Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2011 Issue 6
An Optimal Storage Strategy for Static Path Labeling Scheme
Chen Ziyang;Zhou Junfeng
..............page:1101-1108
The Translation Mining of the Out of Vocabulary Based on Wikipedia
Sun Changlong;Hong Yu;Ge Yundong;Yao Jianmin;Zhu Qiaoming
..............page:1067-1076
Maximum Entropy Relief Feature Weighting
Zhang Xiang;Deng Zhaohong;Wang Shitong;Choi Kupsze
..............page:1038-1048
An Efficient Ontology Ranking Algorithm-MIDSRank
Zhang Zhiqiang;Song Weitao;Xie Xiaoqin
..............page:1077-1088
Filtering Intrusion Forensic Data Based on Attack Signatures
Fu Xiao;Xie Li
..............page:964-973
A Feature Selection Method for TWSVM via a Regularization Technique
Ye Qiaolin;Zhao Chunxia;Chen Xiaobo
..............page:1029-1037
Survey of Software Tamper Proofing Technique
Wang Chaokun;Fu Junning;Wang Jianmin;Yu Zhiwei
..............page:923-933
An Identification Method Combining Data Streaming Counting with Probabilistic Fading for Heavy-Hitter Flows
Li Zhen;Yang Yahui;Xie Gaogang;Qin Guangcheng
..............page:1010-1017
QoS-Aware Semantic Web Service Modeling and Discovery
Wan Changlin;Shi Zhongzhi;Hu Hong;Zhang Dapeng
..............page:1059-1066
Trust Evaluation Model Based on Node Behavior Character
Tian Junfeng;Du Ruizhong;Liu Yuling
..............page:934-944
A Tiered Storage System for Massive Data: TH-TS
Ao Li;Yu Deshui;Shu Jiwu;Xue Wei
..............page:1089-1100
A Congestion Aware Routing Protocol Based on Network Coding in Wireless Sensor Networks
Fu Bin;Li Renfa;Liu Caiping;Xiao Xiongren
..............page:991-999
Cache Based AES Attack Implementation and Its Theoretical Analysis
Zhang Suiyu;Han Jun;Lu Shiting;Zeng Xiaoyang
..............page:955-963
A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model
Chen Feng;Liu Dehui;Zhang Yi;Su Jishu
..............page:945-954
CAMR: Network Coding-Aware Multicast Routing Protocol in Wireless Mesh Networks
Huang Chuanhe;Yang Wenzhong;Wang Bo;Zhang Zhenyu;Xu Liya
..............page:1000-1009
An Environment-Adaptive Role-Based Access Control Model
Wu Xinsong;He Yeping;Zhou Zhouyi;Liang Hongliang
..............page:983-990
Collaborative Classification Mechanism for Privacy-Preserving
Zhang Zhancheng;Wang Shitong;Fu Lai Chung
..............page:1018-1028
Advances in the Component Verification Technology Based on Model Checking
Jia Yangli;Li Zhoujun;Xing Jianying;Chen Shikun
..............page:913-922