计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2012 Vol. 49, No. 8
Published: 15 August 2012

   
 
       Paper
1601 A Constraint Optimization Based Mapping Method for Virtual Network
Li Xiaoling, Guo Changguo, Li Xiaoyong, and Wang Huaimin
2012 Vol. 49 (8): 1601-1610 [Abstract] ( 421 ) HTML (1 KB)  PDF (2155 KB)  ( 481 )
1611 A Multi-Source ALM Congestion Control Method Based on Bi-Directional Pressure
Gao Jianmin, Lu Huimei, Liu Jing, and Cao Yuanda
2012 Vol. 49 (8): 1611-1617 [Abstract] ( 375 ) HTML (1 KB)  PDF (1849 KB)  ( 419 )
1618 Design and Performance Analysis of A MAC Protocol for Wireless Public Bus Networks
Kuang Luobei, Xu Ming, Yu Wei, and Chen Yingwen
2012 Vol. 49 (8): 1618-1631 [Abstract] ( 279 ) HTML (1 KB)  PDF (4683 KB)  ( 366 )
1632 An Algorithm for the Cover Problem Based on Cellular Structure in Wireless Sensor Networks
Lu Kezhong, Jiang Zhao, Mao Rui, Liu Gang, and Ming Zhong
2012 Vol. 49 (8): 1632-1640 [Abstract] ( 509 ) HTML (1 KB)  PDF (2679 KB)  ( 654 )
1641 Algorithm-Level Low-Power Technology for the Channel Decoding Coprocessor of the Network Processor
Song Lihua, Guo Yanfei, and Wang Qin
2012 Vol. 49 (8): 1641-1648 [Abstract] ( 406 ) HTML (1 KB)  PDF (1643 KB)  ( 510 )
1649 Immune-Computing-Based Location Planning of Base Station and Relay Station in IEEE 802.16j Network
Zhu Sifeng, Liu Fang, Chai Zhengyi, and Qi Yutao,
2012 Vol. 49 (8): 1649-1654 [Abstract] ( 417 ) HTML (1 KB)  PDF (1097 KB)  ( 449 )
1655 A Kind of More Secure Orthomorphism Generator
Tong Yan, Zhang Huanguo, and Deng Xiaotie
2012 Vol. 49 (8): 1655-1661 [Abstract] ( 326 ) HTML (1 KB)  PDF (703 KB)  ( 420 )
1662 An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature
Zhang Wenfang, Wang Xiaomin, and He Dake,
2012 Vol. 49 (8): 1662-1667 [Abstract] ( 413 ) HTML (1 KB)  PDF (818 KB)  ( 438 )
1668 A Self-Adaptive Image Steganography Algorithm Based on Cover-Coding and Markov Model
Zhang Zhan, Liu Guangjie, Dai Yuewei, and Wang Zhiquan
2012 Vol. 49 (8): 1668-1675 [Abstract] ( 419 ) HTML (1 KB)  PDF (2960 KB)  ( 366 )
1676 Program Behavior Monitoring Based on System Call Attributes
Li Zhen, Tian Junfeng, and Yang Xiaohui
2012 Vol. 49 (8): 1676-1684 [Abstract] ( 567 ) HTML (1 KB)  PDF (1632 KB)  ( 529 )
1685 Provable Secure ID-Based Authenticated Key Agreement Protocol
Gao Haiying
2012 Vol. 49 (8): 1685-1689 [Abstract] ( 374 ) HTML (1 KB)  PDF (587 KB)  ( 486 )
1690 Perceptual Robust Image Hashing Scheme Based on Secret Sharing
Qin Chuan, Chang Chin Chen, and Guo Cheng
2012 Vol. 49 (8): 1690-1698 [Abstract] ( 547 ) HTML (1 KB)  PDF (2032 KB)  ( 456 )
1699 Local Progressive Interpolation for Subdivision Surface Fitting
Zhao Yu, Lin Hongwei, and Bao Hujun
2012 Vol. 49 (8): 1699-1707 [Abstract] ( 456 ) HTML (1 KB)  PDF (2157 KB)  ( 595 )
1708 Adaptive Multi-Resolutional Image Tracking Algorithm
Lü Na and Feng Zuren
2012 Vol. 49 (8): 1708-1714 [Abstract] ( 405 ) HTML (1 KB)  PDF (2450 KB)  ( 333 )
1715 Detail Extraction from Three-Dimensional Relief Surface
Zheng Hanlin and Liu Ligang
2012 Vol. 49 (8): 1715-1720 [Abstract] ( 526 ) HTML (1 KB)  PDF (1604 KB)  ( 449 )
1721 A New Unsupervised Foreground Object Detection Method
Liang Peng, Li Shaofa, and Wang Cheng
2012 Vol. 49 (8): 1721-1729 [Abstract] ( 620 ) HTML (1 KB)  PDF (3343 KB)  ( 419 )
1730 Supervised Laplacian Discriminant Analysis for Small Sample Size Problem with Its Application to Face Recognition
Lou Songjiang, Zhang Guoyin, Pan Haiwei, and Wang Qingjun
2012 Vol. 49 (8): 1730-1737 [Abstract] ( 461 ) HTML (1 KB)  PDF (1148 KB)  ( 420 )
1738 Cost-Sensitive Listwise Ranking Approach
Lu Min, Huang Yalou, Xie Maoqiang, Wang Yang, Liu Jie, and Liao Zhen
2012 Vol. 49 (8): 1738-1746 [Abstract] ( 622 ) HTML (1 KB)  PDF (1644 KB)  ( 485 )
1747 Multiple Attractor Cellular Automata Classification Method and Over-Fitting Problem with CART
Fang Min, Niu Wenke, and Zhang Xiaosong
2012 Vol. 49 (8): 1747-1752 [Abstract] ( 421 ) HTML (1 KB)  PDF (1063 KB)  ( 408 )
1753 A Hybrid Evolutionary Algorithm Based on Clustering Good-Point Set Crossover for Constrained Optimization
Long Wen, Liang Ximing, Xu Songjin, and Chen Fu
2012 Vol. 49 (8): 1753-1761 [Abstract] ( 399 ) HTML (1 KB)  PDF (1458 KB)  ( 388 )
1762 Distributed Affinity Propagation Clustering Based on MapReduce
Lu Weiming, Du Chenyang, Wei Baogang, Shen Chunhui, and Ye Zhenchao
2012 Vol. 49 (8): 1762-1772 [Abstract] ( 857 ) HTML (1 KB)  PDF (4011 KB)  ( 552 )
1773 Bialgebraic Semantics of the Typed π-Calculus
Li Yongji, Li Shixian, and Zhou Xiaocong
2012 Vol. 49 (8): 1773-1780 [Abstract] ( 374 ) HTML (1 KB)  PDF (864 KB)  ( 398 )
1787 Bialgebraic Structures for Abstract Data Types and Their Computations
Su Jindian and Yu Shanshan
2012 Vol. 49 (8): 1787-1803 [Abstract] ( 445 ) HTML (1 KB)  PDF (3105 KB)  ( 420 )
1804 An Approach for Migrating Data Adaptively in Hierarchical Storage Systems
Zhang Guangyan, amd Qiu Jianping
2012 Vol. 49 (8): 1804-1810 [Abstract] ( 464 ) HTML (1 KB)  PDF (1764 KB)  ( 409 )
1811 Deriving Markov Chain Usage Model from UML Model
Wu Caihua, Liu Juntao, Peng Shirui, and Li Haihong
2012 Vol. 49 (8): 1811-1819 [Abstract] ( 543 ) HTML (1 KB)  PDF (1403 KB)  ( 406 )
17811 Kernelization for Weighted 3-Set Packing Problem
Li Shaohua, Feng Qilong, Wang Jianxin, and Chen Jianer
2012 Vol. 49 (8): 17811-786 [Abstract] ( 469 ) HTML (1 KB)  PDF (603 KB)  ( 430 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech