Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2014 Issue 11
User Interest Minning Research Based on Social Network Sevice
HE Yan-xiang;LIU Xu-le;CHEN Qiang;LIANG Wei;SUN Song-tao;School of Computer of Wuhan University;State Key Laboratory of Software Engineering of Wuhan University;Wuhan University;
..............page:2385-2389
Study on the Cloud Service Selecting Algorithm Under Cloud Manufacturing Mode
ZHANG Yi-wen;ZHANG Ling;QIAN Fu-lan;LIU Hui-ting;School of Computer Science and Technology;Anhui University;
..............page:2390-2395
Improving the Solving of Non-linear Arithmetic Constraints in Dynamic Symbolic Execution
DONG Qi-xing;ZENG Fan-ping;YAN Jun;ZHANG Hui;PENG Ling;School of Computer Science and Technology;University of Science and Technology of China;State Key Laboratory of Computer Science;Institute of Software;Chinese Academy of Sciences;Anhui Province Key Lab of Software in Computing and Communication;Technology Center of Software Engineering;Institute of Software;Chinese Academy of Sciences;
..............page:2396-2401
ben kan jian suo yu shou lu
..............page:2401
Readdir + + : A Performance Optimization Technology for Massive Small-file Read-access in Parallel Network File System
YANG Hong-zhang;ZHANG Jun-wei;LIU Zhen-jun;ZHANG Jian-gang;Institute of Computing Technology;Chinese Academy of Science;University of Chinese Academy of Science;
..............page:2402-2409
Query Optimization Strategy for Dirty Database
ZHANG Yan;TANG Xing;WANG Hong-zhi;Department of Computer Science and Technology;Harbin Institute of Technology;
..............page:2410-2415
Understanding Knowledge Sharing Activities in Software Fault-prone Prediction: a Transfer Learning Study
WU Fang-jun;School of Information Technology;Jiangxi University of Finance and Economics;Jiangxi Key Laboratory of Data and Knowledge Engineering;Jiangxi University of Finance and Economics;
..............page:2416-2421
Keywords Extraction Method for Chinese Web Text Based on Baidu Baike
CHEN Ye-wang;College of Computer Science and Technology;Huaqiao University;
..............page:2422-2427
A Subjective Trust Model Based on Integrated Interval Similarity to Ideal
XU Jun;ZHONG Yuan-sheng;College of Information Management;Jiangxi University of Finance and Economics;Modern Economics & Management College of Jiangxi University of Finance and Economics;
..............page:2428-2433
Research on Caching Mechanism in Publish / Subscribe Systems
YU Run-sheng;CAO Jian;Department of Computer Science and Engineering;Shanghai Jiaotong University;
..............page:2434-2439
Research on Presence and Instant Messaging Technology Based on SIP
LAN Guo-liang;YANG Hai-bo;SUN Jian-wei;JIA Zheng-feng;LIANG Yu;Shenyang Institute of Computer Technology;Chinese Academy of Science;University of Chinese Academy of Science;
..............page:2440-2444
Ranking Distribution Based Co-clustering Algorithm for Heterogeneous Information Network
TONG Hao;YU Chun-yan;College of Mathematics and Computer Science;Fuzhou University;
..............page:2445-2449
Research on Solving Maximum Flow Problem of the Complex Network with Granular Computing
ZHANG Yan-ping;SU Jian-zhong;LIU Qian-qian;ZHAO Shu;School of Computer Science and Technology;Anhui University;Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education;Anhui University;
..............page:2450-2453
Network Traffic Forecasting Model Based on IBBO-LSSVM
JI Ke-ke;ZHANG Guang-hui;Department of Information Engineering;Jiangsu Food and Medicine Science College;School of Information Science and Engineering;Hunan University;
..............page:2454-2458
Research on an Efficient WSN Node Identity Distributed Authentication
ZHOU Zhi-ping;ZHUANG Xue-bo;School of Internet of Things Engineering;Jiangnan University;
..............page:2459-2463
A Multi-QoS Constraint Change Dynamic Bandwidth Allocation Algorithm
LIANG Gen;YU He-wei;YE Qi-ming;WANG Zhe;Guangdong University of Petrochemical Technology;College of Science;Guangdong Province Key Laboratory of Petrochemical Equipment Fault Diagnosis;South China University of Technology;School of Computer Science and Engineering;
..............page:2464-2468
Multi-use Bidirectional Proxy Re-signature Scheme with Strong Unforgeability
YANG Xiao-dong;ZHOU Si-an;LI Yan;LI Chun-mei;WANG Cai-fen;College of Computer Science & Engineering;Northwest Normal University;
..............page:2469-2472
Cryptanalysis of Linkability Attacks on Some Blind Signature Schemes
XU Hao;KANG Bao-yuan;NIU Yong-zheng;School of Computer Science and Software Engineering;Tianjin Polytechnic University;
..............page:2473-2476
English Title a Extension RAID Code Base on Double Failures RDP Code
WAN Wu-nan;YANG Wei;College of Information Security Engineering;Chengdu University of Information Technology;
..............page:2477-2481
InsightDroid—Dynamic Method Trace in Android Applications
QIU Ling-zhi;ZHANG Zi-xiong;SUN Guo-zi;School of Computer Science & Technology;School of Software;Nanjing University of Posts and Telecommunications;
..............page:2482-2487
Research of the Flight Departure Scheduling Based on Multi-objective Genetic Algorithm
LI Dan-cheng;ZHONG Hua-gang;CAO Bin;LIU Pai;Software College;Northeastern University;
..............page:2488-2493
Deep Feature Representation Based on Granular Transaction of Quotient Space Theory
CHEN Jie;ZHANG Yan-ping;School of Computer Science and Technology;Anhui University;Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education;Anhui University;
..............page:2494-2497
Uncertainty Measure of Rough Fuzzy Sets in Covering Approximation Space
HU Jun;ZHANG Qing-hua;HU Feng;Chongqing Key Laboratory of Computational Intelligence;Chongqing University of Posts & Telecommunications;School of Computer Science and Technology;Chongqing University of Posts & Telecommunications;School of Mathematics and Physics;Chongqing University of Posts and Telecommunications;
..............page:2498-2501
Improved NSGA-Ⅱ for Constrained Multi-objective Optimization Problems with Interval Numbers
CHEN Zhi-wang;CHEN Lin;Key Lab of Industrial Computer Control Engineering of Hebei Province;Yanshan University;National Engineering Research Center for Equipment and Technology of Cold Strip Rolling;
..............page:2502-2506
Augmented Reality System Modeling Based on Simple Visual Marker
ZHANG Guo-liang;WU Yan-xiang;GUO Wang-ping;Computer Science and Technology Institute;Huaqiao University;
..............page:2507-2510
Multi-instance Learning Bag-level Covering-kNN Algorithm
ZHAO Shu;RUI Chen;CHEN Jie;ZHANG Yan-ping;Key Lab of Intelligent Computing & Signal Processing;Ministry of Education;Anhui University;Institute of Artificial Intelligence;Anhui University;
..............page:2511-2514
Bipolar-value Fuzzy Soft Ideals of Semigroups
LIU Xiao-ni;LIAO Zu-hua;LUO Xiao-tang;School of Science;Jiangnan University;Institute of Intelligence System & Network Computing;Jiangnan University;
..............page:2515-2518
Two Matroidal Structures of Coverings
LIN Zi-qiong;HUANG Ai-ping;Lab of Granular Computing;Minnan Normal University;
..............page:2519-2522
Composite Ordered Information Systems
LUO Chuan;LI Tian-rui;CHEN Hong-mei;ZHANG Jun-bo;School of Information Science and Technology;Southwest Jiaotong University;
..............page:2523-2527
Feature Selection for Cancer Classification Based on Neighborhood Rough Set and Particle Swarm Optimization
XU Jiu-cheng;XU Tian-he;SUN Lin;REN Jin-yu;College of Computer & Information Engineering;Henan Normal University;Engineering Technology Research Center for Computing Intelligence & Data Mining;Henan Province;
..............page:2528-2532
An SVM Bagging Ensemble Learning Algorithm Based on Feature Selection
QI Hui;WANG Wen-jian;GUO Hu-sheng;Department of Computer;Taiyuan Normal College;School of Computer and Information Technology;Shanxi University;
..............page:2533-2537
zheng gao jian ze
..............page:2537
An Preference Obtain Method Based on Markov Correlation and Passive Establish Confidence
YANG Li;HU Yun-hong;Public Department of Computer Teaching;Yuncheng University;Department of Applied Mathematics;Yuncheng University;
..............page:2538-2542
An Energy-efficient Virtual Machine Placement Algorithm in Cloud Data Center
DOU Yu-sheng;CUI Cheng-yuan;TANG Hong;LI Hong-jian;College of Computer Science and Technology;Chongqing University of Posts and Telecommunications;
..............page:2543-2547
Design of Asynchronous Messaging Communication in Virtual Scene
XU Zeng-min;CUI Zhong-ning;WANG Hui-yong;CHEN Guang-xi;School of Mathematics and Computational Science;Guilin University of Electronic Technology;National Engineering Research Center for Multimedia Software;School of Computer;Wuhan University;Guang Dong OPPO Mobile Telecommunications Corp.;Ltd;School of Computer Science and Engineering;Guilin University of Electronic Technology;
..............page:2548-2552
An Improved Perceptual Hashing Algorithm of Image Based on Discrete Cosine Transform and Speeded Up Robust Features
DING Xu;HE Jian-zhong;Dept. School of Optical Electrical and Computer Engineering;University of Shanghai for Science and Technology;
..............page:2553-2557
Features Fusion Gait Recognition by Combining Energy Image and Canonical Correlation Analysis
LI Lin-jie;GU Guang-hua;WANG Cheng-ru;ZHANG Chun-feng;College of Information Science and Engineering;Yanshan University;
..............page:2558-2561
Coding and Decoding Method for Periodic Permutation Color Structured Light
QIN Xu-jia;MA Ji-yue;ZHANG Qin-feng;ZHENG Hong-bo;XU Xiao-gang;School of Computer Science and Technology;Zhejiang University of Technology;Key Laboratory of Visual Media Intelligent Processing Technology of Zhejiang Province;Department of Equipment System and Automatization;Dalian Naval Academy;
..............page:2562-2566
Pixel Coverage Segmentation Method Based on Crisp Segmentation
DONG Yan;LIANG Jiu-zhen;School of Internet of Things Engineering;Jiangnan University;
..............page:2567-2571
Lossless Image Authentication Algorithm with Minimal Expansion
LI Xiang-yang;Department of Computer Science;Guangdong AIB Polytechnic College;
..............page:2572-2577
Improved Fundamental Matrix Estimation Algorithm
HUANG Chun-yan;HAN Xie;HAN Hui-yan;SUN Fu-sheng;College of Computer and Control Engineering;North University of China;
..............page:2578-2581
Color Self-similarity and HOG Features Based Pedestrian Detection
RAO Qin;XIE Gang;QIN Shuang;Department of Control Engineering;Taiyuan University of Technology;
..............page:2582-2585
CPUAutoplug:a Hybrid Power Management Method Combines Dynamic Frequency Scaling and Automatic Processor Core Plugging
CHEN Hua-cai;ZHANG Fu-xin;WANG Jian;Jiangsu Lemote Technology Corporation Limited;Institute of Computing Technology;Chinese Academy of Sciences;
..............page:2586-2592