Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2009 Issue 8
yan fa dong tai
..............page:1416
xue shu huo dong
..............page:1269,1363,1385
du zhe zhuan lan
..............page:封4
A Novel Method Containing the Radial Error Propagation in Self-Servowriting in Hard Disk
Zhao Xiaogang;Wang Haiwei;Xie Changsheng
..............page:1399-1407
Prediction and Abnormal Behavior Detection of Agent Dynamic Interaction Trust
Tong Xiangrong;Huang Houkuan;Zhang Wei
..............page:1364-1370
An Automated Test Data Generation Algorithm Based on Selective Redundancy
Li Junyi;Li Renfa;Sun Jiaguang
..............page:1371-1377
Operating and Analyzing the Reproducibility of Empty Marking Nets
Ye Jianhong;Song Wen;Sun Shixin
..............page:1378-1385
Transactional Memory System
Peng Lin;Xie Lunguo;Zhang Xiaoqiang
..............page:1386-1398
Delay /Disruption-Tolerant Network Study
Li Xiangqun;Liu Lixiang;Hu Xiaohui;Zeng Kaixiang
..............page:1270-1277
Coarse-Grained Dataflow Network Processor:Architecture and Prototype Design
Li Tao;Zhang Xiaoming;Sun Zhigang
..............page:1278-1284
A Survey of Network Information Content Audit
Sun Qindong;Guan Xiaohong;Zhou Yadong
..............page:1241-1250
A Cooperative Mechanism for Inter-Domain Routing Management
Hu Ning;Zou Peng;Zhu Peidong
..............page:1251-1259
IPSBSAR: An Incremental P2P Search Algorithm Based on Social Acquaintance Relationship
Zhu Guiming;Jin Shiyao;Guo Deke
..............page:1260-1269
A QoS-Oriented Approach for Web Service Group Testing
Deng Xiaopeng;Xing Chunxiao;Zhang Yong;Cai Lianhong
..............page:1285-1293
Image Copy Detection with Rotation and Scaling Tolerance
Zou Fuhao;Li Xiaowei;Xu Zhihua;Ling Hefei;Li Ping
..............page:1349-1356
Coalition Structure Generation with Worst-Case Finite Bound from the Optimal Guarantees
Hu Shanli;Li Shaofang;Shi Chunyi
..............page:1357-1363
An Approach to Data Sealing Based on Trusted Virtualization Platform
Wang Dan;Feng Dengguo;Xu Zhen
..............page:1325-1333
Detecting Distributed Denial of Service Attack Based on Address Correlation Value
Cheng Jieren;Yin Jianping;Liu Yun;Cai Zhiping;Li Min
..............page:1334-1340
A Fast and Exact Single Pattern Matching Algorithm
Fan Hongbo;Yao Nianmin
..............page:1341-1348
An Adaptive Alert Correlation Method Based on Pattern Mining and Clustering Analysis
Tian Zhihong;Zhang Yongzheng;Zhang Weizhe;Li Yang;Ye Jianwei
..............page:1304-1315
Research on Neural Cryptographic Protocols
Chen Tieming;Samuel H. Huang;Liu Duo;Cai Jiamei
..............page:1316-1324