计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2012 Vol. 49, No. 2
Published: 15 February 2012

   
 
       Paper
217 Analyzing and Modeling of Nodes Churn for Large-Scale P2P Reliable Media Streaming
Yue Guangxue, and Li Renfa
2012 Vol. 49 (2): 217-230 [Abstract] ( 424 ) HTML (1 KB)  PDF (2619 KB)  ( 394 )
231 A Game Control Scheme Based on Prediction of Trust and Service for Wireless Access Service
Gui Jinsong and Wu Min
2012 Vol. 49 (2): 231-242 [Abstract] ( 319 ) HTML (1 KB)  PDF (2184 KB)  ( 316 )
243 An Accurate Fingerprinting Localization Algorithm Based on Common Beacons
Zhao Fang, Luo Haiyong, Ma Yan, and Xu Junjun
2012 Vol. 49 (2): 243-252 [Abstract] ( 428 ) HTML (1 KB)  PDF (2086 KB)  ( 557 )
253 Design of MAC Scheme in Multi-Channel Multi-Radio WMNs
Luo Juan, Pan Chen, and Li Renfa
2012 Vol. 49 (2): 253-260 [Abstract] ( 348 ) HTML (1 KB)  PDF (1587 KB)  ( 1331 )
261 Survey of End-to-End Multipath Transport Protocol
Yang Wang, Li Hewu, Wu Qian, and Wu Jianping,
2012 Vol. 49 (2): 261-269 [Abstract] ( 448 ) HTML (1 KB)  PDF (1001 KB)  ( 437 )
270 TCLM-P2P: Task Collaboration Logic Model Oriented to P2P Community
Wang Yang, Wang Ruchuan, Yan Yuanting, Han Zhijie, and Zhao Baohua
2012 Vol. 49 (2): 270-277 [Abstract] ( 394 ) HTML (1 KB)  PDF (1535 KB)  ( 334 )
278 A Topology Constructing Algorithm Based on Punishment and Cultivation in Mobile P2P
Liu Jiaqi, Chen Zhigang, Li Deng, and Ren Zhong
2012 Vol. 49 (2): 278-285 [Abstract] ( 291 ) HTML (1 KB)  PDF (2823 KB)  ( 258 )
286 Network Architecture Design for Data Centers Towards Cloud Computing
Wang Cong, Wang Cuirong, Wang Xingwei, and Jiang Dingde
2012 Vol. 49 (2): 286-293 [Abstract] ( 587 ) HTML (1 KB)  PDF (2345 KB)  ( 1130 )
294 Reverse Hash Chain Traversal Based on Binary Tree
Fu Jianqing, Wu Chunming, Wu Jiyi, and Ping Lingdi
2012 Vol. 49 (2): 294-303 [Abstract] ( 552 ) HTML (1 KB)  PDF (997 KB)  ( 417 )
304 Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System
Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, and Wang Jian
2012 Vol. 49 (2): 304-311 [Abstract] ( 373 ) HTML (1 KB)  PDF (1259 KB)  ( 434 )
312 Adaptive Neighbor Multi-Objective Evolutionary Algorithm Based on Hypervolume Indicator
Zheng Jinhua, Li Ke, Li Miqing, and Wen Shihua
2012 Vol. 49 (2): 312-326 [Abstract] ( 740 ) HTML (1 KB)  PDF (6730 KB)  ( 608 )
327 Rough Approximation Spaces and Belief Structures in Infinite Universes of Discourse
Wu Weizhi, Mi Jusheng , and Li Tongjun
2012 Vol. 49 (2): 327-336 [Abstract] ( 324 ) HTML (1 KB)  PDF (933 KB)  ( 370 )
337 An Effective Model and Algorithm for Community Detection in Social Networks
Lin Youfang, Wang Tianyu, Tang Rui, Zhou Yuanwei, and Huang Houkuan
2012 Vol. 49 (2): 337-345 [Abstract] ( 571 ) HTML (1 KB)  PDF (1376 KB)  ( 923 )
346 Balancing Method for Skewed Training Set in Data Mining
Li Xiongfei, Li Jun, Qu Chengwei, Liu Lijuan, and Sun Tao
2012 Vol. 49 (2): 346-353 [Abstract] ( 440 ) HTML (1 KB)  PDF (1206 KB)  ( 349 )
354 A Feature Selection Method Based on Maximal Marginal Relevance
Liu He, Zhang Xianghong, Liu Dayou, Li Yanjun, and Yin Lijun
2012 Vol. 49 (2): 354-360 [Abstract] ( 586 ) HTML (1 KB)  PDF (769 KB)  ( 456 )
361 Constrained Conditional Random Fields for Semantic Annotation of Web Data
Dong Yongquan, Li Qingzhong, Ding Yanhui, and Peng Zhaohui
2012 Vol. 49 (2): 361-371 [Abstract] ( 440 ) HTML (1 KB)  PDF (1315 KB)  ( 352 )
372 An Unsupervised Feature Selection Approach Based on Mutual Information
Xu Junling, Zhou Yuming, Chen Lin, and Xu Baowen,
2012 Vol. 49 (2): 372-382 [Abstract] ( 1266 ) HTML (1 KB)  PDF (1913 KB)  ( 1174 )
383 A Fast and Adaptive Object Tracking Method
Li Shanqing, Tang Liang, Liu Keyan, and Wang Lei
2012 Vol. 49 (2): 383-391 [Abstract] ( 394 ) HTML (1 KB)  PDF (3174 KB)  ( 416 )
392 Simulation-Based Non-Linear Methods for the Estimation of Execution Cycles of ARM Programs
Kong Liangliang, Jiang Jianhui, Xiao Jie, and Jiang Yuanyuan
2012 Vol. 49 (2): 392-401 [Abstract] ( 502 ) HTML (1 KB)  PDF (2202 KB)  ( 302 )
402 Representing and Perceiving Environment of Complex Self-Adaptive Multi-Agent Systems
Dong Menggao, Mao Xinjun, Guo Yi, and Qi Zhichang
2012 Vol. 49 (2): 402-412 [Abstract] ( 437 ) HTML (1 KB)  PDF (3129 KB)  ( 327 )
413 Real-Time Systems Contact Checking and Resolution Based on Time Petri Net
Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, and Liu Linyuan
2012 Vol. 49 (2): 413-420 [Abstract] ( 363 ) HTML (1 KB)  PDF (1349 KB)  ( 280 )
421 JavaScript Typing System with Prediction
Li Shisheng, Cheng Buqi, Li Xiaofeng, Sun Guangzhong, and Chen Guoliang,
2012 Vol. 49 (2): 421-431 [Abstract] ( 370 ) HTML (1 KB)  PDF (3347 KB)  ( 301 )
432 Triangulation of Implicit Surfaces via Shell-Space Partition
Gao Shanshan, Zhang Caiming, Zhou Yuanfeng, and Bo Pengbo
2012 Vol. 49 (2): 432-442 [Abstract] ( 390 ) HTML (1 KB)  PDF (3863 KB)  ( 294 )
443 A Test Compression Scheme Based on LFSR Reseeding and Optimized Coding
Chen Tian, Liang Huaguo, Wang Wei, Yi Maoxiang, and Huang Zhengfeng
2012 Vol. 49 (2): 443-451 [Abstract] ( 311 ) HTML (1 KB)  PDF (971 KB)  ( 429 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech