计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2013 Vol. 50, No. 3
Published: 15 March 2013

   
 
       Paper
453 Joint TOA/AOA Localization Based on UWB for Wireless Sensor Networks
Xiao Zhu, Tan Guanghua, Li Renfa, and Zhang Xiaoming
2013 Vol. 50 (3): 453-460 [Abstract] ( 502 ) HTML (1 KB)  PDF (2047 KB)  ( 587 )
461 Extending the Network Lifetime Using Topology Control in Ad Hoc Networks
Li Xiaohong, Wang Wenyan, and Wang Dong
2013 Vol. 50 (3): 461-471 [Abstract] ( 315 ) HTML (1 KB)  PDF (3030 KB)  ( 345 )
472 An Adaptive Beacon Exchange Algorithm Based on Link Broken Probability
Zhang Hengyang, Zheng Bo, Chen Xiaoping, and Yu Jia
2013 Vol. 50 (3): 472-480 [Abstract] ( 417 ) HTML (1 KB)  PDF (3227 KB)  ( 595 )
481 An Adaptive Dynamic Redundant Reservation Strategy in Grid Computing
Xiao Peng, and Hu Zhigang
2013 Vol. 50 (3): 481-489 [Abstract] ( 347 ) HTML (1 KB)  PDF (2776 KB)  ( 325 )
490 Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network
Liao Xiaojing, Li Jianzhong, and Yu Lei
2013 Vol. 50 (3): 490-497 [Abstract] ( 343 ) HTML (1 KB)  PDF (1615 KB)  ( 422 )
498 Network Intrusion Detection Model Based on Context Verification
Tian Zhihong, Wang Bailing, Zhang Weizhe, Ye Jianwei, and Zhang Hongli
2013 Vol. 50 (3): 498-508 [Abstract] ( 461 ) HTML (1 KB)  PDF (2360 KB)  ( 432 )
509 TIV and Access Delay in the Internet Delay Space
Wang Zhanfeng, Chen Ming, Xing Changyou, Bai Huali, and Wei Xianglin
2013 Vol. 50 (3): 509-516 [Abstract] ( 295 ) HTML (1 KB)  PDF (1161 KB)  ( 406 )
517 Centralized-Calculating-Based 2-Disjoint Multipath Routing Algorithm for Wireless Sensor Networks
Yu Leilei, Chen Dongyan, Liu Yuemei, and Huang Xu
2013 Vol. 50 (3): 517-523 [Abstract] ( 435 ) HTML (1 KB)  PDF (1864 KB)  ( 481 )
524 A Line of Sight Fingerprint Localization Algorithm Resisting Multipath and Shadow
Chen Yongle, , Zhu Hongsong, and Sun Limin
2013 Vol. 50 (3): 524-531 [Abstract] ( 266 ) HTML (1 KB)  PDF (2748 KB)  ( 424 )
532 A New Key Hiding Scheme Based on Fingerprint
Li Ximing, Yang Bo, Guo Yubin, and Yao Jintao
2013 Vol. 50 (3): 532-539 [Abstract] ( 430 ) HTML (1 KB)  PDF (2299 KB)  ( 365 )
540 An End-to-End Authentication Protocol for Satellite Communication Network
Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, and Hu Xiaohui
2013 Vol. 50 (3): 540-547 [Abstract] ( 356 ) HTML (1 KB)  PDF (3204 KB)  ( 406 )
548 A Membership Degree Refinement-Based Evolutionary Clustering Algorithm
Hou Wei, Dong Hongbin, and Yin Guisheng
2013 Vol. 50 (3): 548-558 [Abstract] ( 377 ) HTML (1 KB)  PDF (1917 KB)  ( 446 )
559 Measuring Ontology Inconsistency Based on Dempster-Shafer Theory
Li Dongmei, Lin Youfang, Huang Houkuan, and Tian Xuan
2013 Vol. 50 (3): 559-567 [Abstract] ( 422 ) HTML (1 KB)  PDF (849 KB)  ( 475 )
568 An In-Building Localization Algorithm Based on Wi-Fi Signal Fingerprint
Niu Jianwei, Liu Yang, Lu Banghui, and Song Wenfang
2013 Vol. 50 (3): 568-577 [Abstract] ( 510 ) HTML (1 KB)  PDF (3123 KB)  ( 387 )
578 A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing
Wu Yingjie, Tang Qingming, Ni Weiwei, Sun Zhihui, and Liao Shangbin
2013 Vol. 50 (3): 578-593 [Abstract] ( 439 ) HTML (1 KB)  PDF (5694 KB)  ( 502 )
594 A Column-Store Based Bucket Partition Algorithm for Range Queries
Li Yefeng, Le Jiajin, and Wang Mei
2013 Vol. 50 (3): 594-601 [Abstract] ( 957 ) HTML (1 KB)  PDF (1243 KB)  ( 517 )
602 Hylomorphisms with Parameters and Its Associated Calculational Laws
Yu Shanshan, Li Shixian, and Su Jindian
2013 Vol. 50 (3): 602-618 [Abstract] ( 332 ) HTML (1 KB)  PDF (2364 KB)  ( 339 )
619 Application of Artificial Neural Network in Software Multi-Faults Location
He Jialang and Zhang Hong
2013 Vol. 50 (3): 619-625 [Abstract] ( 386 ) HTML (1 KB)  PDF (1593 KB)  ( 474 )
626 Formal Description of Software Dynamic Correctness
Ma Yanfang, Zhang Min, and Chen Yixiang
2013 Vol. 50 (3): 626-635 [Abstract] ( 276 ) HTML (1 KB)  PDF (1046 KB)  ( 419 )
636 A Data Placement Approach for Workflow in Cloud
Zhang Peng, Wang Guiling, and Xu Xuehui
2013 Vol. 50 (3): 636-647 [Abstract] ( 343 ) HTML (1 KB)  PDF (3238 KB)  ( 840 )
648 Auto-Tuning of SpMV for Diagonal Sparse Matrices
Sun Xiangzheng, Zhang Yunquan, Wang Ting, Li Yan, and Yuan Liang,
2013 Vol. 50 (3): 648-656 [Abstract] ( 557 ) HTML (1 KB)  PDF (1905 KB)  ( 505 )
657 A Polynomial Time Approximation Scheme for the Traveling Salesman Problem in Curved Surfaces
Wang Gang and Luo Zhigang
2013 Vol. 50 (3): 657-665 [Abstract] ( 553 ) HTML (1 KB)  PDF (1388 KB)  ( 431 )
666 An Algorithm in Tile Assembly Model for Maximum Clique Problem
Li Kenli, Luo Xing, Wu Fan, Zhou Xu, and Huang Xin
2013 Vol. 50 (3): 666-675 [Abstract] ( 427 ) HTML (1 KB)  PDF (3502 KB)  ( 420 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech