计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2009 Vol. 46, No. 11
Published: 15 November 2009

   
 
       Paper
1777 Survey of Naming and Addressing Architecture Based on Locator/Identifier Split
Tu Rui, Su Jinshu, and Peng Wei
2009 Vol. 46 (11): 1777-1786 [Abstract] ( 314 ) HTML (1 KB)  PDF (1213 KB)  ( 458 )
1787 Uplink Resource Allocation in Wireless MIMO Systems
Pang Di, Zhou Jihua, Hu Jinlong, Dong Jiangtao, and Shi Jinglin,
2009 Vol. 46 (11): 1787-1796 [Abstract] ( 317 ) HTML (1 KB)  PDF (1776 KB)  ( 441 )
1797 A Fast Algorithm for Inferring AS-Level Path of Internet Topology
Yang Guoqiang and Dou Wenhua
2009 Vol. 46 (11): 1797-1802 [Abstract] ( 311 ) HTML (1 KB)  PDF (586 KB)  ( 443 )
1803 Data Allocation Algorithms in P2P Streaming
Li Zeping, Lu Xianliang, Nie Xiaowen, and Li Lin
2009 Vol. 46 (11): 1803-1813 [Abstract] ( 372 ) HTML (1 KB)  PDF (1520 KB)  ( 374 )
1814 Recommendation-Based Grid Resource Matching Algorithm
Lin Yuan, Luo Siwei, and Yang Liner
2009 Vol. 46 (11): 1814-1820 [Abstract] ( 488 ) HTML (1 KB)  PDF (1038 KB)  ( 384 )
1821 A Resource Allocating Algorithm in Grid Workflow Based on Critical Regions Reliability
Yu Jiong, Tian Guozhong,5, Cao Yuanda, and Sun Xianhe
2009 Vol. 46 (11): 1821-1829 [Abstract] ( 341 ) HTML (1 KB)  PDF (1058 KB)  ( 422 )
1830 Continuous Versioning-Based Auditable File System
Huang Rongrong, Shu Jiwu, Chen Kang, and Xiao Da
2009 Vol. 46 (11): 1830-1838 [Abstract] ( 360 ) HTML (1 KB)  PDF (1578 KB)  ( 412 )
1839 Automated Testing of the Trusted Platform Module
Zhan Jing, and Zhang Huanguo,
2009 Vol. 46 (11): 1839-1846 [Abstract] ( 340 ) HTML (1 KB)  PDF (1858 KB)  ( 450 )
1847 Identification of Anomalous Traffic Clusters for Network-Wide Anomaly Analysis
Yang Yahui and Du Keming
2009 Vol. 46 (11): 1847-1853 [Abstract] ( 362 ) HTML (1 KB)  PDF (758 KB)  ( 465 )
1854 Verifying Network Security Policy Based on Features
Tang Chenghua, and Yu Shunzheng
2009 Vol. 46 (11): 1854-1861 [Abstract] ( 359 ) HTML (1 KB)  PDF (1002 KB)  ( 487 )
1862 Fingerprint-Based Random Sequence Generator
Zhu Hegui, Zhang Xiangde, Yang Lianping, and Tang Qingsong
2009 Vol. 46 (11): 1862-1867 [Abstract] ( 373 ) HTML (1 KB)  PDF (1410 KB)  ( 411 )
1868 Comparison of Executable Objects Based on Singatures and Properties
Fu Jianming, Qiao Wei, and Gao Debin,
2009 Vol. 46 (11): 1868-1876 [Abstract] ( 312 ) HTML (1 KB)  PDF (1050 KB)  ( 364 )
1877 Improved Algorithms for Weighted 3D-Matching
Feng Qilong, Wang Jianxin, and Chen Jianer
2009 Vol. 46 (11): 1877-1884 [Abstract] ( 396 ) HTML (1 KB)  PDF (798 KB)  ( 386 )
1885 A Detection Algorithm for Rain-Affected Moving Objects
Xu Jing, Liu Peng, Liu Jiafeng, and Tang Xianglong
2009 Vol. 46 (11): 1885-1892 [Abstract] ( 332 ) HTML (1 KB)  PDF (1731 KB)  ( 425 )
1893 Gesture Synthesis Based on Virtual Newscaster for Broadcast TV News Programs
Yan Qingcong, Chen Yiqiang, and Liu Junfa
2009 Vol. 46 (11): 1893-1899 [Abstract] ( 421 ) HTML (1 KB)  PDF (1319 KB)  ( 460 )
1900 A Buffer Based Extensional Model for Topological Relation and Its Application
Wang Shengsheng, Liu Jie, Xie Qi, and Liu Dayou
2009 Vol. 46 (11): 1900-1906 [Abstract] ( 271 ) HTML (1 KB)  PDF (1162 KB)  ( 402 )
1907 Structural Risk Minimization Principle Based on Complex Random Samples
Ha Minghu, Tian Jingfeng, and Zhang Zhiming
2009 Vol. 46 (11): 1907-1916 [Abstract] ( 329 ) HTML (1 KB)  PDF (982 KB)  ( 414 )
1917 Action Reasoning Independent of Designer
Zhou Shengming, Wang Ju, and Jiang Yuncheng,
2009 Vol. 46 (11): 1917-1924 [Abstract] ( 321 ) HTML (1 KB)  PDF (873 KB)  ( 359 )
1925 An Improved Working Set Selection Strategy for Sequential Minimal Optimization Algorithm
Zeng Zhiqiang, Wu Qun, Liao Beishui, and Zhu Shunzhi
2009 Vol. 46 (11): 1925-1933 [Abstract] ( 468 ) HTML (1 KB)  PDF (945 KB)  ( 399 )
1934 An SVM Active Learning Algorithm and Its Application in Obstacle Detection
Han Guang, Zhao Chunxia, and Hu Xuelei
2009 Vol. 46 (11): 1934-1941 [Abstract] ( 304 ) HTML (1 KB)  PDF (1568 KB)  ( 559 )
1942 Semi-supervised Learning of Promoter Sequences Based on EM Algorithm
Wang Lihong, Zhao Xianjia, and Wu Shuanhu
2009 Vol. 46 (11): 1942-1948 [Abstract] ( 299 ) HTML (1 KB)  PDF (787 KB)  ( 428 )
1949 Principal Component Linear Regression Analysis on Performance of Applications
Li Shengmei, Cheng buqi, Gao Xingyu, Qiao Lin, and Tang Zhizhong
2009 Vol. 46 (11): 1949-1955 [Abstract] ( 490 ) HTML (1 KB)  PDF (1230 KB)  ( 456 )
1956 Reductive Data Cube Based on Formal Concept Analysis
Shi Zhibin and Huang Houkuan
2009 Vol. 46 (11): 1956-1962 [Abstract] ( 461 ) HTML (1 KB)  PDF (1072 KB)  ( 424 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech