Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Computer Science
1002-137X
2016 Issue 5
Survey of Fuzz Testing Technology
ZHANG Xiong;,LI Zhou-jun;
..............page:1-8,26
Reliability Analysis of Circuit under Soft Error
WANG Zhen;,JIANG Jian-hui;
..............page:9-12,21
Feedback Numbers of Generalized Kautz Digraphs GK(3, n)
XU Xi-rong;,HUANG Ya-zhen;,ZHANG Si-jia;,DONG Xue-zhi;
..............page:13-21
Branch Divergence Optimization for Performance and Power Consumption on GPU Platform
YU Qi;,WANG Bo-qian;,SHEN Li;,WANG Zhi-ying;,CHEN Wei;
..............page:22-26
Hot-routine Based Optimization of Dynamic Binary Translation
DONG Wei-yu;,LIU Jin-xin;,QI Xu-yan;,HE Hong-qi;,JIANG Lie-hui;
..............page:27-33,41
Mechanism and Capability of Data Prefetching in Intel(R)64 Architecture
DONG Yu-shan;,LI Chun-jiang;
..............page:34-41
Descriptions for Ontologies Based on Category Theory
YU Shan-shan;,SU Jin-dian;,YI Fa-ling;
..............page:42-46,61
Research on Critical Nodes in Social Networks Based on Owen Values
WANG Xue-guang;
..............page:47-50,66
Multiuser Resource Allocation of Power Line Communication Based on Enhanced PSO_GA
ZHANG Pei-ling;,ZHANG Hong-xin;
..............page:51-55
Aeronautical Ad hoc Network Hybrid Routing Algorithm
PANG Song-chao;,LUO Chang-yuan;,HAN Dong-dong;,PANG Han-ying;
..............page:56-61
Adaptive Routing Protocol Based on Directional Transmission in VANETs
CAI Rong;,ZHANG Guo-an;,JI Yan-cheng;
..............page:62-66
Study on Energy Consumption of ZigBee Networks Based on Distributed Neighbor Discovery Mechanism
HUANG Heng-jie;,ZHOU Tao;,WANG Gao-cai;
..............page:67-72,112
Research of WiFi-based Fingerprinting Matching Algorithm in Indoor Positioning
TANG Yang;,BAI Yong;,MA Yue;,LAN Zhang-li;
..............page:73-75
Novel Taxonomy of Security Weakness in Source Code Based on Three-dimension Tree Model
ZHANG Yan;,LI Zhou-jun;,DONG Guo-wei;,MA Dian-fu;
..............page:76-79,107
Static Detection Model and Framework for Software Vulnerability
WANG Tao;,HAN Lan-sheng;,FU Cai;,ZOU De-qing;,LIU Ming;
..............page:80-86,116
Novel Intrusion Detection Method Based on Semi-supervised Clustering
LIANG Chen;,LI Cheng-hai;
..............page:87-90,121
Multiple Trajectories Feature Detection Technology Based on Data Mining
XUE Fei;,SHAN Zheng;,YAN Li-jing;,FAN Chao;
..............page:91-95
Android Malicious Behavior Detection Method Based on Composite-event Trigged Behaviors
ZHANG Guo-yin;,QU Jia-xing;,FU Xiao-jing;,HE Zhi-chang;
..............page:96-99,139
Research of Cloud Provider Selection Method Based on SecLA
ZHU Hua-min;,WU Li-fa;,KANG Hong-kai;
..............page:100-107
Revised Steganography Scheme Based on SI-UNIWARD
SI Yi-fan;,WEI Li-xian;,ZHANG Ying-nan;,LIU Jia;
..............page:108-112
Privacy Protection under Cloud Computing against Data Mining
TAO Lin-bo;,SHEN Jian-jing;,YOU Qing-xiang;,GUO Jia;
..............page:113-116
Electronic Commerce Transaction Trust Model Based on Two Layers Nodes and Objective Risk
LI Dao-quan;,WU Xing-cheng;,GUO Rui-min;
..............page:117-121
Virtual Group Revocation Policy-based Cloud Storage Access Control Model
XIE Li-xia;,BO Fu-kuan;,ZHAO Bin-bin;
..............page:122-126
Model of Virus Propagation in Wireless Sensor Network Based on Directional Antenna
HU Jin-tao;,SONG Yu-rong;,SU Xiao-ping;
..............page:127-131,145
Double Video Watermarking Algorithm Based on Compressive Sensing
ZHOU Yan;,ZENG Fan-zhi;,ZHAO Hui-min;
..............page:132-139
Research on Fault Tolerant Description Language and its Application for Distributed Computing
CAI Yuan-yuan;,ZHAO Zhi-zhuo;
..............page:146-149,168
Safety Analysis of Slat and Flap Control Unit for DO-333
CHEN Guang-ying;,HUANG Zhi-qiu;,CHEN Zhe;,KAN Shuang-long;
..............page:150-156,161
Fast Estimation of WCET Based on Distribution Function
ZHOU Guo-chang;,GUO Bao-long;,GAO Xiang;,WANG Jian;,YAN Yun-yi;
..............page:157-161
On Reducing Monitoring Overhead in Runtime Verification
XU Sheng;,YE Jun-min;,CHEN Shu;,JIN Cong;,CHEN Pan;
..............page:162-168
Confluence Decision Method for Active Rule Set Based on Condition Conflict Analysis
XIONG Zhong-min;,ZHU Ji-guang;,LI Chang-ji;,YUAN Hong-chun;
..............page:169-173
k Nearest Neighbor Query Based on Voronoi Diagram for Obstructed Spaces
ZHANG Li-ping;,JING Hai-dong;,LI Song;,CUI Huan-yu;
..............page:174-178,187
Research of Interval-based Out-of-order Event Processing in Internet of Things
ZHOU Chun-jie;,DAI Peng-fei;,LI Hong-bo;,ZHANG Zhen-xing;
..............page:179-187
Study on Domain-corpus Driven Calculation Method of Sentence Relevance
LI Feng;,HUANG Jin-zhu;,LI Zhou-jun;,YANG Wei-ming;
..............page:188-192,208
Business Process Model Abstraction Based on Cluster Analysis
SUN Shan-wu;,WANG Nan;,OUYANG Dan-tong;
..............page:193-197,229
Novel Method on Community-based User Recommendation on Social Network
ZHAO Qin;,WANG Cheng;,WANG Peng-wei;
..............page:198-203
Orthogonal Non-negative Matrix Factorization for K-means Clustering
LI Meng-jie;,XIE Qiang;,DING Qiu-lin;
..............page:204-208
Crowdsourcing Based Description of Urban Emergency Events
CHEN Hai-yan;,XU Zheng;
..............page:209-213,218
Extended Rough Description Logic
YAN Zhi-huan;,LEI Yin-bin;
..............page:214-218
Split-Integration Recommendation Algorithm Based on Matrix Completion
WANG Yi;,JIN Zhong;
..............page:219-222,237
Research of Text Data Streams Clustering Algorithm Based on Affinity Propagation
LI Yi-ming;,NI Li-ping;,FANG Qing-hua;,LIU Hui-ting;
..............page:223-229
Fuzzy Support Vector Data Description with Centers of Classes Distance
WANG Min-guang;,WANG Zhe;
..............page:230-233,242
Linear Representation Method Based on Key Points for Time Series
CHEN Shuai-fei;,LV Xin;,QI Rong-zhi;,WANG Long-bao;,YU Lin;
..............page:234-237
Research on Parallel SVM Algorithm Based on Spark
LIU Ze-shen;,PAN Zhi-song;
..............page:238-242
Improved Text Clustering Algorithm Based on Kolmogorov Complexity
WANG You-hua;,CHEN Xiao-rong;
..............page:243-246
Selective Ensemble of SVDDs Based on Correntropy and Distance Variance
XING Hong-jie;,WEI Yong-le;
..............page:252-256,264
Incremental Time Series Classification Algorithm Based on Shapelets
DING Jian;,WANG Shu-ying;
..............page:257-260,293
Fast Seed Set Refinement Algorithm for Closest Substrings Discovery
ZHANG Yi-pu;,RU Feng;,WANG Biao;
..............page:261-264
Efficient k-Clique Mining Algorithm in Large-scale Networks
CHAI Xu-qing;,DONG Yong-liang;
..............page:265-268
Product Image Sentence Annotation Based on Gradient Kernel Feature and N-gram Model
ZHANG Hong-bin;,JI Dong-hong;,YIN Lan;,REN Ya-feng;
..............page:269-273,287
Super-resolution Image Reconstruction Based on Fractional Order Total Variation Regularization
LIU Ya-nan;,YANG Xiao-mei;,CHEN Chao-nan;
..............page:274-278,307
Improved Algorithm of Fast Image Stitching by Reducing Panoramic Distortion
QU Zhong;,LIN Si-peng;,JU Fang-rong;
..............page:279-282
Vehicle Behavior Recognition Method Based on Quadratic Spectral Clustering and HMM-RF Hybrid Model
FAN Jing;,RUAN Ti-hong;,WU Jia-min;,DONG Tian-yang;
..............page:288-293
Face Recognition Method Based on Curvelet Transform and Cosine Rules
LI Yan-ping;,JIANG Ying;,HU Jin-ming;,LI Wei-ping;
..............page:294-297,303
State Detection of Cancer Cell in Phase-contrast Microscopy Images
ZHANG Jian-hua;,ZOU Yi-jie;,GAO Qiang;,CHEN Sheng-yong;
..............page:298-303
Fast Image Recognition Method Based on Locality-constrained Linear Coding
CHEN Guang-xi;,GONG Zhen-ting;,WEN Pei-zhi;,REN Xia-li;
..............page:308-312,封3
Forest Fire Image Recognition Algorithm Based on Wireless Multimedia Sensor Network of Hash Coding
CHANG Xiao-min;,ZHAO Juan-juan;,GE Lei;,QIANG Yan;,SHI Yao-hua;
..............page:313-317
Regional Covariance Based Image Superpixels Generation
ZHANG Xu-dong;,LV Yan-yan;,MIAO Yong-wei;,YANG Dong-yong;
..............page:318-322,封3