Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2016 Issue 1
Research on ONS Security
WANG Hu-qing;,SUN Zhi-xin;
..............page:1-7
Parallelization of Hydrostatic Numerical Forecasting Model of Marginal Sea
PANG Ren-bo;,ZHANG Yun-quan;,TAN Guang-ming;,XU Jian-liang;,JIA Hai-peng;,XIE Qing-chun;
..............page:14-17,29
Multi-sensor Fusion Based Indoor Real-time and Highly Accurate Trajectory Generation
LIU Ding-jun;,JIANG Xin-long;,LIU Jun-fa;,CHEN Yi-qiang;
..............page:18-21,43
New Type of Soft Weak BCI-algebras
LIAO Cui-cui;,LIAO Zu-hua;,ZHANG Long-xiang;,TONG Juan;,LUO Qing;,LIU Wei-long;
..............page:22-24,60
Three-way Decision Model Based on Probabilistic Graph
XUE Zhan-ao;,WANG Peng-han;,LIU Jie;,ZHU Tai-long;,XUE Tian-yu;
..............page:30-34
Kernel Canonical Correlation Analysis Feature Fusion Method and Application
XU Jie;,LIANG Jiu-zhen;,WU Qin;,LI Min;
..............page:35-39
New Heuristic Attribute Reduction Algorithm Based on Sample Selection
YANG Xi-bei;,YAN Xu;,XU Su-ping;,YU Hua-long;
..............page:40-43
Study on Model of Covering-based Rough Intuitionistic Fuzzy Sets
XUE Zhan-ao;,SI Xiao-meng;,ZHU Tai-long;,WANG Nan;
..............page:44-48,68
Full Affine Curve in Curvature Scale Space Image Registration
CHAI Xian-tao;,LIANG Jiu-zhen;,LANG Long-ya;
..............page:53-56,84
Matroidal Structure Induced by Neighborhood
LI Hui;,ZHU Feng;,LIN Zi-qiong;
..............page:57-60
Measuring Consistency of Two Datasets Using Shannon Entropy
CHE Xiao-ya;,MI Ju-sheng;
..............page:61-63,80
Research of SVM Multiclass Model Based on Granular Computing & Huffman Tree
CHEN Li-fang;,CHEN Liang;,LIU Bao-xiang;
..............page:64-68
Set Pair Attributes Soft Computing Method and its Application
LIU Bao-xiang;,BAI Bin;,LI Li-hong;,LI Yan;
..............page:69-72,76
Updating Approximations for a Type of Covering-based Rough Sets
LI Chang-qing;,ZHANG Yan-lan;
..............page:73-76
Cost and Risk Control of Conversion of Three-way Decisions' Boundary Domain
LI Li-hong;,LI Yan;,LIU Bao-xiang;
..............page:77-80
Classification Model of Visual Attention Based on Eye Movement Data
WANG Feng-jiao;,TIAN Mei;,HUANG Ya-ping;,AI Li-hua;
..............page:85-88,115
Unsupervised Learning from Categorical Data:A Space Transformation Approach
WANG Jian-xin;,QIAN Yu-hua;
..............page:89-93,121
Research on Multi-features Hierarchical Answer Quality Evaluation Method
CUI Min-jun;,DUAN Li-guo;,LI Ai-ping;
..............page:94-97,102
Color and Space Distance Based Salient Region Detection Using Fixed Threshold Segmentation
QIAN Kun;,LI Fang;,WEN Yi-min;
..............page:103-106,144
Algorithm for Mining Adjoint Pattern of Spatial-Temporal Trajectory Based on Grid Index
YANG Yang;,JI Gen-lin;,BAO Pei-ming;
..............page:107-110
Coalitional Game Spectrum Sensing Scheme
HE Huan-huan;,WANG Xing-wei;,LI Jie;,HUANG Min;
..............page:111-115
Multi-party Authorization Model for Social Networks
HUO Ying-yu;,MA Li;,ZHONG Yong;,QIN Xiao-lin;
..............page:116-121
Simple and Smoothed Fair Round Robin Scheduling Algorithm
GUO Zi-rong;,ZENG Hua-xin;,DOU Jun;
..............page:122-127
Distributed Construction for (k,m)-Fault Tolerant Connected Dominating Set in Wireless Sensor Network
MA Chen-ming;,WANG Wan-liang;,HONG Zhen;
..............page:128-132,158
Richards Model Based Data Center Backbone Network Bandwidth Allocation Policy
MENG Fei;,LAN Ju-long;,HU Yu-xiang;
..............page:133-136,153
Research of Smartphone Energy Saving Based on Buffer Threshold Adaptive Adjustment
JIANG Bo;,LI Tao-shen;,GE Zhi-hui;
..............page:137-140
Trustworthy Web Servcie Selection Based on Social Network
WU Ju-hua;,CHENG Xiao-yan;,CAO Qiang;,MO Zan;
..............page:141-144
System Throughput Optimization for Hybrid Device-to-Device Cellular Networks
QIAN Cheng;,QIAN Li-ping;,WU Hang;,CHEN Qing-zhang;
..............page:145-148,177
Novel Reliability Analysis Algorithm Based on MDDs in Networks with Imperfect Nodes
WANG Hong-gang;,DONG Rong-sheng;,QIAN Jun-yan;
..............page:154-158
Indoor Positioning Algorithm Based on Dynamic K Value and AP MAC Address Match
WANG Pei-zhong;,ZHENG Nan-shan;,ZHANG Yan-zhe;
..............page:163-165
Research on Privacy Access Control Based on RBAC
ZHANG Xue-ming;,HUANG Zhi-qiu;,SUN Yi;
..............page:166-171,185
Compound Approach for Sybil Users Detection in Social Networks
KANG Kai;,ZHANG Ying-jun;,LIAN Yi-feng;,LIU Yu-ling;
..............page:172-177
Authentication Protocol for Cooperation of Unmanned Vehicles
NIU Wen-sheng;,LI Ya-hui;,GUO Peng;
..............page:178-180,201
Efficient Solution to SMP Based on Coding and Homomorphic Encryption
TANG Xuan;,ZHONG Hong;,SHI Run-hua;,CUI Jie;
..............page:181-185
ABE Scheme with Generalized Wildcards on Prime Order Groups
LI Zuo-hui;,CHEN Xing-yuan;
..............page:186-190,210
CP-ABE Scheme with Supporting Policy Elastic Updating in Cloud Storage Environment
XIONG An-ping;,XU Chun-xiang;,FENG Hao;
..............page:191-194
Defense Strategies Selection Method Based on Non-cooperative Game Attack Forecast
ZHANG Heng-wei;,ZHANG Jian;,HAN Ji-hong;
..............page:195-201
Research of Trustworthiness Evaluation Model Based on Software Behavior
DING Wei-tao;,XU Kai-yong;
..............page:202-206,225
Research of PE File Information Hiding Based on Import Table Migration
TIAN Zu-wei;,LI Yong-fan;,LIU Yang;
..............page:207-210
Transformation and Verification Method of AADL Data Flows for Real-time System Using Uppaal
SHEN Ning-min;,LI Jing;,BAI Hai-yang;,ZHUANG Yi;
..............page:211-217
Testing Concurrent Behavior of System Based on CPN
LI Hua;,SUN Tao;,WANG Xian-rong;,XING Yi;,LI Ying-jie;,XIA Xing-hang;
..............page:218-225
Loop Unrolling in Vectorized Programs
GAO Wei;,ZHAO Rong-cai;,YU Hai-ning;,ZHANG Qing-hua;
..............page:226-231,245
Study on Data Repair and Consistency Query Processing
LIU Bo;,CAI Mei;,ZHOU Xu-chuan;
..............page:232-236,241
News-summarization Extraction Method Based on Weighted Event Elements Strategy
GUO Yan-qing;,ZHAO Rui;,KONG Xiang-wei;,FU Hai-yan;,JIANG Jin-ping;
..............page:237-241
Similarity of Objects in Incomplete Information Systems
LUO Jun-fang;,QIN Ke-yun;
..............page:242-245
Text Clustering Method Study Based on MapReduce
LI Zhao;,LI Xiao;,WANG Chun-mei;,LI Cheng;,YANG Chun;
..............page:246-250,269
Social Strength Learning between Users Based on Spatiotemporal Data
CHEN Yuan-juan;,YAN Jian-feng;,LIU Xiao-sheng;,YANG Lu;
..............page:251-254,274
Hybrid Recommendation Algorithm Based on User's Trust in Social Networks
WEN Jun-hao;,HE Bo;,HU Yuan-peng;
..............page:255-258
Pattern Drift Detection in Association Analysis Based on Relation Entropy and J Measure
YANG Ying-jie;,LIU Shuai;,CHANG De-xian;
..............page:259-263
Iterated Local Search Algorithm with Improved Perturbation Mechanism for Vehicle Routing Problem
HOU Yan-e;,KONG Yun-feng;,DANG Lan-xue;
..............page:264-269
Binary Granular Computing Model
ZHENG Lu-bin;,CHEN Yu-ming;,ZENG Zhi-qiang;,LU Jun-wen;
..............page:270-274
Improved Wind Driven Optimization Algorithm with Strong Development Ability
REN Zuo-lin;,TIAN Yu-bo;,SUN Fei-yan;
..............page:275-281,305
Parallel Hierarchical Association Rule Mining in Big Data Environment
ZHANG Zhong-lin;,TIAN Miao-feng;,LIU Zong-cheng;
..............page:286-289
Inlier Selection Algorithm for Feature Matching Based on K Nearest Neighbor Consistency
XIAO Chun-bao;,FENG Da-zheng;
..............page:290-293
Image Inpainting Method Based on Sparse Decomposition
ZHU Xuan;,ZHANG Xu-feng;,LI Qiu-ju;,WANG Ning;,TAO Ji-yao;
..............page:294-297
Mixture Noise Image Denoising Using Reweighted Low-rank Matrix Recovery
WANG Zhen-ping;,ZHANG Jia-shu;,CHEN Gao;
..............page:298-301
Compression Tracking Algorithm for Online Rectangle Feature Selection
CAO Yi-qin;,CHENG Wei;,HUANG Xiao-sheng;
..............page:306-309,314
Dynamic Multi-threshold Binarization Method for Visual Music Images
YANG Fang;,TENG Gui-fa;,TIAN Xue-dong;
..............page:310-314
Dorsal Hand Vein Recognition Algorithm Based on Effective Dimensional Feature
JIA Xu;,SUN Fu-ming;,CAO Yu-dong;,CUI Jian-jiang;,XUE Ding-yu;
..............page:315-319