Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2012 Issue 4
Dynamic Shortest Path Algorithm for Multi-link Increment
XIAO Qian-cai;LI Ming-qi;GUO Wen-qiang
..............page:114-117,122
Practical Dual WiFi NIC and Multi-channel MAC Protocol
ZHAO Yun-long;KANG Shi-long;GAO Zhen-guo;YANG Fei
..............page:79-83
Semi-supervised Clustering Algorithm Based on Graph Contraction
LAN Yuan-dong;DENG Hui-fang;CHEN Tao
..............page:236-239
Improved Model of SNMPv3 Supporting Multicast
CHENG Chun-ling;ZHANG Deng-yin;CUI Guo-liang;SUI Zong-jian
..............page:89-93
Web Service Composition Model Based on Generalized Stochastic Colored Petri Nets
YANG Nian-hua;YU Hui-qun;GUO Xin-shun
..............page:142-144,158
Fast Parallel Molecular Algorithm for Solving the Discrete Logarithm Problem over Group on Zp+ DNA-based Computing
ZHOU Xu;LI Ken-li;YUE Guang-xue;ZHU Kai-le
..............page:232-235,268
Semantic Similarity-based Approach for Answering Imprecise Queries over Web Databases
MENG Xiang-fu;ZHANG Xiao-yan;MA Zong-min;ZHANG Zhi-yan
..............page:154-158
Heterogeneous Network Communication Framework in Smart Space Environment
YANG Yi;WANG Zhi-liang;WANG Lu;ZHANG Fu-shen
..............page:240-245
Combining the Hough Transform and an Improved Least Squares Method for Line Detection
GUO Si-yu;ZHAI Wen-juan;TANG Qiu;ZHU Yuan-juan
..............page:196-200
Congestion Control and Saturation Condition in Multi-hoop Ad hoc Based on Quasi-birth-and-death Model
XIA Wen-jie;LI Qian-mu;LIU Feng-yu;SUN Jin-hou
..............page:110-113
Research on Secure Distributions for Digital Contents in Multimedia Social Networks
ZHANG Zhi-yong;YANG Li-jun;HUANG Tao
..............page:94-97
Provable Secure Identity-based Threshold Proxy Signcryption Scheme
SUN Hua;GUO Lei;ZHENG Xue-feng;WANG Ai-min
..............page:101-105
States Space Reduction Algorithm for Timed Behavior Protocol
ZHANG Zhen-ling;JIA Yang-li;LI Zhou-jun
..............page:135-138
Relative Decision Entropy Based Decision Tree Algorithm and its Application in Intrusion Detection
JIANG Feng;WANG Chun-ping;ZENG Hui-fen
..............page:223-226
Design and Implementation for PLASMA Auto-tuning and Performance Optimizing
LV Jian-chun;ZHANG Yun-quan;WANG Ting;XIAO Xuan-ji
..............page:282-286
Application of Segmentation Based on Optical Flow in Gait Recognition
XU Yan-qun;ZHANG Bin
..............page:275-277,292
Multi-classification Algorithm for Indoor Positioning Based on Support Vector Machine
ZHU Yu-jia;DENG Zhong-liang;LIU Wen-long;XU Lian-ming;FANG Ling
..............page:32-35
Systematic and Irregular GLDPC Codes with Zigzag Component Codes
CHEN Yan-hui;SUN Xiao-yan;CHENG Bing
..............page:84-88
Cardiac MRI Registration Algorithm Based on Radon Transform and Power Spectrum
LUO Xiao-gang;LIU Jing-jing;WANG De-nuan;PENG Cheng-lin;HOU Chang-jun;HUO Dan-qun
..............page:254-257
Delay-constrained Binary Exponential Backoff Algorithm
WANG Ye-qun;HUANG Guo-ce;ZHANG Heng-yang;ZHENG Bo;JING Yuan
..............page:56-59,93
Timing Analysis and Design for DDR3 System
LI Jin-wen;HU Jun;CAO Yue-sheng;SHI Lin-sen;XIAO Li-quan
..............page:293-295,封3
HHSR:A Prototype of Network-on-chip with Commands and Data Transferred Separately
WANG Wei;QIAO Lin;TANG Zhi-zhong;LI Qing-bao
..............page:299-303
Study of Explosion Simulation Based on Particle System
HUA Ze-xi;WANG Ying-chun;SUN Jian-shun
..............page:278-281
Research on Parallel Modern Optimization Algorithms Using GPU
ZHANG Qing-ke;YANG Bo;WANG Lin;ZHU Fu-xian
..............page:304-310,封3
Incremental Hessian LLE by Preserving Local Adjacent Information between Data Points
GAO Cui-zhen;HU Jian-long;LI De-yu
..............page:217-219,226
Research on Geometric Constraint Solving in Family of Objects Feature Model
LIU Xian-guo;SUN Li-juan
..............page:269-274
Improved Global Optimization Algorithm Based on Incremental Support Vector Regression Model
JIA Yun-feng;ZHANG Ai-lian;WU Yi-zhong
..............page:185-188
Formal Languages Model for Temporal Data
MIAO De-cheng;XI Jian-qing
..............page:172-176,204
Novel Revocable Short Group Signatures Scheme without Encryption
MA Hai-ying;ZENG Guo-sun
..............page:41-45,66
Twin Distance of Minimum and Maximum Support Vector Machine
WANG Zhi-chao;ZHANG Hua-xiang
..............page:205-209
Research on Bandwidth Allocation Mechanism of IB QoS
ZHENG Xiao;CHEN Zhong-ping;WU Zhi-bing
..............page:127-130,134
Non-interactive and Non-malleable Commitment Scheme Based on Lattice
SUN Wei-wei;YANG Bo;YANG De-xin;XIA Feng
..............page:63-66
Multiple Paths Test Case Generation Based on Complex System Genetic Algorithm
YU Bo;JIANG Shu-juan;ZHANG Yan-mei
..............page:139-141,153
Improved Ant Colony Optimization Approach for the Team Orienteering Problem with Time Windows
KE Liang-jun;Zhang He;SHANG Ke;FENG Zu-ren
..............page:214-216
Retrieval of 3D CAD Models:Survey
LU Tong
..............page:14-22,27
P-sets and its Dynamic Equivalence Classes Characteristics
ZHANG Jing-xiao;XU Feng-sheng;SHI Kai-quan
..............page:246-249
Image Filtering Algorithm Based on TIP Model
KANG Mu;LI Yong-liang
..............page:258-260,264
Three Level Privacy Protection in Social Networks
ZHANG Rui;QU Bin-bin;ZHANG Ji-xin
..............page:164-167,188
Joint Feature Selection Method Based on Relevance and Redundancy
ZHOU Cheng;GE Bin;TANG Jiu-yang;XIAO Wei-dong
..............page:181-184
Research on Algorithm of Network Topology Discovery Based on Wireless Sensor in Internet of Things
NIU Xin-zheng;LIANG Fan;ZHOU Ming-tian
..............page:118-122
Parallel Transmission Model Based on P2P
JIANG Chun-mao;ZHANG Guo-yin;YAO Ai-hong
..............page:131-134
Ant Colony Algorithm Combined with Survey Propagation for Satisfiability Problem
WANG Fu;ZHOU Yu-ren;YE Li
..............page:227-231
Research on Deep Web Classification Based on Domain Feature Text
WU Chun-ming;XIE De-ti
..............page:177-180
Improved PSO Based on Evolutionary Process Learning
HU Wang;ZHANG Xin
..............page:193-195,213
Research on P2P-based Anonymous Communication Technology
ZHANG Guo-yin;LI Lu;LI Ying;YAO Ai-hong
..............page:98-100,109
New Gait Recognition Method Based on Static and Dynamic Features
LIU Zhi-yong;FENG Guo-can;ZOU Xiao-lin
..............page:261-264
Anonymous and Traceable Copyright Protection Protocol Based on Mobile Devices
JIANG Kun;WANG Xiao-ming
..............page:71-74
Research on P2P Traffic Identification Based on K-means Ensemble and SVM
LIU San-min;SUN Zhi-xin;LIU Yu-xia
..............page:46-48,74
Efficient RFID Location Method Based on Virtual Signal Strength
LI Jun-huai;ZHANG Guo-mou;YU Lei;SUN Zhuan-yi
..............page:67-70
On Multi-granular Labeled Classification for Spatial Remote Sensing Data
WU Wei-zhi;YANG Yu-fang
..............page:23-27
Efficient I/O Scheduler over Multi-bank Flash Memory File Systems
ZHAO Pei;LI Guo-hui
..............page:287-292
Affective Recognition from Pulse Signal Using Correlation Analysis and Max-Min Ant Colony Algorithm
CHEN Hong;LIU Guang-yuan;LAI Xiang-wei
..............page:250-253,274
Grammar Formal Method of Battle Management Language Based on Improved-BNF
LUO Chen;BAO Guang-yu;LIU Xiao-ming;YUAN Li-miao
..............page:189-192,209
Kernel Methods of Software Reliability Prediction
LOU Jun-gang;SHEN Qing;SHEN Zhang-guo
..............page:145-148
Application of Branch and Bound Algorithm Based on K-MEANS Clustering in Network Anomaly Detection
YANG Yu-zhou;ZHANG Feng-li;WANG Yong
..............page:60-62,97
Set Pair Analysis Method for Evaluating Denial of Service Attack Resistance Ability
WANG Hui-mei;XIAN Ming;WANG Guo-yu
..............page:53-55,83
Attribute Reduction Algorithm Based on Object Matrix in Incomplete Decision Table
WANG Wei;XU Zhang-yan;LI Xiao-yu
..............page:201-204
Research on Clone Detection for Large-scale Model
LIANG Zheng-ping;TAN Jia-jia;CHENG Yi-qun;MA Xiao-chi
..............page:28-31,52
Topology Optimization of Network Coding Based P2P TV
ZHANG Zhi-ming;ZHOU Jin;CHEN Zhen;LI Jun
..............page:36-40,70
Combination Model-based Self-similarity Traffic Prediction
GAO Qian;FENG Qi;LI Guang-xia
..............page:123-126