Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2015 Issue 3
TML:A General High-Performance Text Mining Language
Li Jiajing;,Li Xiaoming;,Meng Tao;
..............page:553-560
Smooth CHKS Twin Support Vector Regression
Huang Huajuan;,Ding Shifei;,Shi Zhongzhi;
..............page:561-568
Incremental FP_GROWTH Algorithm Based on Disk-resident 1-itemsets Counting
Shen Yan;,Zhu Yuquan;,Liu Chunhua;
..............page:569-578
A Heuristic Two-layer Reinforcement Learning Algorithm Based on BP Neural Ne two rks
Liu Zhibin;,Zeng Xiaoqin;,Liu Huiyi;,Chu Rong;
..............page:579-587
A Method of Computing Minimal Hitting Sets Using CSP
Wang Yiyuan;,Ouyang Dantong;,Zhang Liming;,Zhang Yonggang;
..............page:588-595
Patch Matching with Global Spatial Constraints for Person Re-Identification
Chen Puqiang;,Guo Lijun;,Zhang Rong;,Zhao Jieyu;
..............page:596-605
Learning Behavior Analysis and Prediction Based on MOOC Data
Jiang Zhuoxuan;,Zhang Yan;,Li Xiaoming;
..............page:614-628
Cross-Domain Text Sentiment Classification Based on Grouping-AdaBoost Ensemble
Zhao Chuanjun;,Wang Suge;,Li Deyu;,and Li Xin;
..............page:629-638
Deceptive Reviews Detection Based on Positive and Unlabeled Learning
Ren Yafeng;,Ji Donghong;,Zhang Hongbin;,Yin Lan;
..............page:639-648
A Latent-Citation-Network Based Patent Value Evaluation Method
Feng Ling;,Peng Zhiyong;,Liu Bin;,Che Dunren;
..............page:649-660
TH-award:A Performance and Security Test Platform for Wireless Multi-Hop Ne two rks
Zhu Lin;,Meng Kun;,Lin Chuang;,Xu Kun;
..............page:661-670
A Selection Method for User Authentication Protocols in Wireless Networks
Zhao Jing;,Li Xin;,Deng Lingjuan;,Li Xinghua;,Ma Jianfeng;
..............page:671-680
Multi-Stride Regular Expression Matching Using Parallel Character Index
Ding Linxuan;,Huang Kun;,Zhang Dafang;
..............page:681-690
Fully Secure Hierarchical Inner Product Encryption with Constant-Size Ciphertexts
Zhang Jie;,Ge Aijun;,Ma Chuangui;
..............page:691-701
Light-Weight Integrity Monitoring Based on Hashing Time Validity
Xu Qingui;,Qin Yong;,Yang Taolan;
..............page:702-717
Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection
Tang Chenghua;,Liu Pengcheng;,Tang Shensheng;,and Xie Yi;
..............page:718-728
Recovering Traceability Links Using Syntactic Analysis
Wang Jinshui;,Weng Wei;,Peng Xin;
..............page:729-737
Processing String Similarity Search in External Memory Efficiently
Wang Jinbao;,Gao Hong;,Li Jianzhong;,Yang Donghua;
..............page:738-748
Strong Neighborhood Pair Query in Dynamic Dataset
Li Song;,Zhang Liping;,Hao Zhongxiao;
..............page:749-759
Fault-Tolerant Real-Time Scheduling Algorithm with Pre-Allocation in Primary/Alternate Model
Liu Xian;,Guo Ruifeng;,Deng Changyi;
..............page:760-768
Balanced k-Way Partitioning for Weighted Graphs
Zheng Lili;,Wu Jigang;,Chen Yong;,Zhu Meixia;
..............page:769-776