Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chinese Computer Systems
1000-1220
2016 Issue 6
A Popularity Versus Similarity Query Recommendation Strategy
SUN Da-ming;ZHANG Bin;ZHANG Shu-bo;MA An-xiang;School of Information Science & Engineering;Northeastern University;
..............page:1121-1125
Exploring the Programmability and Implementation Performance for a Deterministic Multithreaded Programming Model
CAO Hui-fang;ZHANG Yu;School of Computer Science & Technology;University of Science & Technology of China;
..............page:1126-1131
Dynamic Reverse Furthest Neighbor Querying Algorithm of Moving Objects
LI Dong-jing;LI Bo-han;ZHANG Chao;XIA Bin;College of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;
..............page:1132-1137
Automatic Identifying Query Interface in Vertical Crawling by Hierarchical Classification
WANG Lin;WANG Xing-fu;DU Yun-kai;Department of Computer Science and Technology;University of Science and Technology of China;
..............page:1138-1142
Study on Near-duplicate Detection for Massive Web Documents Based on Semantic Similarity
XUE Jian;LV Li;SUN Yong;WANG Dan-ni;University of Chinese Academy of Sciences;Shenyang Institute of Computing Technology;Chinese Academy of Sciences;Information & Telecommunication Branch;State Grid Liaoning Electric Power Supply CO.LTD.;
..............page:1143-1147
Research on Method of Multiple Data Sources Schema Matching Based on Global Ontology
SHI Hao-hong;YANG Wei-dong;School of Computer Science;Fudan University;
..............page:1148-1152
Point-of-interest Recommendation Algorithm Combining Temporal Features and Collaborative Filtering
SONG Ya-wei;SI Ya-li;LIU Wen-yuan;ZHANG Hong-li;School of Information Science and Engineering;Yanshan University;School of Liren;Yanshan University;Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;
..............page:1153-1158
Algorithm of Forward Feature Selection and Aggregation of Classifiers Based on Feature Effective Range
WANG Xiao-mei;LIN Xiao-hui;HUANG Xin;School of Computer Science & Technology;Dalian University of Technology;
..............page:1159-1163
Combined Prediction Model Based on GMDH Neuro Network
CUI Xia;GAO Jian-hua;Ecnu;School of Software;Shnu;Colloge of Information and Mechatronics;
..............page:1164-1167
Social Theme Recommendation Model Based on Location
WANG Yan-bing;PENG Dun-lu;ZOU Meng-ping;School of Optical-Electrical and Computer Engineering;University of Shanghai or Science and Technology;
..............page:1168-1173
Integrating User Similarity and Item Similarity into Weighted Slope One Algorithm
ZHANG Yu-lian;HUAN Si-si;LIANG Shun-pan;Information Science and Engineering College;Yanshan University;The Basic Computer Teaching Experiment Center;Information Science and Engineering College;Yanshan University;The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province;
..............page:1174-1178
Formal Verification of the Message Queue Communication Mechanism in μC/OS-Ⅱ
MA Jie-bo;FU Ming;FENG Xin-yu;Department of Computer Science and Technology;University of Science and Technology of China;Software Security Laboratory;Suzhou Institute for Advanced Study;University of Science and Technology of China;
..............page:1179-1184
NewAccess Control Model for Enterprise in Hadoop
YAO Zhi-ju;TAN Liang;Computer and Science Department;Sichuan Normal University;Institute of Computing Technology;Chinese Academy of Science;
..............page:1185-1190
Trajectory Prediction Method for Location-based Service
XU Biao;HUO Huan;CHEN Shang-ye;WU Yi-mu;BAN Lei-yu;School of Optical-Electrical and Computer Engineering;University of Shanghai for Science and technology;
..............page:1191-1196
LCSS-based Computing Similarity Between Trajectories for Vehicles
PEI Jian;PENG Dun-lu;School of Optical-Electrical and Computer Engineering;University of Shanghai for Science and Technology;
..............page:1197-1202
Research on Cloud Service Strategy Based on User Experience
LIU Chun-yan;ZOU Cheng-ming;Department of Information Engineering;Wuhan University of Technology Hua Xia College;School of Computer Science and Technology;Wuhan University of Technology;
..............page:1203-1206
A Space-time Awareness Model of Social Relationship Based on Semantics
XIONG Wei;WU Zhao;LI Bing;GU Qiong;NING Bin;Hubei University of Arts and Science;International School of Software;Wuhan University;
..............page:1207-1211
An Algorithm of High Utility Itemsets Based on Projection
WANG Jing-hua;LUO Xiang-zhou;WU Qian;School of Computer;Central China Normal University;
..............page:1212-1216
Random Early Detection Technique of the Opportunistic Network Congestion Control Strategy
LI Xiang-li;LI Ya-guang;School of Information Engineering;Zhengzhou University;
..............page:1217-1221
Load-balancing Routing Protocol Based on Dividing Node Neighboring Space in Wireless Sensor Networks
REN Xiu-li;WANG Chong;College of Information;Liaoning University;
..............page:1222-1227
Strategy Based on Distributed Secure Spectrum Sensing of VCG in Cognitive Radio Network
HUANG Yi-jie;LIN Hui;XU Li;HUANG Chuan;ZHOU Zhao-bin;Fujian Normal University;School of Math and Computer Science;
..............page:1228-1233
Unknown Network Protocol Classification Based on Semi-supervised Cluster Ensemble
LIN Rong-qiang;LI Ou;LI Qing;LIU Yan;Institute of Information System Engineering;PLA Information Engineering University;Institute of Cyberspace Security;PLA Information Engineering University;
..............page:1234-1239
Available Bandwidth Estimation Algorithm Based on Urban VANET Network
ZHOU Fan;LIAO Xiao-fei;CHEN Jian-bin;LI De-min;ZHANG Guang-lin;School of Information Science & Technology;Donghua University;Engineering Research Center of Digitized Textile & Fashion Technology;Ministry of Education;Donghua University;
..............page:1240-1244
Minimum Connected Dominating Set Construction Algorithms Based on Two-hop Independent Neighbor Covered
TANG Qiang;XIE Ming-zhong;LUO Yuan-sheng;LI Ping;Hunan Province Key Laboratory of Intelligent Processing of Large Data of Integrated Transportation and Transportation of Changsha University of Science and Technology;School of Computer and Communication Engineering;Changsha University of Science and Technology;
..............page:1245-1249
Internet Worm Propagation Model Based on Purely Discontinuous Markov Process
ZHOU Han-xun;GUO Wei;JIA Da-yu;Liaoning University;School of Information Science;Shenyang Aerospace University;School of computer;Northeastern University;School of Information Science and Engineering;
..............page:1250-1253
zheng gao jian ze
..............page:1253
Study on Dynamic Trust Evaluation Model Based on Grey Multiple Attribute Correlation
LI Dao-feng;ZHANG Xiao-ping;ZHONG Cheng;HUANG Ru-wei;School of Computer and Electronics Information;Guangxi University;
..............page:1254-1258
FCM-DS Trust Model Regarding Qo S Based on FCMs and D-S Evidence Theory
ZHANG Wei;ZHU Yan-chun;SUN Bao-wen;ZHU Shi-wei;School of Information;Central University of Finance and Economics;School of Economics and Business Administration;Beijing Normal University;China Center for Internet Economy Research in CUFE;
..............page:1259-1262
Hierarchical Ciphertext-policy Attribute-based Encryption Scheme
WANG Zi-ying;WANG Jian;College of Computer Science and Technology;Nanjing University of Aeronautics and Astronautics;
..............page:1263-1267
Identification of Malicious Code Based on Selecting and Boosting of Multi-attribute Features
LUO Yang-xia;Dep.Information;University of Finance & Economics;
..............page:1268-1272
Loc Priv: a Scheme on Location Privacy Protection Based on Spatial Region Anonymity
LUO Jian;LIAO Jun-guo;LI Xiong;School of Computer Science and Engineering;Hunan University of Science and Technology;
..............page:1273-1278
Modeling and Validation of Cognitive Robot Control Behavior Using Uppaal
GONG Wei-wei;WANG Rui;LI Xiao-juan;Highly Reliable Embedded Systems Lab;Capital Normal University;
..............page:1279-1283
Feature Evaluation Method Based on Fitting Clustering Results
DONG Lan-fang;CHAO Zhong-di;Vision Computing and Visualization Laboratory;University of Science and Technology of China;
..............page:1284-1288
Efficient Action Recognition Based on Local Binary Descriptor
FENG Ming;CHEN Jun;National Engineering Research Center for Multimedia Software;Computer School of Wuhan University;Research Institute of Wuhan University in Shenzhen;
..............page:1289-1292
Research on Multi-level Refinement Algorithm of Weighted Hypergraph Partitioning Problem
LENG Ming;SUN Ling-yu;ZHU Ping;LI Jin-zhong;Department of Computer Science;Jinggangshan University;Department of Electrical Engineering;University of California;
..............page:1293-1297
Research on Multi-objective Evolutionary Matrix Distance Clustering
LIU Cong;WU Chun-xue;Shanghai Key Lab of Modern Optical System;and Engineering Research Center of Optical Instrument and System;Ministry of Education University of Shanghai for Science and Technology;
..............page:1298-1302
Adaptive Algorithm for Learning Optimal Threshold in Three-way Decisions Based on Two Factors
ZHU Yan-hui;TIAN Hai-long;ZHANG Yong-ping;ZHU Dao-jie;School of Computer and Communication;Hunan University of Technology;
..............page:1303-1307
Many-objective Optimization Via Cooperative Coevolution with Adaptive Preferences
WANG Li-ping;PENG Jun;QIU Fei-yue;MO Lei-ping;College of Business Administration;Zhejiang University of Technology;Institute of Intelligence Information Processing;Zhejiang University of Technology;College of Education;Zhejiang University of Technology;College of Information Engineering;Zhejiang University of Technology;
..............page:1308-1312
Moment and Texture Based Algorithm for Text Detection in Natural Scene Images
YANG Ling-ling;YE Dong-yi;College of Mathematics and Computer Science;Fuzhou University;
..............page:1313-1317
ben kan jian suo yu shou lu
..............page:1317
Multi-objective Evolutionary Algorithm Using Periodically Variable Decomposition
QIU Fei-yue;MO Lei-ping;WANG Li-ping;JIANG Bo;College of Information Engineering;Zhejiang University of Technology;Institute of Modern Educational Technology;Zhejiang University of Technology;Institute of Intelligence Information Processing;Zhejiang University of Technology;
..............page:1318-1322
Hybrid Model of Image Saliency Detection Based on High-level Priors and Low-level Feature
KONG Ling-fu;DUAN Liang-liang;DOU Yan;WU Pei-liang;College of Information Science and Engineering;Yanshan University;
..............page:1323-1328
Block Image Encryption Scheme Based on Wave Transmission and Hyperchaotic Financial System
CHAI Xiu-li;ZHU Chang-jiang;YANG Kang;GAO Yu-lin;Institute of Image Processing and Pattern Recognition;Henan University;Software School;Henan University;
..............page:1329-1333
Virtual Plant Based on Ant Colony Optimization
ZHENG Yan-bin;LIANG Kai;LI Bo;AN De-yu;LI Na;College of Computer and Information Technology;Henan Normal University;Engineering Laboratory of Intellectual Business and Internet of Things Technologie;Henan Province;
..............page:1334-1338
View-dependent Multi-scale Visualization of Protein Molecular Surface
WANG Yan-fen;GUO Dong-liang;NIE Jun-lan;HU Zheng-ping;Information Sci.and Eng.College;Yanshan Univ.;The Key Lab.for Computer Virtual Technol.and System Integration of Hebei Province;Yanshan Univ.;
..............page:1339-1343
Research on Fractal Construction Method Based on Complex Transformation z← (e)1/2z
DONG Jie;CHEN Ning;WANG Feng-ying;Faculty of Information & Control Engineering;Shenyang Jianzhu University;
..............page:1344-1347
Multi-focus Image Fusion by Combining HVS and Cycle Spinning Contourlet Transform
YANG Yong;WAN Wei-guo;HUANG Shu-ying;QUE Yue;HUANG Xuan;School of Information Technology;Jiangxi University of Finance and Economics;Jiangxi Key Laboratory of Digital Media;School of Software and Communication Engineering;Jiangxi University of Finance and Economics;
..............page:1348-1354
FLRU: A Caching Algorithm for Flash-based SSDs
SHEN Yan;LUO Li-ming;LUO Sheng-mei;ZHANG Guang-yan;College of Information Engineering;Capital Normal University;Department of Computer Science and Technology;Tsinghua University;Nanjing R&D Institute;ZTE communication corporation;
..............page:1355-1359
Small Fault Detection Based on Moving WindowPCA
KE Liang;XIONG Wei-li;XU Bao-guo;School of Internet of Things Engineering;Institute of Automation;Jiangnan University;Key Laboratory of Advanced Process Control for Light Industry;Jiangnan University;
..............page:1360-1364
An Automatic Parallelization Framework for Regular DOACROSS Loops
ZHANG Qing-hua;ZHAO Rong-cai;LI Peng-yuan;Information Engineering University;State Key Laboratory of Mathematical Engineering and Advanced Computing;
..............page:1365-1370
Research and Analysis Based on Architectural for Cyber-physical Systems
LIANG Gang-qiang;ZHANG Li-chen;College of computer;Guangdong Unversity of Technology;
..............page:1371-1376