Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2010 Issue 4
Development on Power Analysis Attack and Defense of Embedded Cipher Chip
li lang ; li ren fa ; tong yuan man ; zhang jing jing ;edwin h-m sha
..............page:595-604
A New Security Protocol Modeling Approach Based on π t Calculus
han jin ; cai sheng wen ; wang chong jun ; lai hai guang ; xie jun yuan
..............page:613-620
Research & Development News
..............page:736
A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing
yu jia ; kong fan yu ; hao rong ; li da xing
..............page:605-612
Experimentation Study of BBN-Based Fault Localization
liu yong po ; wu ji ; jin mao zhong ; yang hai yan ; jia xiao xia ; liu xue mei
..............page:707-715
Flash Storage Technology
zheng wen jing ; li ming qiang ; shu ji wu
..............page:716-726
Tunneling Techniques for Focused Web Crawling
peng tao ; meng yu ; zuo wan li ; wang ying ; hu liang
..............page:628-637
M2+-Tree: Processing Multiple Metric Space Queries of Medical Cases Efficiently with Just One Index
yu ya xin ; wang guo ren ; lin li zeng ; li zuo ; zhu zuo hua
..............page:671-678
Duplication Elimination in Large Scale Data Intensive Systems
song huai ming ; an ming yuan ; wang yang ; yuan chun yang ; sun ning zuo
..............page:581-588
Protocol Anomaly Detection Based on Hidden Markov Model
zhao jing ; huang hou kuan ; tian sheng feng
..............page:621-627
A Trust Management Mechanism in Unstructured P2P
jia zhao qing ; xue guang tao ; tang xin huai ; zhang peng zuo ; you jin yuan
..............page:645-652
An Improved Guided Loop Scheduling Algorithm for OpenMP
liu sheng fei ; zhang yun quan ; sun xiang zheng
..............page:687-694
Research on Multilayer Runtime Library Technology for Cell/B.E. Processor
dong xiao she ; feng guo fu ; wang xu zuo ; feng jing hua ; hu lei jun
..............page:561-570
Reliability Analysis of Cluster RAID5 Storage System
zhang hong can ; xue wei
..............page:727-735
Research on Weaving Mechanism in Aspect-Oriented Software Architecture
ni you cong ; ying shi ; zhang lin lin ; wen jing ; ye peng ; zhao kai
..............page:695-706
Research on the Evaluation Criterion for Performance Searching Process of Self-Adapting Numerical Software
sun xiang zheng ; zhang yun quan ; wang xuan qiang ; wang lei
..............page:679-686
Current Situation and Trend of Reliability Technology in High Performance Computers
huang yong qin ; jin li feng ; liu yao
..............page:589-594
Research on the Shared Memory-Based Checkpointing for Cluster Services
liang yi ; wang lei ; fan jian ping ; fang juan
..............page:571-580
A New Local Search Algorithm for No-Wait Fowshops with Setup Time
wang chu yang ; li xiao ping ; wang zuo ; yuan ying chun
..............page:653-662
A Filter Algorithm for Approximate String Matching Based on Match-Region Features
sun de cai ; sun xing ming ; zhang wei ; liu yu ling
..............page:663-670