Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2012 Issue 9
Application of Interval Arithmetic in Software Testing Based on Field-Sensitive Point-to Analysis
Zhou Hongbo;Jin Dahai;Gong Yunzhan
..............page:1852-1862
Dynamical Integrity of Codes: Model and Method
Wu Hao;Wu Guoqing
..............page:1874-1882
qian yan
he yan xiang ; wu wei
..............page:1821
A Multi-Subpopulation PSO Immune Algorithm and Its Application on Function Optimization
Wu Jianhui;Zhang Jing;Li Renfa;Liu Zhaohua
..............page:1883-1898
False Positive Elimination in Static Defect Detection
Zhao Yunshan;Gong Yunzhan;Wang Qian;Zhou Ao;Zhou Hongbo
..............page:1822-1831
A Fast Heuristic Parallel Ant Colony Algorithm for Circles Packing Problem with the Equilibrium Constraints
Li Ziqiang;Tian Zhuojun;Wang Yishou;Yue Benxian
..............page:1899-1909
Multiple Objects Event Detection over RFID Data Streams
Peng Shanglian;Li Zhanhuai;Li Qiang;Chen Qun;Liu Hailong
..............page:1910-1925
Memory Leak Detection for Heap-Manipulating Programs Based on Local Heap Abstraction
Dong Longming;Wang Ji;Chen Liqian;Dong Wei
..............page:1832-1842
Mining Frequent Subtree on Paging XML Data Stream
Lei Xiangxin;Yang Zhiying;Huang Shaoyin;Hu Yunfa
..............page:1926-1936
An LDA Based Approach to Detect the Low-Quality Reply Posts in Web Forums
Han Xiaohui;Ma Jun;Shao Haimin;Xue Ran
..............page:1937-1946
Automatically Generating Error-Traceable Test Cases Based on Compiler
He Yanxiang;Chen Yong;Wu Wei;Xu Chao;Wu Libing
..............page:1843-1851
Traffic Anomaly Detection Using Multi-Dimensional Entropy Classification in Backbone Network
Zheng Liming;Zou Peng;Han Weihong;Li Aiping;Jia Yan
..............page:1972-1981
Anomaly Detection of User Behavior Based on Shell Commands and Co-Occurrence Matrix
Li Chao;Tian Xinguang;Xiao Xi;Duan Miyi
..............page:1982-1990
A Secure Top-k Query Protocol in Two-Tiered Sensor Networks
Li Rui;Lin Yaping;Yi Yeqing;Xiong Shuai;Ye Songtao
..............page:1947-1958
A Detection Model Based on Petri Nets of SMER Constraints Violation in Dynamic Role Translation
Liu Meng;Wang Xuan;Huang Hejiao;Zhao Hainan;Zhang Jiajia
..............page:1991-1998
Dynamic Multi-Secret Sharing Scheme Based on Cellular Automata
Zhou Yousheng;Wang Feng;Qing Sihan;Yang Yixian;Niu Xinxin
..............page:1999-2004
eTissue: An Adaptive Reconfigurable Bio-Inspired Hardware Architecture
Xu Jiaqing;Dou Yong;Lü Qi;Feng Xue
..............page:2005-2017
An Optimized Code-Generating Algorithm for Reconfigurable Instruction Set Processors
Zhang Huizhen;Wang Chao;Li Xi;Zhou Xuehai
..............page:2018-2026
A Novel Flow for Asynchronous Circuit Design Using Synchronous EDA Tools
Wang Yourui;Shi Wei;Wang Zhiying;Lu Hongyi;Su Bo
..............page:2027-2035
Applying Batch Processing to Improve Performance of iSCSI Storage System
Han Yong;Yao Nianmin;Diao Ying
..............page:2036-2043
xin xi dong tai
..............page:2044