Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2009 Issue 3
A Network Security Situational Awareness Model Based on Information Fusion
Wei Yong;Lian Yifeng;Feng Dengguo
..............page:353-362
Study of Mobile Agent Protection Based on Data Obfuscation and Time Checking
Wu Jiehong;Chang Guiran;Gao Fuxiang;Yin Hang
..............page:363-369
Power Analysis Attacks Against AES Based on Maximal Bias Signal
Liu Zhenglin;Han Yu;Zou Xuecheng;Chen Yicheng
..............page:370-376
A DPA and HO-DPA Resistant Implementation of AES
Tong Yuanman;Wang Zhiying;Dai Kui;Lu Hongyi
..............page:377-383
A Traitor Tracing Scheme Based on Bilinear Map
Wang Qinglong;Han Zhen;Yang Bo
..............page:384-389
A Time Model for Complex Event in InforSIB
Liu Jiahong;Wu Quanyuan;Gan Liang;Zhang Bing
..............page:390-397
A Cooperative Monitoring Model of Migrating Workflow
Lu Zhaoxia;Zeng Guangzhou
..............page:398-406
Internet Traffic Classification Using Support Vector Machine
Xu Peng;Liu Qiong;Lin Sen
..............page:407-414
A Structured Peer to Peer File Sharing Model with Non-DHT Searching Algorithm
Xiong Wei;Xie Dongqing;Jiao Bingwang;Liu Jie
..............page:415-424
A Distributed Anchor-Free Localization Algorithm in Sensor Networks
Cui Xunxue;Liu Jianjun;Fan Xiumei
..............page:425-433
Traffic Prediction Models of Traffics at Application Layer in Metro Area Network
Yuan Xiaofang;Chen Nannan;Wang Dong;Xie Gaogang;Zhang Dafang
..............page:434-442
An Ontology Learning Method Based on Double VSM and Fuzzy FCA
Xing Jun;Han Min
..............page:443-451
Study of an Epistemic Description Logic with Transitive Roles
Cao Yi;Xu Dezhi;Chen Jianer;Guan Qinghua
..............page:452-458
Model Counting and Planning Using Extension Rule
Lai Yong
..............page:459-469
Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral
Zhai Junhai;Wang Xizhao;Zhang Sufang
..............page:470-477
An Affine-Invariant Objects Recognition Method Employing Features in Frequency Domain
Lu Wenxian;Peng Qimin;Lv Yuzeng;Li Jun
..............page:478-484
A Mapping Algorithm for Replicated Data in Large-Scale Storage System
Mu Fei;Xue Wei;Shu Jiwu;Zheng Weimin
..............page:492-497
A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy
Ni Weiwei;Xu Lizhen;Chong Zhihong;Wu Yingjie;Liu Tengteng;Sun Zhihui
..............page:498-504
A Dynamic-Fit Heuristic Algorithm for the Rectangular Strip Packing Problem
Jiang Xingbo;Lv Xiaoqing;Liu Chengcheng;Li Monan
..............page:505-512
Equivalence Verification of High-Level Datapaths Based on Polynomial Symbolic Algebra
Yang Zhi;Ma Guangsheng;Zhang Shu
..............page:513-520