计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2009 Vol. 46, No. 7
Published: 15 July 2009

   
 
       Paper
1065 Delay-Tolerant Network Routing Algorithm
Xiao Mingjun and Huang Liusheng
2009 Vol. 46 (7): 1065-1073 [Abstract] ( 521 ) HTML (1 KB)  PDF (984 KB)  ( 797 )
1074 Model Analysis for ARQ Based Multi-Link Forwarding Strategy in WSN
Zhu Hongsong, Xu Yongjun, Li Xiaowei, and Sun Limin
2009 Vol. 46 (7): 1074-1085 [Abstract] ( 396 ) HTML (1 KB)  PDF (2204 KB)  ( 324 )
1086 An Improved PI Active Queue Management Algorithm Based on Network State Parameters Estimation
Liu Feng, Dang Xiaolin, and Xu Zhen
2009 Vol. 46 (7): 1086-1093 [Abstract] ( 369 ) HTML (1 KB)  PDF (1010 KB)  ( 467 )
1094 A Fair-Oriented Two-Level Scheduling Scheme for QoS Guarantee in WiMAX
Chen Ting, Li Jiandong, Zhong Shaobo, and Li Changle
2009 Vol. 46 (7): 1094-1101 [Abstract] ( 390 ) HTML (1 KB)  PDF (1497 KB)  ( 412 )
1102 An Authentication Protocol for Station Roaming in WLAN Mesh
Cao Chunjie, Yang Chao, Ma Jianfeng, and Zhu Jianming
2009 Vol. 46 (7): 1102-1109 [Abstract] ( 436 ) HTML (1 KB)  PDF (903 KB)  ( 370 )
1110 Modeling and Analysis of Divide-and-Rule-Hybrid-Benign Worms
Zhou Hanxun, Zhao Hong, and Wen Yingyou
2009 Vol. 46 (7): 1110-1116 [Abstract] ( 255 ) HTML (1 KB)  PDF (1563 KB)  ( 394 )
1117 Automatic Performance Tuning of Sparse Matrix-Vector Multiplication:Implementation Techniques and Its Application Research
Yuan E, Zhang Yunquan, Liu Fangfang, and Sun Xiangzheng,
2009 Vol. 46 (7): 1117-1126 [Abstract] ( 555 ) HTML (1 KB)  PDF (1622 KB)  ( 410 )
1127 A Fault Injection Model of Component Security Testing
Chen Jinfu, Lu Yansheng, and Xie Xiaodong
2009 Vol. 46 (7): 1127-1135 [Abstract] ( 261 ) HTML (1 KB)  PDF (985 KB)  ( 488 )
1136 Automatic Grading of Student Programs Based on Program Understanding
Ma Peijun, Wang Tiantian, and Su Xiaohong
2009 Vol. 46 (7): 1136-1142 [Abstract] ( 340 ) HTML (1 KB)  PDF (719 KB)  ( 571 )
1143 Integration Verification of Workflow Business Rule Semantic
Li Haibo, Zhan Dechen, and Xu Xiaofei
2009 Vol. 46 (7): 1143-1151 [Abstract] ( 433 ) HTML (1 KB)  PDF (901 KB)  ( 407 )
1152 Trustworthy Software Evaluation Using Utility Based Evidence Theory
Yang Shanlin, Ding Shuai, and Chu Wei
2009 Vol. 46 (7): 1152-1159 [Abstract] ( 316 ) HTML (1 KB)  PDF (825 KB)  ( 506 )
1160 Conformant Planning as Modal Logic Axiomatic System D
Lü Shuai, Liu Lei, Li Ying, and Shi Lian
2009 Vol. 46 (7): 1160-1168 [Abstract] ( 382 ) HTML (1 KB)  PDF (790 KB)  ( 518 )
1169 Qualitative Spatial Reasoning for Multi-Dimensional Topology and Size Relations
Wang Shengsheng, Liu Jie, Wang Xinying, and Liu Dayou
2009 Vol. 46 (7): 1169-1175 [Abstract] ( 279 ) HTML (1 KB)  PDF (651 KB)  ( 321 )
1176 Search Result Clustering Method Based on SOM and LSI
Chen Yiheng, Qin Bing, Liu Ting, Wang Ping, and Li Sheng
2009 Vol. 46 (7): 1176-1183 [Abstract] ( 335 ) HTML (1 KB)  PDF (1359 KB)  ( 340 )
1184 Temporal Multi-Document Summarization Based on Macro-Micro Importance Discriminative Model
He Ruifang, Qin Bing, Liu Ting, Pan Yuequn, and Li Sheng
2009 Vol. 46 (7): 1184-1191 [Abstract] ( 283 ) HTML (1 KB)  PDF (1107 KB)  ( 346 )
1192 A Computer Model of Directional Visual Attention
Zhao Hongwei, Wang Hui, Liu Pingping, and Dai Jinbo
2009 Vol. 46 (7): 1192-1197 [Abstract] ( 363 ) HTML (1 KB)  PDF (1241 KB)  ( 362 )
1198 Scene Image Categorization Based on Content Correlation
Qin Lei, and Gao Wen,
2009 Vol. 46 (7): 1198-1205 [Abstract] ( 360 ) HTML (1 KB)  PDF (1940 KB)  ( 591 )
1206 Effective Property and Best Combination of Classifier Linear Combination
Fu Zhongliang
2009 Vol. 46 (7): 1206-1216 [Abstract] ( 329 ) HTML (1 KB)  PDF (945 KB)  ( 510 )
1217 A Data Privacy Preservation Method Based on Lossy Decomposition
Liu Yubao, Huang Zhilan, Ada Wai Chee Fu, and Yin Jian
2009 Vol. 46 (7): 1217-1225 [Abstract] ( 290 ) HTML (1 KB)  PDF (824 KB)  ( 514 )
1226 Normalization of XML Document with Strong MVD under Incomplete Information Circumstances
Yin Lifeng and Hao Zhongxiao,
2009 Vol. 46 (7): 1226-1233 [Abstract] ( 254 ) HTML (1 KB)  PDF (626 KB)  ( 358 )
1234 A Single Open-Defect Analysis Method for Power/Ground Networks
Luo Zuying, Zhang Yubin, and Yu Xianchuan
2009 Vol. 46 (7): 1234-1240 [Abstract] ( 265 ) HTML (1 KB)  PDF (988 KB)  ( 413 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech