Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2012 Issue 1
A New Analysis Model for Task Buffer of Pipeline Simulator Based on Queueing Network
Qiu Tie;Guo He;Feng Lin;Si Weisheng;Liu Xiaoyan
..............page:103-110
A NoC Router with Dynamically Allocated Virtual-Output-Queueing
Zhu Honglei;Peng Yuanxi;Yin Yaming;Chen Shenggang
..............page:183-192
InfiniBand-Based Multi-path Mesh/Torus Interconnection Network for MassivelyParallel Systems
Xia Xiaoshuang;Liu Yi;Wang Yunbin;Qian Depei
..............page:76-82
Program\'s Performance Profiling Optimization for Guiding Static Cache Partitioning
Jia Yaocang;Wu Chenggang;Zhang Zhaoqing
..............page:93-102
Revisiting Amdahl\'s Law in the Hierarchical Chip Multicore Processors
Chen Shuming;Chen Shenggang;Yin Yaming
..............page:83-92
An Unsupervised Rough Cognition Algorithm for Salient Object Extraction
Li Zhongsheng;Li Renfa;Cai Zesu
..............page:202-209
Cubic Bézier Triangular Patch with Shape Parameters
Liu Zhi;Tan Jieqing;Chen Xiaoyan
..............page:152-157
Audio Authentication Based on Music Content Analysis
Wang Zhurong;Li Wei;Zhu Bilei;Li Xiaoqiang
..............page:158-166
Research and Development on Key Techniques of Data Deduplication
Fu Yinjin;Xiao Nong;Liu Fang
..............page:12-20
An Alternating-Complementary Self-Recovering Method Based on Dual FSMs
Chen Xiumei;Liang Huaguo;Huang Zhengfeng;Wu Zhenni;Cao Yuan
..............page:111-117
Summary of Research for Erasure Code in Storage System
Luo Xianghong;Shu Jiwu
..............page:1-11
Lifetime Optimizing Scheme of WSN
Sun Dayang;Liu Yanheng;Yang Dong;Wang Aimin
..............page:193-201
Inheritance, Subversion and Transcendence-Computational Photography
Xu Shukui;Zhang Jun;Tu Dan;Li Guohui
..............page:128-143
Global Topology Based Image Stitching Using Hierarchical Triangulation
Zeng Dan;Chen Jian;Zhang Qi;Shi Hao
..............page:144-151
A Data Sealing Approach Based on Integrity Measurement Architecture
Shen Qingni;Du Hong;Wen Han;Qing Sihan
..............page:210-216
Accelerating Program Behavior Analysis with Dynamic Binary Translation
Zhao Tianlei;Tang Yuxing;Fu Guitao;Jia Xiaomin;Qi Shubo;Zhang Minxuan
..............page:35-43
A Computation Method of Path Diversity Based on AS Relationships
Zhang Weiguo;Yin Xia;Wu Jianping
..............page:167-173
A 2D-Cache Based Memory Bandwidth Optimization Method for H.264 MotionCompensation
Wang Wenxiang;Zhang Guangfei;Shen Haihua
..............page:55-63
An Adaptive MAC Protocol for Wireless LANs Under Error-Prone Environment
Cheng Yanhong;Li Zhishu;Chen Liangyin
..............page:174-182
Survey of Design-for-Debug of VLSI
Qian Cheng;Shen Haihua;Chen Tianshi;Chen Yunji
..............page:21-34
A Relaxed Co-Scheduling Method of Virtual CPUs on Xen Virtual Machines
Wang Kai;Hou Zifeng
..............page:118-127
A Best-Effort Hardware Transactional Memory Based on Dependency Graph
Zeng Kun;Yang Xuejun
..............page:44-54