Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2009 Issue 7
Delay-Tolerant Network Routing Algorithm
Xiao Mingjun;Huang Liusheng
..............page:1065-1073
Model Analysis for ARQ Based Multi-Link Forwarding Strategy in WSN
Zhu Hongsong;Xu Yongjun;Li Xiaowei;Sun Limin
..............page:1074-1085
A Fair-Oriented Two-Level Scheduling Scheme for QoS Guarantee in WiMAX
Chen Ting;Li Jiandong;Zhong Shaobo;Li Changle
..............page:1094-1101
An Authentication Protocol for Station Roaming in WLAN Mesh
Cao Chunjie;Yang Chao;Ma Jianfeng;Zhu Jianming
..............page:1102-1109
Modeling and Analysis of Divide-and-Rule-Hybrid-Benign Worms
Zhou Hanxun;Zhao Hong;Wen Yingyou
..............page:1110-1116
A Fault Injection Model of Component Security Testing
Chen Jinfu;Lu Yansheng;Xie Xiaodong
..............page:1127-1135
Automatic Grading of Student Programs Based on Program Understanding
Ma Peijun;Wang Tiantian;Su Xiaohong
..............page:1136-1142
Integration Verification of Workflow Business Rule Semantic
Li Haibo;Zhan Dechen;Xu Xiaofei
..............page:1143-1151
Trustworthy Software Evaluation Using Utility Based Evidence Theory
Yang Shanlin;Ding Shuai;Chu Wei
..............page:1152-1159
Conformant Planning as Modal Logic Axiomatic System D
Lü Shuai;Liu Lei;Li Ying;Shi Lian
..............page:1160-1168
Qualitative Spatial Reasoning for Multi-Dimensional Topology and Size Relations
Wang Shengsheng;Liu Jie;Wang Xinying;Liu Dayou
..............page:1169-1175
Search Result Clustering Method Based on SOM and LSI
Chen Yiheng;Qin Bing;Liu Ting;Wang Ping;Li Sheng
..............page:1176-1183
Temporal Multi-Document Summarization Based on Macro-Micro Importance Discriminative Model
He Ruifang;Qin Bing;Liu Ting;Pan Yuequn;Li Sheng
..............page:1184-1191
A Computer Model of Directional Visual Attention
Zhao Hongwei;Wang Hui;Liu Pingping;Dai Jinbo
..............page:1192-1197
Scene Image Categorization Based on Content Correlation
Qin Lei;Gao Wen
..............page:1198-1205
A Data Privacy Preservation Method Based on Lossy Decomposition
Liu Yubao;Huang Zhilan;Fu Weici;Yin Jian
..............page:1217-1225
A Single Open-Defect Analysis Method for Power/Ground Networks
Luo guying;Zhang Yubin;Yu Xianchuan
..............page:1234-1240