计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2013 Vol. 50, No. 11
Published: 15 November 2013

   
 
2253 Regularization Path Algorithm of SVM via Positive Definite Matrix
Shizhong1, Wang Mei1,2, and Zhao Zhihui1,3
2013 Vol. 50 (11): 2253-2261 [Abstract] ( 592 ) HTML (1 KB)  PDF (1518 KB)  ( 654 )
       Paper
2262 A Co-Training Method Based on Teaching-Learning Model
Hu Juhua, Jiang Yuan, and Zhou Zhihua
2013 Vol. 50 (11): 2262-2268 [Abstract] ( 442 ) HTML (1 KB)  PDF (2620 KB)  ( 546 )
2269 An Adaptive Large Margin Nearest Neighbor Classification Algorithm
Yang Liu, Yu Jian, and Jing Liping
2013 Vol. 50 (11): 2269-2277 [Abstract] ( 394 ) HTML (1 KB)  PDF (1447 KB)  ( 505 )
2278 An Intelligent Optimization Algorithm Based on Hybrid of GA and PSO
Ma Chao, Deng Chao, Xiong Yao, and Wu Jun
2013 Vol. 50 (11): 2278-2286 [Abstract] ( 391 ) HTML (1 KB)  PDF (2058 KB)  ( 656 )
2287 Incremental Learning Towards Scene Features in Independent Subspace
Xie Zhao, Ling Ran, and Wu Kewei
2013 Vol. 50 (11): 2287-2294 [Abstract] ( 552 ) HTML (1 KB)  PDF (3021 KB)  ( 526 )
2295 A Soft-Thresholding Coordinate Descent Algorithm for Solving Truncated Hinge Loss
Zhu Yelei, Wang Yujun, Luo Qiang, and Tao Qing
2013 Vol. 50 (11): 2295-2303 [Abstract] ( 982 ) HTML (1 KB)  PDF (0 KB)  ( 422 )
2304 A Traversability Detection Method Dealing with Shaded Terrains
Gao Hua, Zhao Chunxia, and Zhang Haofeng
2013 Vol. 50 (11): 2304-2314 [Abstract] ( 468 ) HTML (1 KB)  PDF (4246 KB)  ( 503 )
2315 A Support Vector Machine Learning Method Based on Granule Shift Parameter
Guo Husheng and Wang Wenjian
2013 Vol. 50 (11): 2315-2324 [Abstract] ( 405 ) HTML (1 KB)  PDF (2910 KB)  ( 421 )
2325 Heuristic Optimization Algorithms of Multi-Carpooling Problem Based on Two-Stage Clustering
Shao Zengzhen, , Wang Hongguo, Liu Hong, Song Chaochao, Meng Chunhua, and Yu Hongling
2013 Vol. 50 (11): 2325-2335 [Abstract] ( 398 ) HTML (1 KB)  PDF (1563 KB)  ( 538 )
2336 Detecting Spammers with a Bidirectional Vote Algorithm Based on Statistical Features in Microblogs
Ding Zhaoyun, Zhou Bin, Jia Yan, and Wang Xiang
2013 Vol. 50 (11): 2336-2348 [Abstract] ( 430 ) HTML (1 KB)  PDF (2362 KB)  ( 535 )
2349 An Active Collective Classification Method Combing Feature Selection and Link Filtering
Li Lina, Ouyang Jihong, Liu Dayou, and Gao Wenjie
2013 Vol. 50 (11): 2349-2357 [Abstract] ( 455 ) HTML (1 KB)  PDF (1526 KB)  ( 558 )
2358 Analysis and Design of Distance-Bounding Protocols for RFID
Xin Wei, Sun Huiping, and Chen Zhong,
2013 Vol. 50 (11): 2358-2366 [Abstract] ( 412 ) HTML (1 KB)  PDF (1252 KB)  ( 459 )
2367 Study on Detection of Covert Channel in Flume System
Cao Hui, Xiong Shengchao, Zhang Huanguo, and Yan Fei,
2013 Vol. 50 (11): 2367-2374 [Abstract] ( 316 ) HTML (1 KB)  PDF (1108 KB)  ( 405 )
2375 A Method of Intrusion Detection Based on Semi-Supervised GHSOM
Yang Shilai, Yang Yahui, Shen Qingni, and Huang Haizhen
2013 Vol. 50 (11): 2375-2382 [Abstract] ( 686 ) HTML (1 KB)  PDF (867 KB)  ( 574 )
2383 A Parallel Architecture for FPGA Based Hyperelliptic Curve Cryptoprocessor
Fang Yuejian, Shen Qingni, and Wu Zhonghai,
2013 Vol. 50 (11): 2383-2388 [Abstract] ( 373 ) HTML (1 KB)  PDF (1283 KB)  ( 501 )
2389 A High-Capability Scattered IP Watermarking Algorithm in FPGA Design
Xu Jianbo, Long Jing, and Peng Li
2013 Vol. 50 (11): 2389-2396 [Abstract] ( 282 ) HTML (1 KB)  PDF (2150 KB)  ( 432 )
2397 Dynamic Trustworthiness Evaluation Model of Software Based on Checkpoint's Classification Attributes
Li Zhen, Tian Junfeng, and Yang Xiaohui
2013 Vol. 50 (11): 2397-2405 [Abstract] ( 314 ) HTML (1 KB)  PDF (1524 KB)  ( 419 )
2406 An Approach to Runtime Memory Leak Detection Oriented to Xen Virtual Computing Environment
Xiao Ruliang, Jiang Jun, Hu Yao, Han Jia, Ni Youcong, Du Xin, and Cai Shengzhen
2013 Vol. 50 (11): 2406-2417 [Abstract] ( 380 ) HTML (1 KB)  PDF (3108 KB)  ( 449 )
2418 A Reconstruction Method of Type Abstraction in Binary Code
Ma Jinxin, Li Zhoujun, Hu Chaojian, Zhang Junxian, and Guo Tao
2013 Vol. 50 (11): 2418-2428 [Abstract] ( 415 ) HTML (1 KB)  PDF (1604 KB)  ( 522 )
2429 An Idle Virtual CPU Scheduling Algorithm on Xen Virtual Machines
Wang Kai, and Hou Zifeng,
2013 Vol. 50 (11): 2429-2435 [Abstract] ( 674 ) HTML (1 KB)  PDF (1532 KB)  ( 458 )
2436 Performance Improvement for Irregular Data Intensive Hot-Slice with Low Computing Workload
Zheng Ninghan, Gu Zhimin, and Sun Xianhe
2013 Vol. 50 (11): 2436-2443 [Abstract] ( 399 ) HTML (1 KB)  PDF (1334 KB)  ( 438 )
2444 Two Longest Common Substring Algorithms Based on Bi-Directional Comparison
Wang Kaiyun, Kong Siqi, Fu Yunsheng, Pan Zeyou, Ma Weidong, and Zhao Qiang
2013 Vol. 50 (11): 2444-2454 [Abstract] ( 364 ) HTML (1 KB)  PDF (2483 KB)  ( 387 )
2455 Group Obstacle Nearest Neighbor Query in Spatial Database
Yang Zexue, and Hao Zhongxiao,
2013 Vol. 50 (11): 2455-2462 [Abstract] ( 544 ) HTML (1 KB)  PDF (1691 KB)  ( 436 )
2463 Parallel Accelerator Design for High-Throughput DNA Sequence Alignment with Hash-Index
Wang Wendi, Tang Wen, Duan Bo, Zhang Chunming, Zhang Peiheng, and Sun Ninghui,
2013 Vol. 50 (11): 2463-2471 [Abstract] ( 642 ) HTML (1 KB)  PDF (2661 KB)  ( 605 )
2472 Review on Liquid Acquisition and Modeling Techniques
Zou Ling, Qi Yue, and Zhao Qinping
2013 Vol. 50 (11): 2472-2480 [Abstract] ( 427 ) HTML (1 KB)  PDF (2846 KB)  ( 429 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech