Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2012 Issue 5
Random-and-Age-based Replication Maintenance Strategy
FU Zhi-peng;WANG Huai-min;Z0U Peng
..............page:31-35,39
Optimization of Network Resource Allocation Based on Genetic Algorithm
ZHANG Ying;YANG Ya-hui;TIAN Hao-ran;ZHANG Wei;DONG Jing-jing
..............page:36-39
Self-adjusting Distance MDS Algorithm for WSNs
YE Fei-hu;BAI Guang-wei;SHEN Hang
..............page:40-43,47
Discussion on the Intelligent Vehicle Technologies
WANG Guo-yin;CHEN Qiao-song;WANG Jin
..............page:1-8
Survey on Network Reliability Evaluation Methods
JIANG Yi-nan;LI Rui-ying;HUANG Ning;KANG Rui
..............page:9-13,18
Optimal Testing for Software Defects Based on Controlled Markov Chain
BAO Xiao-an;YAO Lan;ZHANG Xiao-wen;CAO Jian-wen
..............page:117-119,136
Research Progress of Affect Detection in Interdisciplinary Perspective
CHENG Jing;LIU Guang-yuan
..............page:19-24
Research on Sequential PLD Security Vulnerability Detection Method
CHEN Zhi-feng;LI Qing-bao;ZENG Guang-yu
..............page:53-56,79
Research on Component Behavior Fragment Extraction and Composition Based on Logical Reasoning
XU Jun;XIAO Gang;ZHANG Yuan-ming;GAO Fei;FANG Zhao-ling
..............page:120-123
Quick P2P Search Algorithm Based on Bloom Filter and Probabilistic Distribution Queue
CHENG Lan;GOU Jin;ZHOU Feng
..............page:57-61,94
Classification for Imbalanced Microarray Data Based on Oversampling Technology and Random Forest
YU Hua-long;GAO Shang;ZHAO Jing;QIN Bin
..............page:190-194
Cloud Data Storage Security and Privacy Protection Policies under IoT Environment
HE Ming;CHEN Guo-hua;LIANG Wen-hui;LAI Hai-guang;LING Chen
..............page:62-65,90
Automatic Test Data Generation Tool of Dynamic Variable Parameters Based on Genetic Algorithm
SHI Jiao-jiao;JIANG Shu-juan
..............page:124-127,155
Research and Implement of Facial Action on Human-like Agent
ZHOU Fang-fang;ZHAO Ying;YANG Bin
..............page:195-197,216
Research on Scale-free Network Model Based on Coupling Coefficients
ZHENG Mei-rong;LIU Yu-hua;XU Kai-hua;DAI Wen-wen
..............page:66-68,82
Research on Glowworm Swarm Optimization with Hybrid Swarm Intelligence Behavior
WU Bin;CUI Zhi-yong;NI Wei-hong
..............page:198-200,228
Overlay Construction Policy in Layered P2P Streaming System
CHEN Zhuo;FENG Gang;LU Yi
..............page:69-74
Dynamic Trust Management Research Based on ITIL Model
SHEN Si;HAN Pu;SU Xin-ning
..............page:75-79
Study and Application of Agent Based Parallel Iteration Reengineering Method
CHEN Zhi-bo;CHENG Shu-han
..............page:128-132,160
Automatic Data Type Reconstruction in Decompilation
HE Dong;YIN Qing;XIE Yao-bin;JING Jing
..............page:133-136
Two-dimensional Locality Preserving Projections Based on L1-norm
XING Hong-Jie;ZHAO Hao-Xin
..............page:201-204,238
Conceptual Modeling Method of Simulation System Based on OMCM
LIU Bin;MI Dong;DU Xiao-ming;GAO Lu
..............page:137-140
Effective Approach to Label Extraction and Matching
ZOU Xian-chun;WU Chun-ming;LI Sheng-yu
..............page:208-212
Data Allocation Algorithm Based on Visit Capacity and Dependency Evaluation in Cloud
SUN Xi-ling;CHEN Chao;DING Zhi-ming;XU Jia-jie;YUAN Dong
..............page:141-146,171
Opposition-based Self-organizing Migrating Algorithm
LIN Zhi-yi;WANG Ling-ling
..............page:217-218,233
Improved Broadcast Scheduling Algorithm in Mobile Real-time Environment
TIE Jun;WANG Xiao-rong;JIANG Tian-fa
..............page:147-150
Abstract of Core Operators of Multi-objective Optimizations Immune Algorithms
WANG Shu-ya;CHEN Yun-fang;ZHU Xiao-liang;HU Xiao-hong
..............page:219-222,242
Multi-resolution Modeling Based on Parallel Storage
ZHAO Xiao-song;LI Guo-hui
..............page:151-155
Improved Dijkstra Shortest Path Algorithm and its Application
WANG Shu-xi;WU Zheng-xue
..............page:223-228
Primitives-patterns Based Architecture Modeling Method of Operational Activity Model
XIE Wen-cai;SHEN Wei-ye;LUO Xue-shan
..............page:156-160
Research of Event Anaphora Resolution Based on Machine Learning Approach
ZHANG Ning;KONG Fang;LI Pei-feng;ZHU Qiao-ming
..............page:229-233
Approach of Chinese Event IE Based on Verb Argument Structure
XIAO Sheng;HE Yan-xiang
..............page:161-164,176
Inference Rules of Sequence Failure Symbol in Cut Sequence Set Model
LIU Dong;WANG Bo;ZHANG Hong-lin
..............page:234-238
Research on Estimate Method of DTW Early Abandon Ratio
LI Zheng-xin;ZHANG Feng-ming;LI Jun-kui;ZHANG Xiao-feng
..............page:165-167,186
New Attribute Reduction Algorithm Based on Reconstructed Consistent Decision Table
ZHAO Hong-bo;JIANG Feng;ZENG Hui-fen
..............page:168-171
Research on Computer Forensics System Based on Cloud Computing
WU Lu;WANG Lian-hai;GU Wei-dong
..............page:83-85
Moving Human Target Tracking and Contour Extraction with Weak Boundaries Based on Level Set Method
HU Shi;MEI Xue;ZHANG Jian;ZHANG Ji-fa
..............page:239-242
Improved Face Recognition Method Based on NMF
LIN Qing;LI Jia;YONG Jian-ping;LIAO Ding-an
..............page:243-245,270
Spectral Clustering Algorithm for Large Scale Data Set Based on Accelerating Iterative Method
CHEN Li-min;YANG Jing;ZHANG Jian-pei
..............page:172-176
Dynamic Splog Filtering Algorithm Based on Combined Features
REN Yong-gong;YIN Ming-fei;YANG Rong-jie
..............page:177-179,212
Density Based Weighted Fuzzy Clustering Algorithm
LI Cui-xia;SHI Wei-hang;LI Zhan-bo
..............page:180-182
Multilevel Median Filter Algorithm Based on Vertical and Horizontal Windows Relation
SHEN De-hai;LIU Da-cheng;XING Tao
..............page:246-248
Outlier Sub-sequences Detection for Importance Points Segmentation of Time Series
ZHANG Li-sheng;YANG Mei-jie;LEI Da-jiang
..............page:183-186
Orthogonal Differential Evolution Algorithm for Solving System of Equations
FENG Quan-xi;LIU San-yang;TANG Guo-qiang;LIN Liang
..............page:187-189,194
Face-hashing Algorithm Based on Fuzzy Cyclic Random Mapping
WU Yi-chen;FANG Yu-chun;TAN Ying
..............page:249-253
New Method for Branch Recognition Based on Gradient Phase Grouping
XIE Zhong-hong;GUO Xiao-qing;JI Chang-ying;ZHU Shu-xin
..............page:254-256,265
Research on Laplace Image Enhancement Algorithm Optimization Based on OpenCL
JIA Hai-peng;ZHANG Yun-quan;LONG Guo-ping;XU Jian-liang;LI Yan
..............page:271-277
PHG-Solid:A Parallel Adaptive FEM Software for 3D Structural Analysis
CHENG Jie;ZHANG Lin-bo
..............page:278-281,309
Fast Calculation of Simulation Projection for Cone-beam CT Based on Shepp-Logan Head Phantom
ZHANG Shun-li;ZHANG Ding-hua;LI Xiao-lin;LIU Min-na
..............page:257-260
Bio-inspired Fault-tolerant Approach for Sobel Operator
LV Qi;DOU Yong;XU Jia-qing;FENG Xue
..............page:287-290,299
Study on Method for Operational Event-trace Description Modeling and Validation
LIU Gang;LUO Ai-min;HUANGFU Xian-peng
..............page:291-294
Coding Scheme of Relative Length of Runs
HAN Jian-hua;ZHAN Wen-fa;ZHA Huai-zhi
..............page:295-299
Visual Tracking of Artificial Fish Swarm Algorithm Based on Riemannian Manifold Metric
DING Xin-miao;GUO Wen;XU Chang-sheng
..............page:266-270
Study of Silicon Photonics Based On-chip Optical Interconnect
QIAN Lei;WU Dong;XIE Xiang-hui
..............page:304-309
Design and Optimization of Simultaneous Iterative Reconstruction Technique Based on GPU Platform
ZHANG Guang-yong;LU Xiao-wei;SHEN Bo;ZHANG Kai;CHU Qi;ZHAO Kai-yong
..............page:310-313
Resource Allocation Algorithm for OFDMA-based Cooperative Communication Systems
WANG Dong;FENG Wen-jiang;HENG Yu-long
..............page:86-90
Study on Application of Hyperchaotic Encryption Combined with 3DES in Secure E-mail System
HUANG Han-qi;LIU Ming-hua;HU Jian;YIN Yan-wei;FENG Jiu-chao
..............page:91-94
Modeling of COA Problem of C2 Organization Based on Dynamic Influence Nets
ZHANG Jie-yong;YAO Pei-yang;SUN Peng
..............page:95-98,105
Optimization of New Nonlinear Propagation Model of Worm Based on Immune Hosts
TONG Xiao-jun;LI Qiao-jun
..............page:99-101,140
Study of Requirements Evolution Based on Queuing Theory
YAN Yu-qing;LI Shi-xian;SUN Wei-jun;HUANG Chang-qin
..............page:106-109,123
Web Services Evaluation Model Based on Qualification of Time Utility
YIN Gui-sheng;CUI Xiao-hui;MA Zhi-qiang;DONG Yu-xin
..............page:110-113