Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2012 Issue 9
Indexing of Moving Objects for Predictive Queries and Partial History Query
FANG Ying;CAO Jia-heng;WANG Jun-zhou;PENG Yu-wei;SONG Wei
..............page:1873-1878
Data Stream Clustering Algorithm Based on Neighborhood Covering
ZHANG Ji-yang;WANG Lun-wen
..............page:1913-1916
Stakeholders-driven Requirements Semantics Acquisition for Networked Software
WEN Bin;HE Ke-qing;LIANG Peng;CAO Bu-qing
..............page:1879-1884
Survey of Data Provenance
MING Hua;ZHANG Yong;FU Xiao-hui
..............page:1917-1923
An Automatic Approach of Fine-grained Locking for Linked Data Structure
ZHANG Yu-xian;ZHANG Yu
..............page:1892-1897
Application of Discrete Event System Specification in Validation of IDEF0 Model
ZHANG Yao-hong;YI Xian-qing;LIAO Xiao-lin;LV Xiang
..............page:1924-1927
An Extended Sub-query Sharing Approach Over RFID Event Streams
SONG Bao-yan;LOU Hui-zhen;TANG Min;HUI Xin-hua;YU Ge
..............page:1898-1902
Novel Gait Pattern Planning Method for Increasing Flexibility of Biped Robot
XUE Feng;CHEN Xiao-ping
..............page:1928-1933
Study on Map Merging for Multi-robots
LIU Li-mei;CAI Zi-xing
..............page:1934-1937
Study on Role Assignment Strategies of Group Search Optimizer
WANG Shen-wen;DING Li-xin;XIE Cheng-wang;XIE Da-tong;SHU Wan-neng;YANG Hua
..............page:1938-1943
Uncertainty of K Granularity Fuzzy Rough Set Model
WANG Qing-hai
..............page:1959-1961
Model Mining on Time Series of Sub-item Set and Related Application on Web Security
WEN Sheng;JIA Wei-jia;ZHOU Wei
..............page:1903-1907
An Efficiency Attribute Reduction Algorithm of Tolerance Matrix
ZHANG Qing-guo;ZHENG Xue-feng
..............page:1944-1947
Research and Implementation of Effective Jacobi Iteration Algorithms on GPU
DI Peng;HU Chang-jun;LI Jian-jiang
..............page:1962-1967
Research of Metadata Management Strategy on Object-based Storage System
YAO Nian-min;SHAN Ying;TIAN Ya-kun
..............page:1908-1912
A Novel Multi-objective Optimizations Immune Algorithm
CHEN Yun-fang;SUN Fang;WANG Lin-lin;WANG Shu-ya
..............page:1948-1953
A String Sort Algorithm in Custom Character Order
ZHANG Hai-jun;PAN Wei-min;MU Ni-na;LUAN Jing
..............page:1968-1971
Matrix Algorithm for Quick Attribute Reduction Based on Decision Table
QIAN Wen-bin;YANG Bing-ru;XU Zhang-yan
..............page:1954-1958
Modeling and Verification of Dynamic Management of Cooperative Permission Based on Colored Petri Nets
AN Yi-sheng;LUO Bing-jie;ZHAO Xiang-mo;LI Ren-hou
..............page:1972-1977
Traffic Assignment Routing Mechanism for a New Network Architecture
WEI Yong-tao;WANG Jin-kuan;WANG Cui-rong
..............page:1997-2001
Study on Hybrid Neural Network Data Mining Model for Traffic Flow Prediction
YANG Fan;YAN Zhong-zhen
..............page:1978-1981
Survey of BitTorrent Network Behavior Studies
TANG Hong;HU Rong;ZHU Hui-yun
..............page:2002-2007
Research and Implementation of a Hybrid Content Delivery Network for Stream Media Monitor System
YE Shuang;YE Jian-hong;LIU Chuan-cai
..............page:2008-2012
Improved Algorithm to Simulate L-shaped Tile of Double-loop Networks G ( N;1,s )
SU Xiao-hu;FANG Mu-yun;TAI Wei-peng;ZHENG Xiao
..............page:2053-2055
Efficient Hierarchical Consensus Protocol for Mobile Ad Hoc Networks
LEI Xiang-dong;LU Ming-hao;LEI Zhen-yang;QING You-you
..............page:2013-2018
Realization of Reliable UDP with Congestion Control Mechanism
GUO Cui-juan;MIAO Chang-yun;WU Zhi-gang;LI Jie
..............page:2019-2022
A Method for Frequency Hopping Signals Dynamic Detection
GU Chen-hui;WANG Lun-wen
..............page:1982-1986
New Server Placement Strategy and it Key Technology
YUAN Xiao-qun;FANG Qing;YIN Hao
..............page:1987-1991
Technology of Cartoon Scene Matching Using Color and CSIFT Feature
DENG Li-qiong;YUAN Zhi-min;CHEN Dan-wen;WU Ling-da
..............page:2068-2072
Recent Advances in Research of IP Traceback
YAN Qiao;LEI Qiong-yu
..............page:2027-2032
Analysis Model of Voice Performance Based on IEEE802.11e Wireless Local Area Network
ZHANG Ke-na;WANG Wan-liang;YAO Xin-wei;TAO Li
..............page:2033-2037
Survey on Approximation Algorithms on the Steiner Network Problem
GUO Long-kun;SHEN Hong
..............page:1992-1996
Multi-agent Based Intrusion Detection System for SIP Single Source Flooding Attacks
HOU Hui-chao;LI Hong-bin;WANG Ning
..............page:2038-2042
A Calibration Technology for Multi-resolution Hybrid Camera System
XU Shu-kui;ZHANG Jun;TU Dan;LI Guo-hui
..............page:2073-2078
Summary of Data Compression Algorithm in Wireless Sensor Networks
LIN Wei;HAN Li-hong
..............page:2043-2048
Face Recognition Based on Fusion of Local Gabor Phase Characteristic and Global Intrinsicfaces
JIANG Yan-xia;WANG Juan;TANG Cai-hong
..............page:2091-2095
Nonlocal-means Algorithm for Image Denoising Based on Wavelet Moment in Domain
ZHANG Yu;WANG Xiang-yang
..............page:2079-2082
System Structural Analysis Based on Unfair Integrant Contribution Degree Relation Arithmetic
LI Ming-hui;XIA Jing-bo;CHEN Cai-qiang;SHI Peng-hui
..............page:2049-2052
Real-time Simulation for Interaction of Liquid and Solid by Extended SPH Method
TANG Yong;ZHAO Wen-jing;LV Meng-ya
..............page:2083-2086
Study of the Eye-tracking Methods Based on Video
LIU Ji-hong;LI Zhong-fan
..............page:2087-2090
Vector Map Watermarking Algorithm Based on Egional Curve Segmentation
ZHANG Wen-cai;CAO Yang
..............page:2096-2099
Tracking Control for Mobile Robots with Uncalibrated Visual Parameters
YANG Fang;WANG Chao-li
..............page:2100-2104
Detection of Image Region-duplication Forgery Based on Geometric Mean Decomposition
ZHAO Jie;GUO Ji-chang;WU Bin
..............page:2105-2108
A Method Combined SML and Ontology for Image Semantic Auto-annotation
OUYANG Jun-lin;XIA Li-min;WEN Xing-zi
..............page:2109-2112