计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2010 Vol. 47, No. 12
Published: 15 December 2010

   
 
       Paper
Binary Representation of Similarity
Yu Jian
2010 Vol. 47 (12): - [Abstract] ( 153 ) HTML (1 KB)  PDF (700 KB)  ( 404 )
A Simulation Approach Based on the Notion of Emergence for Analyzing MAS Trust Model
Ren Chuanjun, Huang Hongbing, and Jin Shiyao
2010 Vol. 47 (12): - [Abstract] ( 279 ) HTML (1 KB)  PDF (3061 KB)  ( 342 )
A Privacy-Preserving Data Publishing Algorithm for Clustering Application
Chong Zhihong, Ni Weiwei, Liu Tengteng, and Zhang Yong
2010 Vol. 47 (12): - [Abstract] ( 234 ) HTML (1 KB)  PDF (860 KB)  ( 472 )
Efficient AttributeBased Ring Signature Schemes
Chen Shaozhen, Wang Wenqiang, and Peng Shujuan
2010 Vol. 47 (12): - [Abstract] ( 368 ) HTML (1 KB)  PDF (874 KB)  ( 435 )
Algorithm Analysis and Efficient Parallelization of the Single Particle Reconstruction Software Package: EMAN
Fan Liya, Zhang Fa, Wang Gongming, and Liu Zhiyong
2010 Vol. 47 (12): - [Abstract] ( 416 ) HTML (1 KB)  PDF (2505 KB)  ( 386 )
A Method to Adjust Minutiae Location and Direction in Nonlinear Distorted Fingerprint Image
Chen Hui, Yin Jianping, and Zhu En
2010 Vol. 47 (12): - [Abstract] ( 224 ) HTML (1 KB)  PDF (1730 KB)  ( 337 )
A Survey of Web Page Cleaning Research
Mao Xianling, He Jing, and Yan Hongfei
2010 Vol. 47 (12): - [Abstract] ( 373 ) HTML (1 KB)  PDF (2402 KB)  ( 354 )
Resource Assignment Algorithm Under Multi-Agent for P2P MMOG
Luo Jia, Chang Huiyou, and Yi Yang
2010 Vol. 47 (12): - [Abstract] ( 214 ) HTML (1 KB)  PDF (1057 KB)  ( 450 )
Overview of Botnet Detection
Wang Hailong, Gong Zhenghu, and Hou Jie
2010 Vol. 47 (12): - [Abstract] ( 332 ) HTML (1 KB)  PDF (1516 KB)  ( 516 )
A Fast Motion Detection Method Based on Improved Codebook Model
Xu Cheng, Tian Zheng, and Li Renfa
2010 Vol. 47 (12): - [Abstract] ( 293 ) HTML (1 KB)  PDF (1924 KB)  ( 386 )
Construction of Local Adjustable C2 Parametic Quartic Interpolation Curve
He Ping, Zhang Caiming, and Zhou Jingbo
2010 Vol. 47 (12): - [Abstract] ( 241 ) HTML (1 KB)  PDF (890 KB)  ( 334 )
Focused Web Entity Search Using the Linked-Path Prediction Model
Huang Jianbin and Sun Heli
2010 Vol. 47 (12): - [Abstract] ( 227 ) HTML (1 KB)  PDF (1602 KB)  ( 321 )
A Density-Based Local Outlier Detecting Algorithm
Hu Caiping and Qin Xiaolin
2010 Vol. 47 (12): - [Abstract] ( 462 ) HTML (1 KB)  PDF (936 KB)  ( 674 )
A Template Technology for Transplanting from Single-GPU Programs to Multi-GPU Programs
Li Jianjiang, Li Xinggang, Lu Chuan, and Fan Shaoming
2010 Vol. 47 (12): - [Abstract] ( 319 ) HTML (1 KB)  PDF (1552 KB)  ( 321 )
The Information Model for a Class of Imperfect Information Game
Ma Xiao, Wang Xuan, and Wang Xiaolong
2010 Vol. 47 (12): - [Abstract] ( 277 ) HTML (1 KB)  PDF (1637 KB)  ( 453 )
Improved Single Image Dehazing Using Dark Channel Prior
Hu Wei, Yuan Guodong, Dong Zhao, and Shu Xueming
2010 Vol. 47 (12): - [Abstract] ( 354 ) HTML (1 KB)  PDF (4519 KB)  ( 667 )
High Precision Timestamps in Network Measurement
Xie Yingke, Wang Jiandong, Zhu Chao, Zhao Zili, and Han Chengde
2010 Vol. 47 (12): - [Abstract] ( 287 ) HTML (1 KB)  PDF (4165 KB)  ( 524 )
Writing Mechanism in Digital Organism File System
Qiu Yuanjie and Liu Xinsong
2010 Vol. 47 (12): - [Abstract] ( 252 ) HTML (1 KB)  PDF (1763 KB)  ( 323 )
CrossDomain Opinion Analysis Based on RandomWalk Model
Wu Qiong, Tan Songbo, Xu Hongbo, Duan Miyi, and Cheng Xueqi
2010 Vol. 47 (12): - [Abstract] ( 253 ) HTML (1 KB)  PDF (1649 KB)  ( 317 )
Recovering the Use Case from Object-Oriented Programs by Static Analysis
Ye Pengfei, Peng Xin, and Zhao Wenyun
2010 Vol. 47 (12): - [Abstract] ( 326 ) HTML (1 KB)  PDF (2226 KB)  ( 270 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech