Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2014 Issue 3
Spatial Tessellation Based k Coverage Scheme for 3D Wireless Sensor Network
WANG Xing-w ei;CAI Ling;Huang Min;WANG Jun-wei;WEI Yong-tao;School of Information Science and Engineering;Northeastern University;College of Control Engineering;Northeastern University at Qinhuangdao;
..............page:433-436
Addressing Scheme for 6LoWPAN Networks Based on Geographic Polar Coordinate Grid
XU Xiang-qian;HONG Pei-lin;XUE Kai-ping;Information Network Lab of;EEIS Department;University of Science and Technology of China;
..............page:437-442
An Energy Balanced Minimum Connected Dominating Sets Construction Algorithm
LU Deng-yue;FAN Jian-xi;LIU Wen-jun;ZHANG Biao;School of Computer Science and Technology;Soochow University;
..............page:443-447
Hybrid Routing Algorithm with Adaptive Factor on Weighted Scale-free Network
GUO Wen-zhong;LIU Zhang-hui;WANG Xiao-xi;CHEN Guo-long;College of Mathematics and Computer Science;Fuzhou University;School of Computer;National University of Defense Technology;
..............page:448-452
Fairness-weighted Coupling( FWC) Multipath Congestion Control Algorithm
GUO Jing;XUE Kai-ping;HONG Pei-lin;YANG Rong-hai;Lab of Information Network;University of Science and Technology of China;
..............page:453-457
Grid-based Uneven Clustering Routing Protocol for Wireless Sensor Network
FU Xiao-yang;FANG Yu;SHI Chen-jie;MO Xue-mei;School of Electronics and Information;Tongji University;
..............page:458-462
Low-latency Routing Algorithm for 2D Mesh NoC
HAN Guo-dong;ZHANG Shi-jian;KE Lin;PLA Information Engineering University;
..............page:463-466
Design and Implementation of Hand-up Function in XCON Conference Framework
LI Man-po;ZHANG Wei;XIANG Yong;MENG Ling-yu;YANG Ning;Northeast China Grid Company;Institute of Communication and Information System;College of Information Science and Engineering;Northeastern University;Shenyang Institute of Computing Technology;Chinese Academy of Sciences;
..............page:467-472
Game Model of Information Transmission in Social Networks
HANG Qi-fa;ZHU Jian-ming;SONG Biao;ZHANG Ning;School of Information;Central University of Finance and Economics;Inner Mongolia University of Finance and Economics;
..............page:473-477
Performance Comparison of Outage-optimal Opportunistic Relaying
HE Shao-hua;WANG Ze-xian;Experimental Center;Network and Modern Education Technique Center;Guangzhou University;Guangzhou University Library;Guangzhou University;
..............page:478-482
ben kan jian suo yu shou lu
..............page:482
New Model of Learning Web Application Firewall
LI Xue;TANG Wen;ZHANG Hua;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;IT Security;Corporate Technology Siemens;Ltd.;
..............page:483-487
Unconditionally Secure Multi-secret Sharing Scheme with Identifiable Cheaters
CHEN Zhen-hua;LI Shun-dong;WANG Wen-tao;TAN Shi-chong;School of Computer Science;Shanxi Normal University;School of Civil Engineering;Xi’an University of Architecture and Technology;State Key Laboratory of Integrated Service Networks;Xidian University;
..............page:488-492
Research on Behavior Assessment and Access Control for Terminal
CHANG Chao-w en;XU Jiang-ke;PLA Information Engineering University;
..............page:493-499
A Complete Sub-tree Broadcast Encryption Scheme with Free-riders
ZHANG Yi-chen;LI Ji-guo;HUANG Pi-quan;College of Computer & Information;Hohai University;
..............page:500-503
CAPTCHA Recognition Based on Two Dimensional RNN
CHEN Rui;HUANG Shu-guang;YE Chun-ming;ZHANG Liang;Department of Network;PLA Electronic Engineering Institute;
..............page:504-508
Parameterized LSB Secure Steganography Against RS Statistical Analysis
LIAO Qi-nan;LAI Zhen-dan;Department of Computer & Information Management;Guangxi University of Finance & Economics;
..............page:509-513
Virtual Data Space Sharing Model Towards Domain-specific Science Data
GE Jing-jun;HU Chang-jun;LIU Xin;LI Yang;LIU Zhen-yu;School of Computer and Communication Engineering;University of Science and Technology Beijing;School of Information Engineering;Nanchang Hangkong University;
..............page:514-519
zheng gao jian ze
..............page:519
Lookup Method for Indirect Branch Target in Dynamic Binary Translation
LIAO Yin;JIANG Hai-tao;SUN Guang-zhong;JIN Guo-jie;CHEN Guo-liang;School of Computer Science and Technology;University of Science and Technology of China;Institute of Computing Technology;Chinese Academy of Sciences;
..............page:520-525
A Patent Clustering Method Based on Technology and Effect Matrix
CHEN Xu;FENG Ling;LIU Bin;PENG Zhi-yong;Computer School;Wuhan University;
..............page:526-531
Array Data-flow Analysis Method for Partition
DING Rui;ZHAO Rong-cai;ZHAO Jie;People’s Liberation Army Information Engineering University;
..............page:532-537
Hadoop Cluster Performance Parameters Auto Tuning Information Library System Build
ZHENG Xiao-w ei;XIANG Ming;ZHANG Da-w ei;LIU Qing-kun;College of Computer and Information Technology;Liaoning Normal University;
..............page:538-542
Research on a Software Verification Method at Source Program Level
YE Jun-min;WANG Zhen;DAI Yue-ting;JIN Cong;College of Computer Science;Central China Normal University;
..............page:543-548
GRACE Hash Join Algorithm for Combo Drive
YANG Liang-huai;LIU Ming-chao;PAN Yi-fan;LV Chao-shuai;School of Computer Science and Technology;Zhejiang University of Technology;Key Laboratory of Visual Media Intelligent Process Technology of Zhejiang Province;
..............page:549-554
CG-RTL: a RTL-based Function Call Graph Generator
SUN Wei-zhen;DU Xiang-yan;XIANG Yong;TANG Wei-dong;HOU Hong-ru;College of Information Engineering;Capital Normal University;Department of Computer Science and Technology;Tsinghua University;School of Computer Science & Technology;Beijing Institute of Technology;
..............page:555-559
Adaptive Failure Detection Model FD-LSSVR Based on Time Series Prediction
SHI Lei;JING Jing;WEI Lin;TAO Yong-cai;CAO Yang-jie;School of Information Engineering;Zhengzhou University;School of Software;Zhengzhou University;
..............page:560-565
Software Reliability Models Incorporating Software Error Severity Level
LI Qiang;WANG Chao;YU Xiang;QI Jian-ye;Electronic Engineering Institute;73677 Troop of People’s Liberation Army;
..............page:566-570
Opposed Learning Harmony Search Algorithm Optimize Multidimensional Function Problem
OUYANG Hai-bin;GAO Li-qun;ZOU De-xuan;KONG Xiang-yong;College of Information & Science;Northeastern University;School of Electrical Engineering and Automation;Xuzhou Normal University;
..............page:571-578
Parallel Nonlinear Least Squares for High Dimensional Multi-class Data Classification
ZHAO Yi-lin;ZHU Zhen-feng;ZHOU Qing-lei;School of Information Engineering;Zhengzhou University;
..............page:579-583
Cognitive Neural Mechanisms and Saliency Computational Model of Visual Selective Attention
LIU Yang;YANG Wei;ZHENG Feng-bin;Laboratory of Spatical Information Processing;Henan University;College of Environment and Planning;Henan University;College of Computer Science and Information Engineering;Henan University;
..............page:584-589
Attribute Topology of Formal Context
ZHANG Tao;REN Hong-lei;College of Information Science and Engineering;Yanshan University;
..............page:590-593
Measure and Conquer Algorithm for Perfect Code Problem
WANG Ying-lei;NING Ai-bing;ZHI Zhi-bing;YANG Xiao-fang;School of Management;University of Shanghai for Science and Technology;
..............page:594-596
Extraction Exploration of Facial Cognitive Behavior Feature
WANG Xian-mei;ZHENG Si-yi;LI Cheng;WANG Zhi-liang;School of Computer Science and Telecommunication Engineering;University of Science and Technology Beijing;Beijing Command College of the Chinese People’s Armed Police Force;
..............page:597-601
Research on Dynamic Obstacle Avoidance for Agent in Uncertain Environment
LIU Rong;ZHUANG Yi;XUE Yu;College of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;
..............page:602-605
Metadata Extraction from Papers Based on Third-order Conditional Random Fields
YU Hong-tao;YU Hai-ming;ZHANG Fu-zhi;School of Information Science and Engineering;Yanshan University;
..............page:606-609
Study on Automatically Determining the Optimal Number of Clusters Present in Spectral Coclustering Documents and Words
LIU Na;LU Ying;TANG Xiao-jun;WANG Hai-w en;LI Ming-xia;School of Information Science & Engineering;Dalian Polytechnic University;
..............page:610-614
Content-based Near Duplicate Video Clip Retrieval Technology
WU Ling-da;DENG Li-qiong;DENG Wei;Key Laboratory;Academy of Equipment;Science and Technology on Information Systems Engineering Laboratory;National University of Defense Technology;Dalian Sergeant School of Communication of Air Force;
..............page:615-619
Shadow Detection Based on Content Understanding for a Single Outdoor Image
ZHANG Shi-hui;LUO Yan-qing;JIN Lian-chao;KONG Ling-fu;College of Information Science and Engineering;Yanshan University;The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;
..............page:620-625
Research on Visual Analytics for Multidimensional Digital Battlefield Situation
NIE Jun-lan;CHEN Huan-huan;GUO Dong-liang;ZHANG Ji-kai;The College of Information Science and Engineering;Yanshan University;
..............page:626-629
Linear Feedback Shift Register and Triangular Chaotic System Encryption Algorithm Combining
FANG Peng-fei;WU Cheng-mao;WANG Bao-ping;School of Electronic Engineering;Xi’an University of Posts and Telecommunications;School of Electronics and Information;Northwestern Polytechnical University;
..............page:630-635
Gait Recognition Algorithm Based on Multi-featured Fusion
CHAI Yan-mei;XIA Tian;HAN Wen-ying;LI Yang;School of Information;Central University of Finance and Economics;Department of Computer and Information Science;Shanghai Second Polytechnic University;
..............page:636-641
An Approach for Moving Object Detection Using Continuing Tracking Optical Flow
SHI Xiang-bin;WANG Meng;ZHANG De-yuan;HUANG Xiao-shui;School of Computer Science;Shenyang Aerospace University;
..............page:642-647
Graph Cuts Segmentation Method of Adaptive Shape Priors
XIN Yue-lan;ZHANG Xiao-hua;WANG Xi-li;College of Computer Science;Shaanxi Nomal University;Department of Physics;Qinghai Normal University;Department of Intelligent Information System;Hiroshima Institute of Technology;
..............page:648-653
Human Detection Method Based on Foreground Segmentation
LIU Jian;LIU Ya-nan;GAO En-yang;GONG Zhi-heng;Faculty of Information and Control Engineering;Shenyang Jianzhu University;Faculty of Information Science and Engineering;Northeastern University;Research Institute of Shenyang Automation;Chinese Academy of sciences;
..............page:654-658
Synchronization Algorithm of Color Image Denoising and Enhancement
JIA Di;MENG Lu;ZHANG Yi-fei;HE Xue-ping;FANG Jin-feng;School of Electronic and Information Engineering;Liaoing Technical University;College of Information Science and Engineering;Northeast University;
..............page:659-662
Active Contour Model of Combining Fuzzy Global and Dual-core Local Information
ZHAO Jie;QI Yong-mei;PAN Zheng-yong;College of Electronic and Information Engineering;Hebei University;
..............page:663-666
Energy-saving Scheduling Algorithm for Periodic Tasks with Discrete Frequency
GUO Rui-feng;ZHANG Yi-wen;LI Jie;LIU Xian;Shenyang Institute of Computing Technology;Chinese Academy of Sciences;Graduate University of Chinese Academy of Sciences;
..............page:667-670
Improving Multi-core System Throughput with Memory Load Balance
LIU Yu;AN Hong;SUN Sun;CHEN Jun-shi;School of Computer Science and Technology;University of Science and Technology of China;
..............page:671-675
Assertion-based Functional Verification for Compact PCI IP Core
YAO Ai-hong;SUN Meng-zhe;ZHANG Zhi-jun;YUAN Li-na;College of Computer Science and Technology;Harbin Engineering University;Beijing Institute of Computer Technology and Applications;Key Laboratory of Technology in Geo-Spatial Information Processing and Application System;Institute of Electronics;Chinese Academy of Sciences;
..............page:676-680
Research on Wavelet Mutation Cooperative Differential Evolution Algorithm Based on Graphic Processing Unit
LIU Jian-ying;School of Information Technology;Dalian Vocational Technology College;
..............page:681-684
Discriminative Speaker Models Based on i-vectors for Speaker Verification
FANG Xin;LI Hui;LIU Qing-song;Department of Electronic Science & Technology;University of Science & Technology of China;
..............page:685-688