计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2011 Vol. 48, No. 12
Published: 15 December 2011

   
 
       Paper
2187 A Collusion Detector Based on Fuzzy Logic in P2P Trust Model
Miao Guangsheng, Feng Dengguo, and Su Purui
2011 Vol. 48 (12): 2187-2200 [Abstract] ( 324 ) HTML (1 KB)  PDF (1687 KB)  ( 407 )
2201 An Approach of Trusted Usage Control in Distributed Environment
Hu Hao, Feng Dengguo, Qin Yu, and Yu Aimin,
2011 Vol. 48 (12): 2201-2211 [Abstract] ( 312 ) HTML (1 KB)  PDF (1698 KB)  ( 459 )
2212 FPGA Implementation and Verification of a Pseudo-Pipelined VLSI Architecture of Two Elliptic Curve Scalar Multiplications
Wang Xu, Zhang Yan, and Quan Jinguo
2011 Vol. 48 (12): 2212-2218 [Abstract] ( 290 ) HTML (1 KB)  PDF (1013 KB)  ( 379 )
2219 A Trusted Computing-Based Security Architecture for Policy-Label Protection
Liu Ziwen, Feng Dengguo, and Yu Aimin
2011 Vol. 48 (12): 2219-2226 [Abstract] ( 334 ) HTML (1 KB)  PDF (928 KB)  ( 409 )
2227 Protecting Programs Based on Randomizing the Encapsulated Structure
Chen Ping, Xing Xiao, Xin Zhi, Wang Yi, Mao Bing, and Xie Li
2011 Vol. 48 (12): 2227-2234 [Abstract] ( 300 ) HTML (1 KB)  PDF (1293 KB)  ( 538 )
2235 A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks
Hu Jianli, Zhou Bin, Wu Quanyuan, and Li Xiaohua
2011 Vol. 48 (12): 2235-2241 [Abstract] ( 301 ) HTML (1 KB)  PDF (914 KB)  ( 806 )
2242 BAR-BGP: Achieving High Reliability Interdomain Routing Through Backup AS-Address Advertisement and Recovery Forwarding
Hu Qiaolin, Sun Yipin, and Su Jinshu
2011 Vol. 48 (12): 2242-2252 [Abstract] ( 231 ) HTML (1 KB)  PDF (2593 KB)  ( 338 )
2253 A P2P Network Traffic Identification Approach Based on Machine Learning
Li Zhiyuan, and Wang Ruchuan
2011 Vol. 48 (12): 2253-2260 [Abstract] ( 564 ) HTML (1 KB)  PDF (1581 KB)  ( 1378 )
2261 A Method on Jointing Mobility of BS and Routing for Lifetime Optimization in Wireless Sensor Networks
Qu Jiaqing, Zhang Shu, and Guo Wenzhuo
2011 Vol. 48 (12): 2261-2267 [Abstract] ( 290 ) HTML (1 KB)  PDF (894 KB)  ( 442 )
2268 Performance Bottleneck Analysis and Solution of Shared Memory Operating System on a Multi-Core Platform
Yuan Qingbo, Zhao Jianbo, Chen Mingyu, and Sun Ninghui,
2011 Vol. 48 (12): 2268-2276 [Abstract] ( 588 ) HTML (1 KB)  PDF (1449 KB)  ( 428 )
2277 A Runtime Monitoring Web Services Interaction Behaviors Method Based on CPN
Zhu Jun, Guo Changguo, and Wu Quanyuan
2011 Vol. 48 (12): 2277-2289 [Abstract] ( 369 ) HTML (1 KB)  PDF (3139 KB)  ( 326 )
2290 Static Race Detection of Interrupt-Driven Programs
Huo Wei, Yu Hongtao, Feng Xiaobing, and Zhang Zhaoqing
2011 Vol. 48 (12): 2290-2299 [Abstract] ( 392 ) HTML (1 KB)  PDF (1277 KB)  ( 466 )
2300 An Assignment Model and Algorithm for Self-Adaptive Software Based on Architecture
Chen Honglong, Li Renfa, Li Rui, and Edwin Sha
2011 Vol. 48 (12): 2300-2307 [Abstract] ( 251 ) HTML (1 KB)  PDF (1035 KB)  ( 397 )
2308 Research Progresses on Energy-Efficient Software Optimization Techniques
Zhao Xia, Guo Yao, and Chen Xiangqun,
2011 Vol. 48 (12): 2308-2316 [Abstract] ( 381 ) HTML (1 KB)  PDF (1043 KB)  ( 369 )
2317 Parallel Computation Techniques for Dynamic Description Logics Reasoning
Wang Zhuxiao, Hu Hong, Chen Limin, and Shi Zhongzhi
2011 Vol. 48 (12): 2317-2325 [Abstract] ( 417 ) HTML (1 KB)  PDF (1856 KB)  ( 417 )
2326 Real AdaBoost Algorithm for Multi-Class and Imbalanced Classification Problems
Fu Zhongliang
2011 Vol. 48 (12): 2326-2333 [Abstract] ( 883 ) HTML (1 KB)  PDF (846 KB)  ( 628 )
2334 An Algorithm for Calculating Minimal Unsatisfiability-Preserving Subsets of Ontology in DL-Lite
Zhou Liping, Huang Houkuan, Qi Guilin, Qu Youli, and Ji Qiu
2011 Vol. 48 (12): 2334-2342 [Abstract] ( 484 ) HTML (1 KB)  PDF (883 KB)  ( 389 )
2343 SHP-VI: A Shortest Hamiltonian Path-Based POMDP Value Iteration Algorithm
Feng Qi, Zhou Xuezhong, Huang Houkuan, and Zhang Xiaoping
2011 Vol. 48 (12): 2343-2351 [Abstract] ( 458 ) HTML (1 KB)  PDF (1783 KB)  ( 360 )
2352 A Hierarchical Reinforcement Learning Method Based on Heuristic Reward Function
Liu Quan, Yan Qicui, Fu Yuchen, Hu Daojing, and Gong Shengrong
2011 Vol. 48 (12): 2352-2358 [Abstract] ( 370 ) HTML (1 KB)  PDF (847 KB)  ( 500 )
2359 Human Pose Tracking Based on Partitioned Sampling Particle Filter and Multiple Cues Fusion
Liu Chenguang, Liu Jiafeng, Huang Jianhua, and Tang Xianglong
2011 Vol. 48 (12): 2359-2368 [Abstract] ( 385 ) HTML (1 KB)  PDF (3130 KB)  ( 357 )
2369 A Method of Stream Cube Computing Based on Interesting View Subset
Hou Dongfeng, Zhang Weiming, Liu Qingbao, and Deng Su
2011 Vol. 48 (12): 2369-2378 [Abstract] ( 220 ) HTML (1 KB)  PDF (1434 KB)  ( 390 )
2379 Fast Algorithm of Nearest Neighbor Query for Line Segments of Spatial Database
Liu Runtao and Hao Zhongxiao,
2011 Vol. 48 (12): 2379-2384 [Abstract] ( 376 ) HTML (1 KB)  PDF (909 KB)  ( 479 )
2385 Fusion of Morphological Features for Mongolian Part of Speech Based on Maximum Entropy Model
Zhang Guanhong, S.Loglo, and Odbal
2011 Vol. 48 (12): 2385-2390 [Abstract] ( 370 ) HTML (1 KB)  PDF (701 KB)  ( 341 )
2391 Test Data Compression and Decompression Using Symmetry-Variable Codes
Liang Huaguo, Jiang Cuiyun, and Luo Qiang
2011 Vol. 48 (12): 2391-2399 [Abstract] ( 248 ) HTML (1 KB)  PDF (1199 KB)  ( 353 )
2400 Adaptive Buffer Management for Leakage Power Optimization in NoC Routers
Qi Shubo, Li Jinwen, Yue Daheng, Zhao Tianlei, and Zhang Minxuan
2011 Vol. 48 (12): 2400-2409 [Abstract] ( 326 ) HTML (1 KB)  PDF (3654 KB)  ( 283 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech