Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2013 Issue 10
Protocol Reverse Engineering Using Grammatical Inference
Xiao Mingming;Yu Shunzheng
..............page:2044-2058
Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation
Huang Liang;Feng Dengguo;Lian Yifeng;Chen Kai
..............page:2100-2108
A Practical Dynamic Integrity Protection Model
Yang Tao;Wang Yonggang;Tang Liyong;Kong Lingbo;Hu Jianbin;Chen Zhong
..............page:2082-2091
Variable-Width Channel Allocation Based on Game Theory in 802.11 Networks
Huang Tingpei;Chen Haiming;Zhang Zhaoliang;Cui Li
..............page:2059-2069
Research on Countermeasures Against Tag Spam
Wang Yonggang;Yan Hanbing;Xu Junfeng;Hu Jianbin;Chen Zhong
..............page:2029-2043
Performance Evaluation of Cognitive Radio Networks with Parallel Channels
Chen Xin;Xu Tong;Xiang Xudong;Wan Jianxiong
..............page:2126-2132
Community Mining in Complex Networks
Liu Dayou;Jin Di;He Dongxiao;Huang Jing;Yang Jianning;Yang Bo
..............page:2140-2154
Integral Attack of Reduced-Round MIBS Block Cipher
Yu Xiaoli;Wu Wenling;Li Yanjun
..............page:2117-2125
Cryptanalysis and Modification of a Traitor Tracing Scheme
Wang Xiaoming;Yao Guoxiang;Liao Zhiwei
..............page:2092-2099
M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks
Ma Chunguang;Wang Jiuru;Wu Peng;Zhang Hua
..............page:2109-2116
Topical Influence Analysis Based on the Multi-Relational Network in Microblogs
Ding Zhaoyun;Zhou Bin;Jia Yan;Zhang Lumin
..............page:2155-2175
Identifying the Influential Users in Network Forum
Zhang Yue;Zhang Hongli;Zhang Weizhe;Lu Junjia
..............page:2195-2205
An Optimized Dyna Architecture Algorithm with Prioritized Sweeping
Sun Hongkun;Liu Quan;Fu Qiming;Xiao Fei;Gao Long
..............page:2176-2184
Attack Graph Generation Algorithm for Large-Scale Network System
Ye Yun;Xu Xishan;Qi Zhichang;Wu Xueyang
..............page:2133-2139
Memory Virtulization on MIPS Architecture
Cai Wanwei;Tai Yunfang;Liu Qi;Zhang Ge
..............page:2247-2252
A Running Pattern Generation Based on ZMP for Humanoid Robot
Wang Xianfeng;Li Jianping;Wang Hui
..............page:2206-2211
Context-Aware Recommendation Algorithm Based on Fuzzy C-Means Clustering
Zhang Fuzhi;Chang Junfeng;Zhou Quanqiang
..............page:2185-2194
Survey on Partitioning and Scheduling Policies of Shared Resources in Chip-Multiprocessor
Wang Lei;Liu Daofu;Chen Yunji;Chen Tianshi;Li Ling
..............page:2212-2227
Study of Ahead Branch Prediction Architecture and Algorithm
Jin Wenbing;Shi Feng;Zuo Qi;Zhang Yang
..............page:2228-2238