Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2013 Issue 5
On Cellular Homology Boundary Learning Algorithms
Yang Jiwen;Li Zheshuo;He Shuping;Xian Min
..............page:1005-1011
TDDS:Task Deployment and Scheduling Based on Virtual Cluster System
Feng Lin;Fu Yong;Chen Kang;Zheng Weimin
..............page:1118-1124
Hybrid Role Mining Methods with Minimal Perturbation
Zhai Zhigang;Wang Jiandong;Cao Zining;Mao Yuguang
..............page:951-960
xin xi dong tai
..............page:911,1124
Error Detection by Redundant Transaction in Transactional Memory System
Song Wei;Yang Xuejun
..............page:1085-1099
A Mobile Strategy for Mobile Full-Coverage Issue
Zhang Le;Li Dong;Cui Li
..............page:901-911
A Personalized Web Service Quality Prediction Approach Based on Invoked Feature Model
Zhang Li;Zhang Bin;Huang Liping;Zhu Zhiliang
..............page:1066-1075
A New Evidential Trust Model Based on Graph Theory for Open Computing Systems
Jiang Liming;Zhang Kun;Xu Jian;Zhang Hong
..............page:921-931
Parallel Simulation of Many-Core Processor and Many-Core Clusters
Lü Huiwei;Cheng Yuan;Bai Lu;Chen Mingyu;Fan Dongrui;Sun Ninghui
..............page:1110-1117
A Technique of Multiple Fault Localization Based on Conditioned Execution Slicing Spectrum
Wen Wanzhi;Li Bixin;Sun Xiaobing;Qi Shanshan
..............page:1030-1043
Fuzzy Associative Memories Based on Triangular Norms
Zeng Shuiling;Xu Weihong;Yang Jingyu
..............page:998-1004
An Automatic Program Verifier for PointerC: Design and Implementation
Zhang Zhitian;Li Zhaopeng;Chen Yiyun;Liu Gang
..............page:1044-1054
An Adaptive Shared Filter Ordering Algorithm for Data Stream Systems
Li Jun;Zhang Peng;Guo Li;Zhou Xiaofei
..............page:961-968
An Approach for Monitoring Memory Address Traces with Functional Semantic Information
Chen Licheng;Cui Zehan;Bao Yungang;Chen Mingyu;Shen Linfeng;Liang Qi
..............page:1100-1109
An Agent-Based Requirements Monitoring Framework for Internetware
Fu Lingxiao;Peng Xin;Zhao Wenyun
..............page:1055-1065
Solving the Stereo Matching in Disparity Image Space Using the Hopfield Neural Network
Xu Sheng;Ye Ning;Zhu Fa;Xu Shanshan;Zhou Liuliu
..............page:1021-1029
Logic-Based Dynamical Security Policy Language and Verification
Bao Yibao;Yin Lihua;Fang Binxing;Guo Li
..............page:932-941
Storage Model and Implementation of the Dynamic Ordered Tree
Te Rigen;Li Wei;Li Xiongfei
..............page:969-985
An Adaptive Soft Frequency Reuse Scheme for LTE Systems
Qian Manli;Li Yonghui;Huang Yi;Zhou Yiqing;Shi Jinglin;Yang Xuezhi
..............page:912-920
Efficient Top-k Query Processing on Mutual Skyline
Jiang Tao;Zhang Bin;Gao Yunjun;Yue Guangxue
..............page:986-997
Steganalysis of LSB Matching Based on the Measurement of the Region Randomness
Xiong Gang;Ping Xijian;Zhang Tao;Li Kan
..............page:942-950