计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2012 Vol. 49, No. 5
Published: 15 May 2012

   
 
       Paper
901 Secure Information Flow in Java by Optimized Reachability Analysis of Weighted Pushdown System
Sun Cong, Tang Liyong, Chen Zhong, and Ma Jianfeng
2012 Vol. 49 (5): 901-912 [Abstract] ( 287 ) HTML (1 KB)  PDF (3383 KB)  ( 258 )
913 A QI Weight-Aware Approach to Privacy Preserving Publishing Data Set
Xu Yong, Qin Xiaolin, Yang Yitao, Yang Zhongxue, and Huang Can
2012 Vol. 49 (5): 913-924 [Abstract] ( 381 ) HTML (1 KB)  PDF (3955 KB)  ( 363 )
925 Construction of Transformation Matrix with a Given Period Modulo N
Liu Duo and Dai Yiqi
2012 Vol. 49 (5): 925-931 [Abstract] ( 227 ) HTML (1 KB)  PDF (735 KB)  ( 306 )
932 Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG
Long Yu, Xu Xian, and Chen Kefei
2012 Vol. 49 (5): 932-938 [Abstract] ( 298 ) HTML (1 KB)  PDF (765 KB)  ( 377 )
939 Trusted Intra-Domain Fast Authentication Protocol Based on Split Mechanism Network
Zheng Lijuan, and Han Zhen
2012 Vol. 49 (5): 939-948 [Abstract] ( 346 ) HTML (1 KB)  PDF (2219 KB)  ( 284 )
949 Research on Unknown Malicious Code Automatic Detection Based on Space Relevance Features
Li Peng, Wang Ruchuan, and Wu Ning
2012 Vol. 49 (5): 949-957 [Abstract] ( 382 ) HTML (1 KB)  PDF (2714 KB)  ( 354 )
958 Security Analysis of an RFID Protocol Based on Insubvertible Encryption
Wei Yongzhuang, Ouyang Ning, and Ma Chunbo
2012 Vol. 49 (5): 958-961 [Abstract] ( 238 ) HTML (1 KB)  PDF (528 KB)  ( 346 )
962 A Group Proxy Signature Scheme Based on Sub-Secret Evolution
Gu Ke, Jia Weijia, and Jiang Chunlin,
2012 Vol. 49 (5): 962-973 [Abstract] ( 278 ) HTML (1 KB)  PDF (1182 KB)  ( 315 )
974 Intrusion Detection System Using CVM Algorithm with Extensive Kernel Methods
Wang Qi'an and Chen Bing
2012 Vol. 49 (5): 974-982 [Abstract] ( 288 ) HTML (1 KB)  PDF (1594 KB)  ( 384 )
983 A Method of Disjoint Quantitative Analysis for Dynamic Fault Tree
Zhang Honglin, Zhang Chunyuan, Liu Dong, and Fu Jian
2012 Vol. 49 (5): 983-995 [Abstract] ( 327 ) HTML (1 KB)  PDF (2336 KB)  ( 257 )
996 XenRPC:Design and Implementation of Security VM Remote Procedure Call
Chen Hao, Peng Cuifen, Sun Jianhua, and Shi Lin
2012 Vol. 49 (5): 996-1004 [Abstract] ( 330 ) HTML (1 KB)  PDF (3155 KB)  ( 254 )
1005 A Division Based Composite Service Selection Approach
Zhang Mingwei, Zhang Bin, Zhang Xizhe, and Zhu Zhiliang
2012 Vol. 49 (5): 1005-1017 [Abstract] ( 332 ) HTML (1 KB)  PDF (2376 KB)  ( 259 )
1018 Energy-Aware Scheduling of Hard Real-Time Tasks in VFD-Based Multi-Core Systems
Wu Xiaodong, Han Jianjun, and Wang Tianjiang
2012 Vol. 49 (5): 1018-1027 [Abstract] ( 320 ) HTML (1 KB)  PDF (2642 KB)  ( 466 )
1028 A Dependability Evaluation Model for Internetware Based on Bayesian Network
Si Guannan, Ren Yuhan, Xu Jing, and Yang Jufeng
2012 Vol. 49 (5): 1028-1038 [Abstract] ( 290 ) HTML (1 KB)  PDF (2573 KB)  ( 324 )
1039 Automated Test Data Generation Using Evolutionary Algorithm Based on Maintaining Population Diversity
Wang Jianmin and Cai Yuan
2012 Vol. 49 (5): 1039-1048 [Abstract] ( 252 ) HTML (1 KB)  PDF (1125 KB)  ( 303 )
1049 A Cache Replacement Policy Based on Reuse Distance Prediction and Stream Detection
Lin Junmin, Wang Wei, Qiao Lin, and Tang Zhizhong
2012 Vol. 49 (5): 1049-1060 [Abstract] ( 423 ) HTML (1 KB)  PDF (3847 KB)  ( 317 )
1061 A Bus Arbitration Scheme for Memory Access Performance Optimization
Liu Dan, Feng Yi, Tong Dong, Cheng Xu, and Wang Keyi
2012 Vol. 49 (5): 1061-1071 [Abstract] ( 383 ) HTML (1 KB)  PDF (3762 KB)  ( 308 )
1072 Anaphoricity Determination for Coreference Resolution in English and Chinese Languages
Kong Fang, Zhu Qiaoming, and Zhou Guodong
2012 Vol. 49 (5): 1072-1085 [Abstract] ( 365 ) HTML (1 KB)  PDF (1294 KB)  ( 478 )
1086 Double Center Particle Swarm Optimization Algorithm
Tang Kezong, Liu Bingxiang, Yang Jingyu, and Sun Tingkai
2012 Vol. 49 (5): 1086-1094 [Abstract] ( 410 ) HTML (1 KB)  PDF (2024 KB)  ( 386 )
1095 Privacy-Preserving Data Publication for Clustering
Ni Weiwei, Chen Geng, Chong Zhihong, and Wu Yingjie
2012 Vol. 49 (5): 1095-1104 [Abstract] ( 446 ) HTML (1 KB)  PDF (1960 KB)  ( 390 )
1105 Frequent Patterns Mining over Uncertain Data Streams Based on Probability Decay Window Model
Liao Guoqiong, Wu Lingqin, and Wan Changxuan,
2012 Vol. 49 (5): 1105-1115 [Abstract] ( 412 ) HTML (1 KB)  PDF (2247 KB)  ( 357 )
1116 Piecewise Linear Approximation of Rational Triangular Surfaces
Zhou Lian, and Wang Guojin
2012 Vol. 49 (5): 1116-1122 [Abstract] ( 279 ) HTML (1 KB)  PDF (2388 KB)  ( 241 )
1123 A Data-Clustering Based Robust SIFT Feature Matching Method
Fan Zhiqiang and Zhao Qinping
2012 Vol. 49 (5): 1123-1129 [Abstract] ( 293 ) HTML (1 KB)  PDF (3689 KB)  ( 324 )
1130 A Distributed Parallel Algorithm for SIFT Feature Extraction
Jiang Guiyuan, Zhang Guiling, and Zhang Dakun
2012 Vol. 49 (5): 1130-1141 [Abstract] ( 444 ) HTML (1 KB)  PDF (4197 KB)  ( 404 )
1142 Two Novel Directional Filter Banks with Diamond Structure for Fingerprint Enhancement
Cai Xiumeiand Fan Jiulun
2012 Vol. 49 (5): 1142-1148 [Abstract] ( 407 ) HTML (1 KB)  PDF (3773 KB)  ( 348 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech