Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2014 Issue 10
Breadth-first Spanning Tree-based Algorithm for Self-protection in Wireless Sensor Networks
ZHANG Wen-zhe;LI Ying;Provincial Key Laboratory for Computer Information Processing Technology;School of Computer Science and Technology;Soochow University;
..............page:2193-2198
A Research on Energy-balanced Clustering Routing Protocol in Wireless Sensor Network
LIAO Xian-lin;LU Chang;JIANG Ting;ZHAO Lin-liang;School of Information Science & Engineering;Northeastern University;
..............page:2199-2202
ODR:a New Opportunistic Directional Routing in Wireless Sensor Networks
LIU Chen;CHEN Xiao-jiang;TANG Zhan-yong;FANG Ding-yi;XU Dan;GUO Jun;CHEN Hao;School of Information Science and Technology;Northwest University;
..............page:2203-2208
Multi-strategy Trust Evolution Model for Cognitive Relay Network Based on Moran Process
ZOU Shi-chen;WANG Hui-qiang;FENG Guang-sheng;LV Hong-wu;College of Computer Science and Technology;Harbin Engineering University;
..............page:2209-2214
Dynamic Priority Based Real-time Packet Scheduling for Wireless Sensor Networks
ZHANG Qi;TIAN Li-qin;Computer College;Qinghai Normal University;Computer College;North China Institute of Science and Technology;
..............page:2215-2219
Neighbors Nodes Count and Select Optimized Weight Path Routing Algorithm in Opportunistic Network
WU Jia;CHEN Zhi-gang;CHEN Xue-han;LIU Hui;School of Software;Central South University;"Mobile Health"Ministry of Education-China Mobile Joint Laboratory;
..............page:2220-2224
Outage Performance of Cognitive AF Relay Communication System with Non-identical Parameters
CHEN Dan-jie;GAO Zhen-guo;CHEN Bing-cai;LU Zhi-mao;College of Computer Science;Dalian University of Technology;College of Software;Beijing University of Technology;
..............page:2225-2230
C-MCC:A Clustering-based Coordination Charge Policy of Multiple Mobile Chargers in Wireless Rechargeable Sensor Networks
CHEN Xue-han;CHEN Zhi-gang;ZHANG De-yu;ZENG Feng;School of Software;Central South University;College of Information Science and Engineering;Central South University;
..............page:2231-2236
Mining of Data Redundancy Characteristic in Deduplication Systems
JIANG Zhi-xiong;LU Chun-yang;YU Hong-liang;CNPC Changping Data Center;Lab of High Performance Computing;Tsinghua University;
..............page:2237-2242
A Spatial Join Query Optimization Algorithm Based on Grid Index
QIAO Bai-you;DENG Zeng-an;WANG Qiu-jie;ZHU Hong-yin;KONG De-fu;WANG Guo-ren;National Marine Data and Information Service;State Oceanic Administration;College of Information Science & Engineering;Northeastern University;
..............page:2243-2248
Reverse Skyline Query Processing Algorithms Over Joins
XIN Jun-chang;WANG Pei;WANG Zhi-qiong;WANG Guo-ren;GUO Xin-yu;College of Information Science & Engineering;Northeastern University;Sino-Dutch Biomedical & Information Engineering School;Northeastern University;
..............page:2249-2255
Clustering Analysis in Heterogeneous Information Network Based on Matrix Factorization
LI Yi-tong;HUANG Yue;SHI Chuan;WU Bin;Department of Computer Science;Beijing University of Posts and Telecommunications;Fu Foundation School of Engineering and Applied Science;Columbia University;
..............page:2256-2261
Friend and Location Recommendation Algorithms Based on User Activity and Social Trust in LBSNs
YU Ya-xin;LI Yu-long;LIU Xin;YU Shuang-yu;College of Information Science and Engineering;Northeastern University;Software College;Northeastern University;
..............page:2262-2266
Local Breadth-first Expansion and Shrinking for Densest Subgraph Detection
SUN He-li;WANG Peng;ZHOU Yu;LIU Huai-liang;HUANG Jian-bin;Department of Computer Science and Technology;Xi’an Jiaotong University;State Key Laboratory for Novel Software Technology;Nanjing University;School of Software;Xidian University;School of Economics and Management;Xidian University;
..............page:2267-2271
Detecting Overlapping Community Structure with Neighbor Voting
CHEN Jun-yu;ZHOU Gang;XIONG Xiao-bing;Department of Cyber Space Security;Information and Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;
..............page:2272-2277
Verification of Dynamic Data Integrity Using Counting Bloom Filter in Cloud Storage
XU Guang-wei;SUN Zhi-feng;CHEN Chun-lin;YAN Cai-rong;LIU Guo-hua;School of Computer Science and Technology;Donghua University;The Key Laboratory of Embedded System and Service Computing;Ministry of Education;Tongji University;
..............page:2278-2283
A Method of Autonomous Emergency Rejuvenation for Survivable System
ZHAO Guo-sheng;WANG Jian;LI Zhen-xing;NA Rui;College of Computer Science and Information Engineering;Harbin Normal University;School of computer science and technology;Harbin University of Science and Technology;
..............page:2284-2289
Spectral Clustering Algorithm for User Behavior Patterns in Social Networks
HAN Zhong-ming;ZHANG Chen;LI Bin;MO Qian;School of Computer and Information Engineering;Beijing Technology and Business University;
..............page:2290-2295
An Algorithm of Topic-related Microblogging Opinion Leaders Mining
WU Xian-hui;ZHANG Hui;YANG Chun-ming;LI Bo;ZHAO Xu-jian;School of Computer Science and Technology;Southwest University of Science and Technology;Educational Informationization Office;Southwest University of Science and Technology;School of Computer Science and Technology;University of Science and Technology of China;
..............page:2296-2301
Primary Exploration for Mining Spatial High Utility Co-location Patterns
YANG Shi-sheng;WANG Li-zhen;LU Jun-li;GAO Yuan;Information Department;Yunnan University;
..............page:2302-2307
E-SkipNet:a DHT Network Supporting Multi-attribute Range Queries
FANG Qi-ming;YANG Guang-wen;School of Computer;Hangzhou Dianzi University;Department of Computer Science and Technology;Tsinghua University;
..............page:2308-2312
A IP Traceback Scheme for Direct Broadcast-based DRDoS Attack
ZHANG Jian;XIA Jia-zhi;HE Jian-biao;JIN Ou;School of Information Science and Engineering;Central South University;
..............page:2313-2318
MCSP Model and Payment Protocol Oriented Near-field Payment
CHANG Chao-wen;WEI Yan-fen;WANG Shuai;Institute of Cryptography Engineering;Information Engineering University;
..............page:2319-2324
Fighting Against P2P File Pollution by Encouraging User to Delete Malicious Content Actively
HUANG Zhi-hua;LU Song-nian;ZHANG Ai-xin;LI Lin;Department of Electronic Engineering;Shanghai Jiaotong University;School of Information Security;Shanghai Jiaotong University;
..............page:2325-2330
A Reversible Data Hiding Method in Encrypted Image With Multiple Bits Embedded
WANG Zi-chi;ZHANG Yuan;ZHANG Xin-peng;Shanghai University;School of Communication and Information Engineering;
..............page:2331-2335
zheng gao jian ze
..............page:2335
A Recoverable Dual Watermarking Scheme for Very Large Scale Integration based Intellectual Property Protection
LIANG Wei;ZHANG Da-fang;LONG Jing;LI Xiong;SHENG Yong;School of Computer Science and Engineering;Hunan University of Science and Technology;College of Computer Science and Electronic Engineering;Hunan University;
..............page:2336-2340
Memory Integrity Protection Method Based on Asymmetric Hash Tree
MA Hai-feng;YAO Nian-min;SONG Jing-feng;Computer and Information Engineering Institute;Heilongjiang University of Science and Technology;Computer Science and Technology Institute;Harbin Engineering University;
..............page:2341-2346
Study on An Algorithm of Trusted Data Fusion Oriented on WSNs
ZHANG Shi-bin;FANG Jie;SONG Jia-qi;College of Information Security Engineering;Chengdu University of Information Technology;Sichuan Institute of Computer Sciences;
..............page:2347-2352
Unsupervised Intrusion Detection Algorithm of Improved Fuzzy C-Means Clustering Multiple Classifiers Group
WANG Zuo-hua;YANG Ruo-yu;Department of Computer Science and Technology;Nanjing University;
..............page:2353-2356
DNA Microarray Data Filling Based on Extreme Learning Machine Ridge Regression
ZHANG Jian-jun;ZHANG Tian-cheng;SUI Yu-ting;YUE De-jun;College of Information Science and Engineering;Northeastern University;
..............page:2357-2362
An Optimized Local Discriminant Domain-specific Support Vector Machine
REN Shi-jin;SONG Zhi-huan;LING Ping;YANG Mao-yun;National Laboratory of Industrial Control Technology;Zhejiang University;School of computer science & technology;Jiangsu Normal University;
..............page:2363-2369
A Coarse-Grained Clustering Unit Based Parallel Algorithm for Big Data Set
XIANG Yao;YUAN Jing-ling;ZHONG Luo;ZHAO Yan-peng;Department of Computer Science and Technology;Wuhan University of Technology;
..............page:2370-2374
Joint Fingerprinting and Encryption in the Tree Structure Wavelet Domain for Social Multimedia Sharing
YE Cong-huan;XIONG Zeng-gang;DING Yao-ming;LI Ji-ping;WANG Guang-wei;ZHANG Xue-min;ZHANG Kai-bing;School of Computer and Information Sciencet;Hubei Engineering University;School of Computer;Huazhong University of Science and Technology;
..............page:2375-2379
An Elliptic Curve Scalar Multiplication Processor Based on Custom Instruction
YAN Xin-kai;WU Gui-ming;WU Dong;XIE Xiang-hui;State Key Laboratory of Mathematical Engineering and Advanced Computing;
..............page:2380-2384