Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Research and Development
1000-1239
2015 Issue 8
qian yan
wang wen jian ;, yu jian ;, gao yang ;
..............page:1705-1706
Online Learning Algorithms for Big Data Analytics:A Survey
Li Zhijie;,Li Yuanxiang;,Wang Feng;,He Guoliang;,Kuang Li;
..............page:1707-1721
Generalized Kernel Polarization Criterion for Optimizing Gaussian Kernel
Tian Meng;,Wang Wenjian;
..............page:1722-1734
Temporal Link Prediction Based on Dynamic Heterogeneous Information Network
Zhao Zeya;,Jia Yantao;,Wang Yuanzhuo;,Jin Xiaolong;,Cheng Xueqi;
..............page:1735-1741
Feature Selection Algorithm Based on the Multi-Colony Fairness Model
Yang Tan;,Feng Xiang;,Yu Huiqun;
..............page:1742-1756
xin xi an quan yan jiu qi kan jian jie
..............page:1756-1756
Manifold Clustering and Visualization with Commute Time Distance
Shao Chao;,Zhang Xiaojian;
..............page:1757-1766,1767
FSMBUS:A Frequent Subgraph Mining Algorithm in Single Large-Scale Graph Using Spark
Yan Yuliang;,Dong Yihong;,He Xianmang;,Wang Wei;
..............page:1768-1783
A Graph Clustering Method for Detecting Protein Complexes
Wang Jie;,Liang Jiye;,and Zheng Wenping;
..............page:1784-1793
Recognizing the Same Commodity Entities in Big Data
Hu Yahui;,Li Shijun;,Yu Wei;,Yang Sha;,Gan Lin;,Wang Kai;,Fang Qiqing;
..............page:1794-1805
Sentiment Uncertainty Measure and Classification of Negative Sentences
Zhang Zhifei;,Miao Duoqian;,Nie Jianyun;,Yue Xiaodong;
..............page:1806-1816
Weight-Aware Multicast Routing Algorithm in Cognitive Wireless Mesh Networks
Yang Yiqing;,Chen Zhigang;,Kuang Zhufang;,Liu Hui;
..............page:1817-1830
Multi-Objective Channel Assignment and Gateway Deployment Optimizer for Wireless Mesh Network
Zhao Chuanxin;,Chen Fulong;,Wang Ruchuan;,Zhao Cheng;,Luo Yonglong;
..............page:1831-1841
Fuzzy Support Vector Regression-Based Link Quality Prediction Model for Wireless Sensor Networks
Shu Jian;,Tang Jin;,Liu Linlan;,Hu Gang;,Liu Song;
..............page:1842-1851
A Source Data Congestion Control Based on Sleep Schedule
Huang Junjie;,Chen Xiaojiang;,Liu Chen;,Fang Dingyi;,Wang Wei;,Yin Xiaoyan;,Wu Yueshan;
..............page:1852-1861
A Method of Provable Data Integrity Based on Lattice in Cloud Storage
Tan Shuang;,He Li;,Chen Zhikun;,Jia Yan;
..............page:1862-1872
Game Optimization for Internal DDoS Attack Detection in Cloud Computing
Wang Yichuan;,Ma Jianfeng;,Lu Di;,Zhang Liumei;,Meng Xianjia;
..............page:1873-1882
A Novel Privacy Aware Secure Routing Protocol for HWMN
Lin Hui;,Tian Youliang;,Xu Li;,Hu Jia;
..............page:1883-1892
A Fully Secure KP-ABE Scheme in the Standard Model
Zhang Minqing;,Du Weidong;,Yang Xiaoyuan;,Han Yiliang;
..............page:1893-1901
Using Code Mobility to Obfuscate Control Flow in Binary Codes
Chen Zhe;,Wang Zhi;,Wang Xiaochu;,Jia Chunfu;
..............page:1902-1909
Texture-Based Multiresolution Flow Visualization
Lu Daying;,Zhu Dengming;,Wang Zhaoqi;
..............page:1910-1920
Activity Anomaly Detection Based on Vehicle Trajectory of Automatic Number Plate Recognition System
Sun Yuyan;,Sun Limin;,Zhu Hongsong;,Zhou Xinyun;
..............page:1921-1929