计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2009 Vol. 46, No. 6
Published: 15 June 2009

   
 
       Paper
889 A Bayesian Network-Based Search Method in Unstructured Peer-to-Peer Networks
Qian Ning, Wu Guoxin, and Zhao Shenghui
2009 Vol. 46 (6): 889-897 [Abstract] ( 215 ) HTML (1 KB)  PDF (1505 KB)  ( 451 )
898 WPathload: A Modified Available Bandwidth Measurement Algorithm
Zeng Bin, Zhang Dafang, Li Wenwei , and Xie Gaogang
2009 Vol. 46 (6): 898-904 [Abstract] ( 319 ) HTML (1 KB)  PDF (793 KB)  ( 387 )
905 ENCBP—An Extended Multi-OSs Remote-Booting Method
Wei Li, Xu Guangbin, Zhang Yaoxue, Xia Nan, and Kuang Wenyuan
2009 Vol. 46 (6): 905-912 [Abstract] ( 317 ) HTML (1 KB)  PDF (802 KB)  ( 381 )
913 A Method for Modeling and Test Selection of Interoperability
Li Hua, Ye Xinming, Wu Chengyong, Wang Long, and Wang Lingling
2009 Vol. 46 (6): 913-919 [Abstract] ( 222 ) HTML (1 KB)  PDF (872 KB)  ( 360 )
920 Design and Implementation of a Distributed Multi-Point Concurrent Test System
Luo Hao and Zeng Huaxin
2009 Vol. 46 (6): 920-926 [Abstract] ( 414 ) HTML (1 KB)  PDF (877 KB)  ( 475 )
927 Internet Routing Correlation Analysis and Monitoring System Design
Liang Wei, and Bi Jingping
2009 Vol. 46 (6): 927-933 [Abstract] ( 299 ) HTML (1 KB)  PDF (1126 KB)  ( 548 )
934 A Node-Level Congestion Avoidance Algorithm in Wireless Sensor Networks
Sun Guodong, Liao Minghong, and Qiu Shuo
2009 Vol. 46 (6): 934-939 [Abstract] ( 343 ) HTML (1 KB)  PDF (900 KB)  ( 433 )
940 Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level
Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi
2009 Vol. 46 (6): 940-947 [Abstract] ( 237 ) HTML (1 KB)  PDF (842 KB)  ( 385 )
948 A Dynamic Access Control Model for Inter-Operation in Multi-Domain Environment Based on Risk
Tang Zhuo, Zhao Lin, Li Kenli, and Li Ruixuan
2009 Vol. 46 (6): 948-955 [Abstract] ( 314 ) HTML (1 KB)  PDF (788 KB)  ( 416 )
956 On the Relativity of Binary Derivation and Autocorrelation Randomness Test
Fan Limin, Feng Dengguo, and Chen Hua
2009 Vol. 46 (6): 956-961 [Abstract] ( 314 ) HTML (1 KB)  PDF (534 KB)  ( 456 )
962 Research and Design of Reconfigurable Computing Targeted at Block Cipher Processing
Yang Xiaohui, Dai Zibin, and Zhang Yongfu
2009 Vol. 46 (6): 962-967 [Abstract] ( 404 ) HTML (1 KB)  PDF (613 KB)  ( 542 )
968 A Fast Ant Colony Optimization Algorithm for Traveling Salesman Problems
Ji Junzhong, Huang Zhen, and Liu Chunnian
2009 Vol. 46 (6): 968-978 [Abstract] ( 421 ) HTML (1 KB)  PDF (1682 KB)  ( 479 )
979 Computing Most Specific Concept in Description Logic with Transitive Roles and Existential Restrictions
Jiang Yuncheng, Tang Suqin, Wang Ju, and Zhou Shengming
2009 Vol. 46 (6): 979-987 [Abstract] ( 308 ) HTML (1 KB)  PDF (679 KB)  ( 360 )
988 Fast Relaxed Algorithms of Maximum Variance Unfolding
Wang Qinggang and Li Jianwei,
2009 Vol. 46 (6): 988-994 [Abstract] ( 1024 ) HTML (1 KB)  PDF (1370 KB)  ( 451 )
995 A Δ-Tree Based Similarity Join Processing for High-Dimensional Data
Liu Yan, and Hao Zhongxiao,
2009 Vol. 46 (6): 995-1002 [Abstract] ( 347 ) HTML (1 KB)  PDF (672 KB)  ( 366 )
1003 Generalization Error Bound for the Multi-Class Classification Algorithm Based on the Analytical Center of Version Space
Zeng Fanzi, Xiao Degui, Li Renfa, and Luo Juan
2009 Vol. 46 (6): 1003-1008 [Abstract] ( 366 ) HTML (1 KB)  PDF (596 KB)  ( 361 )
1009 BJUT-3D Large Scale 3D Face Database and Information Processing
Yin Baocai, Sun Yanfeng, Wang Chengzhang, and Ge Yun
2009 Vol. 46 (6): 1009-1018 [Abstract] ( 3045 ) HTML (1 KB)  PDF (1875 KB)  ( 865 )
1019 Modeling of Information System Survivability Analysis Based on SPN
Zhang Lejun, Guo Lin , Zhang Bing, Yang Wu , Wang Wei, and Yang Yongtian
2009 Vol. 46 (6): 1019-1027 [Abstract] ( 383 ) HTML (1 KB)  PDF (1175 KB)  ( 477 )
1028 Study on Membership of Mixed Dependency Set in Strong Totally Ordered Temporal Scheme
Wan Jing, Wang Xiaoyu, and Hao Zhongxiao,
2009 Vol. 46 (6): 1028-1035 [Abstract] ( 251 ) HTML (1 KB)  PDF (610 KB)  ( 415 )
1036 Multi-Type Nearest Neighbor Queries with Partial Range Constrained
Sun Dongpu and Hao Zhongxiao,
2009 Vol. 46 (6): 1036-1042 [Abstract] ( 241 ) HTML (1 KB)  PDF (1155 KB)  ( 420 )
1043 A Decomposition of the Weakly Invertible Linear Finite Automata
Yao Xinghua, Deng Peimin, Yi Zhong, and Jiang Yuncheng
2009 Vol. 46 (6): 1043-1051 [Abstract] ( 232 ) HTML (1 KB)  PDF (703 KB)  ( 398 )
1052 Approximating the Directed Minimum Degree Spanning Tree of Directed Acyclic Graph
Yao Guohui, Zhu Daming, and Ma Shaohan
2009 Vol. 46 (6): 1052-1057 [Abstract] ( 786 ) HTML (1 KB)  PDF (563 KB)  ( 508 )
1058 A Heuristic Task Allocation Algorithm for Multi-Core Based Parallel Systems
Liu Yi, Zhang Xin, Li He, and Qian Depei,
2009 Vol. 46 (6): 1058-1064 [Abstract] ( 458 ) HTML (1 KB)  PDF (661 KB)  ( 472 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech