计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2009 Vol. 46, No. 3
Published: 15 March 2009

   
 
       Paper
353 A Network Security Situational Awareness Model Based on Information Fusion
Wei Yong, Lian Yifeng, and Feng Dengguo
2009 Vol. 46 (3): 353-362 [Abstract] ( 738 ) HTML (1 KB)  PDF (1146 KB)  ( 1567 )
363 Study of Mobile Agent Protection Based on Data Obfuscation and Time Checking
Wu Jiehong, Chang Guiran, Gao Fuxiang, and Yin Hang,
2009 Vol. 46 (3): 363-369 [Abstract] ( 336 ) HTML (1 KB)  PDF (831 KB)  ( 389 )
370 Power Analysis Attacks Against AES Based on Maximal Bias Signal
Liu Zhenglin, Han Yu, Zou Xuecheng, and ChenYicheng
2009 Vol. 46 (3): 370-376 [Abstract] ( 475 ) HTML (1 KB)  PDF (1063 KB)  ( 411 )
377 A DPA and HO-DPA Resistant Implementation of AES
Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi
2009 Vol. 46 (3): 377-383 [Abstract] ( 448 ) HTML (1 KB)  PDF (663 KB)  ( 463 )
384 A Traitor Tracing Scheme Based on Bilinear Map
Wang Qinglong,, Han Zhen, and Yang Bo
2009 Vol. 46 (3): 384-389 [Abstract] ( 339 ) HTML (1 KB)  PDF (587 KB)  ( 410 )
390 A Time Model for Complex Event in InforSIB
Liu Jiahong, Wu Quanyuan, Gan Liang, and Zhang Bing
2009 Vol. 46 (3): 390-397 [Abstract] ( 278 ) HTML (1 KB)  PDF (683 KB)  ( 397 )
398 A Cooperative Monitoring Model of Migrating Workflow
Lu Zhaoxia, and Zeng Guangzhou
2009 Vol. 46 (3): 398-406 [Abstract] ( 307 ) HTML (1 KB)  PDF (1351 KB)  ( 410 )
407 Internet Traffic Classification Using Support Vector Machine
Xu Peng, Liu Qiong, and Lin Sen
2009 Vol. 46 (3): 407-414 [Abstract] ( 368 ) HTML (1 KB)  PDF (858 KB)  ( 565 )
415 A Structured Peer to Peer File Sharing Model with Non-DHT Searching Algorithm
Xiong Wei, Xie Dongqing, Jiao Bingwang, and Liu Jie
2009 Vol. 46 (3): 415-424 [Abstract] ( 405 ) HTML (1 KB)  PDF (1198 KB)  ( 425 )
425 A Distributed Anchor-Free Localization Algorithm in Sensor Networks
Cui Xunxue, Liu Jianjun, and Fan Xiumei
2009 Vol. 46 (3): 425-433 [Abstract] ( 322 ) HTML (1 KB)  PDF (1502 KB)  ( 519 )
434 Traffic Prediction Models of Traffics at Application Layer in Metro Area Network
Yuan Xiaofang, , Chen Nannan, Wang Dong, Xie Gaogang, and Zhang Dafang
2009 Vol. 46 (3): 434- [Abstract] ( 602 ) HTML (1 KB)  PDF (1075 KB)  ( 492 )
443 An Ontology Learning Method Based on Double VSM and Fuzzy FCA
Xing Jun, and Han Min
2009 Vol. 46 (3): 443-451 [Abstract] ( 291 ) HTML (1 KB)  PDF (1274 KB)  ( 434 )
452 Study of an Epistemic Description Logic with Transitive Roles
Cao Yi, Xu Dezhi, Chen Jianer, and Guan Qinghua
2009 Vol. 46 (3): 452-458 [Abstract] ( 418 ) HTML (1 KB)  PDF (613 KB)  ( 386 )
459 Model Counting and Planning Using Extension Rule
Lai Yong, Ouyang Dantong, Cai Dunbo, and Lü Shuai
2009 Vol. 46 (3): 459-469 [Abstract] ( 309 ) HTML (1 KB)  PDF (1015 KB)  ( 570 )
470 Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral
Zhai Junhai, Wang Xizhao, and Zhang Sufang
2009 Vol. 46 (3): 470-477 [Abstract] ( 520 ) HTML (1 KB)  PDF (616 KB)  ( 530 )
478 An Affine-Invariant Objects Recognition Method Employing Features in Frequency Domain
Lü Wenxian, Peng Qimin, Lü Yuzeng , and Li Jun,
2009 Vol. 46 (3): 478-484 [Abstract] ( 308 ) HTML (1 KB)  PDF (2182 KB)  ( 341 )
485 A Register Pressure Sensitive Instruction Speculative Scheduling Technology
Huang Lei, Feng Xiaobing, and Lü Fang
2009 Vol. 46 (3): 485-491 [Abstract] ( 356 ) HTML (1 KB)  PDF (849 KB)  ( 423 )
492 A Mapping Algorithm for Replicated Data in LargeScale Storage System
Mu Fei, Xue Wei, Shu Jiwu, and Zheng Weimin
2009 Vol. 46 (3): 492-497 [Abstract] ( 333 ) HTML (1 KB)  PDF (789 KB)  ( 404 )
498 A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy
Ni Weiwei, Xu Lizhen, Chong Zhihong, Wu Yingjie, Liu Tengteng, and Sun Zhihui
2009 Vol. 46 (3): 498-504 [Abstract] ( 433 ) HTML (1 KB)  PDF (896 KB)  ( 445 )
505 A Dynamic-Fit Heuristic Algorithm for the Rectangular Strip Packing Problem
Jiang Xingbo, Lü Xiaoqing, Liu Chengcheng, and Li Monan
2009 Vol. 46 (3): 505-512 [Abstract] ( 650 ) HTML (1 KB)  PDF (680 KB)  ( 426 )
513 Equivalence Verification of High-Level Datapaths Based on Polynomial Symbolic Algebra
Yang Zhi, Ma Guangsheng, and Zhang Shu
2009 Vol. 46 (3): 513-520 [Abstract] ( 307 ) HTML (1 KB)  PDF (783 KB)  ( 380 )
521 Segmentation of Brain MR Images Based on the Measurement of Difference of Mutual Information and Gauss-Markov Random Field Model
Wang Wenhui, Feng Qianjin, and Chen Wufan
2009 Vol. 46 (3): 521-527 [Abstract] ( 488 ) HTML (1 KB)  PDF (1011 KB)  ( 452 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech