Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2012 Issue 5
A Method of Disjoint Quantitative Analysis for Dynamic Fault Tree
Zhang Honglin;Zhang Chunyuan;Liu Dong;Fu Jian
..............page:983-995
Frequent Patterns Mining over Uncertain Data Streams Based on Probability Decay Window Model
Liao Guoqiong;Wu Lingqin;Wan Changxuan
..............page:1105-1115
Privacy-Preserving Data Publication for Clustering
Ni Weiwei;Chen Geng;Chong Zhihong;Wu Yingjie
..............page:1095-1104
A Bus Arbitration Scheme for Memory Access Performance Optimization
Liu Dan;Feng Yi;Tong Dong;Cheng Xu;Wang Keyi
..............page:1061-1071
A Distributed Parallel Algorithm for SIFT Feature Extraction
Jiang Guiyuan;Zhang Guiling;Zhang Dakun
..............page:1130-1141
A QI Weight-Aware Approach to Privacy Preserving Publishing Data Set
Xu Yong;Qin Xiaolin;Yang Yitao;Yang Zhongxue;Huang Can
..............page:913-924
A Cache Replacement Policy Based on Reuse Distance Prediction and Stream Detection
Lin Junmin;Wang Wei;Qiao Lin;Tang Zhizhong
..............page:1049-1060
xin xi dong tai
..............page:1004,1122
Piecewise Linear Approximation of Rational Triangular Surfaces
Zhou Lian;Wang Guojin
..............page:1116-1122
XenRPC:Design and Implementation of Security VM Remote Procedure Call
Chen Hao;Peng Cuifen;Sun Jianhua;Shi Lin
..............page:996-1004
Double Center Particle Swarm Optimization Algorithm
Tang Kezong;Liu Bingxiang;Yang Jingyu;Sun Tingkai
..............page:1086-1094
Energy-Aware Scheduling of Hard Real-Time Tasks in VFD-Based Multi-Core Systems
Wu Xiaodong;Han Jianjun;Wang Tianjiang
..............page:1018-1027
A Data-Clustering Based Robust SIFT Feature Matching Method
Fan Zhiqiang;Zhao Qinping
..............page:1123-1129
Security Analysis of an RFID Protocol Based on Insubvertible Encryption
Wei Yongzhuang;Ouyang Ning;Ma Chunbo
..............page:958-961
Construction of Transformation Matrix with a Given Period Modulo N
Liu Duo;Dai Yiqi
..............page:925-931
Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG
Long Yu;Xu Xian;Chen Kefei
..............page:932-938
Intrusion Detection System Using CVM Algorithm with Extensive Kernel Methods
Wang Qi\'an;Chen Bing
..............page:974-982
A Division Based Composite Service Selection Approach
Zhang Mingwei;Zhang Bin;Zhang Xizhe;Zhu Zhiliang
..............page:1005-1017
A Group Proxy Signature Scheme Based on Sub-Secret Evolution
Gu Ke;Jia Weijia;Jiang Chunlin
..............page:962-973
Secure Information Flow in Java by Optimized Reachability Analysis of Weighted Pushdown System
Sun Cong;Tang Liyong;Chen Zhong;Ma Jianfeng
..............page:901-912