Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2014 Issue 10
Stock Network Community Detection Method Based on Influence Calculating Model
Li Guohuan;,Li Junzhao;,Wang Hao;,Yao Hongliang;
..............page:2137-2147
A Pattern Class Mining Model Based on Active Learning
Guo Husheng;,Wang Wenjian;
..............page:2148-2159
Approximate Gaussian Kernel for Large-Scale SVM
Jiang Shali;,Liao Shizhong;,Liu Yong;
..............page:2171-2177
On Protein Complexes Identifying Algorithm Based on the Novel Modularity Function
Dai Qiguo;,Guo Maozu;,Liu Xiaoyan;,Xu Liqiu;
..............page:2178-2186
An Effective Differential Privacy Transaction Data Publication Strategy
Liu Shaopeng;,Liu Yubao;,Ouyang Jia;,Yin Jian;
..............page:2195-2205
An Algorithm for Top-k Query Refinement Based on User's Feedback
Fan Hua;,Han Weihong;,Jia Yan;,Zhang Jianfeng;,Zou Peng;
..............page:2206-2215
Exploration of Weighted Proximity Measure in Information Retrieval
Cheng Xueqi;,Guan Feng;,Liu Yue;,Xue Yuanhai;,Yu Xiaoming;
..............page:2216-2224
TTRank: User Influence Rank Based on Tendency Transformation
Duan Songqing;,Wang Bai;,Wu Bin;
..............page:2225-2238
Indexing Page Collection Selection Method for Search Engine
Li Zhichao;,Ma Shaoping;,Ru Liyun;
..............page:2239-2247
Markov Network Retrieval Model Based on Document Cliques
Tang Wanning;,Wan Jianyi;,Wang Mingwen;
..............page:2248-2254
A Collaborative Filtering Recommendation Mechanism for Cloud Computing
Dong Fang;,Luo Junzhou;,Song Aibo;,Zhu Xia;
..............page:2255-2269
Mining Latent Semantic on User-Tag-Item for Personalized Music Recommendation
Li Ruimin;,Lin Hongfei;,Yan Jun;
..............page:2270-2276
MMCKDE: m-Mixed Clustering Kernel Density Estimation over Data Streams
Deng Zhaohong;,Shi Yingzhong;,Wang Shitong;,Xu Min;
..............page:2277-2294
Structured Sparse Linear Discriminant Analysis
Chen Xilin;,Cui Zhen;,Shan Shiguang;
..............page:2295-2301
Dynamic Spatial Synthesis of Dorsal Hand Vein Images Based on PCA
Jiang Nan;,Li Kefeng;,Wang Yiding;
..............page:2302-2307
A Cloud User Behavior Authentication Model Based on Multi-Partite Graphs
Cao Xun;,Tian Junfeng;
..............page:2308-2317
Network Coding-Based Privacy Protection Scheme for Mobile P2P Networks
Bi Junlei;,Li Zhiyuan;,Wang Ruchuan;
..............page:2318-2328
Biclique Cryptanalysis of Block Cipher SHACAL2
Wei Hongru;,Zheng Yafei;
..............page:2329-2335
A Pattern Translation Method for Flags in Binary Translation
Bai Tongxin;,Cui Huimin;,Wang Wenwen;,Wang Zhenjiang;,Wu Chenggang;,Yuan Xiang;
..............page:2336-2347
Interception and Identification of Guest OS Non-trapping System Call Instruction within VMM
Fan Dongrui;,Liu Zhiyong;,Tang Shibin;,Xiong Haiquan;,Xu Weizhi;
..............page:2348-2359
xin xi dong tai
..............page:2360