Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2011 Issue 12
Cloud-based Architecture for Media Forensics
HUI Wen;LIN Chuang;ZHAO Hai-ying;YANG Yang
..............page:28-30,42
SOA and Cloud Computing: Competition or Integration
ZHU Zhi-liang;YUAN Hai-tao;SONG Jie;LIU Guo-qi
..............page:6-11
Research on Cooperative Relaying Scheme Based on Compressed Packet
FENG Qiang;YU Hong-yi
..............page:65-67
Research on Watermarking Relational Database Based on Character Field
WANG Tang;CAO Bao-xiang;LU Xiao-feng;YANG Yi-xian;NIU Xin-xin
..............page:162-166,190
Improved Positive and Negative Association Rules Mining Algorithm
CHEN Ning-jun;GAO Zhi-nian
..............page:191-193,212
Balanced Space-time Frequent Itemsets Mining over Data Stream
SONG Kui-yong;REN Yong-gong;KOU Xiang-xia
..............page:187-190
Design and Implementation of Music Content Dynamic Encryption and License Authorization System
ZHANG Shuo;MA Zhao-feng;LU Xiao-feng;YANG Yi-xian;NIU Xin-xin
..............page:43-48
Partial Cut Set Algorithm for Maximum-flow of Networks
MAO Hua;MAO Xiao-liang;LI Bin
..............page:229-231,246
Hamming Weight-based Algebraic Side-channel Attack against PRESENT
WU Ke-hui;WANG Tao;ZHAO Xin-jie;LIU Hui-ying
..............page:53-56
Answer Set Programming Based Verification of Semantic Web Service Composition
QIAN J un-yan;HUANG Guo-wang;ZHAO Ling-zhong
..............page:131-134,161
Particle Swarm Optimization Algorithm Based on Stable Strategy
WEI Bo;LI Yuan-xiang;XU Xing;SHEN Ding-cai
..............page:221-223
Improved Monte Carlo Node Localization Scheme by Using Multi-energy-level Beacon
LIU Ke-zhong;CUI Yong-qiang;ZHANG Jin-fen;YAN Xin-ping
..............page:61-64,81
Certificate-based Aggregate Signature Scheme
PENG Yan-guo;PENG Chang-gen;FENG Lei;FAN Mei-mei
..............page:57-60
Research and Implementation on Visualization System for PPI Network
WANG Jian;XIE Dong;YANG Zhi-hao;LIN Hong-fei
..............page:232-235
Existence of Answer Sets of Normal Logic Programs
FANG Yi-li;ZHAO Ling-zhong;QIAN Jun-yan
..............page:213-220
Research on VMM-based Rootkit and its Detection Technology
ZHOU Tian-yang;ZHU Jun-hu;WANG Qing-xian
..............page:77-81
Self-adjusting Sampling Area MCL Algorithm for Mobile WSNs
YE Fei-hu;SHEN Hang;CAO Lei;BAI Guang-wei
..............page:49-52,60
Analysis Method of Embedded Code\'s Semantic Properties Based on ARM Microprocessor
LIU Tie-ming;JIANG Lie-hui;JING Jing;LI Ji-zhong
..............page:284-287,292
Pipeline Hardware Design and Optimization for H.264 Deblocking Filter
TAN Li-min;LI Ren-fa;CHEN Zhi
..............page:288-292
Research on Location Updates of Network-constrainted Moving Objects in Mobile Computing Environment
TANG Wei;ZHANG Dong-liang;FAN Yuan-yuan
..............page:106-109,138
xin xi dong tai
..............page:封3,306
Lagrange Twin Support Vector Regression
ZHENG Feng-de;ZHANG Hong-bin
..............page:247-249,254
Construction and Learning Method of Rough Logic Neural Network
CHEN Jin-rong;DING Shi-fei
..............page:236-238,268
Pricing Mechanism of TSP Solving Service in Cloud Computing
ZENG Xu-hong;ZENG Guo-sun
..............page:194-199
Schema Mapping Based on Semantic Similarity of Data Instances Sets
LI Rong-rong;WANG Hui;CHEN Ran
..............page:151-155
Medical Image Fusion Method Based on Lifting Wavelet Transform
YANG Yan-chun;DANG Jian-wu;WANG Yang-ping;LI Sha;TIAN Zhong-ze
..............page:266-268
License Plate Location Method Based on Image Region Segmentation
YING Jun;LIU Hong
..............page:281-283
Research on Distribution Center Information System Model for Internet of Things Based on RFID and SCOR
LV J un-min;MIAO Chun-chi;ZHOU Qi-hai;MA Chang-song
..............page:128-130,161
Estimation Method of Software Reliability for Safety-critical System
ZHANG De-ping;XU Bao-wen
..............page:135-138
AEMP-A New Reuptation Model of Sensor Nodes in WSNs
GU Xiang;QIU Jian-lin
..............page:92-95
New Variational Model for Image Segmentation
LUO Zhi-hong;FENG Guo-can
..............page:263-265,283
Coordinated Dynamic Spectrum Allocation Mechanism Design Based on Combined Priority Scheduling
WANG Fan;YAO Fu-qiang;ZHAO Hang-sheng;FENG Shao-dong;ZHANG Jian-zhao
..............page:31-35
Method for Evaluating on Two-terminal Reliability Based on Topology
HE Ming;CHEN Guo-hua;JIANG Jun;LIANG Wen-hui
..............page:96-99
Robust MP3 Audio Watermarking Algorithm Based on MDCT Spectral Entropy Recognition
LIU Ting;MA Zhao-feng;JIANG Ming
..............page:113-117
Analysis on Topology of P2P Logical Network with Simulation Experiments
FENG Chao-sheng;FENG Lin;QING Yu;YUAN Ding
..............page:121-124
Method of Shellcode Detection Based on Static and Dynamic Mechanism
ZHAO Shuai;DING Bao-zhen;SHEN Bei-jun;LIN Jiu-chuan
..............page:125-127,155
Image Sequence Based Lunar Landing Locating Algorithm
XU Huan-yu;LIU Ji-xin;SUN Wei-wei;LUO Nan;ZHU Jin
..............page:269-273
Novel Routing Algorithm Based on Trustworthy Core Tree in WSN
WANG Jiang-tao;CHEN Zhi-gang;DENG Xiao-heng
..............page:36-42
CORS TV:A Network Coding Based P2P TV System
ZHANG Zhi-ming;DU Jian;GUO Ying;ZHOU Jin;CHEN Zhen;LI Jun
..............page:20-27
Research on Boosting-based Imbalanced Data Classification
L1 Qiu-jie;MAO Yao-bin;WANG Zhi-quan
..............page:224-228
ILDM:Information Lifecycle Dynamic Management
MIN Hua-song;XU Gui-ping
..............page:239-241,262
Improved ISOMAP for a Single Manifold with a Gap
WANG Hong-yuan;LIU Ai-ping;CHENG Qi-cai;LIU Suo-lan
..............page:250-254
Research on One-hop Expansion Enhanced Tree Routing Protocol for Wireless Sensor Networks
YANG Gui-song;WANG Zhong-jie;HE Xing-yu
..............page:88-91,99
Analysis and Evaluation of Heuristic Algorithms for Test Suite Reduction
YOU Liang;LU Yan-sheng
..............page:147-150,177
Research of Human Task Performing System Based on Asynchronous Pattern in BPEL
LIU Ling;YU Gang;WEN Jun-hao
..............page:144-146,181
Privacy Preserving Technology for Multiple Sensitive Attributes in Medical Data Publishing
JIN Hua;LIU Shan-cheng;JU Shi-guang
..............page:172-177
Further Discussion on SynFlood Attack Detection Based on Distance Computation in Space Geometry
LIU Hui-yu;CHEN Kai;PENG Tao;CHEN Xiao-su
..............page:82-87
New Survey on Automatic Image and Video Annotation
YIN Wen-jie;HAN Jun-wei;GUO Lei
..............page:12-16
Description and Verification of Asynchronous Web Service Composition Based on XYZ/ADL
SHI Hui-juan;RONG Mei;ZHANG Guang-quan;ZHU Ji-han
..............page:139-143
Image Segmentation Based on Sobel Operator and Maximum Entropy Algorithm
ZHANG Hui;GONG Sheng-rong
..............page:278-280,292
Load Balancing Algorithm for Hierarchical P2P Networks
WANG Bin;SHEN Qing-guo
..............page:118-120,143
Routing Mechanism Based Algorithm for Fast Path Generation in Variable -Weight Network
TANG Jun;ZHANG Dong-liang
..............page:110-112,124
Saliency Detection Method Based on Spectrum Tuning Using Lateral Inhibition
LI Chong-fei;QU Zhi-guo;LU Kai;GAO Ying-hui
..............page:258-262
(√3) Subdivision Based on Laplacian Coordinate
LIU Wen-yao;WANG Guo-yin;GONG Xun;HU Yong
..............page:206-208,220
Minimum Joint Mutual Information Loss-based Optimal Feature Selection Algorithm
ZHANG Yi-shi;CHEN Chuan-bo
..............page:200-205
Extracting Name Aliases of Mailbox Users from Email Bodies
YIN Mei-juan;CHEN Shu-min;LIU Xiao-nan;LU Lin
..............page:182-186,199
Conceptual Design Methodology for Fuzzy XML Model
YAN Li;LIU Jian
..............page:156-161
New Method of the Fast Narrow Brand C-V Level Set Model for Image Segmentation
LI Chuan-long;LI Ying;LAN Guo-xin
..............page:17-19,35
Service Selection Approach Considering the Dynamic Change of QoS
SUN Ruo-nan;ZHANG Bin;ZHAO Xiu-tao;LI Fei
..............page:100-105,117
Granularity Transformation Operators for Granular Computing
CHEN Guang;ZHONG Ning;YAO Yi-yu;HUANG Jia-jin
..............page:209-212
Data Stream Clustering Algorithm Based on Density Grid
MI Yuan;YANG Yan;LI Tian-rui
..............page:178-181
Approach of Ontology Learning from Relational Database Based on FCA
OUYANG Chun-ping;HU Chang-jun;LI Yang;LIU Zhen-yu
..............page:167-171
Mandarin Prosodic Break Automatic Detection Based on Complementary Model
NI Chong-jia;LIU Wen-ju;XU Bo
..............page:242-246
Rule-based Ellipsis Identification in Chinese
YANG Guo-qing;KONG Fang;ZHU Qiao-ming;LI Pei-feng
..............page:255-257,273