Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2015 Issue 8
Multimodal Multimedia Retrieval Model Based on Probabilistic Latent Semantic Analysis
ZHANG Yu;YUAN Ye;WANG Guo-ren;School of Information Science and Engineering;Northeastern University;
..............page:1665-1670
ben kan jian suo yu shou lu
..............page:1670
A Service-composition Oriented Privacy Protection Method
PENG Huan-feng;HUANG Zhi-qiu;FAN Da-juan;College of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;College of Computer Engineering;Nanjing Institute of Technology;
..............page:1671-1676
Location Recommendation Method Based on Trust Degree Between Users and Classification Hierarchical Preference Tree
LIN Shu-kuan;LIU Shuai;CHEN Zu-long;QIAO Jian-zhong;College of Information Science and Engineering;Northeastern University;
..............page:1677-1681
Nested Regular Expression Based Property Paths Querying and Reasoning on RDF Graph Data
LING Jun;WANG Xin;FENG Zhi-yong;RAO Guo-zheng;JIANG Yang;School of Computer Science and Technology;Tianjin University;Tianjin Key Laboratory of Cognitive Computing and Application;Tianjin University;
..............page:1682-1687
Evidence Trust Model for Behaviors Detection Under Open Enterprise Environment
SHEN Li-min;LI Hui-qing;LI Feng;TONG Lian-gang;Information Science and Engineering College/Information Technology Office;Yanshan University;The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;Computer and Communication Engineering College;Northeastern University at Qinhuangdao;
..............page:1688-1694
TiStor: a Tiered Storage System Based on Policy Engine
LUO Sheng-mei;ZHANG Jia-cheng;ZHOU Yang;CHENG Shu-han;Department of Science and Technology;Tsinghua University;Zhongxing Telecommunication Equipment Corporation;
..............page:1695-1699
Research on Cross-company Software Defect Prediction Based on Integrated Sampling and Ensemble Learning
DAI Xiang;MAO Yu-guang;College of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;State Key Lab for Novel Software Technology;Nanjing University;
..............page:1700-1705
Handling Data Skew in MapReduce Programming Model Based on Virtual Partitioning Method
GAO Yu-fei;CAO Yang-jie;TAO Yong-cai;SHI Lei;School of Information Engineering;Zhengzhou University;School of Software;Zhengzhou University;
..............page:1706-1710
On Modeling and Querying of Text Corpora
LIU Ding-jia;LIU Guo-hua;LIU Ze-quan;WANG Wei;School of Information Science & Engineering;Yanshan University;Department of Computer & Technology;Donghua University;The School of Foreign Studies;Yanshan University;
..............page:1711-1716
Graph-based Bursty Topic Detection Approach in User-generated Texts
ZHAO Li;LIU Xin-ran;ZHANG Hong;LI Yan;National Computer Network Emergency Response Technical Team Coordination Center of China;School of Computer Science and Engineering;Beihang University;
..............page:1717-1722
A Cold-starting Personalized Recommendation Algorithm
LIAO Shou-fu;LIN Shi-ping;GUO Kun;College of Mathematics and Computer Science;Fuzhou University;
..............page:1723-1727
Word Similarity Computation Based on the HowNet 2008
LIU Jie;GUO Yu;TANG Shi-ping;FAN Xiao-zhong;College of Information and Engineering;Capital Normal University;College of Information Technology;Beijing Institute of Technology;
..............page:1728-1733
Community Mining Algorithm of Information Propagation Probability to Probability Matrix of Affinity
ZHANG Jia-li;XIE Jin-kui;WANG Ting-ting;YANG Zong-yuan;Department of Computer Science and Technology;East China Normal University;
..............page:1734-1738
Multiparty Cloud Computation and Homomorphic Proxy Re-encrypt Scheme
TAN Zhen-lin;ZHANG Wei;Department of Electronic Technology;Engineering University of the Chinese Armed Police Force;
..............page:1739-1742
A Model on Application Layer Balanced Binary Multicast Tree with Low Delay
SHENG Zuo;LIAO Xiao-fei;WU Yun;CHEN Guang;LI De-min;School of Information Science & Technology;Donghua University;Engineering Research Center of Digitized Textile & Fashion Technology;Ministry of Education;Donghua University;
..............page:1743-1746
Optimizationof Reception and Storage for Massive Small Files
ZHANG Shou-li;YANG Dong-ju;HAN Yan-bo;Shandong University of Science and Technology;College of Information Science and Engineering;Research Center for Cloud Computing;North China University of Technology;
..............page:1747-1751
Scheme of Data Service Recommendation for Mobile Devices
LIU Xin-yang;WANG Jing;HAN Bo-yang;Research Center for Cloud Computing;North China University of Technology;School of Computer Science and Technology;Shandong University;
..............page:1752-1757
Self-adaptive Dynamic Requests Scheduling Algorithm in Multi-core Web Server
YOU Guo-hua;ZHAO Ying;College of Information Science & Technology;Center for Information Technology;Beijing University of Chemical Technology;
..............page:1758-1762
A Method for Detecting Cross-site Script
YU Xue-yong;JIANG Guo-hua;School of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;
..............page:1763-1768
Method for Estimating Overlapping Community Influence in Social Networks
LUO Yu-min;CHEN Yu-zhong;ZHAN Zhen-feng;SHI Song;College of Mathematics and Computer Science;Fuzhou University;Fujian Key Laboratory of Network Computing and Intelligent Information Processing;Fuzhou University;
..............page:1769-1773
Intrusion Detection Model Based on Confidence of Relation Among System Call Arguments
SHEN Li-min;GUO Chao;MA Chuan;College of Information Science and Engineering;Yanshan University /Computer Virtual Technology & System Integration Key Laboratory of Hebei Province;
..............page:1774-1778
Research on Intrusion Detection Based on WOS-ELM Algorithm
KANG Song-lin;LIU Chu-chu;FAN Xiao-ping;LI Hong;YANG Ning;School of Information Science and Engineering;Central South University;
..............page:1779-1783
Network Security Situation Assessment Method Based on HMM and Information Entropy
PAN Heng;LI Jing-feng;ZHENG Qiu-sheng;Hen Nan Computer Information System Security Assessment Engineering Laboratory;Computer Science Institute of Zhong Yuan University of Technology;Information Engineering University;
..............page:1784-1788
Prediction of Mobile Users for Updating Terminal Method Based on Dominance-based Rough Set Approach
LIU Li-kai;WANG Guo-yin;DENG Wei-bin;Chongqing Key Laboratory of Computational Intelligence;Chongqing University of Posts and Telecommunications;School of Information Science and Technology;Southwest Jiaotong University;
..............page:1789-1794
Community Detection Algorithm Based on Neighbor Searching
ZHAO Shu;WU Min-zhang;DUAN Zhen;WANG Yang;ZHANG Yan-ping;School of Computer Science and Technology;Anhui University;Computer Science and Technology Institute;Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education;
..............page:1795-1798
Hierarchical Granular Support Vector Machine Algorithm
CHENG Feng-wei;WANG Wen-jian;School of Computer and Information Technology;Shanxi University;Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education;
..............page:1799-1802
Attribute Reduction Method for Formal Decision Contexts Based on Genetic Algorithm and its Application to Decision-making Analysis
LI Jin-hai;MEI Chang-lin;ZHANG Hong-ying;ZHANG Xiao;Faculty of Science;Kunming University of Science and Technology;School of Mathematics and Statistics;Xi’an Jiaotong University;
..............page:1803-1808
Lattice Close-degree Based on Granular Computing and Applied in Image Retrieval
MA Yuan-yuan;LV Kang;XU Jiu-cheng;ZHU Ma;Henan Normal University;Engineering Technology Research Center for Computing Intelligence & Data Mining;Henan Institute of Education;The PLA Information Engineering University;
..............page:1809-1812
Matroidal Structure of the Generalized Rough Set Based on Arbitrary Relations
LIU Hui;ZHU Feng;Lab of Granular Computing;Minnan Normal University;
..............page:1813-1816
Wireless Sensor Networks Dynamic Topology Routing Algorithm Based on Quotient Space
LI Yu;XU Jian-feng;TU Min;ZHANG Yuan-jian;XU Yuan;LIU Qing;Software School;Nanchang University;School of Electronics and Information Engineering;Tongji Uiversity;Jiangxi Police College;
..............page:1817-1822
Pedestrian Evacuation Model Based on Cellular Ant and Kalman Filter
GUO Yang-yong;WEI Juan;Faculty of Computer Science;Chengdu Normal University;
..............page:1823-1826
Group Feature Selection Based on Feature Subset Discrimination Optimization
MAO Wen-tao;XU Wen-tao;XUE Tian-yu;HE Ling;College of Computer and Information Engineering;Henan Normal University;Engineering Technology Research Center for Computing Intelligence & Data Mining;
..............page:1827-1831
Feature Selection Algorithm Based on Maximal Nearest-neighbor Rough Approximation
LIU Jing-hua;LIN Meng-lei;WANG Chen-xi;LIN Yao-jin;School of Computer Science;Minnan Normal University;Department of Computer Engineering;Zhangzhou Institute of Technology;
..............page:1832-1836
Fast Incremental Learning Method for Pedestrian Detection
SHI Pei-bei;LIU Gui-quan;WANG Zhong;Department of Public Computer Teaching;Hefei Normal University;School of Computer Science and Technology;University of Science and Technology of China;Department of Digit Technology;No.38 Research Institute of CETC;
..............page:1837-1841
Optimality Strategy of an Agent-based Sealed-offer Multi-issue Negotiation Protocol Considering Time Constraint
ZHANG Lin-lan;LIU Qing;PENG Xian-qi;School of Business;Hubei University;Wuhan Centre of Sci-Tech Information;
..............page:1842-1846
Fuzzy-rough Parallel Reduction Based on Mutual Information
XU Fei-fei;WEI Lai;BI Zhong-qin;Institute of Computer Science and Technology;Shanghai University of Electric Power;Institute of Information Engineering;Shanghai Maritime University;
..............page:1847-1851
Quick Knowledge Reduction Algorithm in Inconsistent Information System
CHANG Yu-hui;GUO Qing-jun;QIAN Jin;School of Computer Engineering;Jiangsu University of Technology;Key Laboratory of Cloud Computing & Intelligent Information Processing of Changzhou City;Jiangsu University of Technology;
..............page:1852-1856
Application of Matroids on Network Security
MA Dui-xia;LIN Zi-qiong;ZHU Feng;Lab of Granular Computing;Minnan Normal University;
..............page:1857-1860
Research of LLE-combined HMM on Kiln Coal Feeding Trend Prediction
LIU Yun-long;ZHANG Xiao-gang;ZENG Lin;CHEN Ji-ping;College of Electrical and Information Engineering;Hunan University;
..............page:1861-1864
Feature Selection Method Based on SVM-RFE and Particle Swarm Optimization
LIN Jun;XU Lu;LIU Long;College of Engineering and Design Hunan Normal University;
..............page:1865-1868
Studies on the Metabolic Network Alignment of Mesophilic and Thermophilic Methanogenic Archaea
CHEN Jing;XU Wen-bo;School of Internet of Things Engineering;Jiangnan University;
..............page:1869-1873
A Fast Coding Unit Divided Decision Algorithm for HEVC
TAO Yao-dong;WANG Peng-bo;GAO Chun;YU Bo;Shenyang Institute of Computing Technology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Liaoning University;
..............page:1874-1877
An Adaptive Method of Determining Clustering Numbers in Image Segmentation
BAO Xiang;SONG Yu-qing;LIU Zhe;LIU Yi;ZHENG Ming-jie;School of Computer Science and Communication Engineering;Jiangsu University;School of Computer Science Jilin Nomal University;
..............page:1878-1881
Steganography Based on the Error Image and Modular Arithmetic with High Capacity
LIU Jiu-wen;PAN Feng;LI Jun;Key Laboratory of Cryptography & Information Security Under the Chinese Armed Police Force;Engineering University of the Armed Police Force;Institution of Network & Information Security;Engineering University of the Armed Police Force;
..............page:1882-1885
Pixel Coverage Segmentation Method Based on Multiple Color Spaces
DONG Yan;LIANG Jiu-zhen;School of Internet of Things Engineering;Jiangnan University;
..............page:1886-1890
Small Image Processing Techniques in Hadoop and its Application on Facial Feature Extraction
YU Zheng;GONG Xun;LI Tian-rui;ZHANG Jun-bo;School of Information Science and Technology;Southwest Jiaotong University;
..............page:1891-1895
Face Recognition Method Based on Gabor Wavelet and Supervised 2DNPE
XU Xiu-xiu;LIANG Jiu-zhen;Institute of Intelligent Systems and Network Computing;School of Internet of Things Engineering;Jiangnan University;
..............page:1896-1901
Fast Compressive Tracking Algorithm Using Similar Strategy of Three Step Search
QIAN Kai;CHEN Xiu-hong;SUN Bai-wei;School of Digital Media;Jiangnan University;
..............page:1902-1906
zheng gao jian ze
..............page:1906
Low Power Scheduling Algorithm Based on Average Slack Time Allocating
ZHANG Yi-wen;GUO Rui-feng;LIU Xian;DUAN Li-ming;Shenyang Institute of Computing Technology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Dalian Commodity Exchange;
..............page:1907-1910
Energy-saving Scheduling Algorithm with Critical Speed
GUO Rui-feng;DENG Chang-yi;ZHANG Yi-wen;LIU Xian;WANG Hong-liang;Shenyang Institute of Computing Technology;Chinese Academy of Sciences;Graduate University of Chinese Academy of Sciences;
..............page:1911-1914
Optimization Method for Accumulation Based on VLIW DSP Processor
YANG Yang-zhao;GU Nai-jie;REN Kai-xing;ZHAO Zeng;School of Computer Science and Technology;University of Science and Technology of China;Anhui Province Key Laboratory of Computing and Communication Software;
..............page:1915-1920