentao;Wu Junmin;Xu Yinlong;Li Huanghai;Bao Chunjian
..............page:1775-1781
Strategies of Regression Test Case Selection for Component-Based Software
Mao Chengying;Lu Yansheng
..............page:1767-1774
Detecting Out-of-Bounds Accesses with Conditional Range Constraint
Xia Yimin;Luo Jun;Zhang Minxuan
..............page:1760-1766
An Event Composite Matching Approach Based on the OBDD Graphs
Xu Gang;Ma Jiangang;Huang Tao
..............page:1751-1759
Online Correlation Analysis for Multiple Dimensions Data Streams
Yang Xuemei;Dong Yisheng;Xu Hongbing;Liu Xuejun;Qian Jiangbo;Wang Yongli
..............page:1744-1750
Mining Frequent Closed Patterns from a Sliding Window over Data Streams
Liu Xuejun;Xu Hongbing;Dong Yisheng;Qian Jiangbo;Wang Yongli
..............page:1738-1743
The Tight Estimation Distance Using Wavelet
Liu Bing;Wang Wei;Shi Baile
..............page:1732-1737