Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2007 Issue 1
An Optimal Multicast Protocol Combined with Hops and FGs in Mobile ad hoc Networks
WANG Jian-xin;DENG Xia;CHEN Jian-er
..............page:31-35
Cluster Interconnect Network Supporting Shared Memory
HU Ming-chang;SHI Gang;YIN Hong-da;CAI Fei
..............page:24-30
Fault Identification of Protocol by Passive Testing
ZHAO Bao-hua;ZHANG Wei
..............page:15-18
Steady Routing Protocol with Prediction in Mobile Ad Hoc Networks
TAN Chang-geng;CHEN Song-qiao;GONG Xiao-xia
..............page:9-14
Framework for Mobile Agent-based Data Fusion in Sensor Network
YAN Yu-jie;WANG Shu
..............page:1-8
CSRAID: a New Storage Architecture for Large-scale RAID
LIU Yan;XIE Chang-sheng;LI Huai-yang;ZHAO Zhen
..............page:172-177
A Practical Electronic Jury Voting Scheme
ZHONG Hong;HUANG Liu-sheng;LUO Yong-long
..............page:178-181
Verification Methodology for PCI Slave
DENG Wan-ling;ZHENG Xue-ren;LIU Wei-jian
..............page:182-185
Study on Kinematics Transform in Numerical Control System of Parallel Machine Tool
YANG Dong-sheng;HUANG Jun;LIU Yin-zhong;XIA Xiao-jun
..............page:186-188
Study on Retargetable Cycle-accurate Simulator Generation Environment
YU Jie;LI Xi;ZHOU Xue-hai;WANG Zhi-gang
..............page:166-171
Power Analysis Resistant Method for Scalar Multiplication Based on Randomized Mixed Coordinates
TONG Yuan-man;WANG Zhi-ying;DAI Kui;LU Hong-yi
..............page:159-165
Temporal Error Concealment Based on Block-warping
YANG Tian-wu;PENG Qiang;ZHU Chang-qian
..............page:155-158
Research on Visualization War-fight Simulation Environment for Reconfigurable Missile
SONG Li-li;ZHAO Wen;WANG Wei-ping
..............page:151-154
Transfer Function Based on Multi-scale Iso-Surface
ZHOU Fang-fang;FAN Xiao-ping;YE Zhen
..............page:144-147
Research on High-dimensional Indexing Scheme for Large Image Database
HE Ling;WU Ling-da;CAI Yi-chao
..............page:140-143
An Adaptive Failure Detection Method for Distributed Computing Systems
CAI Jing-ping;JIA Yun-de
..............page:136-139
System Integration of WebGIS Collaborative Platform Based on J2EE
NI Kai;FENG Xiang;LU Ming;YE Lei;HOU Hong-liang
..............page:132-135
Design and Implementation of Waycryptic, a Versatile Cryptographic File System for Linux
LIN Hao-xiang;DONG Yuan;ZHANG Wei;ZHANG Su-qin;HU Chang-jun
..............page:122-126
Text Association Categorization Based on Self-Adaptive Weighting
CHEN Xiao-yun;HU Yun-fa
..............page:116-121
Research of Fusion Rules on Mass of Information
WU Qiang;LI Jin-long;ZHU Ping;WANG Xu-fa
..............page:112-115
MultiFactor:an Adaptive Scheduling Strategy on Data Streams
SONG Bao-yan;LU Yan;ZHANG Jun-ning;ZHANG Li-jie;YU Ge
..............page:107-111
Data Flow Analysis for Checking Information Flow Security of Programs
HUANG Hai-jun;CHEN Yi-yun
..............page:102-106
taTHP: an Improved Transaction Model Based on THP
XU Wei;CHENG Wen-qing;LI Bing
..............page:97-101
Research of Concurrency Control Protocol for Real-Time Nested Transactions in Mobile Computing Environments
LEI Xiang-dong;ZHAO Yue-long;CHEN Song-qiao;YUAN Xiao-li
..............page:93-96
Algorithm for Fast Searching of k-nearest Neighbors in Cloud Points
WU Li-juan;ZHENG Mian;ZHANG Cai-ming
..............page:70-74
New Method for Retrieving Trademark Image Based on Sub-Block Under Polar Coordinate
ZHANG Ling;ZOU Bei-ji;SUN Jia-guang;ZHANG Quan-xin
..............page:66-69
DBSL: a Novel Distributed Intrusion Detection Method for Intrusion Tolerance
JIN Li;ZHAO Feng;LI Qing-hua
..............page:62-65
Multi-agent Logic Program and its Application to Protocol Verification
ZHOU Yong;ZHU Wu-jia
..............page:54-57
Floating Priority Based 802.11e MAC Mechanism
ZHOU Xiao-bo;LU Han-cheng;LI Jin-sheng;HONG Pei-lin
..............page:36-39
Implementation Scheme for Multicast Based on Omega Network
LIU Yong;GU Nai-jie;REN Kai-xin;LIU Gang
..............page:40-43
Dynamic Resource Reservation Ordering Based on Signal Prediction Priority Queuing in All-IP Mobile Networks
ZHAO Yue;ZHAO Lin-liang;LI Si-zhong;LUO Xiao-hua;WANG Guang-xing
..............page:44-47
Research of Identification Method Based on P2P Flow Behavior Characterization
GONG Jing;SUN Zhi-xin;GU Qiang
..............page:48-53
Automatic Keyword Extraction Algorithm Research Using BC Method
ZHANG Min;GENG Huan-tong;WANG Xu-fa
..............page:189-192
Abstract Machine Supporting Bit Arithmetic Reasoning
XIANG Sen;CHEN Yi-yun;LIN Chun-xiao
..............page:88-92
Efficient Data Stream Clustering Algorithm Based on k-Means Partitioning and Density
NI Wei-wei;LU Jie-ping;CHEN Geng;SUN Zhi-hui
..............page:83-87
PCP Comprehensive Decision-Making Model Based on Information Entropy
DING Shi-fei;WANG Qi-tian;JI Zhao-jun;SUN Ke-qiang;SHI Zhong-zhi
..............page:79-82
Simulated Annealing Algorithm for Protein Folding Problem
CHEN Mao;HUANG Wen-qi;Lv Zhi-peng
..............page:75-78