Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2012 Issue 4
A Fault-list Generation Approach Based on Data Flow Analysis
TAN Lan-fang;TAN Qing-ping;XU Jian-jun
..............page:716-721
Group Nearest Neighbor Queries over Existentially Uncertain Data
CHEN Mo;JIA Zi-xi;GU Yu;YU Ge
..............page:684-687
Chemical Semantics of Imperative Languages
YAN Wei;LU Yan-sheng
..............page:688-693
2-Opt-and-generalized Opposition-based Differential Evolution Algorithm with Reserved Genes
LIU Gang;LI Yuan-xiang;ZHENG Hao
..............page:789-794
A Hierarchical-segment Reduction Algorithm for Nehalem Systems in Threaded MPI
ZOU Jin-an;LIU Zhi-qiang;LIAO Wei
..............page:733-738
A Quantum Particle Swarm Optimization Clustering Algorithm Using Variable Dimensions Searching
ZHANG Liang;ZHANG Liang;YANG Guo-zheng;ZHANG Min
..............page:804-808
Novel Graph-based Recommender System with Interest Drift Detection
YE Hong-yun;NI Zhi-wei;NI Li-ping
..............page:700-706
Reliable Scheduling of Scientific Workflow Application with Cost-constraint for the Grid
YAN Chao-kun;HU Zhi-gang;LIXi;LUO Hui-min
..............page:707-711
Research and Implementation of Interpreting Technology in High Performance CNC System
HONG Hai-tao;YU Dong;CHEN Long;HAN Wen-ye
..............page:727-732
Adaptive Epidemic Routing Algorithm Based on Multi Queue in DTN
GUO Hang;WANG Xing-wei;HUANG Min;JIANG Ding-de
..............page:829-832
Distributed Cooperative Methods for Traffic Flow Optimization in Intelligent Transportation Network
WEN Meng-fei;PENG Jun;ZHU Zheng-fa;LIU Wei-rong
..............page:852-855
Security Chip Memory Bus for Resisting Invasive Analysis
ZHANG Yi-wei;WU Ke-ke;CHEN Jia-pei
..............page:785-788
Self-destruction Perception Method and Application of Distributed Systems Based on Hierarchical Assessment
JIANG Dong;WANG Hui-qiang;FENG Guang-sheng;LV Hong-wu;LIN Jun-yu
..............page:768-772
Traffic Grooming Scheme Based on Steady Elimination Evolution and Gaming
WANG Xing-wei;HOU Wei-gang;SUN Yong-jian;HUANG Min;GUO Lei
..............page:815-818
Research on Traffic-adaptive Hybrid MAC Protocol Based on Broadcast Mechanism
ZHANG Lie-ping;LIAO Zhao-liang
..............page:843-846
Research on the Evolution Process of Blog Networks
LIU Qun;QIAO Jie;PENG Zhi-ming;GAO Yi
..............page:839-842
A Component Assembly Search Based on Function-driven
XU Jun;WANG Yong-xing;ZHANG Yuan-ming;LU Jia-wei;XIAO Gang
..............page:746-750
Link Layer Adaption TCP Header Compression Algorithm in LTE System
ZENG Yu-hui;ZHU Guang-xi;WU Wei-min;SHEN Zhao
..............page:819-824
Binocular Mobile Robot 3D Scene Reconstruction Based on Evidence Grid Model
LIDan-cheng;LIU Jing-ming;JIANG Lin-ying;LIU Yan-ji
..............page:873-877
Human Segmentation and Tracking for Crowded People in Video Surveillance
WEN Xiang-bing;MAN Jun-feng;LI Qian-qian;LI Chang-yun
..............page:891-895
Stereo Camera Calibration Based on Rectification Error
SUN Xi;WANG Zeng-fu
..............page:869-872
Improvement of the Packer-pair Based Path Capacity Estimation Methods
HE Xiao-tao;ZHENG Wen-feng
..............page:861-864
Overview of Simulation-based SoC Functional Verification Technology
SUN Gang-de;DING Yong;SONG Wen-hua;LUO Xiao-hua;YAN Xiao-lang
..............page:896-904
Realtime Capability Analysis of Aperiodic Message in MVB
ZENG Qiu-fen;CHEN Te-fang;LIU Yi-bin
..............page:905-908
Real-time Text Search Based on Parallel Computing Platform KD-60
LONG Bai;FANG Wei;SUN Guang-zhong;CHEN Guo-liang
..............page:712-715
Adaptive Power Efficient Mechanism for Multi-channel MAC Protocol in Ad Hoc Networks
ZHU Qing;LEI Lei;XU Zong-ze
..............page:856-860
Novel Routing Protocol Based on CDMA and Event-triggering in Wireless Sensor Networks
LING Qiang;YAN Jin-feng;ZHANG Wei-hua
..............page:825-828
Certificateless Ring Proxy Signature Scheme
XIA Xiang-sheng;HONG Fan;CUI Guo-hua
..............page:764-767
Modeling and Reasoning About Authentication in Application
ZHANG Ming-de;ZHENG Xue-feng;LV Shu-wang;ZHANG Qing-guo
..............page:754-758
Collaborative Filtering Algorithm Combining the Feature of Controversy
ZHANG Xue-sheng;CHEN Chao;ZHAGN Ying-feng;YU Neng-hai
..............page:694-699
Memory-optimized RFC Packet Classification Algorithm MergeRFC
CAO Jie;CHEN Bing
..............page:865-868
Integral Cryptanalysis of Reduced-round MIBS Block Cipher
WANG Gao-li;WANG Shao-hui
..............page:773-777
Researching of Artificial Immune Based Secure Storage Area Network System
CAI Tao;NIU De-jiao;LIU Yang-kuan;JU Shi-guang
..............page:759-763
Novel Evolutionary Generation Approach to Test Data for Data-flow Coverage
JIN Rong;JIANG Shu-juan;ZHANG Hong-chang
..............page:722-726
Interactive Dynamic Neighborhood Differential Evolutionary Group Search Optimizer
HE Guo-hua;CUI Zhi-hua;TAN Ying
..............page:809-814
EScribe: a Topic-based Publish-subscribe System with Dynamic Routing
GAO Sheng;LI Guo-hui
..............page:673-678
A Kind of Compact Particle Swarm Optimization Algorithm
ZHU Pei-yi;ZHONG Qiang;XU Bao-guo
..............page:800-803
Improved Segmentation Method for Medical Images Based on Dual Level Sets
QIN Xu-jia;ZHENG Qin;ZHANG Su-qiong;HAN Jun
..............page:887-890
An Non-parametric Input-domain Based Model of Software Reliability
ZHENG Jun;FENG Er-qiang;LIU Chang
..............page:751-753
DRT:a Dynamical and Robust Trust Model for Software Service in Cloud Computing
REN Wei;LEI Min;YANG Yu
..............page:679-683
Trojan Intelligent Detection Based on Ensemble of Spatio-temporal Information
SUN Xiao-yan;GUO Ning;HUANG Qian;ZHU Yue-fei
..............page:778-784