Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2016 Issue 2
Research and Advances on Deep Learning
SUN Zhi-yuan;,LU Cheng-xiang;,SHI Zhong-zhi;,MA Gang;
..............page:1-8
Operational Architecture Modeling Based on Information Flow
YANG Ying-hui;,LI Jian-hua;,NAN Ming-li;,TIAN Yan-tao;
..............page:13-18
Multi-pattern Matching Algorithm Based on Coding Association
ZHU Yong-qiang;,QIN Zhi-guang;
..............page:26-30
Comparison of Chinese Anaphora Resolution Models
ZHOU Xuan-yu;,LIU Juan;,LUO Fei;,LIU Yang;,YAN Han;
..............page:31-34,56
Fingerprint Focal Point Detection Method Based on Map of Cross Points' Weights
GUO Xi-feng;,ZHU En;,ZHOU Si-hang;,SHEN Xiao-long;,YIN Jian-ping;
..............page:35-37,46
Data Compression with Attribute Homomorphism in Information Systems
HAO Yan-bin;,GUO Xiao;,YANG Nai-ding;
..............page:41-46
Hyperspectral Remote Sensing Image Data Processing Research and Realization Based on CPU/GPU Heterogeneous Model
TANG Yuan-yuan;,ZHOU Hai-fang;,FANG Min-quan;,SHEN Xiao-long;
..............page:47-50,77
Social Recommendation Combining Global and Dual Local Information
QIAN Fu-lan;,LI Qi-long;
..............page:57-59,94
Infrared Dim and Small Target Detection Based on Background Prediction by Wavelet Filter
JIAO Jiao;,XIE Yong-jie;,ZHANG Hua-liang;,ZHANG Song;
..............page:60-63
Capsule Defects Detection Based on Stacked Denoising Autoencoders
WANG Xian-bao;,HE Wen-xiu;,WANG Xin-gang;,YAO Ming-hai;,QIAN Yun-tao;
..............page:64-67
Rough Set Algebra of Multi-granulation
KONG Qing-zhao;,WEI Zeng-xin;
..............page:68-71
Improving Recommendation Diversity via Probabilistic Selection
ZHANG Dong;,CAI Guo-yong;,XIA Bin-bin;
..............page:72-77
Microblog Topic Evolution Algorithm Based on Retweeting Relationship
XU Wei;,ZHAO Bin;,JI Gen-lin;
..............page:78-82,100
Improved WPR Algorithm Based on Referenced Frequency in Recent Search Cycle
WANG Xu-yang;,REN Guo-sheng;
..............page:86-88
Attribute Granulation Based on Attribute Discernibility and AP Clustering
ZHU Hong;,DING Shi-fei;
..............page:95-97,128
Homotopy Support Vector Machine
JIANG Jin-chao;,ZHANG Rui;
..............page:98-100
zhuan jia ji yu
wang wen jian ;, yu jian ;
..............page:封2
Algorithm to Determine Number of Clusters for Mixed Data Based on Prior Information
PANG Tian-jie;,ZHAO Xing-wang;
..............page:101-104
Face Enhancement Algorithm with Variable Illumination Based on Improved Retinex
DU Ming;,ZHAO Xiang-jun;
..............page:105-108,112
Distributed Localization Scheme Based on Virtual Force in Wireless Sensor Networks
XIONG Zhe;,JIA Jie;,CHEN Jian;
..............page:109-112
xMAS-based Formal Verification of SpaceWire Credit Logic
LI Yan-chun;,LI Xiao-juan;,GUAN Yong;,WANG Rui;,ZHANG Jie;,WEI Hong-xing;
..............page:113-117,134
Projection Based Algorithm for Link Prediction in Bipartite Network
GAO Man;,CHEN Ling;,XU Yong-cheng;
..............page:118-123,154
Degrees of Freedom of Coexistence Network with Point-to-Point and Two-user Broadcast Channels
LIU Feng;,WANG Yuan-yuan;,ZENG Lian-sun;
..............page:129-134
Rumor Spreading Model Considering Conformity Phenomena in Complex Social Networks
ZHU Guan-hua;,JIANG Guo-ping;,XIA Ling-ling;
..............page:135-139,143
Fault Tolerant Regression Model for Sensing Data
ZUO Xiang-dong;,WANG Kun;,QIU Hui;
..............page:140-143
Low Delay Topology Control Algorithm Based on Delivery Ratio Constraint in Wireless Sensor Networks
KONG Shan-shan;,LIU Lin-feng;,CHEN Hang;
..............page:144-147,168
Identity Authentication Method Based on User's Mouse Behavior
XU Jian;,LI Ming-jie;,ZHOU Fu-cai;,XUE Rui;
..............page:148-154
Dynamic Symbolic Taint Analysis of Binary Programs
ZHU Zheng-xin;,ZENG Fan-ping;,HUANG Xin-yi;
..............page:155-158,187
Anonymous Multi-user Searchable Encryption Scheme with Hierarchial Permission Management
DUAN Yang-yang;,LI Shi-yang;
..............page:159-162,174
Algebraic Side-channel Attacks Method of ITUbee
LI Lang;,DU Guo-quan;
..............page:169-174
Ciphertext-policy Attribute-based Encryption with Anonymous Access Structure
WANG Hai-ping;,ZHAO Jing-jing;
..............page:175-178,198
Correctness Analysis and Improvement of Group Signature in Composite Order Bilinear Groups
YU Jia-fu;,ZHONG Hong;,WANG Yi-min;
..............page:179-182,209
Checking Topological Integrity of Geographic Data Based on Fragile Watermarking
SUI Li-li;,WANG Chuan-jian;
..............page:183-187
Performance Analysis of PHY-CRAM Physical Layer Challenge Response Authentication Mechanism
ZHANG Dan;,WU Xiao-fu;,YAN Jun;,ZHU Wei-ping;
..............page:188-191,223
UML Model to Simulink Model Transformation Method in Design of Embedded Software
GUO Peng;,LI Ya-hui;,SUN Lei;,CAI Xiao-le;
..............page:192-198
Dynamic Mutation Execution Strategy for Mutation-based Fault Localization
GONG Pei;,GENG Chu-yao;,GUO Jun-xia;,ZHAO Rui-lian;
..............page:199-203,229
Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree
XU Wen-hua;,CHEN Hai-yan;,ZHANG Yu-ping;,WANG Jian-dong;
..............page:204-209
Structure Optimization for Automatic Vectorization
YU Hai-ning;,HAN Lin;,LI Peng-yuan;
..............page:210-215
Method of Code Evolution Recommendation for Database Schema Change
ZHANG Wu-neng;,LI Hong-wei;,SHEN Li-wei;,ZHAO Wen-yun;
..............page:216-223
Traffic Speed Forecasting Method Based on Nonparametric Regression
SHI Dian-xi;,DING Tao-jie;,DING Bo;,LIU Hui;
..............page:224-229
Incremental Learning Algorithm Based on Twin Support Vector Regression
HAO Yun-he;,ZHANG Hao-feng;
..............page:230-234,249
Target Grouping Algorithm Based on Multiple Combat Formations
YUAN De-ping;,ZHENG Juan-yi;,SHI Hao-shan;,LIU Ning;
..............page:235-238,244
Liheci Word Sense Disambiguation Based on SVM
ZHANG Zhen-jing;,LI Xin-fu;,TIAN Xue-dong;,WANG Kai;
..............page:239-244
DTW Clustering-based Similarity Mining Method for Hydrological Time Series
YANG Yan-lin;,YE Feng;,LV Xin;,YU Lin;,LIU Xuan;
..............page:245-249
Outer Inverse P-sets and Double Information Camouflage-Recovery for Digital Image and its Application
ZHANG Jing-xiao;,XU Feng-sheng;,LIU Xin-hua;,ZHANG Li-hua;
..............page:250-253,292
Semantic-based Feature Extraction Method for Document
JIANG Fang;,LI Guo-he;,YUE Xiang;
..............page:254-258
Accelerating Structure Learning of Bayesian Network
FU Shun-kai;
..............page:263-268,272
New Note on Classical Measure of Knowledge Dependency and Attribute Significance
CHEN Fei;,JIANG Lin;,LI Jin-hai;
..............page:273-276,306
Building User Personalization Model Based on Short Term Memory and Forgetting Factor
CHEN Hai-yan;,XU Zheng;,ZHANG Hui;
..............page:277-282
PID-type Iterative Learning Control for a Class of Nonlinear Systems with Arbitrary Initial Value
HAO Xiao-hong;,LI Zhuo-yue;,WANG Hua;
..............page:283-286
Multi-instance Multi-label Learning Algorithm by Treating Instances as Non-independent Identically Distributed Samples
CHEN Tong-tong;,DING Xin-miao;,LIU Chan-juan;,ZOU Hai-lin;,ZHOU Shu-sen;,LIU Ying;
..............page:287-292
Co-location Patterns Mining with Time Constraint
ZENG Xin;,YANG Jian;
..............page:293-296,301
Method about Reconstruction of SEM Image Based on Gradient
MAO Xiang-di;,SHI Zheng;
..............page:297-301
Video Segmentation Algorithm Based on Join Weight of Superpixels
SUN Tao;,CHEN Kang-rui;
..............page:302-306
Enhanced Block Compressed Sensing of Images Based on Total Variation Using Texture Information
WANG Yue;,ZHOU Cheng;,XIONG Cheng-yi;,SHU Zhen-yu;
..............page:307-310,315
Chemotaxis Operator Embedded Particle Swarm Optimization Algorithm and its Application to Multilevel Thresholding
ZHANG Xin-ming;,TU Qiang;,YIN Xin-xin;,FENG Meng-qing;
..............page:311-315