Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2010 Issue 3
yan fa dong tai
..............page:560
Similar Sub-Sequences Search over Multi-Dimensional Time Series Data
cheng wen cong ; zou peng ; jia yan
..............page:416-425
An Optimization of Broadcast on Godson-T Many-Core System Architecture
bao er gu de ; li wei sheng ; fan dong zuo ; yang yang ; ma xiao yu
..............page:524-531
Mining Top-K Significant Itemsets in Landmark Windows over Data Streams
yang zuo ; huang hou kuan
..............page:463-473
Survey of Shape from Image
shu bo ; qiu xian jie ; wang zhao qi
..............page:549-560
Distributed Topology Control Algorithm for Ad Hoc Networks Using Steered Beam Directional Antennas
wang dong ; chen wen bin ; li xiao hong ; hu zuo ; zhang da fang
..............page:407-415
An Extended π-Calculus and Its Transactional Bisimulation
yuan min ; huang zhi qiu ; cao zi ning ; xiao fang xiong
..............page:541-548
Current Progress and Research Issues in Underwater Sensor Networks
guo zhong wen ; luo han jiang ; hong feng ; yang meng ; ni ming xuan
..............page:377-389
Learning Non-Deterministic Action Models for Web Services from WSBPEL Programs
rao dong ning ; jiang zhi hua ; jiang yun fei ; wu kang heng
..............page:445-454
Steady State Throughput Modeling of TCP NewReno
sun wei ; wen tao ; feng zi qin ; guo quan
..............page:398-406
Reactive Worms Propagation Modeling and Analysis in Peer-to-Peer Networks
feng chao sheng ; qin zhi guang ; lao lun si ku zuo te ; luo rui sha tuo ka ku ke
..............page:500-507
A Hybrid Fault Diagnosis Model in Distributed Application Management
li yun chun ; qin xian long
..............page:455-462
An Online Adaptive Network Anomaly Detection System-Model and Algorithm
wei xiao tao ; huang hou kuan ; tian sheng feng
..............page:485-492
VFRS:A Novel Approach for Intrusion Tolerance in Virtual Computing Environment
zhao feng ; jin hai ; jin li ; yuan ping peng
..............page:493-499
A Multilevel Security Model Based on Time Limit
fan yan fang ; han zhen ; cao xiang gang ; he yong zhong
..............page:508-514
A Subjective Trust Management Model Based on Certainty-Factor for MANETs
luo jun hai ; fan ming zuo
..............page:515-523
On the Joint Optimization of Coding Cost and Link Cost with Network Coding
deng liang ; zhao jin ; wang xin
..............page:390-397
Performance Analysis of the 2-D Networks-On-Chip for Local Uniform Random Communication Pattern
wang zuo ; qiao lin ; yang guang wen ; tang zhi zhong
..............page:532-540
An Ant Colony Algorithm Based on Multiple-Grain Representation for the Traveling Salesman Problems
ji jun zhong ; huang zhen ; liu chun nian ; dai qi guo
..............page:434-444
Distance-Based Outlier Detection on Uncertain Data
yu hao ; wang bin ; xiao gang ; yang xiao chun
..............page:474-484