Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2008 Issue 5
Research & Development News
..............page:764
A New Approach to Ridgelet Transform
Zhao Xiaoming;Ye Xijian
..............page:915-922
Extraction and Removal of Frame Line in Form Bill
Zhang Yan;Yu Shengyang;Zhang Chongyang;Yang Jingyu
..............page:909-914
NDSMMV-A New Dynamic Selection Strategy of Materialized Views for Multi Dimensional Data
Zhang Dongzhan;Huang Zongyi;Xue Yongsheng
..............page:901-908
A New Algorithm for DTDs Absolute Consistency Checking
Lu Yan;Hao Zhongxiao
..............page:895-900
Research on User-Oriented Availability Modeling in Parallel Computer Systems
Zheng Fang;Zheng Xiao;Li Hongliang;Chen Zuoning
..............page:886-894
A Capacity-Shared Heterogeneous CMP Cache
Gao Xiang;Zhang Longbing;Hu Weiwu
..............page:877-885
Cross-Media Correlation Reasoning and Retrieval
Zhang Hong;Wu Fei;Zhuang Yueting
..............page:869-876
A Spoken Language Understanding Approach Based on Two-Stage Classification
Wu Weilin;Lu Ruzhan;Duan Jianyong;Liu Hui;Gao Feng;Chen Yuquan
..............page:861-868
A Binary-Encoding Differential Evolution Algorithm for Agent Coalition
Wu Zhifeng;Huang Houkuan;Zhao Xiang
..............page:848-852
A New Scheduling Algorithm in Grid Based on Dynamic Decisive Path
Lin Jianning;Wu Huizhong
..............page:841-847
Software Pipelining with Cache Profiling Information
Zhou Qian;Feng Xiaobing;Zhang Zhaoqing
..............page:834-840
A Formal Certifying Framework for Assembly Programs
Li Zhaopeng;Chen Yiyun;Ge Lin;Hua Baojian
..............page:825-833
A Survey on Operating System Power Management
Zhao Xia;Chen Xiangqun;Guo Yao;Yang Fuqing
..............page:817-824
A Delay-Constrained Steiner Tree Algorithm Using MPH
Zhou Ling;Sun Yamin
..............page:810-816
TBSN:A Taxonomy Hierarchy Based P2P Network
Qiao Baiyou;Wang Guoren;Ding Linlin
..............page:803-809
An Improved Transport Layer Identification of Peer-to-Peer Traffic
Xu Peng;Liu Qiong;Lin Sen
..............page:794-802
Backbone-Based Relative Positioning in Ad Hoc Networks
Tian Mingjun;Zhao Dan;Wang Jingxuan;Yan Wei
..............page:786-793
Double Secret Keys and Double Random Numbers Authentication Scheme
Tian Junfeng;Jiao Hongqiang;Li Ning;Liu Tao
..............page:779-785
A Robust Watermarking Scheme Based on Image Feature and Pseudo-Zernike Moments
Wang Xiangyang;Hou Limin;Yang Hongying
..............page:772-778
A Trust Valuation Model in MANET
Ye Ayong;Ma Jianfeng
..............page:765-771
STBAC:A New Access Control Model for Operating System
Shan Zhiyong;Shi Wenchang
..............page:758-764
Dynamic Intrusion Response Based on Game Theory
Shi Jin;Lu Yin;Xie Li
..............page:747-757