计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2012 Vol. 49, No. 2
Published: 15 February 2012

   
 
       Paper
217 Analyzing and Modeling of Nodes Churn for Large-Scale P2P Reliable Media Streaming
Yue Guangxue, and Li Renfa
2012 Vol. 49 (2): 217-230 [Abstract] ( 429 ) HTML (1 KB)  PDF (2619 KB)  ( 408 )
231 A Game Control Scheme Based on Prediction of Trust and Service for Wireless Access Service
Gui Jinsong and Wu Min
2012 Vol. 49 (2): 231-242 [Abstract] ( 305 ) HTML (1 KB)  PDF (2184 KB)  ( 326 )
243 An Accurate Fingerprinting Localization Algorithm Based on Common Beacons
Zhao Fang, Luo Haiyong, Ma Yan, and Xu Junjun
2012 Vol. 49 (2): 243-252 [Abstract] ( 450 ) HTML (1 KB)  PDF (2086 KB)  ( 558 )
253 Design of MAC Scheme in Multi-Channel Multi-Radio WMNs
Luo Juan, Pan Chen, and Li Renfa
2012 Vol. 49 (2): 253-260 [Abstract] ( 337 ) HTML (1 KB)  PDF (1587 KB)  ( 1321 )
261 Survey of End-to-End Multipath Transport Protocol
Yang Wang, Li Hewu, Wu Qian, and Wu Jianping,
2012 Vol. 49 (2): 261-269 [Abstract] ( 420 ) HTML (1 KB)  PDF (1001 KB)  ( 439 )
270 TCLM-P2P: Task Collaboration Logic Model Oriented to P2P Community
Wang Yang, Wang Ruchuan, Yan Yuanting, Han Zhijie, and Zhao Baohua
2012 Vol. 49 (2): 270-277 [Abstract] ( 370 ) HTML (1 KB)  PDF (1535 KB)  ( 338 )
278 A Topology Constructing Algorithm Based on Punishment and Cultivation in Mobile P2P
Liu Jiaqi, Chen Zhigang, Li Deng, and Ren Zhong
2012 Vol. 49 (2): 278-285 [Abstract] ( 275 ) HTML (1 KB)  PDF (2823 KB)  ( 253 )
286 Network Architecture Design for Data Centers Towards Cloud Computing
Wang Cong, Wang Cuirong, Wang Xingwei, and Jiang Dingde
2012 Vol. 49 (2): 286-293 [Abstract] ( 554 ) HTML (1 KB)  PDF (2345 KB)  ( 1107 )
294 Reverse Hash Chain Traversal Based on Binary Tree
Fu Jianqing, Wu Chunming, Wu Jiyi, and Ping Lingdi
2012 Vol. 49 (2): 294-303 [Abstract] ( 536 ) HTML (1 KB)  PDF (997 KB)  ( 418 )
304 Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System
Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, and Wang Jian
2012 Vol. 49 (2): 304-311 [Abstract] ( 362 ) HTML (1 KB)  PDF (1259 KB)  ( 422 )
312 Adaptive Neighbor Multi-Objective Evolutionary Algorithm Based on Hypervolume Indicator
Zheng Jinhua, Li Ke, Li Miqing, and Wen Shihua
2012 Vol. 49 (2): 312-326 [Abstract] ( 725 ) HTML (1 KB)  PDF (6730 KB)  ( 619 )
327 Rough Approximation Spaces and Belief Structures in Infinite Universes of Discourse
Wu Weizhi, Mi Jusheng , and Li Tongjun
2012 Vol. 49 (2): 327-336 [Abstract] ( 304 ) HTML (1 KB)  PDF (933 KB)  ( 368 )
337 An Effective Model and Algorithm for Community Detection in Social Networks
Lin Youfang, Wang Tianyu, Tang Rui, Zhou Yuanwei, and Huang Houkuan
2012 Vol. 49 (2): 337-345 [Abstract] ( 542 ) HTML (1 KB)  PDF (1376 KB)  ( 908 )
346 Balancing Method for Skewed Training Set in Data Mining
Li Xiongfei, Li Jun, Qu Chengwei, Liu Lijuan, and Sun Tao
2012 Vol. 49 (2): 346-353 [Abstract] ( 428 ) HTML (1 KB)  PDF (1206 KB)  ( 359 )
354 A Feature Selection Method Based on Maximal Marginal Relevance
Liu He, Zhang Xianghong, Liu Dayou, Li Yanjun, and Yin Lijun
2012 Vol. 49 (2): 354-360 [Abstract] ( 574 ) HTML (1 KB)  PDF (769 KB)  ( 460 )
361 Constrained Conditional Random Fields for Semantic Annotation of Web Data
Dong Yongquan, Li Qingzhong, Ding Yanhui, and Peng Zhaohui
2012 Vol. 49 (2): 361-371 [Abstract] ( 437 ) HTML (1 KB)  PDF (1315 KB)  ( 362 )
372 An Unsupervised Feature Selection Approach Based on Mutual Information
Xu Junling, Zhou Yuming, Chen Lin, and Xu Baowen,
2012 Vol. 49 (2): 372-382 [Abstract] ( 1221 ) HTML (1 KB)  PDF (1913 KB)  ( 1161 )
383 A Fast and Adaptive Object Tracking Method
Li Shanqing, Tang Liang, Liu Keyan, and Wang Lei
2012 Vol. 49 (2): 383-391 [Abstract] ( 373 ) HTML (1 KB)  PDF (3174 KB)  ( 407 )
392 Simulation-Based Non-Linear Methods for the Estimation of Execution Cycles of ARM Programs
Kong Liangliang, Jiang Jianhui, Xiao Jie, and Jiang Yuanyuan
2012 Vol. 49 (2): 392-401 [Abstract] ( 489 ) HTML (1 KB)  PDF (2202 KB)  ( 308 )
402 Representing and Perceiving Environment of Complex Self-Adaptive Multi-Agent Systems
Dong Menggao, Mao Xinjun, Guo Yi, and Qi Zhichang
2012 Vol. 49 (2): 402-412 [Abstract] ( 434 ) HTML (1 KB)  PDF (3129 KB)  ( 329 )
413 Real-Time Systems Contact Checking and Resolution Based on Time Petri Net
Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, and Liu Linyuan
2012 Vol. 49 (2): 413-420 [Abstract] ( 378 ) HTML (1 KB)  PDF (1349 KB)  ( 282 )
421 JavaScript Typing System with Prediction
Li Shisheng, Cheng Buqi, Li Xiaofeng, Sun Guangzhong, and Chen Guoliang,
2012 Vol. 49 (2): 421-431 [Abstract] ( 357 ) HTML (1 KB)  PDF (3347 KB)  ( 311 )
432 Triangulation of Implicit Surfaces via Shell-Space Partition
Gao Shanshan, Zhang Caiming, Zhou Yuanfeng, and Bo Pengbo
2012 Vol. 49 (2): 432-442 [Abstract] ( 384 ) HTML (1 KB)  PDF (3863 KB)  ( 302 )
443 A Test Compression Scheme Based on LFSR Reseeding and Optimized Coding
Chen Tian, Liang Huaguo, Wang Wei, Yi Maoxiang, and Huang Zhengfeng
2012 Vol. 49 (2): 443-451 [Abstract] ( 310 ) HTML (1 KB)  PDF (971 KB)  ( 428 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech