计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2013 Vol. 50, No. 3
Published: 15 March 2013

   
 
       Paper
453 Joint TOA/AOA Localization Based on UWB for Wireless Sensor Networks
Xiao Zhu, Tan Guanghua, Li Renfa, and Zhang Xiaoming
2013 Vol. 50 (3): 453-460 [Abstract] ( 553 ) HTML (1 KB)  PDF (2047 KB)  ( 611 )
461 Extending the Network Lifetime Using Topology Control in Ad Hoc Networks
Li Xiaohong, Wang Wenyan, and Wang Dong
2013 Vol. 50 (3): 461-471 [Abstract] ( 359 ) HTML (1 KB)  PDF (3030 KB)  ( 368 )
472 An Adaptive Beacon Exchange Algorithm Based on Link Broken Probability
Zhang Hengyang, Zheng Bo, Chen Xiaoping, and Yu Jia
2013 Vol. 50 (3): 472-480 [Abstract] ( 462 ) HTML (1 KB)  PDF (3227 KB)  ( 662 )
481 An Adaptive Dynamic Redundant Reservation Strategy in Grid Computing
Xiao Peng, and Hu Zhigang
2013 Vol. 50 (3): 481-489 [Abstract] ( 406 ) HTML (1 KB)  PDF (2776 KB)  ( 361 )
490 Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network
Liao Xiaojing, Li Jianzhong, and Yu Lei
2013 Vol. 50 (3): 490-497 [Abstract] ( 383 ) HTML (1 KB)  PDF (1615 KB)  ( 449 )
498 Network Intrusion Detection Model Based on Context Verification
Tian Zhihong, Wang Bailing, Zhang Weizhe, Ye Jianwei, and Zhang Hongli
2013 Vol. 50 (3): 498-508 [Abstract] ( 512 ) HTML (1 KB)  PDF (2360 KB)  ( 461 )
509 TIV and Access Delay in the Internet Delay Space
Wang Zhanfeng, Chen Ming, Xing Changyou, Bai Huali, and Wei Xianglin
2013 Vol. 50 (3): 509-516 [Abstract] ( 338 ) HTML (1 KB)  PDF (1161 KB)  ( 429 )
517 Centralized-Calculating-Based 2-Disjoint Multipath Routing Algorithm for Wireless Sensor Networks
Yu Leilei, Chen Dongyan, Liu Yuemei, and Huang Xu
2013 Vol. 50 (3): 517-523 [Abstract] ( 490 ) HTML (1 KB)  PDF (1864 KB)  ( 505 )
524 A Line of Sight Fingerprint Localization Algorithm Resisting Multipath and Shadow
Chen Yongle, , Zhu Hongsong, and Sun Limin
2013 Vol. 50 (3): 524-531 [Abstract] ( 305 ) HTML (1 KB)  PDF (2748 KB)  ( 443 )
532 A New Key Hiding Scheme Based on Fingerprint
Li Ximing, Yang Bo, Guo Yubin, and Yao Jintao
2013 Vol. 50 (3): 532-539 [Abstract] ( 479 ) HTML (1 KB)  PDF (2299 KB)  ( 383 )
540 An End-to-End Authentication Protocol for Satellite Communication Network
Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, and Hu Xiaohui
2013 Vol. 50 (3): 540-547 [Abstract] ( 383 ) HTML (1 KB)  PDF (3204 KB)  ( 430 )
548 A Membership Degree Refinement-Based Evolutionary Clustering Algorithm
Hou Wei, Dong Hongbin, and Yin Guisheng
2013 Vol. 50 (3): 548-558 [Abstract] ( 406 ) HTML (1 KB)  PDF (1917 KB)  ( 462 )
559 Measuring Ontology Inconsistency Based on Dempster-Shafer Theory
Li Dongmei, Lin Youfang, Huang Houkuan, and Tian Xuan
2013 Vol. 50 (3): 559-567 [Abstract] ( 476 ) HTML (1 KB)  PDF (849 KB)  ( 487 )
568 An In-Building Localization Algorithm Based on Wi-Fi Signal Fingerprint
Niu Jianwei, Liu Yang, Lu Banghui, and Song Wenfang
2013 Vol. 50 (3): 568-577 [Abstract] ( 570 ) HTML (1 KB)  PDF (3123 KB)  ( 397 )
578 A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing
Wu Yingjie, Tang Qingming, Ni Weiwei, Sun Zhihui, and Liao Shangbin
2013 Vol. 50 (3): 578-593 [Abstract] ( 490 ) HTML (1 KB)  PDF (5694 KB)  ( 524 )
594 A Column-Store Based Bucket Partition Algorithm for Range Queries
Li Yefeng, Le Jiajin, and Wang Mei
2013 Vol. 50 (3): 594-601 [Abstract] ( 1049 ) HTML (1 KB)  PDF (1243 KB)  ( 545 )
602 Hylomorphisms with Parameters and Its Associated Calculational Laws
Yu Shanshan, Li Shixian, and Su Jindian
2013 Vol. 50 (3): 602-618 [Abstract] ( 370 ) HTML (1 KB)  PDF (2364 KB)  ( 345 )
619 Application of Artificial Neural Network in Software Multi-Faults Location
He Jialang and Zhang Hong
2013 Vol. 50 (3): 619-625 [Abstract] ( 451 ) HTML (1 KB)  PDF (1593 KB)  ( 483 )
626 Formal Description of Software Dynamic Correctness
Ma Yanfang, Zhang Min, and Chen Yixiang
2013 Vol. 50 (3): 626-635 [Abstract] ( 302 ) HTML (1 KB)  PDF (1046 KB)  ( 428 )
636 A Data Placement Approach for Workflow in Cloud
Zhang Peng, Wang Guiling, and Xu Xuehui
2013 Vol. 50 (3): 636-647 [Abstract] ( 369 ) HTML (1 KB)  PDF (3238 KB)  ( 880 )
648 Auto-Tuning of SpMV for Diagonal Sparse Matrices
Sun Xiangzheng, Zhang Yunquan, Wang Ting, Li Yan, and Yuan Liang,
2013 Vol. 50 (3): 648-656 [Abstract] ( 596 ) HTML (1 KB)  PDF (1905 KB)  ( 508 )
657 A Polynomial Time Approximation Scheme for the Traveling Salesman Problem in Curved Surfaces
Wang Gang and Luo Zhigang
2013 Vol. 50 (3): 657-665 [Abstract] ( 609 ) HTML (1 KB)  PDF (1388 KB)  ( 436 )
666 An Algorithm in Tile Assembly Model for Maximum Clique Problem
Li Kenli, Luo Xing, Wu Fan, Zhou Xu, and Huang Xin
2013 Vol. 50 (3): 666-675 [Abstract] ( 487 ) HTML (1 KB)  PDF (3502 KB)  ( 439 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech