计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2012 Vol. 49, No. 11
Published: 15 November 2012

   
 
       Paper
2271 An Improved Multi-Label Lazy Learning Approach
Zhang Minling
2012 Vol. 49 (11): 2271-2282 [Abstract] ( 896 ) HTML (1 KB)  PDF (1410 KB)  ( 665 )
2283 A Mid-Perpendicular Hyperplane Similarity Criterion Based on Pairwise Constraints
Gao Shan, Zu Chen, and Zhang Daoqiang
2012 Vol. 49 (11): 2283-2288 [Abstract] ( 443 ) HTML (1 KB)  PDF (1330 KB)  ( 411 )
2289 Large-Scale Image Annotation via Random Forest Based Label Propagation
She Qiaoqiao, Yu Yang, Jiang Yuan, and Zhou Zhihua
2012 Vol. 49 (11): 2289-2295 [Abstract] ( 590 ) HTML (1 KB)  PDF (1890 KB)  ( 564 )
2296 LDA-CRF: Object Detection Based on Graphical Model
Guo Qiaojin, Li Ning, Yang Yubin, and Wu Gangshan
2012 Vol. 49 (11): 2296-2304 [Abstract] ( 882 ) HTML (1 KB)  PDF (2102 KB)  ( 550 )
2305 An Attribute Reduction Algorithm Based on Instance Selection
Wang Xizhao, Wang Tingting, and Zhai Junhai
2012 Vol. 49 (11): 2305-2310 [Abstract] ( 353 ) HTML (1 KB)  PDF (664 KB)  ( 532 )
2311 A Novel Graph Classification Approach Based on Embedding Sets
Wang Guijuan, Yin Jian , and Zhan Weixu
2012 Vol. 49 (11): 2311-2319 [Abstract] ( 425 ) HTML (1 KB)  PDF (1555 KB)  ( 395 )
2320 Subtraction Operation between Temporal Points with Granularities Based on Granularity Hierarchy Mapping
Zuo Yayao, Tang Yong, and Shu Zhongmei
2012 Vol. 49 (11): 2320-2327 [Abstract] ( 318 ) HTML (1 KB)  PDF (1010 KB)  ( 541 )
2328 Low-Resolution Face Recognition in Semi-Paired and Semi-Supervised Scenario
Zhou Xudong, Chen Xiaohong,, and Chen Songcan,
2012 Vol. 49 (11): 2328-2333 [Abstract] ( 553 ) HTML (1 KB)  PDF (950 KB)  ( 524 )
2334 Formal Method Based on Petri Nets to Detect RFID Event
Sun Jinan, Huang Yu, Huang Shuzhi, Zhang Shikun, and Yuan Chongyi,
2012 Vol. 49 (11): 2334-2343 [Abstract] ( 585 ) HTML (1 KB)  PDF (2204 KB)  ( 434 )
2344 Tag-TextRank: A Webpage Keyword Extraction Method Based on Tags
Li Peng, Wang Bin, Shi Zhiwei, Cui Yachao, and Li Hengxun
2012 Vol. 49 (11): 2344-2351 [Abstract] ( 1020 ) HTML (1 KB)  PDF (1360 KB)  ( 689 )
2352 Combining Content and Link Analysis for Local Web Community Extraction
Zhang Xianchao, Xu Wen, Gao Liang, and Liang Wenxin
2012 Vol. 49 (11): 2352-2358 [Abstract] ( 328 ) HTML (1 KB)  PDF (1214 KB)  ( 460 )
2359 Web Forum Thread Summarization Based on Dynamic Topic Modeling
Ren Zhaochun, Ma Jun, and Chen Zhumin
2012 Vol. 49 (11): 2359-2367 [Abstract] ( 477 ) HTML (1 KB)  PDF (1891 KB)  ( 657 )
2368 Empirical Study on Rare Query Categorization
Yao Ting, Zhang Min, Liu Yiqun, Ma Shaoping, and Ru Liyun
2012 Vol. 49 (11): 2368-2375 [Abstract] ( 495 ) HTML (1 KB)  PDF (1643 KB)  ( 496 )
2376 Sentiment Classification Analysis Based on Extraction of Sentiment Key Sentence
Lin Zheng, Tan Songbo, and Cheng Xueqi
2012 Vol. 49 (11): 2376-2382 [Abstract] ( 411 ) HTML (1 KB)  PDF (886 KB)  ( 522 )
2383 Interface Integration of Deep Web Based on Ontology
Wang Ying, Zuo Xianglin, Zuo Wanli, and Wang Xin,
2012 Vol. 49 (11): 2383-2394 [Abstract] ( 457 ) HTML (1 KB)  PDF (2612 KB)  ( 481 )
2395 Blog Sentiment Orientation Analysis Based on Dependency Parsing
Feng Shi, Fu Yongchen, Yang Feng, Wang Daling, and Zhang Yifei,
2012 Vol. 49 (11): 2395-2406 [Abstract] ( 521 ) HTML (1 KB)  PDF (2504 KB)  ( 573 )
2407 Query Clustering Based on Query Requirements for Ranking
Hua Guichun, Zhang Min, Liu Yiqun, Ma Shaoping, and Ru Liyun
2012 Vol. 49 (11): 2407-2413 [Abstract] ( 336 ) HTML (1 KB)  PDF (1431 KB)  ( 426 )
2414 Literal Tainting Method for Preventing Code Injection Attack in Web Application
Wang Yi, Li Zhoujun, and Guo Tao
2012 Vol. 49 (11): 2414-2423 [Abstract] ( 445 ) HTML (1 KB)  PDF (1996 KB)  ( 398 )
2424 An Improved Minimalist Mutual-Authentication Protocol
Zhang Xuejun, Cai Wenqi, Sun Zhixin, and Wang Suoping
2012 Vol. 49 (11): 2424-2431 [Abstract] ( 350 ) HTML (1 KB)  PDF (1294 KB)  ( 404 )
2432 A Privacy-Preserving Data Publishing Method Based on Genetic Algorithm with Roulette Wheel
Hu Xinping, He Yuzhi, Ni Weiwei, and Zhang Yong
2012 Vol. 49 (11): 2432-2439 [Abstract] ( 592 ) HTML (1 KB)  PDF (2099 KB)  ( 333 )
2440 A Kind of Safe Typed Memory Model for C-Like Languages
He Yanxiang, Wu Wei, Chen Yong, Li Qingan, and Liu Jianbo
2012 Vol. 49 (11): 2440-2449 [Abstract] ( 321 ) HTML (1 KB)  PDF (1180 KB)  ( 488 )
2450 A Web Services Interaction Behavior-Environment Model Based on Generalized Stochastic Petri Nets
Zhu Jun, Guo Changguo, and Wu Quanyuan
2012 Vol. 49 (11): 2450-2463 [Abstract] ( 459 ) HTML (1 KB)  PDF (4145 KB)  ( 356 )
2464 Failure-Recovery-Strategies-Based QoS Estimation for Web Composition Transaction
Mei Xiaoyong, Li Shixian, Huang Changqin, and Zheng Xiaolin
2012 Vol. 49 (11): 2464-2480 [Abstract] ( 499 ) HTML (1 KB)  PDF (5112 KB)  ( 380 )
2481 PMTree: An Efficient Pattern Matching Method for Event Stream Processing
Cheng Sujun, Wang Yongjian, Meng You, Cheng Zhendong, Luan Zhongzhi, and Qian Depei
2012 Vol. 49 (11): 2481-2493 [Abstract] ( 641 ) HTML (1 KB)  PDF (3432 KB)  ( 454 )
2494 Beacon Dynamic Movement Strategy in Node Localization for Wireless Sensor Networks
Liu Kezhong, Chen Weibo, Zhan Zhen, Zhang Jinfen, and Fu Qin
2012 Vol. 49 (11): 2494-2500 [Abstract] ( 411 ) HTML (1 KB)  PDF (2269 KB)  ( 352 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech