计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2012 Vol. 49, No. 9
Published: 15 September 2012

   
 
       Paper
1822 False Positive Elimination in Static Defect Detection
Zhao Yunshan, Gong Yunzhan, Zhou Ao, Wang Qian, and Zhou Hongbo
2012 Vol. 49 (9): 1822-1831 [Abstract] ( 570 ) HTML (1 KB)  PDF (1270 KB)  ( 631 )
1832 Memory Leak Detection for Heap-Manipulating Programs Based on Local Heap Abstraction
Dong Longming, Wang Ji, Chen Liqian, and Dong Wei
2012 Vol. 49 (9): 1832-1842 [Abstract] ( 585 ) HTML (1 KB)  PDF (1856 KB)  ( 575 )
1843 Automatically Generating Error-Traceable Test Cases Based on Compiler
He Yanxiang, Chen Yong, Wu Wei, Xu Chao, and Wu Libing
2012 Vol. 49 (9): 1843-1851 [Abstract] ( 482 ) HTML (1 KB)  PDF (1293 KB)  ( 532 )
1852 Application of Interval Arithmetic in Software Testing Based on Field-Sensitive Point-to Analysis
Zhou Hongbo, Jin Dahai, and Gong Yunzhan
2012 Vol. 49 (9): 1852-1862 [Abstract] ( 426 ) HTML (1 KB)  PDF (1145 KB)  ( 489 )
1863 Verifying the Correctness of Loop Optimization Based on Extended Logic Transformation System μTS
Wang Changjing
2012 Vol. 49 (9): 1863-1873 [Abstract] ( 432 ) HTML (1 KB)  PDF (1101 KB)  ( 600 )
1874 Dynamical Integrity of Codes: Model and Method
Wu Hao and Wu Guoqing
2012 Vol. 49 (9): 1874-1882 [Abstract] ( 445 ) HTML (1 KB)  PDF (1331 KB)  ( 438 )
1883 A Multi-Subpopulation PSO Immune Algorithm and Its Application on Function Optimization
Wu Jianhui, Zhang Jing, Li Renfa, and Liu Zhaohua
2012 Vol. 49 (9): 1883-1898 [Abstract] ( 361 ) HTML (1 KB)  PDF (2610 KB)  ( 520 )
1899 A Fast Heuristic Parallel Ant Colony Algorithm for Circles Packing Problem with the Equilibrium Constraints
Li Ziqiang, Tian Zhuojun, Wang Yishou, and Yue Benxian
2012 Vol. 49 (9): 1899-1909 [Abstract] ( 513 ) HTML (1 KB)  PDF (3202 KB)  ( 476 )
1910 Multiple Objects Event Detection over RFID Data Streams
Peng Shanglian, Li Zhanhuai, Li Qiang, Chen Qun, and Liu Hailong
2012 Vol. 49 (9): 1910-1925 [Abstract] ( 513 ) HTML (1 KB)  PDF (5017 KB)  ( 433 )
1926 Mining Frequent Subtree on Paging XML Data Stream
Lei Xiangxin, Yang Zhiying, Huang Shaoyin, and Hu Yunfa
2012 Vol. 49 (9): 1926-1936 [Abstract] ( 487 ) HTML (1 KB)  PDF (2542 KB)  ( 835 )
1937 An LDA Based Approach to Detect the Low-Quality Reply Posts in Web Forums
Han Xiaohui, Ma Jun, Shao Haimin, and Xue Ran
2012 Vol. 49 (9): 1937-1946 [Abstract] ( 415 ) HTML (1 KB)  PDF (2393 KB)  ( 400 )
1947 A Secure Top-k Query Protocol in Two-Tiered Sensor Networks
Li Rui, Lin Yaping, Yi Yeqing, Xiong Shuai, and Ye Songtao
2012 Vol. 49 (9): 1947-1958 [Abstract] ( 518 ) HTML (1 KB)  PDF (2024 KB)  ( 469 )
1959 Passive RFID Tag Anti-Collision Binary Tree Slotted Protocol without Tags Quantity Estimation
Wu Haifeng, Zeng Yu, and Feng Jihua
2012 Vol. 49 (9): 1959-1971 [Abstract] ( 350 ) HTML (1 KB)  PDF (2868 KB)  ( 421 )
1972 Traffic Anomaly Detection Using Multi-Dimensional Entropy Classification in Backbone Network
Zheng Liming, Zou Peng, Han Weihong, Li Aiping, and Jia Yan
2012 Vol. 49 (9): 1972-1981 [Abstract] ( 391 ) HTML (1 KB)  PDF (2998 KB)  ( 678 )
1982 Anomaly Detection of User Behavior Based on Shell Commands and Co-Occurrence Matrix
Li Chao, Tian Xinguang, Xiao Xi, and Duan Miyi,
2012 Vol. 49 (9): 1982-1990 [Abstract] ( 600 ) HTML (1 KB)  PDF (2151 KB)  ( 646 )
1991 A Detection Model Based on Petri Nets of SMER Constraints Violation in Dynamic Role Translation
Liu Meng, Wang Xuan, Huang Hejiao, Zhao Hainan, and Zhang Jiajia
2012 Vol. 49 (9): 1991-1998 [Abstract] ( 439 ) HTML (1 KB)  PDF (1352 KB)  ( 556 )
1999 Dynamic Multi-Secret Sharing Scheme Based on Cellular Automata
Zhou Yousheng,, Wang Feng,, Qing Sihan, Yang Yixian, and Niu Xinxin
2012 Vol. 49 (9): 1999-2004 [Abstract] ( 392 ) HTML (1 KB)  PDF (735 KB)  ( 495 )
2005 eTissue: An Adaptive Reconfigurable Bio-Inspired Hardware Architecture
Xu Jiaqing, Dou Yong, Lü Qi, and Feng Xue
2012 Vol. 49 (9): 2005-2017 [Abstract] ( 390 ) HTML (1 KB)  PDF (5696 KB)  ( 405 )
2018 An Optimized Code-Generating Algorithm for Reconfigurable Instruction Set Processors
Zhang Huizhen, Wang Chao, Li Xi, and Zhou Xuehai
2012 Vol. 49 (9): 2018-2026 [Abstract] ( 481 ) HTML (1 KB)  PDF (1999 KB)  ( 499 )
2027 A Novel Flow for Asynchronous Circuit Design Using Synchronous EDA Tools
Wang Yourui, Shi Wei, Wang Zhiying, Lu Hongyi, and Su Bo
2012 Vol. 49 (9): 2027-2035 [Abstract] ( 407 ) HTML (1 KB)  PDF (2930 KB)  ( 456 )
2036 Applying Batch Processing to Improve Performance of iSCSI Storage System
Han Yong, Yao Nianmin, and Diao Ying
2012 Vol. 49 (9): 2036-2043 [Abstract] ( 360 ) HTML (1 KB)  PDF (1736 KB)  ( 465 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech