计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2011 Vol. 48, No. 12
Published: 15 December 2011

   
 
       Paper
2187 A Collusion Detector Based on Fuzzy Logic in P2P Trust Model
Miao Guangsheng, Feng Dengguo, and Su Purui
2011 Vol. 48 (12): 2187-2200 [Abstract] ( 307 ) HTML (1 KB)  PDF (1687 KB)  ( 397 )
2201 An Approach of Trusted Usage Control in Distributed Environment
Hu Hao, Feng Dengguo, Qin Yu, and Yu Aimin,
2011 Vol. 48 (12): 2201-2211 [Abstract] ( 305 ) HTML (1 KB)  PDF (1698 KB)  ( 454 )
2212 FPGA Implementation and Verification of a Pseudo-Pipelined VLSI Architecture of Two Elliptic Curve Scalar Multiplications
Wang Xu, Zhang Yan, and Quan Jinguo
2011 Vol. 48 (12): 2212-2218 [Abstract] ( 279 ) HTML (1 KB)  PDF (1013 KB)  ( 376 )
2219 A Trusted Computing-Based Security Architecture for Policy-Label Protection
Liu Ziwen, Feng Dengguo, and Yu Aimin
2011 Vol. 48 (12): 2219-2226 [Abstract] ( 322 ) HTML (1 KB)  PDF (928 KB)  ( 411 )
2227 Protecting Programs Based on Randomizing the Encapsulated Structure
Chen Ping, Xing Xiao, Xin Zhi, Wang Yi, Mao Bing, and Xie Li
2011 Vol. 48 (12): 2227-2234 [Abstract] ( 268 ) HTML (1 KB)  PDF (1293 KB)  ( 536 )
2235 A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks
Hu Jianli, Zhou Bin, Wu Quanyuan, and Li Xiaohua
2011 Vol. 48 (12): 2235-2241 [Abstract] ( 292 ) HTML (1 KB)  PDF (914 KB)  ( 799 )
2242 BAR-BGP: Achieving High Reliability Interdomain Routing Through Backup AS-Address Advertisement and Recovery Forwarding
Hu Qiaolin, Sun Yipin, and Su Jinshu
2011 Vol. 48 (12): 2242-2252 [Abstract] ( 229 ) HTML (1 KB)  PDF (2593 KB)  ( 332 )
2253 A P2P Network Traffic Identification Approach Based on Machine Learning
Li Zhiyuan, and Wang Ruchuan
2011 Vol. 48 (12): 2253-2260 [Abstract] ( 536 ) HTML (1 KB)  PDF (1581 KB)  ( 1388 )
2261 A Method on Jointing Mobility of BS and Routing for Lifetime Optimization in Wireless Sensor Networks
Qu Jiaqing, Zhang Shu, and Guo Wenzhuo
2011 Vol. 48 (12): 2261-2267 [Abstract] ( 291 ) HTML (1 KB)  PDF (894 KB)  ( 444 )
2268 Performance Bottleneck Analysis and Solution of Shared Memory Operating System on a Multi-Core Platform
Yuan Qingbo, Zhao Jianbo, Chen Mingyu, and Sun Ninghui,
2011 Vol. 48 (12): 2268-2276 [Abstract] ( 588 ) HTML (1 KB)  PDF (1449 KB)  ( 427 )
2277 A Runtime Monitoring Web Services Interaction Behaviors Method Based on CPN
Zhu Jun, Guo Changguo, and Wu Quanyuan
2011 Vol. 48 (12): 2277-2289 [Abstract] ( 359 ) HTML (1 KB)  PDF (3139 KB)  ( 325 )
2290 Static Race Detection of Interrupt-Driven Programs
Huo Wei, Yu Hongtao, Feng Xiaobing, and Zhang Zhaoqing
2011 Vol. 48 (12): 2290-2299 [Abstract] ( 383 ) HTML (1 KB)  PDF (1277 KB)  ( 466 )
2300 An Assignment Model and Algorithm for Self-Adaptive Software Based on Architecture
Chen Honglong, Li Renfa, Li Rui, and Edwin Sha
2011 Vol. 48 (12): 2300-2307 [Abstract] ( 251 ) HTML (1 KB)  PDF (1035 KB)  ( 396 )
2308 Research Progresses on Energy-Efficient Software Optimization Techniques
Zhao Xia, Guo Yao, and Chen Xiangqun,
2011 Vol. 48 (12): 2308-2316 [Abstract] ( 377 ) HTML (1 KB)  PDF (1043 KB)  ( 371 )
2317 Parallel Computation Techniques for Dynamic Description Logics Reasoning
Wang Zhuxiao, Hu Hong, Chen Limin, and Shi Zhongzhi
2011 Vol. 48 (12): 2317-2325 [Abstract] ( 395 ) HTML (1 KB)  PDF (1856 KB)  ( 418 )
2326 Real AdaBoost Algorithm for Multi-Class and Imbalanced Classification Problems
Fu Zhongliang
2011 Vol. 48 (12): 2326-2333 [Abstract] ( 866 ) HTML (1 KB)  PDF (846 KB)  ( 628 )
2334 An Algorithm for Calculating Minimal Unsatisfiability-Preserving Subsets of Ontology in DL-Lite
Zhou Liping, Huang Houkuan, Qi Guilin, Qu Youli, and Ji Qiu
2011 Vol. 48 (12): 2334-2342 [Abstract] ( 458 ) HTML (1 KB)  PDF (883 KB)  ( 387 )
2343 SHP-VI: A Shortest Hamiltonian Path-Based POMDP Value Iteration Algorithm
Feng Qi, Zhou Xuezhong, Huang Houkuan, and Zhang Xiaoping
2011 Vol. 48 (12): 2343-2351 [Abstract] ( 441 ) HTML (1 KB)  PDF (1783 KB)  ( 361 )
2352 A Hierarchical Reinforcement Learning Method Based on Heuristic Reward Function
Liu Quan, Yan Qicui, Fu Yuchen, Hu Daojing, and Gong Shengrong
2011 Vol. 48 (12): 2352-2358 [Abstract] ( 359 ) HTML (1 KB)  PDF (847 KB)  ( 499 )
2359 Human Pose Tracking Based on Partitioned Sampling Particle Filter and Multiple Cues Fusion
Liu Chenguang, Liu Jiafeng, Huang Jianhua, and Tang Xianglong
2011 Vol. 48 (12): 2359-2368 [Abstract] ( 385 ) HTML (1 KB)  PDF (3130 KB)  ( 363 )
2369 A Method of Stream Cube Computing Based on Interesting View Subset
Hou Dongfeng, Zhang Weiming, Liu Qingbao, and Deng Su
2011 Vol. 48 (12): 2369-2378 [Abstract] ( 205 ) HTML (1 KB)  PDF (1434 KB)  ( 387 )
2379 Fast Algorithm of Nearest Neighbor Query for Line Segments of Spatial Database
Liu Runtao and Hao Zhongxiao,
2011 Vol. 48 (12): 2379-2384 [Abstract] ( 364 ) HTML (1 KB)  PDF (909 KB)  ( 473 )
2385 Fusion of Morphological Features for Mongolian Part of Speech Based on Maximum Entropy Model
Zhang Guanhong, S.Loglo, and Odbal
2011 Vol. 48 (12): 2385-2390 [Abstract] ( 362 ) HTML (1 KB)  PDF (701 KB)  ( 343 )
2391 Test Data Compression and Decompression Using Symmetry-Variable Codes
Liang Huaguo, Jiang Cuiyun, and Luo Qiang
2011 Vol. 48 (12): 2391-2399 [Abstract] ( 242 ) HTML (1 KB)  PDF (1199 KB)  ( 352 )
2400 Adaptive Buffer Management for Leakage Power Optimization in NoC Routers
Qi Shubo, Li Jinwen, Yue Daheng, Zhao Tianlei, and Zhang Minxuan
2011 Vol. 48 (12): 2400-2409 [Abstract] ( 313 ) HTML (1 KB)  PDF (3654 KB)  ( 285 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech