Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2007 Issue 4
yan jiu kai fa dong tai
..............page:559
Research on Reliability of a Reconfigurable Data Processing System Based on JBits
Ren Xiaoxi;Li Renfa;Jin Shengzhen;Zhang Kehuan;Wu Qiang
..............page:722-728
A Performance Model of I/O-Intensive Parallel Applications
Chen Yongran;Qi Xingyun;Dou Wenhua
..............page:707-713
Irregular Patch for Texture Synthesis
Xiong Changzhen;Huang Jing;Qi Dongxu
..............page:701-706
Dynamic Role Assignment for Multi-Agent System with Parallel Constraints Among Goals
Wang Hongbing;Fan Zhihua;She Chundong
..............page:693-700
PKUMoDEL: A Model-Driven Development Environment for Languages Family
Ma Haohai;Xie Bing;Ma Zhiyi;Zhang Nengbin;Shao Weizhong
..............page:686-692
A Secure Multi-Attribute Auction Model
Chen Xiang;Hu Shanli;Shi Manyin
..............page:680-685
Agent-Based Automatic Composition of Semantic Web Services
Qiu Lirong;Shi Zhongzhi;Lin Fen;Chang Liang
..............page:643-650
Mobile Robot Hierarchical Simultaneous Localization and Mapping Based on Active Loop Closure Constraint
Huang Qingcheng;Hong Bingrong;Li Maohai;Luo Ronghua
..............page:636-642
Probabilistic Character for Localization Problem in Sensor Networks
Cui Xunxue;Fang Hongyu;Zhu Xulai
..............page:630-635
A TCP Friendly Multicast Rate Control Mechanism for Internet DTV
Li Fei;Wang Xin;Xue Xiangyang
..............page:623-629
Implementing Chinese Wall Policies on RBAC
He Yongzhong;Li Xiaofeng;Feng Dengguo
..............page:615-622
A Group Key Management Scheme Based on Distributed Rekeying Authority in Sensor Networks
Zeng Weini;Lin Yaping;Hu Yupeng;Yi Yeqing;Li Xiaolong
..............page:606-614
The Trust Model and Its Analysis in TDDSS
Tian Junfeng;Xiao Bing;Ma Xiaoxue;Wang Zixian
..............page:598-605
BPCRISM: A New Intrusion Scenario Building Model
Liu Yuling;Du Ruizhong;Zhao Weidong;Cai Hongyun
..............page:589-597
A Novel Algorithm of Soft Fast Correlation Attack and Applications
Zou Yan;Lu Peizhong;Zhu Xueling
..............page:581-588
A Forward Secure Threshold Signature Scheme from Bilinear Pairing
Peng Huaxi;Feng Dengguo
..............page:574-580
A Trust-Scheme-Based DRM Model for P2P System
Xiao Shangqin;Lu Zhengding;Ling Hefei;Zou Fuhao
..............page:567-573
A Dynamic Mix Anonymity Algorithm for Wireless Ad Hoc Networks
Wu Zhenqiang;Ma Jianfeng
..............page:560-566
Research on Reliability Evaluation of Cache Based on Instruction Behavior
Zhou Xuehai;Yu Jie;Li Xi;Wand Zhigang
..............page:553-559
A Direct Clustering Algorithm Based on Generalized Information Distance
Ding Shifei;Shi Zhongzhi;Jin Fengxiang;Xia Shixiong
..............page:674-679
Optimal Decomposition of Decision Table Systems Based on Bayesian Networks
Hu Xiaojian;Yang Shanlin;Hu Xiaoxuan;Fang Fang
..............page:667-673
A Quick Emergency Response Plan Generation System Combining CBR and RBR
Luo Jiewen;Shi Zhiping;He Qing;Shi Zhongzhi
..............page:660-666
An Algorithm for Clustering of Outliers Based on Key Attribute Subspace
Jin Yifu;Zhu Qingsheng;Xing Yongkang
..............page:651-659
Survey of Security Technology for Large Scale MANET
Hu Huaping;Hu Guangming;Dong Pan;Chen Xin
..............page:545-552