Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2014 Issue 8
An Optimal-based Bidding Strategies Keyword Advertising Auction Agent Model
DONG Hong-bin;YANG Xue;YIN Gui-sheng;HAN Qi-long;Computer Science and Technology College;Harbin Engineering University;
..............page:1681-1686
Web Service Trust Evaluation Model Based on Game Theory
SHEN Li-min;WANG Qian;LI Feng;College of Information Science and Engineering;Yanshan University;The Key Laboratory of Computer Virtual Technology and System Integration in Hebei;College of Computer and Communications Engineering;Northeastern University at Qinhuangdao;
..............page:1687-1692
Algorithm of Frequent Itemsets Mining Based on Array Prefix-trees
NIU Xin-zheng;YANG Jian;SHE Kun;School of Computer Science and Engineering;University of Electronic Science and Technology of China;School of Information and Software Engineering;University of Electronic Science and Technology of China;
..............page:1693-1698
Detecting Program Non-crashing Failures via Assertion and Slicing
DENG Chao-qiang;ZENG Fan-ping;ZHANG Hui;ZHANG Zhen-yu;DONG Qi-xing;School of Computer Science and Technology;University of Science and Technology of China;State Key Laboratory of Computer Science;Institute of Software;Chinese Academy of Sciences;Anhui Province Key Lab of Software in Computing and Communication;
..............page:1699-1704
Mining Periodic-frequent Patterns of Moving Objects
XU Shou-quan;PI De-chang;College of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;
..............page:1705-1710
Automatically Generating Regular Expression of Load Signatures for Applications
WU Fei;ZENG Fan-ping;ZHANG Hui;DONG Qi-xing;School of Computer Science and Technology;University of Science and Technology of China;Anhui Province Key Lab of Software in Computing and Communication;
..............page:1711-1716
Maximum Profit Oriented Adaptive Scheduling of Cloud Resources
FENG Guo-fu;LIU Lin-yuan;TANG Ming-wei;HAN Bing-qing;Department of Computer Science;Nanjing Audit University;
..............page:1717-1721
Topic Tracking Algorithm Based on the Improved KNN
CHEN Zhi-min;MENG Zu-qiang;LIN Qin-feng;College of Computer;Electronics and Information;Guangxi University;
..............page:1722-1725
Research on Ontology Modeling of Product Servitization Supply Chain Collaboration Based on Service Capacity
HE Zheng;CHEN Ju-hong;YAO Shu-jun;School of Economics and Management;Xi’an University of Technology;School of Management;Xi’an Polytechnic University;School of Management;Xi’an University of Finance & Economics;
..............page:1726-1731
Research on Software Transactional Memory Parallel Programming Model Based on Multicore Cluster
LI Wen-jing;LI Shuang;YUAN Chang-an;LIAO Wei-zhi;School of Computer and Information Engineering;Guangxi Teachers Education University;College of Mathematics Physics and Information Engineering Jiaxing University;
..............page:1732-1737
Prefetching Strategy of Streaming Data Based on Correlation in Interactive Behavior
ZHANG Xi-wen;WU Gang;WANG Song;Anhui Key Lab of Network Communication System and Control;University of Science and Technology of China;
..............page:1738-1742
Research of Access Control Lists Pipelined Lookup for 100Gbps Line Rates
WU Dong;QUAN Cheng-bin;ZHAO You-jian;Department of Computer Science and Technology;Tsinghua University;
..............page:1743-1746
Simulating a Complex Transport Network Evolution Model With Variable Structure Type
LI Zhou-ping;YANG Jian-zheng;HAN Jing-ti;Economic and Management Experiment Center;University of Shanghai for Science and Technology;Business School;University of Shanghai for Science and Technology;The School of Information Management and Engineering;Shanghai University of Finance and Economics;
..............page:1747-1750
Improvement of Caching Efficiency in CCN by Network Coding
LIU Wai-xi;YU Shun-zheng;ZHU Ping-yu;GAO Ying;Department of Electronic and Information Engineering;Guangzhou University;Department of Electronic and Communication Engineering;Sun Yat-Sen University;
..............page:1751-1755
Novel Scheduling Algorithms for Cooperative Distribution Caching Systems
YAO Shi-jia;ZHU Ming;SUN Yong-lu;Department of Automation;University of Science and Technology of China;
..............page:1756-1760
Topology Control Scheme Based on Potential Game for Ad Hoc Networks
FANG He;XU Li;ZHANG Jing;LU Wei-sheng;School of Mathematics and Computer Science;Fujian Normal University;
..............page:1761-1765
Dual-channel Beaconless Geographic Routing Protocol for Wireless Sensor Networks
HUANG Chao;WANG Guo-li;School of Computer Science;Guangdong Polytechnic Normal University;School of Information Science and Technology;Sun Yat-Sen University;
..............page:1766-1770
Lower Order Data Fusion Algorithm Based on ARMA Model for Wireless Sensor Networks
ZHANG Xi-guang;ZHU Si-feng;ZHENG Qiu-sheng;YAN Bao-ping;School of Computer Science;Zhongyuan University of Technology;Department of Mathematics & Information Science;Zhoukou Normal University;Computer Network Information Center;Chinese Academy of Sciences;
..............page:1771-1774
Minimum Hop Routing Algorithm for Clustering Wireless Sensor Networks
FAN Shu-ping;MA Bao-ying;GAO Chen-guang;YAO Nian-min;Institute of Technology;Mudanjiang Normal University;College of Health Management;Mudanjiang Medical University;College of Computer Science and Technology;Harbin Engineering University;
..............page:1775-1779
Multi-path Routing Algorithm About Network Reliability
HU Jian-jun;WANG Xue-yi;FAN Bin;Engineering College of Electric & Information;Lanzhou University of Arts and Science;College of Information Science and Engineering;Northeastern University;Teaching Department of Basic Computer;Shenyang Institute of Engineering;
..............page:1780-1783
Design of Anonymous Authentication for Mobility Networks
WANG Rui;WANG Qing;LI Xiao-biao;ZHANG Hua;LI Zhong-xian;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;National Computer Network Emergency Response Technical Team/Coordination Center of China;National Cybernet Security Limited;
..............page:1784-1788
Robust Digital Watermarking Scheme Based on Digital Holography and Singular Value Decomposition
WANG Zu-xi;MAO Liu-gang;HU Han-ping;School of Automation;Huazhong University of Science & Technology;Science and Technology on Multi-spectral Information Processing Laboratory;
..............page:1789-1793
Fuzzy-clustering-based Overall Evaluation of Mobile Node Access Risk
WANG Jian-jun;LI Jian-ping;DU Shi-fu;School of Computer Science;University of Electronic Science and Technology of China;Information Science and Technology Department;Hunan First Normal University;
..............page:1794-1797
A Vulnerability Attack Detection Method Based on Dynamic Taint Analysis for Cisco IOS
CHEN Li-gen;LIU Sheng-li;GAO Xiang;XIAO Da;PLA Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;
..............page:1798-1802
Improving the Efficiency of Viral Marketing in a Social Network Using Influential Nodes
SU Xiao-ping;SHEN Qing;SONG Yu-rong;JIANG Yun-liang;School of Computer & Software Engineering;Nanjing Institute of Industry Technology;School of Information & Engineering;Huzhou Teachers College;College of Automation;Nanjing University of Posts and Telecommunications;
..............page:1803-1807
Lightweight One-time Password Scheme
YANG Ming-xing;PENG Xin-guang;College of Computer Science and Technology;Taiyuan University of Technology;
..............page:1808-1811
Application and Improvement of Classification Tree in Block Cipher IPs Verification
LI Sen-sen;XU Jin-fu;PLA Information Engineering University;
..............page:1812-1815
Study of Routing Algorithms for Three Dimensional Networks-on-chip
WANG Lian-lian;ZHANG Da-kun;SONG Guo-zhi;School of Computer Science and Software;Engineering Tianjin Polytechnic University;
..............page:1816-1821
Application Specific Instruction Set Architecure of Feedback Shift Register for Stream Cipher
DAI Qiang;DAI Zi-bin;ZHANG Li-chao;People’s Liberation Army Information Engineering University;
..............page:1822-1826
Design of Instruction Extended Interface of RISC Microprocessor
GUO Yi-hui;ZHANG Li-chao;DAI Zi-bin;PLA Information Engineering University;
..............page:1827-1830
Improved Ant Colony Optimization Algorithm Based on Global Best Path Map and Probability Edge Count Value
SHEN Jia-jie;JIANG Hong;WANG Su;School of Information Science and Technology;East China Normal University;
..............page:1831-1836
Cooperative Coevolutionary Biogeography-based Optimization
WANG Xiao-guang;ZHENG Xiang-wei;School of Information Science and Engineering;Shandong Normal University;Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology;
..............page:1837-1841
zheng gao jian ze
..............page:1841
A Particle Filter Based Smart Mobile Terminal Indoor Pedestrian Localization Algorithm
ZHAO Feng-da;YAN Ting-ting;KONG Ling-fu;Department of Information Science and Engineering of Yanshan University;The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;
..............page:1842-1847
L-diversity Model Implementation Based on Improved Clustering Algorithm
YANG Jing;YUAN Yong-bin;YU Xu;College of Computer Science and Technology;Harbin Engineering University;College of Electrical Engineering & Automation;Fuzhou University;College of Information Science and Technology;Qingdao University of Science & Technology;
..............page:1848-1851
Deviation Based Trust Recommendation Model for Multi-agent System
ZHANG Da-peng;ZUO Meng-fei;WANG Xin-sheng;Institute of Information Science and Engineering;Yanshan University;Guangxi Key Laboratory of Trusted Software;Guilin University of Electronic Technology;
..............page:1852-1855
Distributed Power Load Forecasting Algorithm Research
ZHAO Shuo;ZHANG Shao-min;School of Control and Computer Engineering;North China Electric Power University;
..............page:1856-1860
Global Harmony Search Algorithm for Absolute Value Equation with 2~n Solutions
YONG Long-quan;LIU San-yang;TUO Shou-heng;DENG Fang-an;CHEN Tao;School of Mathematics and Computer Science;Shaanxi University of Technology;School of Mathematics and Statistics Xidian University;
..............page:1861-1864
Constraint Based Diagnostic Model and Analysis of Diagnosability
CAI Yong-ming;ZHANG Xue-nong;ZHANG Li-cheng;Guangdong Pharmacy University;
..............page:1865-1868
An Isosurface Extraction Method Guaranteed Topological Characteristics From Second-order Hexahedron
LIU He-dan;WANG Cheng-en;State Key Laboratory of Synthetical Automation for Process Industries;Northeastern University;Liaoning Province Key Laboratory of Multidisciplinary Optimal Design for Complex Equipment;Northeastern University;School of Information Science & Engineering;Northeastern University;
..............page:1869-1875
Saliency Region Detection of an Image: a Multi-level Fusion Approach
ZHANG Shi-hui;HOU Fang;DUAN Liang-liang;KONG Ling-fu;College of Information Science and Engineering;Yanshan University;The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;
..............page:1876-1881
Construction of the Fractal on the Surface of the Inscribed Icosahedron in the Unit Sphere from Sierpinski Triangle with D3 Symmetry
CHEN Ning;DENG Bin;Faculty of Information & Control Engineering;Shenyang Jianzhu University;
..............page:1882-1884
Signal Reconstruction Method Using Fusion Compressed Sensing Framework
YANG Jia-hong;LIU Yuan-yuan;SHAN Jin-ting;XU Kun;CHEN Yue-li;Engineering College;Hunan Normal University;Shenzhen Institutes of Advanced Technology;Chinese Academy of Sciences;China Tobacco Guangdong Industrial Co;Ltd;
..............page:1885-1890
Recognition of Suspicious Activity Using Case-based Reasoning in Video Surveillance
XIA Li-min;YANG Bao-juan;CAI Nan-ping;School of Information Science and Engineering;Central South University;
..............page:1891-1896
Sketch Feature Extraction and Recognition Considering Location Information
WANG Yi-hong;CHEN Zhao-jiong;College of Mathematics and Computer Science;Fuzhou University;
..............page:1897-1900
Hierarchical Cascade Combined Tracking Feedback for Target Detection in Complex Scenes
CAO Qian-xia;LUO Da-yong;WANG Zheng-wu;School of Information Science and Engineering;Central South University;Key Laboratory of Highway Engineering;Ministry of Education;
..............page:1901-1905
Fast Hyperspectral Image Band Selection Method Based on Curve Shape Feature
QIU Jian-bin;LI Shi-jin;ZHU Yue-long;WAN Ding-sheng;College of Computer and Information;HoHai University;
..............page:1906-1910
Image Based Automatic Detection Quadrilateral Algorithm
HU Li-hua;ZHANG Ji-fu;Computer Science College;Taiyuan University of Science and Technology;
..............page:1911-1915
Novel Fast Moving Target Detection Method in Image Sequences
LI Chun-hua;LI Ning;WU Li-chao;Central South University of Forestry and Technology;School of Sciences;Beijing Normal University State Key Laboratory of Earth Surface Processes and Resource Ecology;Beijing Normal University Academy of Disaster Reduction and Emergency Management;Ministry of Civil Affairs & Ministry of Education;Beijing Normal University Key Laboratory of Environmental Change and Natural Disaster;Ministry of Education of China;
..............page:1916-1921
Color Image Encryption Algorithm Based on Two-dimensional Arnold Mapping
YANG Feng-xia;Computer Department of Cangzhou Normal University;
..............page:1922-1925
Adaptive Non-maxima Suppression Edge Detection Algorithm and FPGA Design to Achieve
WANG Wen-tao;ZHU Shun-an;TANG Wan;Computer Science Department;South-central University for Nationalities;
..............page:1926-1930
Robust Image Watermarking Scheme Against Geometric Attacks
ZHAO Yan-li;WANG Xing;MA Xiao-pu;LI Zheng-yan;College of Computer and Information Technology;Nanyang Normal University;School of Software;Nanyang Normal University;
..............page:1931-1936
ben kan jian suo yu shou lu
..............page:1936