Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chinese Journal of Computers
0254-4164
2007 Issue 2
Efficient Processing of Meshless Geometrical Data Based on OBB Tree Structure
CHEN Wei;MA Rui-Jin;ZHENG Wen-Ting;LIANG Xiao;PENG Qun-Sheng
..............page:330-336
Simulation of Wave and Water Surface Near the Seashore
PI Xue-Xian;YANG Xu-Dong;LI Si-Kun;SONG Jun-Qiang
..............page:324-329
Adaptive Level Set Method Based on the Narrow Band
ZHENG Guo-Xian;FENG Jie-Qing;JIN Xiao-Gang;PENG Qun-Sheng
..............page:317-323
A Parallel Clustering Algorithm of Gene Expression Patterns
LANG Xian-Yu;LU Zhong-Hua;CHI Xue-Bin
..............page:311-316
The Strategy for Diversifying Initial Population of Gene Expression Programming
HU Jian-Jun;TANG Chang-Jie;DUAN Lei;ZUO Jie;PENG Jing;YUAN Chang-An
..............page:305-310
TTA-EC: A Whole Algorithm Processor for ECC Based on Transport Triggered Architecture
ZHAO Xue-Mi;WANG Zhi-Ying;YUE Hong;LU Hong-Yi;DAI Kui
..............page:225-233
Partial Retransmission Based on Minimal Bandwidth-Distortion Cost in Error Prone Video Delivery
ZHOU Shu-Min;LI Jin-Tao;ZHANG Yong-Dong
..............page:212-224
Optimal Test Suite Generation Methods for Neighbor Factors Combinatorial Testing
WANG Zi-Yuan;NIE Chang-Hai;XU Bao-Wen;SHI Liang
..............page:200-211
An Experimental Study on the Performances of SNACKTCP in the LEO Satellite Networks
ZHANG Run-Tong;FAN Ning;ZHANG Wei-Jun
..............page:297-304
The Finite Mixture Model and Its EM Algorithm for Line-Type Image Patterns
MA Jiang-Hong;GE Yong
..............page:288-296
Research on Compressed Chain Code
LIU Yong-Kui;WEI Wei;GUO He
..............page:281-287
GPU-Based Texture Encoding and Real-Time Rendering
TANG Ying;ZHANG Hong-Xin;ZHANG Mei-Yu
..............page:272-280
Research of Fractional Linear Neural Network and Its Ability for Nonlinear Approach
YANG Guo-Wei;WANG Shou-Jue;YAN Qing-Xu
..............page:189-199
A Fuzzy Concept Lattice Model and Its Incremental Construction Algorithm
LIU Zong-Tian;QIANG Yu;ZHOU Wen;LI Xu;HUANG Mei-Li
..............page:184-188
Quantum-Inspired Immune Clonal Algorithm for SAT Problem
LI Yang-Yang;JIAO Li-Cheng
..............page:176-183
Rough Algebras and 3-Valued Lukasiewicz Algebras
DAI Jian-Hua
..............page:161-167
Accelerating Ray-Tracing Using Proxy Polygons
HUANG Pei-Jie;WANG Wen-Cheng;YANG Gang;WU En-Hua
..............page:262-271
Secrecy Analysis of Security Protocol Based on Reachability Relation
GU Yong-Gen;FU Yu-Xi;ZHU Han
..............page:255-261
Privacy-Preserving Cross Product Protocol and Its Applications
LUO Yong-Long;HUANG Liu-Sheng;JING Wei-Wei;XU Wei-Jiang;CHEN Guo-Liang
..............page:248-254
Threshold Proxy Signature Scheme Based on RSA Cryptosystems
JIANG Han;XU Qiu-Liang;ZHOU Yong-Bin
..............page:241-247
Research on Network Node Correlation in Network Risk Assessment
ZHANG Yong-Zheng;FANG Bin-Xing;CHI Yue;YUN Xiao-Chun
..............page:234-240