Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2013 Issue 2
Three Dimensional Localization Algorithm Base on Layered Structure for Indoor WSN
MAO Ke-ji;DAI Guang-lin;XIA Ming;SHAO Ben;CHEN Qing-zhang
..............page:277-280
A Routing Algorithm of IOT Base on Context-awareness Using Ant Colony Algorithm
LI Liang;CHEN Zhi-kui;WEI Zhe;LIU Yang
..............page:281-286
Dependable Service Composition Scheduling Algorithm for QoS Guarantee
MA Lin;ZHU Ming;WANG Lei;WANG Song
..............page:193-198
Research on TCP High Availability Technology for Embedded Network Device
CHENG You-qing;YU Shao-hua
..............page:199-204
Segment Relevance Based Peer Self-organization Strategy in P2P VoD
ZHANG Qian;LI Run-zhi;LIN Yu-song;WANG Zong-min
..............page:205-209
A Cluster Cooperative Routing Algorithm in Wireless Multi-hop Networks
XIE Kun;SUN Jia-qi;GONG Chuang;WEN Ji-gang
..............page:210-215
Low Call-blocking Routing Protocol in Multi-hop Cellular Network
KIM Visale;LIU Wei;CHEN Xiao-hui;CHENG Wen-qing
..............page:216-219
A Model-independent Fast Localization Algorithm of WiFi Access Point
BAI Yun;YU Li;XIE Chang-sheng;ZHANG Dong-hua
..............page:220-223
Interest-trust Based Cooperative System Formation and Evolution
WANG Jiang-tao;CHEN Zhi-gang;DENG Xiao-heng
..............page:224-228
Novel Video Recommendation Mechanism for P2P VoD Services
HE Zhen-hua;TIAN Ye
..............page:229-232
Research for Reputation Models in VANET
CHEN Chen;HAN Wei-li;ZHU Lie2;WANG Xin
..............page:233-237
Hidden Terminal Resolution Mechanism Based on Network Coding in Wireless Broadcast Networks
HOU Xue-zhi;ZHANG Da-fang;HE Shi-ming
..............page:238-242
The Web Service Invoking Character Pattern Mining Algorithm Based on DBSCAN
ZHANG Li;ZHANG Bin;NA Jun;ZHU Zhi-liang
..............page:293-297
Research on Unidirectional P2P Traffic Identification Methods Based on C4.5 Decision Tree
DU Xi-shou;CHEN Shu-qiao;ZHANG Jian-hui
..............page:247-252
Software Practicality Fuzzy Evaluation Based on AHP Theory
OUYANG Liu-bo;ZOU Bei-ji;LIN Jian;YANG Guan-zhong;LIU Li-jie
..............page:298-303
Energy-efficient and Load-balancing Multipath Routing Scheme for Wireless Sensor Networks
FAN Zhi-ping;XIE Dong-qing;JIN Zheng-zhe
..............page:253-257
Clustering-based Distributed and Adaptive Data Storage in Wireless Sensor Networks
YU Zhao-chun;GUAN Ji-hong;LING Hong
..............page:304-308
A Resource Allocation Model Based on Double Auction Under Cloud Computing Environment
WANG Xing-wei;WANG Xue-yi;HUANG Min
..............page:309-316
Multi-objective Evolutionary Optimizations of Wireless Sensor Network Based on Cooperative MIMO
RONG Wei;PEI Ting-rui;LI Zhe-tao;SHEN Rui-min
..............page:258-263
A Distributed Assistance Multicast Scheduling Algorithm in Cognitive Wireless Mesh Networks
KUANG Zhu-fang;CHEN Zhi-gang;ZHAO Ming
..............page:264-268
Research and Implementation of Multi-tenancy Business Customization System Based on SBTM Model
ZHANG Yi-chuan;ZHANG Bin;LIU Ying
..............page:317-323
Research on Power and Bandwidth of XMPP on Mobile Devices
LIU Yong;ZHANG Yan-gong;LIANG Kun-tao
..............page:272-276
RABC Permission Access Control Model with Attribute Policy
LI Wei-guan;ZHAO Feng-yu
..............page:328-331
Automatic Generation of Petri Net for Web Services Composition
MA Bing-xian;XIANG Dong-ming;ZHANG Zheng-ming
..............page:332-337
Research on Feature Dimension Reduction Method for Multivariate Time Series
LI Zheng-xin;ZHANG Feng-ming;ZHANG Xiao-feng;YANG Shi-mei
..............page:338-344
Efficient Algorithm for Computing Tolerance Classes of Incomplete Decision Table
QIAN Wen-bin;YANG Bing-ru;XU Zhang-yan;SHU Wen-hao
..............page:345-350
Multi-miminum Particle Swarm Optimization
LIU Wen-yuan;GUO Xiang-jun
..............page:351-355
Building Fragment Library Based on Fold Recognition for Protein Structure Prediction
CHEN Sha-sha;WU Hong-jie;LV Qiang
..............page:356-359
Spiking Neural P Systems for Performing Signed Integer Arithmetic Operations
PENG Xian-wu;FAN Xiao-ping;LIU Jian-xun;WEN Hong
..............page:360-364
A Cache-aware Scheduling Algorithm on Multicore Systems
XU Yuan-chao;SHEN Yan;TAN Xu;WAN Hu;ZHANG Zhi-min
..............page:365-369
Effective Graph Index Query Processing Algorithm
ZOU Xiao-hong;GUO Cong-min;GUO Jing-feng
..............page:370-374
A Multi-source Fusion Algorithm for Constructing Time-lagged Gene Regulation Network
XU Sai-juan;GUO Hong;LV Tun
..............page:375-379
Heuristics Attribute Reduction Algorithm Based on Discernibility Set
GE Hao;LI Long-shu;YANG Chuan-jian
..............page:380-385
Design and Implementation of the Tool Center Point Interpolation Algorithm for Five-axis Machining
LIU Feng;LIN Hu;ZHENG Liao-mo;WANG Feng;ZHANG Hong-nan
..............page:390-393
Generation of the Chaotic Attractors with Symmetry on the Hexahedron
CHEN Ning;LUO Nan-nan
..............page:394-397
Controllable Smoke Deformation Simulation
TANG Yong;SONG Zhi-jie;LV Meng-ya;WU Yu
..............page:398-401
An Improved Active Contours Model Without Edges Based on Chebyshev Distance
ZHANG Hai-bo;HOU Yu-qing;GAO Shi-rui;CHENG Xing-hong
..............page:402-404
Image Matching Algorithm Based on Cross-entropy and Projection Features
ZHOU Jun-ni;YANG Run-ling;WANG Yan-ni;JIANG Li
..............page:405-408
Combination of Color and Texture for Fast JPEG Image Segmentation
LIU Yi;JING Xia;SUN Huai-jiang;XIA De-shen
..............page:413-416
Research on Attack Element and Attack Template of the Overflow Attacks
ZHU Ning;CHEN Xing-yuan;ZHANG Yong-fu
..............page:417-422
Shadow Elimination Algorithm for Foreground Based on Statistical Model
YANG Zhi-bang;XU Cheng;ZHOU Xu;TIAN Zheng
..............page:423-428
Enterprise Data Encryption and Ciphertext Fulltext Retrieval on Cloud Storage
LI Wen-cheng;ZHAO Feng-yu
..............page:429-432