Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2013 Issue 6
A (l,m)-Diversity Model of Resisting the Associated Attack on Multi-sensitive Attributes
LUO Fang-wei;HAN Jian-min;LU Jian-feng;LIU Hua-wen
..............page:1387-1391
An Inter-cluster Cooperative Node Selection Scheme Based on Blind Channel Estimation
ZHONG Xiao-qiang;ZHANG Qing-bo
..............page:1266-1269
Research on Algorithm of Tree Stream Classification Based on k-best Tree Pattern
JIA Min-jie;WANG Li-ming
..............page:1328-1333
A Reconfigurable Fault-tolerance Routing Algorithm of NoC Based on the Awareness of Status-on-neighbor
CHEN Qing-qiang;LUO Xing-guo;CHEN Tao;LIU Jing;ZHANG Shi-jian
..............page:1365-1370
A Dataflow-like Driven Reconfigurable Manycore Stream Processor
XU Mu;AN Hong;TANG Xu-long;ZHOU Wei
..............page:1359-1364
Study on Query of Heterogeneous Bipolarity Information in Possibilistic Databases
ZHAO Fa-xin;MA Zong-min
..............page:1354-1358
QAM Resource Allocation Algorithm Based on Utility Max-min Fairness
WANG Hao-lun;NI Hong;SUN Peng
..............page:1216-1220
Network Traffic Anomaly Detection Based on Semi-supervised Combination Model
XU Qian;CHENG Dong-nian;CHENG Guo-zhen
..............page:1242-1247
Dynamic Clustering Algorithm in Uncertain Tree Database
GUO Xin;YAN Yi-ming;XU Hong-zhi;DONG Jian-feng
..............page:1339-1343
Rational Multi-secret Sharing
LI Ji-guo;WANG Fei;LI Yan-qiong;ZHANG Yi-chen
..............page:1392-1395
Nearest Neighbor Algorithms for Packing Circles into a 2D Container
XU Zhi-bin;YOU Ya;GONG Sheng-rong;LIU Chun-ping
..............page:1409-1412
Study of Efficient Clustering Algorithm on Large Graphs
WANG Hao-cheng;MA Jing
..............page:1417-1423
Research on Heuristic Network Coding Protocol for Multi-hop Wireless Networks
LI Yi-wen;TAO Wen;BAI Guang-wei;CAO Lei
..............page:1248-1252
Speech Emotion Feature Based on Acoustic Context Extraction and Analysis
BAI Li-juan;ZHAO Xiao-lei;MAO Qi-rong;WU Bao-feng
..............page:1451-1456
Research in Learning from Demonstration Based on Cognitive Reasoning for Family Service Robot
CHEN Shi-jia;YIN Dong;ZHANG Rong;WANG De-jian
..............page:1441-1445
SWALLOW :A Stable WLAN Area Localization System
YI Fei-tao;HUANG Liu-sheng;LIU Gang;XU Hong-li
..............page:1237-1241
Key Nodes Behavior Analysis Based on Complex Software Execution Network
ZHANG Xi-zhe;ZHAO Guo-long;LV Tian-yang;ZHANG Bin
..............page:1201-1205
Fusion Extraction Method of Gesture Contour Based on GVF Snake and Skin Color Model
TAN Wen-jun;YANG Jin-zhu;SONG Xiang-man;ZHAO Da-zhe
..............page:1405-1408
Research Development of All Digital Delay-locked Loops
XU Tai-long;CHEN Jun-ning;MENG Jian;XU Chao;KE Dao-ming
..............page:1371-1374
Structured Addressing Scheme in Dense Distributed Sensor Networks
XIONG Wan-xing;XUE Kai-ping;HONG Pei-lin
..............page:1221-1225
A Novel Dynamic Source Authentication Scheme in Multicast
WU Tao;ZHENG Xue-feng;BAI Li-zhen
..............page:1261-1265
ZDC-tree:An Efficient Index Structure for Supporting Skyline Query on Data Streams
PENG Dun-lu;YI Shao-jun;DUAN Kai;HUO Huan
..............page:1288-1294
Research on Fault-tolerate Scheduling Algorithm to Real-time Periodic Tasks in Multiprocessor Systems
LI Jie;GUO Rui-feng;SHAO Zhi-xiang;YU Jin-gang
..............page:1253-1256
An Energy-aware Multi-path Routing Mechanism for Industrial Wireless Networks
YI Xiu-shuang;WANG Xing-wei;ZHANG Deng-ke;HUANG Min
..............page:1206-1211
A Method for Checking Consistency Between Domain Requirements and Business Process
LIU Jin-du;SHEN Li-wei;PENG Xin;ZHAO Wen-yun
..............page:1270-1275
Study on Framework-based Virtual Computing Environment and Key Technology
ZHANG Qian;LIANG Hong;GUAN Xin-quan;SHI Jin
..............page:1344-1348
Role Engineering in Access Control
MA Xiao-pu;LI Rui-xuan;HU Jin-wei
..............page:1301-1306
An New Method for Modifying Binary Discernibility Matrix and Computation of Core
REN Qian;LUO Yue-tong;YAO Guang-shun
..............page:1437-1440
Optimization Mechanism for Distributed File System Based on Merging Control Messages
LIU Yang-kuan;CAI Tao;JU Shi-guang;ZHAN Yong-zhao
..............page:1317-1320
xin xi dong tai
..............page:1294
A Parallel Method for Isogeometric Analysis Using Computational Domain Decomposition
GUO Li-cai;HUANG Zhang-jin;GU Nai-jie
..............page:1396-1399
Lock-free Stack Algorithm Using Elimination Technology
ZHANG Lian-fa;YANG Dong-sheng;QIN Cheng-gang
..............page:1349-1353
Using Code Caching and Reusing to Improve Efficiency of Android JIT Compiler
ZHOU Bo;ZHANG Yuan;YANG Min;ZHOU Xi
..............page:1307-1312
Spectrum Allocation Algorithm Based on Constraint Operator of Binary Particle Swarm in the Congnitive Wireless Networks
ZHANG Li-ying;ZENG Zhi-wen;CHEN Zhi-gang;KUANG Zhu-fang
..............page:1226-1229
Utilizing Static Information Flow Analysis to Detect Logging Vulnerability in Android Apps
PENG Zhi-jun;ZHANG Yuan;YANG Min
..............page:1276-1281
Finite Automaton Based Strategy for Automated Trust Negotiation
LI Jian-li;LIU Bo;DENG Xiao
..............page:1375-1381
Design and Implementation of Distributed File System Based on the Hash Rule
DUAN Han-cong;MEI Mei;LI Lin
..............page:1313-1316
A Fast Algorithm for Near-duplicate Video Detection
LIU Da-wei;ZHU Ming
..............page:1400-1404
Crossed Twisted Cube Interconnection Networks and Their Properties
SHI Sheng-nan;LIANG Jia-rong;HE Gao-xing
..............page:1257-1260
A Color Image Segmentation Approach Based on Improved Spectral Clustering
QIAN Su-jing;PENG Hong-jing;LIU Yue
..............page:1413-1416
Energy Efficient Query Processing Techniques Based on Particle Filters in Wireless Sensor Networks
HAN Qiu-ting;ZHENG Ji-ping;ZHANG Hui
..............page:1230-1236
A Data Aggregation Algorithm for Delay Tolerant Networks
WANG Ya;XIAO Ming-jun
..............page:1212-1215
Research on an Improved Particle Filter Algorithm Based on Adaptive Optimization Mechanism
YU Jin-xia;TANG Yong-li;XU Jing-min
..............page:1446-1450
Study of Data Hiding Method in Binary Images Acted on Block Parity
WANG Guo-cai;WANG Fang;KE Fu-song;CHEN Si
..............page:1424-1427
Research on Methods for Generating AOP Test Cases Based on Predicate Dynamic Slicing
WANG Bo;CHAI Yu-mei;WANG Li-ming
..............page:1321-1327
OBJ-D:An Object-centric Concurrency Bug Detection Framework for Java
WANG Di;YANG Min;ZHOU Xi
..............page:1295-1300
Provable Secure and Efficient Proxy Signature Scheme without Bilinear Pairings
GU Ke;JIA Wei-jia;LI Chao-liang;JIANG Chun-lin
..............page:1382-1386
More Steps De-noising Method of Wavelet Coefficients Diffusion
LIU Chen-hua;FENG Xiang-chu
..............page:1433-1436
Schedulability Analysis for Fault-tolerant Real-time System Under Rollback Recovery Model
GUO Rui-feng;LIU Xian;DING Wan-fu;LI Jie;WANG Hong-liang
..............page:1334-1338