Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2011 Issue 2
Robust Digital Image Watermarking Technique
XIA Wei;LU Hong-wei;ZHAO Xiao-xia
..............page:356-360
Face Super-resolution With Non-negative Featrue Basis Constraint
LAN Cheng-dong;HU Rui-min;HAN Zhen;LU Tao
..............page:347-350
Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks
LI Hai-po;DU Qing-wei
..............page:233-236
Research on Streamline Inter-relevant Successive Trees
HUO Lin;HUANG Jun-wen;LU Zheng-ding;HUANG Bao-hua;PAN Ying-hua;WANG Li
..............page:286-290
Particle swarm Optimization with small-world Model Individual Decision
JIAO Guo-hui;CUI Zhi-hua;TAN Ying;FAN Wei-bing
..............page:317-322
Robust Semi-supervised Locally Linear Embedding
DAI Zhi-bo;WANG Jing
..............page:310-316
Area Census-oriented Electronic Reconnaissance Satellites Scheduling Technique
QIU Di-shan;WANG Hui-lin;ZHU Jiang-han;MA Man-hao
..............page:379-384
Improved Method of Chord Ring Configuration
CHEN Bai-sheng;LI Jian-ping;DU Ji-xiang
..............page:370-373
Temporal Partitioning and Quantitaive Analysis of Behaviour Level Algorithms for Dynamic Reconfigurable Systems
CHEN Nai-jin;JIANG Jian-hui;CHEN Xin;ZHOU Zhou;XU Ying;PAN Cheng
..............page:328-332
New Scheduling Policy for Peer-to-peer Based Video-on-demand Storage
SHEN Shi-jun;LI San-li
..............page:203-207
Efficient Attribute Reduction Algorithm Based on the Idea of Discernibility Object Pair Set
HAN Zhi-dong;WANG Zhi-liang;GAO Jing
..............page:299-304
Design of Authentication Protocol for IPTV Digital Rights Management
SUN Bao-yin;MA Zhao-feng;XIN Yu;YANG Yi-xian;NIU Xin-xin
..............page:253-257
xin xi dong tai
..............page:223,316,369
Algorithm and Realization of Transformation from PLC Ladder Diagram to Structured Text
HUANG Liu-wen;LIU Wei;LIU Zhan-qing
..............page:339-341
Improved and Real-time Equipped Dynamic Source Routing Protocol
WU Chun-xue;ZHAO Xian-jing
..............page:214-217
Novel Structure Adaptive Algorithm for Texture Synthesis
ZHANG Jun;ZHU Wei;HUANG Wei-qiang
..............page:351-355
Minimum Range Error Estimation Localization Algorithm for Wireless Sensor Networks
ZHANG Shao-ping;LI Guo-hui
..............page:218-223
S-RSM:a Semantics-based Resource Search Mechanism for Dataspace
KOU Yue;SHEN De-rong;NIE Tie-zheng;ZHAO Ning;YU Ge
..............page:265-270
Method of Program Understanding Based on Computational Function
TANG He-ping;SONG Shun-hong;HUANG Shu-guang;Tian Jie
..............page:295-298
Hybrid Quantum-inspired Evolutionary Algorithm for Knapsack Problem
QIN Chao-yong;HUANG Jing-wen;ZHENG Jian-guo;MO Guo-li
..............page:305-309
Improved Registration Procedure Based on Cache in IMS
ZHANG Qi-zhi;FAN Bing-bing;HUANG Xing-ping
..............page:224-227
Advance in the Research of Complex Network:Model and Application
ZHAN Wei-hua;GUAN Ji-hong;ZHANG Zhong-zhi
..............page:193-202
Survey of Research on Anonymization Privacy-preserving Techniques
WANG Ping-shui;WANG Jian-dong
..............page:248-252
Real-time Shadow Detection and Removal of the Moving Objects
LI Guang-lun;SHU wei-qun
..............page:361-364
Modeling and Analysis of Capture Effect in Passive UHF RFID Systems
LI Bo;WANG Jun-yu;WEI Peng;XI Jing-tian
..............page:342-346
Dynamic Multi-group Asynchronous Multi-channel MAC Protocol for Ad Hoc Network
FANG Li-cai;XU Zong-ze;LEI Lei
..............page:228-232
Interpolation Method Using Cokriging and the Markov Model
WANG Yan-long;LIU Jin-hua;ZHANG Ting
..............page:365-369
Parallel Method for Incremental View Maintenance Based on Decomposition of Maintenance Task
ZUO Ya-yao;SHU Zhong-mei;TANG Yong
..............page:279-285
Software Protection Scheme Via Nested Virtual Machine
YANG Ming;HUANG Liu-sheng
..............page:237-241
Graph Grammar Based Method for Parallel Exploitation
ZOU Yang;LV Jian;ZENG Xiao-qin
..............page:271-278
Fast Multimedia File Transport Protocol on Embedded System
WANG Hai-wei;NI Hong;ZHU Ming;SUN Peng;ZHU Xiao-yong
..............page:208-213
Constraint Based Multi-task Learning Approach and its Application
HE Zhen-feng;YU Chun-yan;LU Chang-hua
..............page:291-294
Steganalysis of Steganographic Images in Wavelet Domain
QIAN Ping;LIU Zhen;CHEN Li-ya
..............page:262-264
Research and Implementation of Service Hijack Attacks on Composite Web Services
HUANG Kang-yu;ZHENG Cheng-hui;WU Hai-jia;WU Li-fa
..............page:258-261
Design of a Custom Instruction set processor and its Tool Chain
YANG Qiog-qiog;ZHOU Xiao-fang;YANG Hong
..............page:333-338
Design of Network Communication for Electronic Document Leak Prevention System Based on Fine-grained Authorization
MAO Li-rong;MA Zhao-feng;HUANG Jian-qing;YANG Yi-xian;NIU Xin-xin
..............page:242-247
Constrained Delaun Triangulation Algorithm for Planar Polygonal Domains Based on Minimum Search Circle
CHEN Xue-gong;MA Jin-jin;HUANG Wei;LI Nan
..............page:374-378