计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2009 Vol. 46, No. 6
Published: 15 June 2009

   
 
       Paper
889 A Bayesian Network-Based Search Method in Unstructured Peer-to-Peer Networks
Qian Ning, Wu Guoxin, and Zhao Shenghui
2009 Vol. 46 (6): 889-897 [Abstract] ( 240 ) HTML (1 KB)  PDF (1505 KB)  ( 473 )
898 WPathload: A Modified Available Bandwidth Measurement Algorithm
Zeng Bin, Zhang Dafang, Li Wenwei , and Xie Gaogang
2009 Vol. 46 (6): 898-904 [Abstract] ( 353 ) HTML (1 KB)  PDF (793 KB)  ( 410 )
905 ENCBP—An Extended Multi-OSs Remote-Booting Method
Wei Li, Xu Guangbin, Zhang Yaoxue, Xia Nan, and Kuang Wenyuan
2009 Vol. 46 (6): 905-912 [Abstract] ( 374 ) HTML (1 KB)  PDF (802 KB)  ( 397 )
913 A Method for Modeling and Test Selection of Interoperability
Li Hua, Ye Xinming, Wu Chengyong, Wang Long, and Wang Lingling
2009 Vol. 46 (6): 913-919 [Abstract] ( 244 ) HTML (1 KB)  PDF (872 KB)  ( 373 )
920 Design and Implementation of a Distributed Multi-Point Concurrent Test System
Luo Hao and Zeng Huaxin
2009 Vol. 46 (6): 920-926 [Abstract] ( 494 ) HTML (1 KB)  PDF (877 KB)  ( 492 )
927 Internet Routing Correlation Analysis and Monitoring System Design
Liang Wei, and Bi Jingping
2009 Vol. 46 (6): 927-933 [Abstract] ( 336 ) HTML (1 KB)  PDF (1126 KB)  ( 562 )
934 A Node-Level Congestion Avoidance Algorithm in Wireless Sensor Networks
Sun Guodong, Liao Minghong, and Qiu Shuo
2009 Vol. 46 (6): 934-939 [Abstract] ( 368 ) HTML (1 KB)  PDF (900 KB)  ( 446 )
940 Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level
Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi
2009 Vol. 46 (6): 940-947 [Abstract] ( 266 ) HTML (1 KB)  PDF (842 KB)  ( 398 )
948 A Dynamic Access Control Model for Inter-Operation in Multi-Domain Environment Based on Risk
Tang Zhuo, Zhao Lin, Li Kenli, and Li Ruixuan
2009 Vol. 46 (6): 948-955 [Abstract] ( 350 ) HTML (1 KB)  PDF (788 KB)  ( 432 )
956 On the Relativity of Binary Derivation and Autocorrelation Randomness Test
Fan Limin, Feng Dengguo, and Chen Hua
2009 Vol. 46 (6): 956-961 [Abstract] ( 347 ) HTML (1 KB)  PDF (534 KB)  ( 480 )
962 Research and Design of Reconfigurable Computing Targeted at Block Cipher Processing
Yang Xiaohui, Dai Zibin, and Zhang Yongfu
2009 Vol. 46 (6): 962-967 [Abstract] ( 449 ) HTML (1 KB)  PDF (613 KB)  ( 560 )
968 A Fast Ant Colony Optimization Algorithm for Traveling Salesman Problems
Ji Junzhong, Huang Zhen, and Liu Chunnian
2009 Vol. 46 (6): 968-978 [Abstract] ( 489 ) HTML (1 KB)  PDF (1682 KB)  ( 503 )
979 Computing Most Specific Concept in Description Logic with Transitive Roles and Existential Restrictions
Jiang Yuncheng, Tang Suqin, Wang Ju, and Zhou Shengming
2009 Vol. 46 (6): 979-987 [Abstract] ( 368 ) HTML (1 KB)  PDF (679 KB)  ( 376 )
988 Fast Relaxed Algorithms of Maximum Variance Unfolding
Wang Qinggang and Li Jianwei,
2009 Vol. 46 (6): 988-994 [Abstract] ( 1123 ) HTML (1 KB)  PDF (1370 KB)  ( 463 )
995 A Δ-Tree Based Similarity Join Processing for High-Dimensional Data
Liu Yan, and Hao Zhongxiao,
2009 Vol. 46 (6): 995-1002 [Abstract] ( 374 ) HTML (1 KB)  PDF (672 KB)  ( 371 )
1003 Generalization Error Bound for the Multi-Class Classification Algorithm Based on the Analytical Center of Version Space
Zeng Fanzi, Xiao Degui, Li Renfa, and Luo Juan
2009 Vol. 46 (6): 1003-1008 [Abstract] ( 405 ) HTML (1 KB)  PDF (596 KB)  ( 368 )
1009 BJUT-3D Large Scale 3D Face Database and Information Processing
Yin Baocai, Sun Yanfeng, Wang Chengzhang, and Ge Yun
2009 Vol. 46 (6): 1009-1018 [Abstract] ( 3284 ) HTML (1 KB)  PDF (1875 KB)  ( 912 )
1019 Modeling of Information System Survivability Analysis Based on SPN
Zhang Lejun, Guo Lin , Zhang Bing, Yang Wu , Wang Wei, and Yang Yongtian
2009 Vol. 46 (6): 1019-1027 [Abstract] ( 419 ) HTML (1 KB)  PDF (1175 KB)  ( 484 )
1028 Study on Membership of Mixed Dependency Set in Strong Totally Ordered Temporal Scheme
Wan Jing, Wang Xiaoyu, and Hao Zhongxiao,
2009 Vol. 46 (6): 1028-1035 [Abstract] ( 275 ) HTML (1 KB)  PDF (610 KB)  ( 419 )
1036 Multi-Type Nearest Neighbor Queries with Partial Range Constrained
Sun Dongpu and Hao Zhongxiao,
2009 Vol. 46 (6): 1036-1042 [Abstract] ( 291 ) HTML (1 KB)  PDF (1155 KB)  ( 438 )
1043 A Decomposition of the Weakly Invertible Linear Finite Automata
Yao Xinghua, Deng Peimin, Yi Zhong, and Jiang Yuncheng
2009 Vol. 46 (6): 1043-1051 [Abstract] ( 269 ) HTML (1 KB)  PDF (703 KB)  ( 411 )
1052 Approximating the Directed Minimum Degree Spanning Tree of Directed Acyclic Graph
Yao Guohui, Zhu Daming, and Ma Shaohan
2009 Vol. 46 (6): 1052-1057 [Abstract] ( 892 ) HTML (1 KB)  PDF (563 KB)  ( 529 )
1058 A Heuristic Task Allocation Algorithm for Multi-Core Based Parallel Systems
Liu Yi, Zhang Xin, Li He, and Qian Depei,
2009 Vol. 46 (6): 1058-1064 [Abstract] ( 487 ) HTML (1 KB)  PDF (661 KB)  ( 481 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech