Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2013 Issue 2
mDHT:A Search Algorithm to Extra-large Volume of Data Based on Open HDFS Platform and Multi-level Indexing
TANG Yu;WANG Ying-jie;FAN Ai-hua;YAO Yuan-zhe
..............page:195-199,234
Research on Image Integral Algorithm Optimization Based on OpenCL
JIA Hai-peng;ZHANG Yun-quan;XU Jian-liang
..............page:1-7
Grain Yield Prediction Model Based on Grey Theory and Markvo
XIANG Chang-sheng;ZHANG Lin-feng
..............page:245-248
Dependency Basis of Arbitrary Axiomatic System
MA Yuan
..............page:200-205
Approach for Web Service Composition Trustworthiness Evaluation
TANG Jia-jun;HUANG Zhi-qiu;WANG Jin
..............page:163-166,171
Analysis on the Applicability of Dempster's Combination Rule
XIAO Jian-yu;TONG Min-ming;FAN Qi;WANG Xiao-lei
..............page:249-252
Research on Reputation Model Based on Interest Group in P2P File Sharing System
LI Shao-jing;SU Wan-li
..............page:129-132,144
Distributed Network Risk Assessment Method Based on Attack Graph
FANG Ming;XU Kai-yong;YANG Tian-chi;MENG Fan-wei;YU Cong
..............page:139-144
Improved Subdivision Algorithm of Trapezium Examining Strip for Constraint Voronoi Diagram Generation
LI Hai-sheng;ZENG Yu-hang;CAI Qiang;LIU Yue-wu
..............page:301-303,封3
Study on Label Propagation Based Community Detection Algorithm for Social Semantic Network
CAI Guo-yong;LIN Hang;WEN Yi-min
..............page:53-57
Service-oriented Component Specification
TANG Long-ye;WANG Yu;WANG Zhi-jian
..............page:180-185
Study on Topology with Non-uniform Hierarchical Clustering for Wireless Sensor Networks
LI Hong-bing;XIONG Qing-yu;SHI Wei-ren
..............page:49-52,77
Classification Algorithm of Database Request Based on Session and Content Level in Cloud Computing
ZHAO Juan-juan;LIU Tao;QIANG Yan;LU Jun-zuo
..............page:177-179
Model-based Approach for Software Test Adequacy Analysis
ZHANG Yao;BAI Xiao-ying;ZHANG Ren-wei;LU Hao
..............page:153-158
Software Reliability Growth Model Based on Dynamic Fuzzy Neural Network with Parameters Dynamic Adjustment
LIU Luo;GUO Li-hong;XIAO Hui;WANG Jian-jun;WANG Gai-ge
..............page:186-190
Retrieval Based on Lexical Chains in Q & A System
ZHANG Jiang-tao;DU Yong-ping
..............page:257-260,300
Efficient and Provably Secure IBE Scheme Suitable for Multi-hop Cognitive Radio Networks
YU Yong;LEI Feng-yu;QIN Yu-hua;ZHANG Sha-sha
..............page:71-77
Seal Character Strokes Segmentation Method Based on the Skeleton
YANG Ping;LOU Hai-tao;HU Zheng-kun
..............page:297-300
Simulation System Based on Multi-scale Fusion of City Traffic Network Optimization
LI Xiao-feng;HUANG Guo-xing;LI Dong
..............page:108-111
Research on Knowledge Reasoning Technology in Emergency Command System
ZHANG Jing-yi;TONG Qing;XIAO Xiao-hua
..............page:261-264
Formalization of Gauge Integration Theory in HOL4
GU Wei-qing;SHI Zhi-ping;GUAN Yong;ZHANG Jie;ZHAO Chun-na;YE Shi-wei
..............page:191-194,228
Real-time Network Security Assessment Based on Dynamic Attack Graph
CHEN Jing;WANG Dong-hai;PENG Wu
..............page:133-138
Secret Gray-level Image Sharing Scheme Based on Recovery Function and Error Diffusion
OU Duan-hao;WU Xiao-tian;SUN Wei;LIU Juan
..............page:112-116
Robust and Fast Feature Points Matching
XU Zheng-guang;CHEN Chen
..............page:294-296
Novel Identity Based Broadcast Signcryption Scheme
SUN Jin;HU Yu-pu
..............page:124-128
Access Control Method Based on Fuzzy ECA Rules for Pervasive Computing Environments
ZHANG Li-chen;WANG Xiao-ming;DOU Wen-yang;LIU Ding
..............page:78-83
Research and Design of Cloud Computing Simulation System Based on Phase Space
ZHANG Lei;WANG Peng;HUANG Yan;CHEN Dong-xiao;GUO You-ming
..............page:84-86,111
Novel Mining Implicit Text Fragment from Abstract Scheme
DAI Lu;DING Li-xin;XUE Bing
..............page:218-221
Statistical Machine Translation Based on Translation Rules
LIU Ying;JIANG Wei
..............page:214-217
Imperative-style Semantics Framework for Object-oriented Languages
HUA Bao-jian;GAO Ying
..............page:159-162
Chameleon Signature Scheme Based on Lattice
XIE Xuan;YU Jian-ping;WANG Ting;ZHANG Peng
..............page:117-119
Sleep Scheme Based on Contact Time in DTN
FU Kai;XIA Jing-bo;YIN Bo
..............page:87-90
Attribute Weight Evaluation Approach Based on Approximate Functional Dependencies
ZHANG Xiao-yan;MENG Xiang-fu;MA Zong-min;ZHANG Wen-bo;ZHANG Xiao-peng
..............page:172-176
Data Privacy Protection Mechanism for Cloud Storage Based on Data Partition and Classification
XU Xiao-long;ZHOU Jing-lan;YANG Geng
..............page:98-102
Concept Algebra Based on Lattice
ZHANG Xu-jie;LIU Zong-tian;LIU Wei;WANG Dong;TIAN Long
..............page:265-269,311
Optimization Model for Performance of Molecular Dynamics Simulation Based on Modified Cell-linked List Method
JIN Ming-can;HU Chang-jun;LI Jian-jiang;MIAO Qing-song
..............page:12-15
Cluster-based Multipath Routing Protocol for Wireless Sensor Networks
MA Ming;XU Bao-guo
..............page:91-94
Completed Free Resource Management Research on Dynamic Partial Reconfigurable System
CHAI Ya-hui;ZHANG Sheng-hui;HUANG Wei-chun;LIU Jue-fu;XU Wei-min
..............page:20-23,34
Mental Fatigue Recognition Extension Model Based on Facial Visual Cues
CHEN Yun-hua;YU Yong-quan;ZHANG Ling;DING Wu-yang
..............page:284-288
Parallel Implementation and Optimization of Two Basic Geo-Spatial-Analysis Algorithms Based on OpenMP
ZHU Xiao-min;PAN Jing-shan;SUN Zhan-quan;GU Wei-dong
..............page:8-11,39
Low Overhead Large Scale Location-based Information Sharing System
LIU Yuan-jian;MENG Xiang-xu;WANG Xiao-dong;ZHOU Xing-ming
..............page:24-29
Track-to-track Fusion Algorithm Based on Track Quality with Multiple Model
ZHANG Wei;WANG Ze-yang;ZHANG Ke
..............page:65-70
Multi-Agents Network Security Risk Evaluation Model Based on Attack Graph
YANG Hong-yu;JIANG Hua
..............page:148-152
Exploring Multiple Execution Paths Based on Execution Path Driven
ZHANG Ping;LI Qing-bao;CUI Chen
..............page:145-147,185
xin xi
..............page:封2
Property Weight Based Co-reference Resolution for Linked Data
ZHANG Xiao-hui;JIANG Hai-hua;DI Rui-hua
..............page:40-43
Research of Chinese Writeprint Recognition Using Semi-random Feature Sampling Algorithm
LI Dong-yuan;LIU Zhi;LIU San-ya;MENG Wen-ting
..............page:120-123,152
Human Action Recognition Using Image Contour
ZHAO Hai-yong;JIA Bao-xian
..............page:312-314,封3
Research on System Identification by SPPSO Programming for Time-delay HBV Model
TANG Xiao;WU Zhi-jian
..............page:210-213,217
Survey on Feedback Correlation Based Dynamic Trust Model for P2P Systems
WANG Yong;HOU Jie;BAI Yang;XIA Yun;QIN Zhi-guang
..............page:103-107
Mashup Services Clustering Based on Tag Recommendation
HUANG Yuan;LI Bing;HE Peng;XIONG Wei
..............page:167-171
Qualitative Preference Decision and Reasoning of Consistency for CP-nets
SUN Xue-jiao;LIU Jing-lei
..............page:274-278
Delivering Social Activity Formation Service over Opportunistic Networks
LI Dong-sheng;YANG Zhi-yi;GUO Bin;HE Hui-lei;YU Zhi-wen
..............page:35-39
Adaptive Algorithm for MRMP
SONG Chao-chao;WANG Hong-guo;SHAO Zeng-zhen;YANG Fu-ping
..............page:222-228
Local Evolving Model Research of Layered Supply Chains Complex Networks
LIU Hong;ZHOU Gen-gui;FU Pei-hua
..............page:270-273
Quantum-behaved Particle Swarm Algorithm on Weapon Target Assignment
LIU Shuang-ying;HAN Xie
..............page:235-236,248
Parallel Algorithm for Computing Convex Hulls in Multi-processor Architecture
YAN Jian;BI Shuo-ben;WANG Da;GUO Yi
..............page:16-19,57
Research on Fast 3-D Rotation Calculation Based on Video Techniques
ZHU Xiao-dong;YU Song-nian
..............page:289-293,307
Efficient Algorithm for Online Mining Closed Frequent Itemsets over Data Streams
MAO Yi-min;CHEN Zhi-gang
..............page:229-234