Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2014 Issue 5
Two-dimension Node Matrix Based Hierarchized Multi-join in Cloud Environment
TAO Yong-cai;ZHOU Meng-xue;SHI Lei;WEI Lin;CAO Yang-jie;School of Information Engineering;Zhengzhou University;School of Software;Zhengzhou University;
..............page:945-950
Approximate Approaching High-dimensional Indexing Method
QIN Long;ZHENG Quan;GUI Shu-ting;YANG Jian;Department of Automation;University of Science and Technology of China;Joint Laboratory of Network Communication System & Control Key Lab of Anhui;
..............page:951-955
Designing a Power-aware Web Cluster by Leveraging Web Connections
FANG Ming;DENG Yu-hui;XIONG Jin;Department of Computer Science;Jinan University;State Key Laboratory of Computer Architecture Institute of Computing Technology;Chinese Academy of Sciences;
..............page:956-960
Multiclass Imbalanced Data Classification Based on Decision Criteria Optimization
CAO Peng;LI Wei;ZHAO Da-zhe;College of Information Science and Engineering;Northeastern University;Key Laboratory of Medical Image Computing of Ministry of Education;Northeastern University;
..............page:961-966
Personalized Recommendation Framework for Trustworthy Services in Cloud Paradigm
MA Hua;HU Zhi-gang;ZHANG Hong-yu;School of Software;Central South University;School of Information Science and Engineering;Hunan International Economics University;Business School;Central South University;
..............page:967-972
A Collaborative Filtering Algorithm Combined with User Rating Credibility and Similarity
LIU Sheng-zong;LIAO Zhi-fang;WU Yan-feng;FAN Xiao-ping;School of Information Science and Engineering;Central South University;School of Software;Central South University;Laboratory of Networked Systems;Hunan University of Finance and Economics;
..............page:973-977
User-oriented Resource Monitoring System for IaaS Cloud
CHEN He;LI Jing;WANG Wei-wei;Department of Computer Science;University of Science and Technology of China;
..............page:978-982
Hurricane Trajectory Prediction Method with Pattern Matching
DONG Xin;PI De-chang;College of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;
..............page:983-988
MSDD: a Memory Swap Scheme with Data Deduplication
LIANG Ying;LU You-you;LIU Qing-kun;SHU Ji-wu;College of Computer and Information Technology;Liaoning Normal University;Department of Computer Science and Technology;Tsinghua University;
..............page:989-993
Multi-agent System Negotiation Driven by a Multi-win Policy
WANG Mao-guang;FENG Hai-qi;School of Information;Central University of Finance and Economics;
..............page:994-998
Direction Aware Collective Spatial Keyword Query
CHEN Zi-jun;ZHOU Tong;LIU Wen-yuan;College of Information Science and Engineering;Yanshan University;Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;
..............page:999-1004
Data Cube Structure Contained Semantics of Attribute Implication
SHI Zhi-bin;GAO Xian-wei;LIU Zhong-bao;College of Computer and Conerol Engineering;North University of China;
..............page:1005-1009
VMIMO Game Cooperative Routing Algorithm Based on Group
XIE Kun;DUAN Shen-lin;School of Information Science and Engineering;Hunan University;
..............page:1010-1015
CloudSIP: a Dynamically Scalable SIP System in the Cloud
ZHANG Wei;LEI Wei-min;GUAN Yun-chong;LIU Shao-wei;Institute of Communication and Information System;College of Information Science and Engineering;Northeastern University;
..............page:1016-1021
Data Collection Method in Wireless Sensor Networks Based on Mobile Base Station and Collecting-tree
REN Xiu-li;TANG Yi-bo;LIU Shan-shan;College of Information;Liaoning University;
..............page:1022-1026
Research on Video Streaming Bandwidth Allocation for User Previewing Behaviors
WANG Yue;CHEN Liang;CAO Huai-hu;LI Hai-feng;Department of Information Management;School of Information;Central University of Finance and Economics;Department of Information Engineering;The Chinese University of Hong Kong;Department of Computer Science and Technology;School of Information;Central University of Finance and Economics;
..............page:1027-1030
An Improvement of MAC Protocol for Transmission Line Monitoring in Idle Period
ZHU Bao-hui;LIN Jun-ru;ZENG Peng;WANG Yang;ZHANG Yan-yu;KUANG Fang-jun;Laboratory of industrial Control Network and System Shenyang Institute of Automation;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:1031-1036
Routing Algorithm Based on Key Nodes for Wireless Sensor Networks
ZHANG Dan;YAO Nian-min;MA Bao-ying;FAN Shu-ping;YANG Zhi-qiu;Institute of Technology;Mudanjiang Normal University;College of Computer Science and Technology;Harbin Engineering University;College of Health Management;Mudanjiang Medical University;
..............page:1037-1040
Stochastic Fault-tolerant Control for Networked Control Systems with BIBO Stability
ZHOU Xia;ZHONG Shou-ming;School of Mathematics and Computational Science;Fuyang Teachers College;College of Mathematics Science;University of Electronic Science and Technology of China;
..............page:1041-1045
An Improved Method for Packet Loss Causes Judgment in 802. 11 WLAN
WANG Tao;LI Wen-wei;College of Information Science and Engineering;Hunan City University;College of Information Science and Engineering;Hunan University;
..............page:1046-1050
Building Self-organizing Peer-to-peer Network for Cloud Resource Sharing
CHEN Yu-zhong;CHEN Shi-ping;FANG Fang;University of Shanghai for Science and Technology Optoelectronic Information and Computer Engineering;Informatization Office of University of Shanghai for Science and Technology;
..............page:1051-1054
Research of Multi-functional E-mail Protocol Based on the Generalized Signcryption Scheme
SI Ya-li;LIU Wen-yuan;College of Liren;Yanshan University;College of Information Science and Engineering;Yanshan University;
..............page:1055-1060
Forward Secure( t,n) Threshold Proxy Signature Scheme with Designated Verifier
CUI Tao;LIU Pei-yu;WANG Zhen;School of Information Science and Engineering;Shandong Normal University;Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology;
..............page:1061-1064
Quantum Private Comparison Without Entanglement
YU Chao-hua;GUO Gong-de;LIN Song;School of Mathematics and Computer Science;Fujian Normal University;Key Lab of Network Security and Cryptography;Fujian Normal University;
..............page:1065-1068
Implementation of a Role Information-flow Risk Multi-level Evaluation Model and Flexible Authorization
WANG Jian-jun;LI Jian-ping;School of Computer Science;University of Electronic Science and Technology of China;Information Science and Technology Department;HuNan First Normal University;
..............page:1069-1073
Study on Optimizing Techniques of Breadth-first Search Algorithm on Graphic Processing Unit
LIU Gu;AN Hong;LI Xiao-qian;WU Shi-lei;School of Computer Science and Technology;University of Science and Technology of China;Key Laboratory of Computer System and Architecture Chinese Academy of Science;
..............page:1074-1079
Cache-efficient RNA Secondary Structure Prediction Algorithm on CPU / GPU Systems
ZHENG Ming;ZHONG Cheng;School of Computer and Electronics and Information;Guangxi University;
..............page:1080-1084
Parallelization of LAPACK Linear Equation Functions Based on Loongson 3A
LIU Bin-bin;GU Nai-jie;REN Kai-xin;ZHANG Jie;School of Computer Science and Technology;University of Science and Technology of China;Anhui Province Key Laboratory of Computing and Communication Software;USTC&SICT Network and Communication Joint Laboratory;
..............page:1085-1089
Controller Design for the System of Parameter Uncertainty with Beidou Channel Constraints and Time-delay
WU Xiao-feng;GUI Wei-hua;LIU Guo-ping;School of Information Science and Engineering;Central South University;Department of Intelligence Transportation;Guangxi Transportation Research Institute;Department of Engineering;Glamorgan University;
..............page:1090-1094
Research on Availability of Virtual Machine Hot Standby
ZHENG Zhi-yun;WANG Hui-ling;WANG Zhen-fei;LI Lun;LU Li-ping;School of Information Engineering;Zhengzhou University;Department of Information Engineering;Henan College of Finance and Taxation;
..............page:1095-1100
ben kan jian suo yu shou lu
..............page:1100
Fast Mode Decision Strategy for H. 264 Frame Skipping Transcoding
ZHANG Xiao-hong;QIU Bao-lin;School of Information Engineering;Jiangxi University of Science and Technology;
..............page:1101-1105
Design of a Dynamic Memory Manager for Embedded Real-time Systems
SUN Di-hua;WU Wen-feng;ZHENG Lin-jiang;ZHAO Min;LI Bin;College of Automation;Chongqing University;Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education;Chongqing University;College of Computer Science;Chongqing University;
..............page:1106-1110
Bidirectional Quantum Reversible Logic Circuits Synthesis Algorithm
WANG Dong;ZHANG Xiao-lei;ZHU Chang-jiang;Software Shool;Henan University;State Key Laboratory of Software Engineering;Wuhan University;
..............page:1111-1115
Analysis and Optimization of Greedy Pursuit Algorithms
CAI Ti-jian;FAN Xiao-ping;School of Information and Science Engineering;Central South University;Institute of Information Engineering;East China Jiaotong University;Laboratory of Networked Systems;Hunan University of Finance and Economics;
..............page:1116-1119
Tolerance Neighborhood Entropy and Feature Selection in Incomplete Information Systems
ZENG Kai;SHE Kun;School of Computer Science and Engineering;University of Electronic Science and Technology of China;
..............page:1120-1123
Reduction Branch and Bound Algorithm for Bottleneck Steiner Tree Problem
NING Ai-bing;LIU Yan-fang;ZHI Zhi-bing;YANG Xiao-fang;School of Management;University of Shanghai for Science and Technology;
..............page:1124-1127
An Improved Support Vector Machines with Balanced Binary Decision Tree for Multi-class Classification
LIN Zhi-jie;YU Chun-yan;College of Mathematics and Computer Science;Fuzhou University;
..............page:1128-1132
Algorithm of K-means Spectral Clustering Based on Local Similarity
GAO Hong-yan;LIU Fei;Faculty of Physics and Information Engineering;Baoji University of Art and Science;
..............page:1133-1136
Scheduling Radar Tasks Simulation in Heterogeneous System
ZHAN Hong-ying;WANG Lei;CAO Jian-shu;Research Institute of Electronic Science and Technology;University of Electronic Science and Technology of China;
..............page:1137-1141
An Improved Artificial Fish Swarm Algorithm Based on Membrane Computing
LIAO Xiao-yong;LI Shang-jian;SUN Di-hua;HE Wei;YU Chu-zhong;College of Automation;Chongqing University;
..............page:1142-1146
zheng gao jian ze
..............page:1146
Multi-attribute Extension Decision-making Model of Product Design Scheme and Its Application
ZHAI Hong-sheng;WEN Zheng-ying;Department of Management Science and Engineering Henan Institute of Engineering;Department of Computer Science and Engineering Henan Institute of Engineering;
..............page:1147-1150
Stretching Clonal Selection Algorithm for Multi-modal Function Optimization
HONG Lu;GONG Cheng-long;WANG Jing-zhuo;JI Zhi-cheng;Department of Electronic Engineering Huaihai Institute of Technology;Department of Internet of Things Engineering;Jiangnan University;
..............page:1151-1154
Cuckoo-search-algorithm-based Watermarking Method in Wavelet Domain
ZENG Qing;MA Miao;ZHOU Tao;SUN Li;College of Computer Science;Shaanxi Normal University;Shaanxi Key Lab of Speech & Image Information Processing;School of Science;Ningxia Medical University;Information and Navigation Institute;Air Force Engineering University;
..............page:1155-1159
An Efficient Fast Copy Detection Method for Large-scale Video
CAO Hai-bin;ZHU Ming;FENG Wei-guo;Department of Automation;University of Science and Technology of China;
..............page:1160-1163
An Improved Grabcut Image Segmentation Method
YI Cong-cong;WU Bin;ZHANG Hong-ying;School of Information Engineering;Southwest University of Science and Technology;
..............page:1164-1168
Model Simplification Based on Blend Surface Reconstruction
PENG Jian-jun;ZHANG Guang-li;LI Ji-ping;FAN Bang-yu;School of Information Science and Engineering Dalian Polytechnic University;Shenyang Institute of Computing Technology Chinese Academy of Sciences;
..............page:1169-1173
Scene Salience Computation for Media
WEI Wei;WEI Min;CHENG Bang- sheng;School of Computer Science and Technology;Chengdu University of Information Technology;
..............page:1174-1179
New Precise Parameters Estimation Algorithm Based on Secondary Wiener Filtering for Blurred Image
ZHAO Jia-lun;WANG Yan;Institute of Information Science and Technology;Shenyang Ligong University;
..............page:1180-1183
Multi-classes Maximum Variance Method Applied in Image Segmentation
LI Yi;CAI Zi-xing;GU Ming-qin;College of Information Science and Engineering;Central South University;Hunan Engineering Laboratory for Advanced Control and Intelligent Automation;
..............page:1184-1187
Content-aware Packetization Strategy for H. 264 Video
LI Zhi-peng;LU Han-cheng;Hong Pei-lin;Lab of Information Network;University of Science and Technology of China;
..............page:1188-1191
An Algorithm for Reversible Watermarking Based on Difference Expansion and Histogram Shifting
WANG Ji-jun;School of Information and Statistics;Guangxi University of Finance and Economics;
..............page:1192-1195
New Edge Detection Method Based on Omni-directional and Multi-scale Mathematical Morphology
WANG Hong-yi;ZHOU Hang;CHEN Hou-jin;School of Electronic and Information Engineering;Beijing Jiaotong University;
..............page:1196-1200