Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2014 Issue 5
Research on Space Internetworking Service Based on DTN
Dong Yangwei;,Lin Chuang;,Shan Zhiguang;
..............page:931-943
Data and Protocol Optimization Techniques in Wide Area Networks
Dong Pingping;,Sun Jun;,Wang Jianxin;,Wang Lezhi;
..............page:944-958
EasiSHA: A Reconfigurable Node Architecture for IoT Based on Joint Design of Software and Hardware
Cui Li;,Li Dong;,Qiu Jiefan;,Shi Hailong;
..............page:959-973
RBSA: Repeatedly-Woken Based Scanning Algorithm for Road Network Surveillance
chen liang yin ;, chen peng peng ;, li zuo hua ;, liu yan ;, wang chao long ;, yan bing zuo ;, yin feng ;, zhang jing yu ;
..............page:974-983
A Low-Power FIS Mechanism and Energy Analysis for Green Router
Dai Yi;,Wang Binqiang;,Yuan Bo;
..............page:984-996
An Efficient Fault-Tolerant Event and Event Boundary Detection Algorithm for Wireless Sensor Networks
Geng Weijian;,Li Lingjuan;,Xu Xiaolong;,Yang Geng;,Yang Zhen;
..............page:997-1008
DCent: A High Extensible Data Center Networking Structure Using Dual-port Servers
Guo Deke;,Lu Feifei;,Tao Zhirong;,Xie Xianghui;,Zhu Guiming;
..............page:1009-1017
ECG Signal Recovery Problem Based on Compressed Sensing Theory
Hu Kai;,Mao Dan;,Zhang Yingchao;
..............page:1018-1027
A Behavior-Based System Resources Access Control Scheme for Android
Jing Jiwu;,Lei Lingguang;,Wang Yuewu;,Zhang Zhongwen;
..............page:1028-1038
A Real-time Network Threat Recognition and Assessment Method Based on Association Analysis of Time and Space
Lü Huiying;,Peng Wu;,Wang Jie;,Wang Ruimei;
..............page:1039-1049
A Sensitivity Measurement for Sensitive Information Processing
Chen Jing;,Fu Jianming;,Huang Shiyong;,Sha Letian;
..............page:1050-1060
Fine-Grained Parallel Regular Expression Matching for Deep Packet Inspection
Liu Xinchun;,Liu Xingkui;,Shao Zongyou;,Sun Ninghui;
..............page:1061-1070
Spampot: A Spam Capture System Based on Distributed Honeypot
Duan Haixin;,Guo Junquan;,Sun Donghong;,Zhuge Jianwei;
..............page:1071-1080
Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model
Cheng Xiangguo;,Ge Lirong;,Hao Rong;,Li Meng;,Yu Jia;,Zhao Huiyan;
..............page:1081-1088
An Efficient Rainbow Table Structure and Faster Cryptanalytic Time-Memory Trad-off Attack
Gu Chunxiang;,Li Zheng;,Zheng Yonghui;,Zhu Yuefei;
..............page:1089-1094
Load Balancing Degree First Algorithm on Phase Space for Cloud Computing Cluster
Guo Youming;,Huang Yan;,Li Kun;,Wang Peng;
..............page:1095-1107
User-Aware Resource Provision Policy for Cloud Computing
Chen Yibo;,Zha Wenliang;,Zhang Huyin;,Zhou Jingcai;
..............page:1108-1119
Random Task-Oriented User Utility Optimization Model in the Cloud Environment
Li Kenli;,Tang Xiaoyong;,Tang Zhuo;,Yang Li;,Zhu Min;
..............page:1120-1128
A Splitting-Based Cloud Storage Mechanism for Digital Images
Chen Xiangqun;,Guo Yao;,Lü Xiaobo;
..............page:1129-1135
A Fast Processing Algorithm on Section Disjoint Query of Data Stream
Li Zhi;,Wang Shaopeng;,Wen Yingyou;,Zhao Hong;
..............page:1136-1148
A Cyclic Memory Race Recording Algorithm Implemented with Hardware Signatures
Ji Zhenzhou;,Li Dong;,Zhang Hao;,Zhu Suxia;
..............page:1149-1157
xin xi dong tai
..............page:1158