计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2010 Vol. 47, No. 5
Published: 15 May 2010

   
 
       Paper
737 Research Advances and Challenges of Body Sensor Network (BSN)
Gong Jibing, Wang Rui, and Cui Li
2010 Vol. 47 (5): 737-753 [Abstract] ( 458 ) HTML (1 KB)  PDF (3056 KB)  ( 604 )
754 Multi-Query Processing Technology of Approximate Continuous Queries in Wireless Sensor Networks
He Wenlin and Chen Hong
2010 Vol. 47 (5): 754-761 [Abstract] ( 244 ) HTML (1 KB)  PDF (1271 KB)  ( 332 )
762 Distributed Aggregations for Two Queries over Uncertain Data
Zhou Xun, Li Jianzhong, and Shi Shengfei
2010 Vol. 47 (5): 762-771 [Abstract] ( 328 ) HTML (1 KB)  PDF (1088 KB)  ( 464 )
772 Modeling Cascading Failures for Internet Based on Congestion Effects
Wang Jian, Liu Yanheng, Mei Fang, and Zhang Cheng
2010 Vol. 47 (5): 772-779 [Abstract] ( 225 ) HTML (1 KB)  PDF (1879 KB)  ( 456 )
780 A Web Services Matching Mechanism Based on Semantics and QoS-Aware Aspect
Zhang Peiyun, Huang Bo, and Sun Yamin
2010 Vol. 47 (5): 780-787 [Abstract] ( 271 ) HTML (1 KB)  PDF (904 KB)  ( 378 )
788 Discovering Redundancy-Aware Top-k Anomalies in High Dimensional Data
Chen Guanhua, Ma Xiuli, Yang Dongqing, , Tang Shiwei, Shuai Meng, and Xie Kunqing,
2010 Vol. 47 (5): 788-795 [Abstract] ( 280 ) HTML (1 KB)  PDF (821 KB)  ( 377 )
796 InfoSigs: A Fine-Grained Clustering Algorithm for Web Objects
Sheng Zhenhua, Wu Yu, Jiang Jinhua, Shou Lidan, and Chen Gang
2010 Vol. 47 (5): 796-803 [Abstract] ( 377 ) HTML (1 KB)  PDF (1297 KB)  ( 368 )
804 XCluster: A Cluster-Based Queriable Multi-Document XML Compression Method
Zhao Ming, Luo Jizhou, Li Jianzhong, and Gao Hong
2010 Vol. 47 (5): 804-814 [Abstract] ( 273 ) HTML (1 KB)  PDF (1633 KB)  ( 353 )
815 An Enhancement Algorithm of Cluster Boundaries Precision Based on Grid's Density Direction
Yu Canling, Wang Lizhen, and Zhang Yuanwu
2010 Vol. 47 (5): 815-823 [Abstract] ( 273 ) HTML (1 KB)  PDF (1142 KB)  ( 344 )
824 Multi-Schema Integration Based on Usage and Clustering Approach
Ding Guohui, Wang Guoren, and Zhao Yuhai
2010 Vol. 47 (5): 824-831 [Abstract] ( 325 ) HTML (1 KB)  PDF (893 KB)  ( 378 )
832 (中国人民大学信息学院 北京 100872) (cadizhou@gmail.com)
HF-Tree: An Update-Efficient Index for Flash Memory
2010 Vol. 47 (5): 832-840 [Abstract] ( 314 ) HTML (1 KB)  PDF (1399 KB)  ( 347 )
841 Efficient XML Keyword Query Refinement with Meaningful Results Generation
Huang Jing, Lu Jiaheng, and Meng Xiaofeng
2010 Vol. 47 (5): 841-848 [Abstract] ( 336 ) HTML (1 KB)  PDF (1001 KB)  ( 325 )
849 A Multi-Order Based Index Structure for Spatial Data—MOIS-tree
Liu Runtao and Hao Zhongxiao,
2010 Vol. 47 (5): 849-857 [Abstract] ( 320 ) HTML (1 KB)  PDF (647 KB)  ( 338 )
858 D-EEM: A DOM-Tree Based Entity Extraction Mechanism for Deep Web
Kou Yue, Li Dong, Shen Derong, Yu Ge, and Nie Tiezheng
2010 Vol. 47 (5): 858-865 [Abstract] ( 425 ) HTML (1 KB)  PDF (1316 KB)  ( 480 )
866 Processing XPath over F&B-Index
Wang Hongqiang, Li Jianzhong, and Wang Hongzhi
2010 Vol. 47 (5): 866-877 [Abstract] ( 210 ) HTML (1 KB)  PDF (2262 KB)  ( 275 )
878 Research on Simulative Column-Storage Model Policy Based on Row-Storage Model
Yu Lisheng, Zhang Yansong, Wang Shan, and Zhang Qian
2010 Vol. 47 (5): 878-885 [Abstract] ( 253 ) HTML (1 KB)  PDF (1402 KB)  ( 473 )
886 SLCA Algorithm for XML Streams Based on Hole-Filler Model
Huo Huan, Wang Guoren, Chen Qingkui, and Peng Dunlu
2010 Vol. 47 (5): 886-892 [Abstract] ( 312 ) HTML (1 KB)  PDF (1159 KB)  ( 355 )
893 Anomaly Detection over Pseudo Period Data Streams Based on DTW Distance
Cheng Wencong, Zou Peng, Jia Yan, and Yang Yin
2010 Vol. 47 (5): 893-902 [Abstract] ( 454 ) HTML (1 KB)  PDF (1057 KB)  ( 439 )
903 Research on Network Bidirectional Topology Discovery Based on Measurer by Spreading
Jiao Jian,Yao Shan, and Li Xiaojian,
2010 Vol. 47 (5): 903-910 [Abstract] ( 259 ) HTML (1 KB)  PDF (1835 KB)  ( 333 )
911 An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks
Wang Gang, Wen Tao, Guo Quan, and Ma Xuebin
2010 Vol. 47 (5): 911-920 [Abstract] ( 231 ) HTML (1 KB)  PDF (1004 KB)  ( 475 )
921 A Malicious Transaction Detection Method Based on Transaction Template
Dai Hua, Qin Xiaolin, and Bai Chuanjie
2010 Vol. 47 (5): 921-929 [Abstract] ( 259 ) HTML (1 KB)  PDF (829 KB)  ( 308 )
930 Distance-Based Outlier Detection for Distributed RFID Data Streams
Liao Guoqiong, and Li Jing
2010 Vol. 47 (5): 930-939 [Abstract] ( 279 ) HTML (1 KB)  PDF (1461 KB)  ( 381 )
940 A Novel Rule-Centered Fuzzy Model Induced by Epanechnikov Mixtures
Zhang Qinli, and Wang Shitong
2010 Vol. 47 (5): 940-947 [Abstract] ( 375 ) HTML (1 KB)  PDF (925 KB)  ( 335 )
948 Research on Cnvergence of Multi-Robots Path Planning Based on Learning Classifier System
Shao Jie, Yang Jingyu, Wan Minghua, and Huang Chuanbo
2010 Vol. 47 (5): 948-955 [Abstract] ( 327 ) HTML (1 KB)  PDF (1533 KB)  ( 415 )
956 A Storage Optimization Method for Frequency Direct Digital Synthesizer
Zhang Kehuan, Ren Xiaoxi, Li Renfa, and Ling Chunqing
2010 Vol. 47 (5): 956-961 [Abstract] ( 241 ) HTML (1 KB)  PDF (880 KB)  ( 346 )
962 Dual-Layer CRFs Based on Subword for Chinese Word Segmentation
Huang Degen, Jiao Shidou, and Zhou Huiwei
2010 Vol. 47 (5): 962-968 [Abstract] ( 394 ) HTML (1 KB)  PDF (727 KB)  ( 452 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech