Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2015 Issue 7
Mixture of Probabilistic Canonical Correlation Analysis
Zhang Bo;,Hao Jie;,Ma Gang;,Yue Jinpeng;,Zhang Jianhua;,Shi Zhongzhi;
..............page:1463-1476
Word Semantic Similarity Measurement Based on Na?ve Bayes Model
Wang Junhua;,Zuo Wanli;,Yan Zhao;
..............page:1499-1509
wen zhang che xiao sheng ming
..............page:1509-1509
An Overlapping Semantic Community Detection Algorithm Based on Local Semantic Cluster
Xin Yu;,Yang Jing;,Tang Chuheng;,Ge Siqiao;
..............page:1510-1521
A Cache Approach for Large Scale Data-Intensive Computing
Zhou Enqiang;,Zhang Wei;,Lu Yutong;,Hou Hongjun;,Dong Yong;
..............page:1522-1530
Concurrent Skiplist Based Double-Layer Index Framework for Cloud Data Processing
Zhou Wei;,Lu Jin;,Zhou Keren;,Wang Shipu;,Yao Shaowen;
..............page:1531-1545
Object-Based Data De-Duplication Method for OpenXML Compound Files
Yan Fang;,Li Yuanzhang;,Zhang Quanxin;,Tan Yuan;
..............page:1546-1557
File System Level Wear Leveling Mechanism for Non-Volatile Memory Based Storage
Cai Tao;,Zhang Yongchun;,Niu Dejiao;,Ni Xiaorong;,Liang Dongying;
..............page:1558-1566
Asyn-SimRank:An Asynchronous Large-Scale SimRank Algorithm
Wang Chunlei;,Zhang Yanfeng;,Bao Yubin;,Zhao Changkuan;,Yu Ge;,Gao Lixin;
..............page:1567-1579
Abstract Modeling Formalisms in Software Model Checking
Wei Ou;,Shi Yufeng;,Xu Bingfeng;,Huang Zhiqiu;,Chen Zhe;
..............page:1580-1603
Modeling,Verification and Test of Interactive Behaviors in Distributed Software Systems
Zhang Chen;,Duan Zhenhua;,Tian Cong;,Yu Bin;
..............page:1604-1619
Research on Flow Sensitive Demand Driven Alias Analysis
Pang Long;,Su Xiaohong;,Ma Peijun;,Zhao Lingling;
..............page:1620-1630
A Generalized Non-interference Based on Refinement of Interfaces
Sun Cong;,Xi Ning;,Gao Sheng;,Zhang Tao;,Li Jinku;,Ma Jianfeng;
..............page:1631-1641
Risk Evaluation of Complex Information System Based on Threat Propagation Sampling
Ma Gang;,Du Yuge;,An Bo;,Zhang Bo;,Wang Wei;,Shi Zhongzhi;
..............page:1642-1659
A Multiple Replica Possession Proving Scheme Based on Public Key Partition
Fu Wei;,Wu Xiaoping;,Ye Qing;,Xiao Nong;,Lu Xicheng;
..............page:1672-1681
Segmentation of Color Overlapping Cells Image Based on Sparse Contour Point Model
Guan Tao;,Zhou Dongxiang;,Fan Weihong;,Liu Yunhui;
..............page:1682-1691
Robust Fragments-Based Tracking with Multi-Feature Joint Kernel Sparse Representation
Hu Zhaohua;,Yuan Xiaotong;,Li Jun;,He Jun;
..............page:1692-1704