Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2015 Issue 5
Multi-domain clustering topology-aware application layer multicast
CuiJianqun;Ma Liang;Shan Zhiguang;Huang Feng;School of Computer;Central China Normal University;Informatization Research Department;State Information Center;
..............page:1-5
Complex field network coding and cooperative multipath algorithm for wireless sensor network
Sun Baolin;Lu Muyao;Hu Chengsong;Gui Chao;School of Information Engineering;Hubei University of Economics;School of Computer Science and Technology;Wuhan University of Technology;School of Information Engineering;Wuhan Technology and Business University;
..............page:6-10
Community trust driven service selection method for cloud computing
Wang Yan;Zhou Jiantao;College of Computer Science;Inner Mongolia University;
..............page:11-16
Intelligent detector and related algorithms based on immune danger theory
Tan Minsheng;Bai Yaohua;Zhou Huan;Liu Jianxue;School of Computer Science and Technology;University of South China;
..............page:17-22
Incremental deployed architecture for quality of service guarantee of future internet
Hu Chao;Ding Ke;Xie Yuanyuan;Li Yuan;College of Command Information Systems;PLA University of Science and Technology;PLA Unit 161672;PLA Unit 61221;
..............page:23-26+32
Hybrid differentiated protection strategy with delay aware in WDM networks
Xiong Yu;Yao Hao;L Yi;Liao Bin;Key Laboratory of Optical Fiber Communication;Chongqing University of Posts and Telecommunications;School of Statistics and Information;Xinjiang University of Finance and Economics;
..............page:27-32
Wideband spectrum detection based on multi-task Bayesian compressive sensing
Xu Xiaorong;Wang Zan;Yao Yingbiao;Bao Jianrong;College of Telecommunication Engineering;Hangzhou Dianzi University;National Mobile Communications Research Laboratory;Southeast University;
..............page:33-38+43
Approximate l0 recovery algorithm-based data collection scheme in wireless sensor networks
Li Guorui;Wang Ying;He Jingsha;School of Computer and Communication Engineering;Northeastern University at Qinhuangdao;Department of Information Engineering;Qinhuangdao Institute of Technology;School of Software Engineering;Beijing University of Technology;
..............page:39-43
Preference elicitation method based on decision cheat adaptive modified for context-aware recommender system
Gao Quanli;Gao Ling;Gao Ni;Wang Hai;Department of Information Science and Technology;Northwest University;
..............page:44-49
Cooperation model and algorithm for network security system based on multi-ISM alliance
Ma Zhanfei;Yang Shuying;Baotou Teachers College;Inner Mongolia University of Science and Technology;Department of Network Technology;Baotou Vocational School of Service and Management;
..............page:50-55
Multi-objective virtual machine management in virtualized data center environments
Huang Haifeng;Song Aibo;Fan Wei;Zhang Hong;China Electric Power Research Institute;School of Computer Science and Engineering;Southeast University;Key Laboratory of Computer Network and Information Integration;Southeast University;
..............page:56-62
Anomaly detection of virtual machines based on multi-attribute entropy in cloud computing environments
Yu Ming;Zhang Yu;Liu Chang;Zhang Dandan;School of Information and Communication Engineering;Dalian University of Technology;
..............page:63-67
Evolution mechanism for mimicry honeypot through adaptive genetic algorithm
Shi Leyi;Liu Deli;Xing Wenjuan;Feng Haijie;College of Computer and Communication Engineering;China University of Petroleum;
..............page:68-72+83
Message extraction method for plaintext LSB steganography in spatial domain
LiuJiufen;Wang Junchao;Han Tao;State Key Laboratory of Mathematical Engineering and Advanced Computing;Information Engineering University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Science;
..............page:73-78
Performance analysis of AWGR-based hybrid opto-electrical data center network
Cai Yueping;Zhou Li;Luo Sen;College of Communication Engineering;Chongqing University;
..............page:79-83
Blind packets flow watermark based on centroid of cross inter-packet delays grouping
Wang Changda;Zhu Hui;School of Computer Science and Communication Engineering;Jiangsu University;
..............page:84-88
Privacy-preserving selective profile matching protocols for MSN
Li Yongkai;Liu Shubo;Yang Zhaohuan;Liu Mengjun;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing;Ministry of Education;Wuhan University;
..............page:89-94
Traffic prediction method based on hybrid model of WRC
Fei Jinlong;Han Tao;Zou Wei;Zhu Yuefei;State Key Laboratory of Mathematical Engineering and Advanced Computing;Information Engineering University;
..............page:95-98+123
Cognitive model and quantitative analysis for survivable system based on SM-PEPA
Wang Jian;Zhao Guosheng;College of Computer Science and Technology;Harbin University of Science and Technology;College of Computer Science and Information Engineering;Harbin Normal University;
..............page:99-103
Correcting algorithm for local characteristic metrics of Internet topology structure
Wang Ting;Xu Ke;Wang Na;Song Junde;School of Computing;Beijing University of Posts and Telecommunications;PLA Unit 96630;
..............page:104-108
Real trace driven temporal centrality analysis for dynamic networks
Dong Yongqiang;Zu Qianqian;Tao Hua;School of Computer Science and Engineering;Southeast University;Key Laboratory of Computer Network and Information Integration;Ministry of Education;Southeast University;Network and Information Center;Southeast University;
..............page:109-113
Indoor cooperation localization algorithm based grid in wireless networks
Luo Juan;He Zanyi;Zhang Yuxi;Song Yanchao;Computer Science and Electronic Engineering;Hunan University;Baicheng Ordnance Test Center of China;School of Electronic Information and Communications;Huazhong University of Science and Technology;
..............page:114-118
Block cipher algorithm based on multidimensional dynamic S-box and LFSR
Zhao Guosheng;Li Guangcheng;Wang Jian;College of Computer Science and Information Engineering;Harbin Normal University;School of Computer Science and Technology;Harbin University of Science and Technology;
..............page:119-123
Research on damage measurement and orientation of pipeline based on fiber Bragg grating sensing
Liu Dong;Liu Quan;Chen Juntao;Key Laboratory of Fiber Optic Sensing Technology and Information Processing;Ministry of Education;Wuhan University of Technology;School of Mechanical and Electronic Engineering;Wuhan University of Technology;
..............page:124-128
Video content crawler system research based on MapReduce
Kong Tao;Cao Bingzhang;Qiu Hehua;The 709 Research Institute;China Shipbuilding Industry Corporation;School of Computer Science and Technology;Huazhong University of Science and Technology;
..............page:129-132