Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2012 Issue 3
Symbolic Model Checking of Asynchronous FIFO
LUO Li;OU Guo-dong;LIU Bin;XU Wei-xia;DOU Qiang
..............page:268-270
Tree Decomposition and its Applications in Algorithms:Survey
GAO Wen-yu;LI Shao-hua
..............page:14-18
Resource Optimization for Uncertain Traffic in Multi-radio Wireless Networks
XU Jing;LIU Wei;YANG Zong-kai
..............page:33-38
Study on GSNPP Algorithm Based Privacy-preserving Approach in Social Networks
WEI Wei;LI Yang;ZHANG Wei-qun
..............page:104-106
Research on Server Centric Data Center Network Design
YIN Dong;MU De-jun;DAI Guan-zhong
..............page:110-112,123
Muitispectral and Panchromatic Images Fusion Based on Directionlets
ZHANG Jian;CHEN Xiao-wei
..............page:249-250,264
xin xi dong tai
..............page:封2
Safety-centered Architecture Design Method for IMA Software
XU Xian-liang;ZHANG Feng-ming;CHU Wen-kui
..............page:128-130,162
Chaotic Artificial Glowworm Swarm Optimization Algorithm with Mating Behavior
HUANG Kai;ZHOU Yong-quan
..............page:231-234
Parallel Computing and Rendering Framework of Time Variable 3D Scalar Fields
YU Rong-huan;DENG Bao-song;WU Ling-da;QU Shi
..............page:183-186,205
Document Classification Algorithm Based on Manifold Regularization
XU Hai-rui;ZHANG Wen-sheng;WU Shuang
..............page:192-195
Parallel Program Design and Implementation on Precipitation Program of Networking Weather Radar System
WU Shi-lei;AN Hong;LI Xiao-qiang;ZHOU Wei;LIU Gu;WEI Xue-chao
..............page:271-275
Lightweight High Performance Computing Environment Monitoring System Based on GMA
WANG Wei;WEI Yong;ZHANG Xiao-xia;LUO Hong-bing
..............page:283-285,311
X-Hop:Storage of Transitive Closure and Efficient Query Process
SHU Hu;CHONG Zhi-hong;NI Wei-wei;LU Shan;XU Li-zhen
..............page:144-148
Research on Privacy Preserving Distributed Clustering Algorithm
LIU Ying-hua;YANG Bing-ru;CAO Dan-yang;MA Nan
..............page:160-162
Research of Ranking Algorithm Based on Information Quantity and Entropy in Meta Search Engine
LAI Xiang-xu;HAN Li-xin;ZENG Xiao-qin;WANG Min;WU Sheng-li
..............page:153-156,191
Automatic Generation of Attack-based Signature
WANG Guo-dong;CHEN Ping;MAO Bing;XIE Li
..............page:118-123
Fault-tolerant Routing Algorithm in 2D-Mesh
XU Da-cheng;FAN Jiar-xi;ZHANG Shu-kui
..............page:113-117,134
Algorithm of Frequent Patterns Finding Based on Large Scale Corpus Partition
DING Xi-yuan;HUANG He-yan;ZHANG Hai-jun;WANG Shu-mei
..............page:149-152,169
Extracting Abbreviated Names for Chinese Entities from the Web
DING Yuan-jun;CAO Cun-gen;WANG Shi;FU Jian-hui
..............page:174-182,195
Method of Structure and Fusion for Uncertainty Seminar Information
XIANG Dong;ZHAO Yong;CHEN Yang
..............page:187-191
Image Segmentation of Multilevel Thresholding Based on Spectral Clustering
ZOU Xiao-lin;CHEN Wei-fu;FENG Guo-can;LIU Zhi-yong;TANG Xin
..............page:246-248,259
Situation-driven Framework for Context-aware Computing
XU Bu-kan;ZHOU Xing-she;LIANG Yun-ji;WANG Hai-peng;YU Zhi-wen
..............page:216-221
Performance Test of Massively Parallel Program on TH-1A
ZHU Xiao-qian;MENG Xiang-fei;JIAN Xiao-dong;FENG Jing-hua
..............page:265-267,282
Efficient Method for Histogram Generation on GPU
DI Peng;HU Chang-jun;LI Jian-jiang
..............page:304-307
Recent Advances in P2P Streaming with Network Coding
XU Jin;LI Xiao-feng;FU Zhi-zhong;XIAN Hai-ying
..............page:1-8
Improved Algorithm for Communication Synchronization on Reconfigurable Mesh with Faults
ZHANG Yuan-rui;WU Ji-gang;DUAN Xin-ming
..............page:295-298,封3
Logical Framework for Evaluation of Multiple-premise
XIA Lan-ting;HAN Dao-jun;BIAN Rui;LI Lei
..............page:235-242
Parallel Traffic Signal Numerical Optimization Algorithm Study
ZHANG Li-dong;JIA Lei;ZHU Wen-xing;SHI Xiao-wei
..............page:206-208
Image Denosing Based on Context Model in Contourlet Domain
LIU Zhen-tao;LI Tao;DU Hui-min;HAN Jun-gang
..............page:243-245
Research on Image Blur Algorithm Optimization Using OpenCL
ZHANG Ying;ZHANG Yun-quan;LONG Guo-ping
..............page:260-264
Research on Service Matching Method for LBS
ZHANG De-gan;WANG Dong
..............page:19-22,61
Improvement of Web Information Extraction Based on Genetic Algorithm and Hidden Markov Model
LI Rong;HU Zhi-jun;ZHENG Jia-heng
..............page:196-199,215
Generalized Intuitionistic Fuzzy Implication and its Residuated Lattice
XUE Zhan-ao;XIAO Yun-hua;CHENG Hui-ru;XUE Hai-feng
..............page:200-205
Parallel Realization of the MRRR Algorithm Based on CUDA
WANG Li-jie;ZHAO Yong-hua
..............page:286-289
Internal P-reasoning and Identification of Internal Convergence Information
XU Feng-sheng;YU Xiu-qing;SHI Kai-quan
..............page:212-215
Research on Intrusion Detection System Based on Commodity Multi-core Platform
CHEN Cheng;SUN Yi-pin;ZHONG Qiu-xi;HOU Yi-fan
..............page:71-74
Research on BIC Security Mechanisms of the Polymorphic Key Exchange Protocol
YIN Yi-feng;DING Han-qing;HU Yu-pu
..............page:51-53
Modeling the Subjective Dynamic Trust with Behavior-based Attestation
SHI Guang-yuan;ZHANG Jian-biao
..............page:54-61
Adaptive Peer-to-Peer Overlay for the Maximum Throughput
FENG Guo-fu;ZHANG Jin-cheng;HAN Bing-qing;SUN Yu-xing;LI Wen-zhong
..............page:43-46,82
Analysis and Verification of Secure E-commerce Payment Protocol Based on Four Parties
XIAO Shi-cheng;LI Kai;GAN Zao-bin
..............page:75-78,92
Area Division Based Semi-auto DV-Hop Localization Algorithm in WSN
MAO Ke-ji;ZHAO Xiao-min;HE Wen-xiu;XIA Ming;WANG Lei;CHEN Qin-zhang
..............page:39-42,70
Reducing Number of Free Riders in Trust Model
XU Xiao-dong;ZOU Bao-jun;ZHU Shi-rui
..............page:88-92
Access Control Algorithm with Buffering in Cognitive Radio System
ZHANG Guo-bin;LI Ming;ZHAO Xiao-fang
..............page:79-82
Joint Detection of Difference Value Energy for Spectrum Sensing in Cognitive Radio
TANG Cheng-kai;LIAN Bao-wang;ZHANG Ling-ling
..............page:67-70
Evaluation of Hop-distance Relationship for Sensor Networks in Internet of Things
YU Fan-peng;NIU Yan-chao
..............page:107-109
Research on Dynamic Obstacle Avoidance and Path Planning for AS-R Mobile Robot
CHEN Jin-yin;YANGDong-yong;ZOU Qing-hua
..............page:222-226
Load Evaluation Method about Cloud Computing Cluster Based on the Load Grayscale Mapping Model
DONG Jing-yi;WANG Peng;QIN Yong-bo;JIANG Bing-kun;CHEN Lei;REN Chao
..............page:23-27
Automatic Computation and Data Decomposition Algorithm Based on Dominant Value
DING Rui;ZHAO Rong-cai;HAN Lin
..............page:290-294,303
Linear Linklist Based Algorithm for Fuzzy Association Rule Mining
LIU Qing-bao;WANG Wen-xi;WANG Wan-jun
..............page:135-138
Fast Approximation Algorithm Based on Adjacent Matrix for Construction Virtual Backbone
HE Yi-chao;TIAN Hai-yan;ZHANG Xin-lu;GAO Suo-gang
..............page:83-87
Construction and Simulation of Worm Propagation Model in Vehicular Internet of Things
WANG Zheng;QIAN Huan-yan;WANG Jing-ya;GAO De-min
..............page:28-32,38
ARIMA-based Weighted Clustering Algorithm for Prediction of Nodes\' Location in Ad-hoc Network
SHA Yi;YANG Yang;HUANG Ye;ZHU Li-chun;ZHANG Zhi-wei
..............page:47-50
Algorithms for Dominating Set Problems in OTIS Networks
XIANG Yong-xiang;YE Hui;LI Min;CHEN Wei-dong
..............page:93-97
Human Abnormal Behavior Recognition Based on Topic Hidden Markov Model
ZHU Xu-dong;LIU Zhi-jing
..............page:251-255,275
Survey of XQuery Implementation
LI Xiao-qing;LIAO Hu-sheng;ZHANG Xiao-bo
..............page:9-13,18
Research on Pre-processing Methods of Unstructured Grids
LIU Xin;LU Lin-sheng;CHEN De-xun
..............page:308-311
Adaptive Method to Select Policy in HSM
HU Na;LI Zhan-huai;ZHANG Xiao
..............page:139-143
FILiC:A Framework for Interactive Library on CUDA
WU Wei;QING Peng;QI Feng-bin
..............page:124-127,138
Cluster Algorithm for Time Series Based on Key Points
XIE Fu-ding;LI Ying;SUN Yan;ZHANG Yong
..............page:157-159,173
Data Flow Analysis Based on the Variable Scope
JIANG Shu-juan;ZHAO Xue-feng
..............page:131-134
Provable Secure Route Optimization Scheme for HMIPv6 in Wireless Mesh Network
WANG Gang;GUO Yuan-bo;LIU Wei
..............page:62-66
GPU-based Algorithm of Shortest Path
XING Xing-xing;ZHAO Guo-xing;LUO Zu-ying;FANG Hao
..............page:299-303
Research on Hardware/Software Task Partitioning for Reconfigurable System
ZHANG Dan;ZHAO Rong-cai;SHAN Zheng;HAN Lin;QU Jin
..............page:276-278,289
Application of QPSO Algorithm and Correlation Analysis in Feature Selection from ECG Signal
CAO Jun;LIU Guang-yuan;LAI Xiang-wei
..............page:209-211,221
Core Functions Analysis and Example Deployment of Virtual Honeynet
YI Xiu-shuang;MA Shi-wei;WANG Wei-dong
..............page:101-103,109