Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chinese Journal of Computers
0254-4164
2011 Issue 1
Snowflake: A New-Type Network Structure of Data Center
LIU Xiao-Qian;YANG Shou-Bao;GUO Liang-Min;WANG Shu-Ling;SONG Hu
..............page:76-86
Dynamic Trust Evaluation Model Under Distributed Computing Environment
ZHU You-Wen;HUANG Liu-Sheng;CHEN Guo-Liang;YANG Wei
..............page:55-64
Gateway-Oriented Password-Authenticated Key Exchange Based on RSA
WEI Fu-Shan;MA Chuan-Gui;CHENG Qing-Feng
..............page:38-46
A Study of Thread-Based MPI Communication Accelerator
LIU Zhi-Qiang;SONG Jun-Qiang;LU Feng-Shun;ZHAO Juan
..............page:154-164
Delivery Probability Prediction Based Efficient Routing in DTN
PENG Min;HONG Pei-Lin;XUE Kai-Ping;LU Han-Cheng
..............page:174-181
A User-Centric Service Composition Method Synthesizing Multiple Views
DING Wei-Long;WANG Jing;ZHAO Shuan
..............page:131-142
Study of Mobility-Adaptive Strategy for Stability-Based Routing of MANETs
HU Xi;WANG Jin-Kuan;WANG Cui-Rong
..............page:96-104
Anonymous HIBE Scheme Secure Against Full Adaptive -ID Attacks
WANG Hao;XU Qiu-Liang
..............page:25-37
Provably Secure Two -Party Authenticated Key Exchange Protocol in eCK Model
ZHAO Jian-Jie;GU Da-Wu
..............page:47-54
An Improved Particle Swarm Optimization Algorithm with Search Space Zoomed Factor and Attractor
CHI Yu-Hong;SUN Fu-Chun;WANG Wei-Jun;YU Chun-Ming
..............page:115-130
Distribution of the Symmetrical Logic Formulas in the L*3-Logic Metric Space
WANG Qing-Ping;WANG Guo-Jun
..............page:105-114
Design and Implementation of a FPGA Based Gaussian Random Number Generator
GU Xiao-Chen;ZHANG Min-Xuan
..............page:165-173
Optimization Approaches for QoS in Computer Networks: A Survey
LIN Chuang;LI Yin;WAN Jian-Xiong
..............page:1-14
ELF:Shared Cache Management through Eliminating Dead Blocks and Filtering Less Reused Lines
SUI Xiu-Feng;WU Jun-Min;CHEN Guo-Liang;TANG Yi-Xuan
..............page:143-153
Study on the Countermeasures of BitTorrent Fake Block Attack
SHI Jian-Tao;ZHANG Hong-Li;FANG Bin-Xing
..............page:15-24