Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2006 Issue 4
Academic Activities
..............page:678
A TTA-Based ASIP Design Methodology for Embedded Systems
Yue Hong;Shen Li;Dai Kui;Wang Zhiying
..............page:752-758
A Low-Power Instruction Cache Design Based on Record Buffer
Ma Zhiqiang;Ji Zhenzhou;Hu Mingzeng
..............page:744-751
A New Java Memory Model L-JMM
Wu Junmin;Chen Guoliang
..............page:738-743
A Buffer Management Policy in IA-64 Large-Scale Video Streaming Servers
Yu Hongliang;Chen Jing;Li Yi;Zheng Weimin
..............page:729-737
The Priority Mapping Problem in Static Real-Time Middleware
Wang Baojin;Li Mingshu;Wang Zhigang
..............page:722-728
Design of Mongolian Operating System Within the Framework of Internationalization
Rui Jianwu;Wu Jian;Sun Yufang
..............page:716-721
Remote Sensing Image Classification Based on a Loose Modified FastICA Algorithm
Wang Xiaomin;Zeng Shenggen;Xia Deshen
..............page:708-715
Statistical Landscape Features for Texture Retrieval
Xu Cunlu;Chen Yanqiu;Lu Hanqing
..............page:702-707
A Reinforcement Learning Method Based on Node-Growing k-Means Clustering Algorithm
Chen Zonghai;Wen Feng;Nie Jianbin;Wu Xiaoshu
..............page:661-666
An Annealing Expectation Maximization Algorithm
Qi Yingjian;Luo Siwei;Huang Yaping;Li Aijun;Liu Yunhui
..............page:654-660
Modified Particle Swarm Optimization Based on Differential Model
Cui Zhihua;Zeng Jianchao
..............page:646-653
A Low Cost RSA Chip Design Based on CRT
Wu Min;Zeng Xiaoyang;Han Jun;Ma Yongxin;Wu Yongyi;Zhang Guoquan
..............page:639-645
An Intrusion Detection Ensemble System Based on the Features Extracted by PCA and ICA
Gu Yu;Xu Zongben;Sun Jian;Zheng Jinhui
..............page:633-638
The Implementation of Alert Aggregation and Dataset Testing
Qian Jun;Xu Chao;Shi Meilin
..............page:627-632
Intrusion Detection for Ad Hoc Routing Based on Fuzzy Behavior Analysis
Zhang Xiaoning;Feng Dengguo
..............page:621-626
An New Method of Audio-Digital Watermarking Based on Trap Strategy
Wang Rangding;Jiang Gangyi;Chen Jin'er;Zhu Bin
..............page:613-620
ERSN: An Efficient and Robust Super-Peer P2P Network
Zheng Qianbing;Peng Wei;Lu Xicheng
..............page:607-612
A Distributed Network Monitoring Model with Link Constraint
Cai Zhiping;Yin Jianping;Liu Xianghui;Liu Fang;Lü Shaohe
..............page:601-606
Proxy Caching for Interactive Streaming Media
Liu Wei;ChunTung Chou;Cheng Wenqing;Du Xu
..............page:594-600
Stochastic Sleeping for Energy-Conserving in Large Wireless Sensor Networks
Shi Gaotao;Liao Minghong
..............page:579-585
Semi-Online Scheduling Algorithm of Multi-Agent in Network Management
Liu Bo;Li Wei;Luo Junzhou;Bian Zheng'ai
..............page:571-578
A Shape Adaptive Integer Wavelet Coding Algorithm Based on New Quantization Scheme
Song Chuanming;Wang Xianghai
..............page:695-701
A Constrained Curve Surface Deformation Model Based on Metaball
Li Lingfeng;Tan Jianrong;Chen Yuanpeng
..............page:688-694
Algebraic-Trigonometric Splines
Chen Wenyu;Wang Guozhao
..............page:679-687