Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2011 Issue 12
A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks
Hu Jianli;Zhou Bin;Wu Quanyuan;Li Xiaohua
..............page:2235-2241
An Approach of Trusted Usage Control in Distributed Environment
Hu Hao;Feng Dengguo;Qin Yu;Yu Aimin
..............page:2201-2211
xin xi dong tai
..............page:2410
A Hierarchical Reinforcement Learning Method Based on Heuristic Reward Function
Liu Quan;Yan Qicui;Fu Yuchen;Hu Daojing;Gong Shengrong
..............page:2352-2358
An Assignment Model and Algorithm for Self-Adaptive Software Based on Architecture
Chen Honglong;Li Renfa;Li Rui;Edwin Sha
..............page:2300-2307
Static Race Detection of Interrupt-Driven Programs
Huo Wei;Yu Hongtao;Feng Xiaobing;Zhang Zhaoqing
..............page:2290-2299
Fast Algorithm of Nearest Neighbor Query for Line Segments of Spatial Database
Liu Runtao;Hao Zhongxiao
..............page:2379-2384
Adaptive Buffer Management for Leakage Power Optimization in NoC Routers
Qi Shubo;Li Jinwen;Yue Daheng;Zhao Tianlei;Zhang Minxuan
..............page:2400-2409
Research Progresses on Energy-Efficient Software Optimization Techniques
Zhao Xia;Guo Yao;Chen Xiangqun
..............page:2308-2316
Performance Bottleneck Analysis and Solution of Shared Memory Operating System on a Multi-Core Platform
Yuan Qingbo;Zhao Jianbo;Chen Mingyu;Sun Ninghui
..............page:2268-2276
Parallel Computation Techniques for Dynamic Description Logics Reasoning
Wang Zhuxiao;Hu Hong;Chen Limin;Shi Zhongzhi
..............page:2317-2325
A Trusted Computing-Based Security Architecture for Policy-Label Protection
Liu Ziwen;Feng Dengguo;Yu Aimin
..............page:2219-2226
Human Pose Tracking Based on Partitioned Sampling Particle Filter and Multiple Cues Fusion
Liu Chenguang;Liu Jiafeng;Huang Jianhua;Tang Xianglong
..............page:2359-2368
A Collusion Detector Based on Fuzzy Logic in P2P Trust Model
Miao Guangsheng;Feng Dengguo;Su Purui
..............page:2187-2200
SHP-Ⅵ: A Shortest Hamiltonian Path-Based POMDP Value Iteration Algorithm
Feng Qi;Zhou Xuezhong;Huang Houkuan;Zhang Xiaoping
..............page:2343-2351
A P2P Network Traffic Identification Approach Based on Machine Learning
Li Zhiyuan;Wang Ruchuan
..............page:2253-2260
Test Data Compression and Decompression Using Symmetry-Variable Codes
Liang Huaguo;Jiang Cuiyun;Luo Qiang
..............page:2391-2399
An Algorithm for Calculating Minimal Unsatisfiability-Preserving Subsets of Ontology in DL-Lite
Zhou Liping;Huang Houkuan;Qi Guilin;Qu Youli;Ji Qiu
..............page:2334-2342
A Method of Stream Cube Computing Based on Interesting View Subset
Hou Dongfeng;Zhang Weiming;Liu Qingbao;Deng Su
..............page:2369-2378