Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2011 Issue 5
New Heuristic Algorithm Based on Web Service Composition
SUN Zhan-zhi;ZHU yi-an;CHE Ming
..............page:116-118
Time-dependent Chinese Postman Problem Solved by TWO Layers SA/GA Algorithm
SUN Jing-hao;WU Xiong;TAN Guo-zhen;YAN Chao
..............page:93-95,101
Software Cascading Failures Based on Coupled Map Lattice
ZHOU Kuan-jiu;LAN Wen-hui;FENG Jin-jin
..............page:129-131,174
DCSP-based Resource Allocation Approach for Emergency Rescue in Coal Mine
LI Wei;ZHANG Zi-li;WU Hua-jun
..............page:244-248
Two Dimensional Dynamic Priority-based FCFS Token-Queuing Algorithm
LIU Jun-rui;CHEN Ying-tu;FAN Xiao-ya
..............page:89-92
Domain Modeling and Mapping Technique Based on Goal-tree
JIAO Feng
..............page:107-112
CCNeter:An Automatic Modeling Tool Based on Petri Nets for C Program
ZHOU Guo-fu;SUN Yun-qiu;CAI Yu
..............page:96-101
Design and Implement of Embedded Web Server toward Video Surveillance System
ZHOU Ruo-gu;DING Feng;LU li
..............page:236-239
Cross-layer Adaptive Round Distributed Clustering Routing Model for Wireless Sensor Networks
XU Nan;SUN Ya-min;HUANG Bo;YU Ji-ming
..............page:56-59,78
AP Clustering Based Biomimetic Pattern Recognition
DING Jie;YANG Jing-yu
..............page:224-226,230
Automatic Data Permutation Generation and Optimization for SIMD Devices
CHEN Xiang;SHEN Li;LI Jia-wen
..............page:290-294
Nearest Neighbor Method Data Association Algorithm to Support Multi-target Tracking in WSN
ZHU Xiao-gang;YANG Bing;XU Hua-jie
..............page:67-70
Extracting Methods of Primitive Shapes and Boundary Curves from Scattered Point Set
LIU Guang-shuai;LI Bai-lin;HE Chao-ming
..............page:279-282
Research of Multiple Dimensional Reliability Model for MANET
ZHAO Zhi-feng;ZHAO Xi-bin;CHEN Dan-ning
..............page:60-63,92
Research on Workload Balancing Strategy Based on Flexible Layout
LIU Qun;FENG Dan;LI Jian
..............page:283-286
Two-phrase Retrieval Strategy in Content Aware Network Storage System
LIU Ke;QIN Lei-hua;ZHOU Jing-li;NTE Xue-jun;ZENG Dong
..............page:20-23,48
Design and Implementation of MOSE for Optical Molecular Imaging Simulation
REN Nu-nu;CHEN Duo-fang;CHEN Xue-li;PENG Kuan;MAO Jing-jing;TIAN Jie
..............page:268-271
Lip Feature Extraction Based on DCT and ONPP
LIANG Ya-ling;DU Ming-hui
..............page:261-264
Improved Algorithm of Congestion Control Based on Bandwidth Estimation
SHI Shi-jie;XUE Kai;SHAO Yan;ZHANG Guo-yong
..............page:71-73
New Mobile Agents Secure Itinerary Protection Based on Merkle Trees
LIU Yi;HAO Yan-jun;PANG Liao-jun
..............page:28-30
Cyber-physical System Architecture Design
CHEN Li-na;WANG Xiao-le;DENG Su
..............page:295-300
Automatic Video Object Segmentation Based on Spatio-temporal Information
ZHANG Xiao-yan;MA Zhi-qiang;ZHAO Yu-bo;SHAN Yong
..............page:275-278,封3
P-Fuzzy Sets(AF,AF)and its Applications
YAN Li-mei;XU Feng-sheng;SHI Kai-quan
..............page:194-198
Multicollinearity-based 3D DV-Hop Localization Algorithm
YAN Xiao-yong;QIAN Huan-yan;GAO De-min;YU Ji-min
..............page:37-40,44
P-sets and F-memory Information Characteristic-application
WANG Yang;SHI Jin-chang;SHI Kai-quan
..............page:212-215,243
Study of Adaptive RED Algorithm Based on 2nd-order Difference Equation
FAN Xun-li;ZHENG Feng;GUAN Lin;GAO Li
..............page:24-27
Emotion Mechanism of Uncertain Behavior Selection
ZHANG GUO-feng;LI Zu-shu
..............page:252-257
Image Watershed Segmentation with Evolutionary Programming
ZHAO Shan;WANG Shui
..............page:265-267,282
Gradient Field Optical Flow Estimation for Color Image Sequences Based on Automatic Growcut
LIAO Bin;DU Ming-hui;HU Jin-long
..............page:272-274,300
Instructing Low-power TLB Design by the Analysis of Program Behavior
SHI Li-wen;FAN Xiao-ya;CHEN Jie;HUANG Xiao-ping;ZHENG Qiao-shi
..............page:301-304,封3
Predicate Formal System (A)UL-h∈[0.75,1]and its Soundness
MA Ying-cang;HE Hua-can
..............page:178-180,223
Self-adaptive Optimization for Traffic Flow Model Based on Evolvable Hardware
NIE Xin;LI Yuan-xiang;WANG Long;LIU Lin
..............page:186-189
Feature Preserved Mesh Simplification Algorithm Based on Stochastic Sampling
ZHAO Ye;ZHOU Chang;WANG Chang
..............page:249-251
Grid-based K Nearest Neighbor Query Processing Algorithm in Wireless Sensor Networks
LIU Yu-lei;QIN Xiao-lin;SHEN Jia-jia
..............page:31-36
Data Dependence and Separation-application of Abnormal Data
LIN Hong-kang;LI Yu-ying;RUAN Qun-Sheng
..............page:203-207
Local Cluster Based Biased Sampling of Trajectory Stream
WANG Kao-jie;ZHENG Xue-feng;SONG Yi-ding;AN Feng-liang
..............page:135-137,185
Mining Frequent Subtrees from Dynamic Database
GUO Xin;DONG Jian-feng;ZHOU Qing-ping
..............page:138-141
Regular Region Algorithm Optimal Coverage and Connectivity in WSN
SUN Ze-yu;XING Xiao-fei
..............page:79-82
Design of Linear System Solver on CCA
ZHOU Jing-jing;SHENG Xin-ya
..............page:127-128,163
Adaptive Query Optimum Scheduling Strategy on Data Streams
DONG Nan-nan;LU Yan;SONG Bao-yan
..............page:142-144,193
Missing Data Imputation Based on Generalized Mahalanobis Distance
CHEN Huan;HUANG De-cai
..............page:149-153
Study on Indexing Method for Korean Information Search
JIN Guang-he;WANG Xing-wei;JIANG Ding-de
..............page:169-174
Customer Segmentation Modeling on Factor Analysis and K-MEANS Clustering
PENG Kai;QING Yong-bin;XU Dao-yun
..............page:154-158,198
Multiple Data Threshold Detecting Method Based on Autonomic Computing
LIU Wen-jie;LI Zhan-huai
..............page:132-134,168
Perceived Speech Quality Estimation Model for VoIP-based Networks
HU Zhi-guo;ZHANG Da-lu;ZHANG Jun-sheng
..............page:49-53,70
Research on Eliciting Security Requirement Methods
JIN Ying;LIU Xin;ZHANG Jing
..............page:14-19
Classifier Algorithm Based on Orthogonal Projection
WANG Wei-dong;MIAO Shuai;YANG Jing-yu
..............page:190-193
Neighboring Point Data Recovery for CDP Based on Data Gap
HOU Li-man;LI Zhan-huai;HU Na
..............page:159-163
Joint Multi-path Routing and Channel Assigmnent Strategy for Cognitive Wireless Mesh Networks
GU Jin-yuan;ZHANG Guo-an;BAO Zhi-hua
..............page:45-48
Research of Trust Evaluation Model Based on Reputation and Cooperation
LI Li-miao;CHEN Zhi-gang;DENG Xiao-heng;GUI Jing-song
..............page:41-44
Research of Phase Transition in Artificial Intelligence
GU Wenxiang;HUANG Ping;ZHU Lei;YIN Ming-hao
..............page:1-7
Effort of User-Item Degree Corrlations to Bipartite Network Personalized Recommendations
CHENG Ting-ting;WANG Heng-shan;LIU-Jian-guo
..............page:216-219
Chernoff Bound Based Approximate Frequent Itemset Mining Method over Streams
LI Hai-feng;ZHANG Ning
..............page:164-168
Research of Security Authentication Protocol of the RFID Based on the Multi-prover Model
LU Yao;LIAO Ming-hong;LI Gui-lin
..............page:74-78
Subject Sentence Extraction Based on Undirected Graph Construction
GE Bin;LI Fang-fang;LI Fu;XIAO Wei-dong
..............page:181-185
COSMIC-FFP Function Size Measurement for Object-oriented Methods
JI Chun-lei;YAN Shun-cheng;SONG Guo-xin
..............page:119-122
Performance Evaluation Algorithm of Digital Modulation Signals Recognition
LIU Ming-qian;LI Bing-bing;LIU Han
..............page:64-66
RMLT DR Algorithm\'s Research and Implementation in Pedestrian Navigation System
ZHENG Wei;WANG Wei-xing;LIANG Shun-long
..............page:240-243
Surveys of Software Safety
FAN Xiao-guang;CHU Wen-kui;ZHANG Feng-ming
..............page:8-13,27
Research of User Interest Drift Pattern Based on Web Access Information
MA Li;TAN Wei;LI Pei
..............page:175-177,219
DataStreams Clustering Algorithm Based on Density and Sliding Window
HU Rui;LIN Zhao-wen;KE Hong-li;MA Yan
..............page:145-148
QoS Research of H.264 Video Transmission in Embedded Wireless LAN
LI Wen-xin;LI Yu-guang;HU Yan-su;MU De-jun
..............page:83-85
Cache-style Parallel Checkpointing for Large-scale Computing System
LIU Yong-yan;LIU Yong-peng;FENG Hua;CHI Wan-qing
..............page:287-289,封3