Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2011 Issue 6
Research of an Efficient Variant of Batch RSA Algorithm
LI Yun-fei;LIU Qing;LI Tong;HAO Lin
..............page:127-132,139
PSD Congestion Control Algorithm in Ad-hoc Network
CHEN Liang;ZHANG Hong
..............page:45-48,69
Rough It-means Clustering Based on Self-adaptive Weights
ZHOU Yang;MIAO Duo-qian;YUE Xiao-dong
..............page:237-241
Research of Sketch Symbol Recognition Based on Bayesian Network
LI Lu;ZHOU Liang;DING Qiu-lin
..............page:262-265
Efficient ID-based Proxy Signature in the Standard Model
YU Yi-ke;ZHEN Xue-feng;HAN Xiao-guang;LIU Xing-bing
..............page:133-139
Analysis and Elimination of the Dependent Relationships in Trust Networks
JIANG Li-ming;ZHANG Kun;XU Jian;ZHANG Hong
..............page:70-73
Image Encryption Scheme Based on Novel Hyperchaotic System
LU Hui-bin;SUN Yan
..............page:149-152
Survey on Image and Video Painterly Rendering
HUANG Hua;ZANG Yu;ZHANG Lei
..............page:1-6,27
TDMA/CDMA Hybrid MAC Protocol for Wireless Sensor Network
GU Zhi-chun;XIAO De-qin
..............page:84-87,100
Architecture Design of Embedded Real-time Operating System for Heterogeneous Multi-core Processor
JIANG Jian-chun;WANG Tong-qing
..............page:298-302,封3
Survey on Realistic Simulation of Cloud
QIU Hang;YANG Ke;CHEN Yu;CHEN Lei-ting
..............page:14-19
Adaptive Data Dissemination Algorithm for Vehicular Opportunistic Networks
CAI Qing-song;NIU Jian-wei;LIU Chang
..............page:58-63
Harmony Search Algorithm for End-of-Life Items Disposal Facilities\' Location Problem
HAN Yi;CAI Jian-hu;ZHOU Gen-gui;LI Yan-lai;SONG Ping
..............page:255-258
Performance Evaluation for the Algorithms to Measure Texture Coarseness
ZHAO Hai-ying;XU Guang-mei;PENG Hong
..............page:288-292
Novel Digital Watermark Scheme Based on Wavelet Transform and Neural Network
CHEN Jun;ZHANG Wei;YANG Hua-qiang;HE Chun-xiao
..............page:142-144
Solution to Render the 2D Timely in the 3D Visual Reality
YANG Yang;XIAO Fei;MENG Kun;ZHAO Xiao-yong
..............page:279-282
Fuzzy Extension of OWL Supporting Representation of Customized Fuzzy Data Type
ZHAO Fa-xin;MA Zong-min;WANG Hai-long
..............page:200-204
Complex Network Model and Application in Epidemic Spreading and Controlling
CHEN Duan-bing;HUANG Sheng;SHANG Ming-sheng
..............page:118-121
Secure Network Coding:Challenges and Solution
LIU Wai-xi;YU Shun-zheng;CAI Jun
..............page:20-27
Research and Implementation of Deployment and Configuration Tool for Light-weight Components
SHI Dian-xi;DING Bo;CUI Wei;ZHANG Yi-ming;WANG Huai-min
..............page:165-168
Security Information Flow Model Based on Grid Environment
LIU Yi-he
..............page:157-160,199
Face Recognition Based on Wavelet Multiscale Singular-value Decomposition
ZHAI Jun-hai;WANG Hua-chao;ZHAI Meng-yao;WANG Xi-zhao
..............page:283-285,封3
Analysis for the Inter-domain Routing System Based on Cellular Automaton Model
XU Zan-xin;YUAN Jian;WANG Yue;FENG Zhen-ming
..............page:35-37
Study on AMS-02 Massive Data Processing Environment
YANG Peng
..............page:41-44
Network-aware Based Fault Tolerant Volunteer Computing
FAN Pei;SHEN Rui
..............page:38-40,63
Remote Attestation Extension for IPSec
WANG Jian;WANG Hai-hang;YANG Jian
..............page:49-53
EDCA Model of TCP/UDP Flows Based on Non-saturation
ZHANG Nan;XIAO Yang
..............page:64-69
Research on Network Protocol Enhancing Mechanisms Based on Online Social Networks
ZHENG Qian-bing;ZHU Pei-dong;WANG Yong-wen;XU Ming
..............page:81-83,117
Evaluation Method for Node Importance Based on Mutual Information in Complex Networks
ZHANG Yi;LIU Yu-hua;XU Kai-hua;LUO Zhen-rong
..............page:88-89,109
Security Analysis Approaches for Group Key Agreement Protocols
ZHAO Xiu-feng;XU Qiu-liang;WEI Da-wei
..............page:145-148,156
Context-aware Optimized Link State Routing Protocol for Fast Movement Scene
ZHANG Ke;ZHANG Wei;LI Wei;ZENG Jia-zhi
..............page:110-113,126
Overview of Anomaly Detection Based on Program
HUANG Jin-zhong;ZHU Miao-liang
..............page:7-13,53
Single-Class Classification Approach Based on Integrated Pyramid Model
XUE Wen;XIE Yong-hong;Ma Yan-hui;YANG Bing-ru
..............page:191-194
Storage of Fuzzy Ontologies Based on Relational Databases
LU Yan-hui
..............page:217-222,245
Integrated Route Strategy for Large Scale MANET
MA Chi;ZHANG Hong;LIU Feng-yu
..............page:96-100
Research on Target Contour Feature Extraction Based on Image Potential Energy Theory
CHEN Xue-song;XU Xue-jun;ZHU Hong-bo
..............page:270-274
Worm Warning and Optimization of Nonlinear Propagation Model
TONG Xiao-jun;WANG Zhu
..............page:101-105
Research of Online Writeprint Identification Based on Ensemble Learning and Genetic Algorithm
SUN Jian-wen;YANG Zong-kai;LIU San-ya;WANG Pei
..............page:242-245
Scalable Distributed Inverted Index Built on Cassandra
TANG Li-yang;NI Zhi-wei;LI Ying
..............page:187-190
Research on Frequent Itemsets Mining Algorithm Based on High-dimensional Sparse Dataset
YAN Zhen;PI De-chang;WU Wen-hao
..............page:183-186
Intra Macro Block Refresh Approach for Wireless Video Transmission
QIU Jin-bo;FENG Bin;DENG Hui-ping;YU Li;ZHU Guang-xi
..............page:114-117
Hyperspectral Images Compression Algorithm Using Adaptive Band Regrouping
BAI Lin;HE Ming-yi;DAI Yu-chao
..............page:275-278
Service-oriented Domain Feature Model
WU Ying-bo;WANG Xu
..............page:180-182,194
Distributed Deployment and QoS Performance Analysis of Grid Services Scheduling Algorithm
LIU Hong-lan;HAO Wei-dong;GAO Qing-shi
..............page:31-34
Denoising Algorithm with Wave Atoms Based on Nonlocal TV Regularization
WU Yu-lian;FENG Xiang-chu
..............page:286-287,292
Undirected Graph Languages
SHI Hai-zhong
..............page:259-261,274
Research on Analysis and Management of Dynamic Target Spatio-temporal Data
GAO Ren;TANG Long;WU Jue-bo
..............page:195-199
Cross-layer Data Transmission Control Based on Active Notify of Vehicular Ad-hoc Network Node
LI Yuan-yuan;SONG Jun;JIN Yan-hua;Huang Da-rong
..............page:153-156
Channel Estimation Based on Block-thresholding Wavelet Denoising for OFDM System
YANG Yong-li;LIU Jian;ZHU Guang-xi
..............page:74-76,105
Approach Based on Graphics Model for Semantic Modeling in Soccer Video
WANG Hao-ran;BAI Liang;LAO Song-yang
..............page:266-269,297
Novel Non-stationary Time Series Anomaly Detection Model Based on Superstatistics Theory
YANG Yue;HU Han-ping;XIONG Wei;DING Fan
..............page:93-95,117
Trustworthy Web Service Composition Approach Based on QoS
XIAO Wen;ZHANG Zi-li;LI Wei-hua
..............page:173-176
Operation-based Multi-secret Visual Cryptography Scheme with Disguised Patterns
FU Zheng-xin;YU Bin;FANG Li-guo
..............page:90-92
Automatic Service Orchestration by Dynamically Binding
LIANG Ping;YANG Xian-ze
..............page:177-179
Affinity Class-hyperparallel Fuzzy Support Vector Machine
ZHANG Ya-pu;MENG Xiang-ru;ZHAO Wei-hu;ZHANG Li
..............page:251-254,278
Quality Evaluation and Prediction for Question and Answer in Chinese Community Question Answering
LI Chen;CHAO Wen-han;CHEN Xiao-ming;LI Zhou-jun
..............page:230-236
Research of Evaluating Model on the Criticality of Software Vulnerability
LI Yi;LI Xin-ming;CUI Yun-fei
..............page:169-172,216
Research on an Ensemble Method of Uncertainty Reasoning
HE Huai-qing;LI Jian-fu
..............page:246-250
Improved IPv4/v6 Network IDS Technology
WU Zhuang;CHEN Jia-xin;WANG Ke-ping
..............page:140-141,152
New ID-based Aggregate Signature Scheme
WEN Yi-ling;MA Jian-feng;WANG Chao
..............page:54-57,80
Fuzzy/Temporal Characteristic of Vector Space on Fuzzy Temporal Database Design
DENG Li-guo;MA Zong-min
..............page:211-216