计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2011 Vol. 48, No. 2
Published: 15 February 2011

   
 
       Paper
177 A Parallel Coordinates-Based Measure Model and Its Applications
Hu Jun, Huang Houkuan, and Gao Fang
2011 Vol. 48 (2): 177-185 [Abstract] ( 304 ) HTML (1 KB)  PDF (3135 KB)  ( 395 )
186 Research on Decomposition Strategy for Knowledge Tree of Characteristic Predicate
Wu Xiangjun, Bian Rui, Ling Yingbiao, and Jiang Yunfei
2011 Vol. 48 (2): 186-194 [Abstract] ( 323 ) HTML (1 KB)  PDF (933 KB)  ( 362 )
195 Simulation and Implementation of Gene Expression Regulation in E-Cell Model Analog-Cell
Han Xiaosong, Pei Zhili,, Lu Xinhua, Ji Zhaohua, and Liang Yanchun,
2011 Vol. 48 (2): 195-202 [Abstract] ( 389 ) HTML (1 KB)  PDF (2459 KB)  ( 341 )
203 Flocking Movement of Delayed Multi-Agent Systems with Leader-Following
Yang Hongyong, Cao Kecai, and Zhang Siying
2011 Vol. 48 (2): 203-208 [Abstract] ( 403 ) HTML (1 KB)  PDF (783 KB)  ( 451 )
209 Computing the Minimal Hitting Sets Based on Dynamic Maximum Degree
Zhang Liming, Ouyang Dantong, and Zeng Hailin
2011 Vol. 48 (2): 209-215 [Abstract] ( 244 ) HTML (1 KB)  PDF (808 KB)  ( 383 )
216 Why-Questions Answering for Reading Comprehension Based on Topic and Rhetorical Identification
Zhang Zhichang, Zhang Yu, Liu Ting, and Li Sheng
2011 Vol. 48 (2): 216-223 [Abstract] ( 299 ) HTML (1 KB)  PDF (973 KB)  ( 500 )
224 An Estimation of Query Language Model Based on Statistical Semantic Clustering
Pu Qiang, He Daqing, and Yang Guowei
2011 Vol. 48 (2): 224-231 [Abstract] ( 364 ) HTML (1 KB)  PDF (1211 KB)  ( 378 )
232 Software Reliability Modeling with Logistic Test Coverage Function
Li Haifeng, Li Qiuying, and Lu Minyan
2011 Vol. 48 (2): 232-240 [Abstract] ( 386 ) HTML (1 KB)  PDF (1200 KB)  ( 521 )
241 A Method for Generating Software Architecture Models from Process Algebra Specifications
Zhu Yi, Huang Zhiqiu, Zhou Hang, and Liu Linyuan
2011 Vol. 48 (2): 241-250 [Abstract] ( 427 ) HTML (1 KB)  PDF (3599 KB)  ( 581 )
251 Software Superfamilies Based on Sub-Graph Significance Profile
Zhang Lin, and Zhang Li
2011 Vol. 48 (2): 251-258 [Abstract] ( 221 ) HTML (1 KB)  PDF (2635 KB)  ( 314 )
259 Image Enhancement in the Compressed Domain Based on Retinex Theory
Wang Ronggui, Zhang Xinlong, Zhang Xuan, and Fang Shuai
2011 Vol. 48 (2): 259-270 [Abstract] ( 429 ) HTML (1 KB)  PDF (5060 KB)  ( 531 )
271 Detection for Flood Change with SAR Images Based on Fusion and T-Distribution
Li Jinji, Jiao Licheng, Zhang Xiangrong, and Yang Dongdong
2011 Vol. 48 (2): 271-280 [Abstract] ( 295 ) HTML (1 KB)  PDF (3939 KB)  ( 351 )
281 Image Guided Computer Assisted Microwave Ablation for Liver Cancer
Zhai Weiming, Sheng Lin, Song Yixu, Zhao Yangnan, Wang Hong, and Jia Peifa,
2011 Vol. 48 (2): 281-288 [Abstract] ( 359 ) HTML (1 KB)  PDF (1819 KB)  ( 486 )
289 Constructing Technology for Hypervideo Based on Sketch Interface
Yang Haiyan, Chen Jia, Ma Cuixia, He Lili, Teng Dongxing, Dai Guozhong, and Wang Hongan
2011 Vol. 48 (2): 289-295 [Abstract] ( 257 ) HTML (1 KB)  PDF (1429 KB)  ( 433 )
296 Adaptive Controlling Mechanism for Data Duplicates Based on Prediction in WSN
Zheng Mingcai, Zhang Dafang, Luo Jian, and Li Wenwei
2011 Vol. 48 (2): 296-305 [Abstract] ( 218 ) HTML (1 KB)  PDF (2482 KB)  ( 300 )
306 Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory
Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan
2011 Vol. 48 (2): 306-316 [Abstract] ( 312 ) HTML (1 KB)  PDF (1382 KB)  ( 761 )
317 Integrity Measurement Model According to Needs Under Open Network Environment
Liu Changping, Fan Mingyu, and Wang Guangwei
2011 Vol. 48 (2): 317-326 [Abstract] ( 273 ) HTML (1 KB)  PDF (1289 KB)  ( 443 )
327 Energy-Efficient Real-Time Scheduling Algorithm with Accrual Utility under Energy Bounds
Han Jianjun, Wu Xiaodong, and Li Qinghua
2011 Vol. 48 (2): 327-337 [Abstract] ( 286 ) HTML (1 KB)  PDF (1199 KB)  ( 508 )
338 A Measurement Method of Interactive Performance for Desktop Computing System Using Restricted Behavior Policy
Niu Yan, Yang Chun, Xia Yubin, and Cheng Xu
2011 Vol. 48 (2): 338-345 [Abstract] ( 221 ) HTML (1 KB)  PDF (1682 KB)  ( 414 )
346 A Multi-Variable -Function Placement Algorithm Based on Dominator Frontier Inverse
Ma Hongtu, Hu Shian, Su Yanbing, Li Xun, and Zhao Rongcai
2011 Vol. 48 (2): 346-352 [Abstract] ( 261 ) HTML (1 KB)  PDF (730 KB)  ( 484 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech