计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2009 Vol. 46, No. 11
Published: 15 November 2009

   
 
       Paper
1777 Survey of Naming and Addressing Architecture Based on Locator/Identifier Split
Tu Rui, Su Jinshu, and Peng Wei
2009 Vol. 46 (11): 1777-1786 [Abstract] ( 343 ) HTML (1 KB)  PDF (1213 KB)  ( 475 )
1787 Uplink Resource Allocation in Wireless MIMO Systems
Pang Di, Zhou Jihua, Hu Jinlong, Dong Jiangtao, and Shi Jinglin,
2009 Vol. 46 (11): 1787-1796 [Abstract] ( 350 ) HTML (1 KB)  PDF (1776 KB)  ( 462 )
1797 A Fast Algorithm for Inferring AS-Level Path of Internet Topology
Yang Guoqiang and Dou Wenhua
2009 Vol. 46 (11): 1797-1802 [Abstract] ( 354 ) HTML (1 KB)  PDF (586 KB)  ( 456 )
1803 Data Allocation Algorithms in P2P Streaming
Li Zeping, Lu Xianliang, Nie Xiaowen, and Li Lin
2009 Vol. 46 (11): 1803-1813 [Abstract] ( 404 ) HTML (1 KB)  PDF (1520 KB)  ( 391 )
1814 Recommendation-Based Grid Resource Matching Algorithm
Lin Yuan, Luo Siwei, and Yang Liner
2009 Vol. 46 (11): 1814-1820 [Abstract] ( 534 ) HTML (1 KB)  PDF (1038 KB)  ( 399 )
1821 A Resource Allocating Algorithm in Grid Workflow Based on Critical Regions Reliability
Yu Jiong, Tian Guozhong,5, Cao Yuanda, and Sun Xianhe
2009 Vol. 46 (11): 1821-1829 [Abstract] ( 381 ) HTML (1 KB)  PDF (1058 KB)  ( 431 )
1830 Continuous Versioning-Based Auditable File System
Huang Rongrong, Shu Jiwu, Chen Kang, and Xiao Da
2009 Vol. 46 (11): 1830-1838 [Abstract] ( 397 ) HTML (1 KB)  PDF (1578 KB)  ( 436 )
1839 Automated Testing of the Trusted Platform Module
Zhan Jing, and Zhang Huanguo,
2009 Vol. 46 (11): 1839-1846 [Abstract] ( 371 ) HTML (1 KB)  PDF (1858 KB)  ( 461 )
1847 Identification of Anomalous Traffic Clusters for Network-Wide Anomaly Analysis
Yang Yahui and Du Keming
2009 Vol. 46 (11): 1847-1853 [Abstract] ( 399 ) HTML (1 KB)  PDF (758 KB)  ( 494 )
1854 Verifying Network Security Policy Based on Features
Tang Chenghua, and Yu Shunzheng
2009 Vol. 46 (11): 1854-1861 [Abstract] ( 395 ) HTML (1 KB)  PDF (1002 KB)  ( 496 )
1862 Fingerprint-Based Random Sequence Generator
Zhu Hegui, Zhang Xiangde, Yang Lianping, and Tang Qingsong
2009 Vol. 46 (11): 1862-1867 [Abstract] ( 422 ) HTML (1 KB)  PDF (1410 KB)  ( 432 )
1868 Comparison of Executable Objects Based on Singatures and Properties
Fu Jianming, Qiao Wei, and Gao Debin,
2009 Vol. 46 (11): 1868-1876 [Abstract] ( 364 ) HTML (1 KB)  PDF (1050 KB)  ( 376 )
1877 Improved Algorithms for Weighted 3D-Matching
Feng Qilong, Wang Jianxin, and Chen Jianer
2009 Vol. 46 (11): 1877-1884 [Abstract] ( 462 ) HTML (1 KB)  PDF (798 KB)  ( 399 )
1885 A Detection Algorithm for Rain-Affected Moving Objects
Xu Jing, Liu Peng, Liu Jiafeng, and Tang Xianglong
2009 Vol. 46 (11): 1885-1892 [Abstract] ( 372 ) HTML (1 KB)  PDF (1731 KB)  ( 439 )
1893 Gesture Synthesis Based on Virtual Newscaster for Broadcast TV News Programs
Yan Qingcong, Chen Yiqiang, and Liu Junfa
2009 Vol. 46 (11): 1893-1899 [Abstract] ( 477 ) HTML (1 KB)  PDF (1319 KB)  ( 467 )
1900 A Buffer Based Extensional Model for Topological Relation and Its Application
Wang Shengsheng, Liu Jie, Xie Qi, and Liu Dayou
2009 Vol. 46 (11): 1900-1906 [Abstract] ( 292 ) HTML (1 KB)  PDF (1162 KB)  ( 416 )
1907 Structural Risk Minimization Principle Based on Complex Random Samples
Ha Minghu, Tian Jingfeng, and Zhang Zhiming
2009 Vol. 46 (11): 1907-1916 [Abstract] ( 382 ) HTML (1 KB)  PDF (982 KB)  ( 421 )
1917 Action Reasoning Independent of Designer
Zhou Shengming, Wang Ju, and Jiang Yuncheng,
2009 Vol. 46 (11): 1917-1924 [Abstract] ( 354 ) HTML (1 KB)  PDF (873 KB)  ( 361 )
1925 An Improved Working Set Selection Strategy for Sequential Minimal Optimization Algorithm
Zeng Zhiqiang, Wu Qun, Liao Beishui, and Zhu Shunzhi
2009 Vol. 46 (11): 1925-1933 [Abstract] ( 520 ) HTML (1 KB)  PDF (945 KB)  ( 403 )
1934 An SVM Active Learning Algorithm and Its Application in Obstacle Detection
Han Guang, Zhao Chunxia, and Hu Xuelei
2009 Vol. 46 (11): 1934-1941 [Abstract] ( 333 ) HTML (1 KB)  PDF (1568 KB)  ( 566 )
1942 Semi-supervised Learning of Promoter Sequences Based on EM Algorithm
Wang Lihong, Zhao Xianjia, and Wu Shuanhu
2009 Vol. 46 (11): 1942-1948 [Abstract] ( 335 ) HTML (1 KB)  PDF (787 KB)  ( 430 )
1949 Principal Component Linear Regression Analysis on Performance of Applications
Li Shengmei, Cheng buqi, Gao Xingyu, Qiao Lin, and Tang Zhizhong
2009 Vol. 46 (11): 1949-1955 [Abstract] ( 521 ) HTML (1 KB)  PDF (1230 KB)  ( 465 )
1956 Reductive Data Cube Based on Formal Concept Analysis
Shi Zhibin and Huang Houkuan
2009 Vol. 46 (11): 1956-1962 [Abstract] ( 514 ) HTML (1 KB)  PDF (1072 KB)  ( 431 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech