Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2016 Issue 3
A Hybrid Approach for Ripple Effect Analysis of Software Evolution Activities
Wang Wei;,Li Tong;,He Yun;,Li Hao;
..............page:503-516
A Class Integration Test Order Method Based on the Node Importance of Software
Wang Ying;,Yu Hai;,Zhu Zhiliang;
..............page:517-530
A Graph Database Based Method for Parsing and Searching Code Structure
Lin Zeqi;,Zhao Junfeng;,Xie Bing;
..............page:531-540
Output Domain Based Automatic Test Case Generation
You Feng;,Zhao Ruilian;,Lü Shanshan;
..............page:541-549
Regression Test Case Prioritization Based on Bug Propagation Network
Pan Weifeng;,Li Bing;,Zhou Xiaoyan;,He Peng;
..............page:550-558
Efficient Duplicate Detection Approach for High Dimensional Big Data
Zhu Weiheng;,Yin Jian;,Deng Yuhui;,Long Shun;,Qiu Shiding;
..............page:559-570
A Compression-Based Approximate Query Method for Massive Incomplete Data
Wang Yan;,Liu Genghao;,Wang Junlu;,Song Baoyan;
..............page:571-581
Knowledge Graph Construction Techniques
Liu Qiao;,Li Yang;,Duan Hong;,Liu Yao;,Qin Zhiguang;
..............page:582-600
Robust Influence Blocking Maximization in Social Networks
Li Jin;,Yue Kun;,Zhang Dehai;,Liu Weiyi;
..............page:601-610
Recognition of Abnormal Behavior Based on Data of Public Opinion on the Web
Hao Yazhou;,Zheng Qinghua;,Chen Yanping;,Yan Caixia;
..............page:611-620
Human Motion Recognition Based on Triaxial Accelerometer
Li Feng;,Pan Jingkui;
..............page:621-631
A Classification Method Using Transferring Shared Subspace
Dong Aimei;,Bi Anqi;,Wang Shitong;
..............page:632-643
Complexity and Algorithm for Minimum Breakpoint Median from PQ-trees
Liu Peixia;,Jiang Haitao;,Zhu Daming;
..............page:644-650
Quaternion Exponent Moments Based Robust Color Image Watermarking
Wang Xiangyang;,Yang Hongying;,Niu Panpan;,Wang Chunpeng;
..............page:651-665
A Meet-in-the-Middle Attack on 8-Round mCrypton-96
Wang Gaoli;,Gan Nan;
..............page:666-673
A Hash Function Algorithm Based on Variable Parameter Cascade Chaos
Wu Tao;,Jin Jianguo;,Wei Mingjun;
..............page:674-681
Optimal Resources Allocation Algorithm for Optional Redundancy and Monitoring Strategies
He Pan;,Tan Chun;,Yuan Yue;,Wu Kaigui;
..............page:682-696
Smart Home Energy Optimization Based on Cognition of Wearable Devices Sensor Data
chen si yun ;, liu ting ;, shen chao ;, su man ;, gao feng ;, xu zhan bo ;, shi jia yue ;, jia zhan pei ;
..............page:704-715
Patterns of Cardiorespiratory Activity Associated with Five Basic Emotions
Liu Ye;,Wang Sirui;,Fu Xiaolan;
..............page:716-725
xin xi dong tai
..............page:726