计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2009 Vol. 46, No. 3
Published: 15 March 2009

   
 
       Paper
353 A Network Security Situational Awareness Model Based on Information Fusion
Wei Yong, Lian Yifeng, and Feng Dengguo
2009 Vol. 46 (3): 353-362 [Abstract] ( 660 ) HTML (1 KB)  PDF (1146 KB)  ( 1444 )
363 Study of Mobile Agent Protection Based on Data Obfuscation and Time Checking
Wu Jiehong, Chang Guiran, Gao Fuxiang, and Yin Hang,
2009 Vol. 46 (3): 363-369 [Abstract] ( 309 ) HTML (1 KB)  PDF (831 KB)  ( 371 )
370 Power Analysis Attacks Against AES Based on Maximal Bias Signal
Liu Zhenglin, Han Yu, Zou Xuecheng, and ChenYicheng
2009 Vol. 46 (3): 370-376 [Abstract] ( 409 ) HTML (1 KB)  PDF (1063 KB)  ( 385 )
377 A DPA and HO-DPA Resistant Implementation of AES
Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi
2009 Vol. 46 (3): 377-383 [Abstract] ( 393 ) HTML (1 KB)  PDF (663 KB)  ( 445 )
384 A Traitor Tracing Scheme Based on Bilinear Map
Wang Qinglong,, Han Zhen, and Yang Bo
2009 Vol. 46 (3): 384-389 [Abstract] ( 310 ) HTML (1 KB)  PDF (587 KB)  ( 395 )
390 A Time Model for Complex Event in InforSIB
Liu Jiahong, Wu Quanyuan, Gan Liang, and Zhang Bing
2009 Vol. 46 (3): 390-397 [Abstract] ( 235 ) HTML (1 KB)  PDF (683 KB)  ( 377 )
398 A Cooperative Monitoring Model of Migrating Workflow
Lu Zhaoxia, and Zeng Guangzhou
2009 Vol. 46 (3): 398-406 [Abstract] ( 263 ) HTML (1 KB)  PDF (1351 KB)  ( 389 )
407 Internet Traffic Classification Using Support Vector Machine
Xu Peng, Liu Qiong, and Lin Sen
2009 Vol. 46 (3): 407-414 [Abstract] ( 309 ) HTML (1 KB)  PDF (858 KB)  ( 535 )
415 A Structured Peer to Peer File Sharing Model with Non-DHT Searching Algorithm
Xiong Wei, Xie Dongqing, Jiao Bingwang, and Liu Jie
2009 Vol. 46 (3): 415-424 [Abstract] ( 349 ) HTML (1 KB)  PDF (1198 KB)  ( 412 )
425 A Distributed Anchor-Free Localization Algorithm in Sensor Networks
Cui Xunxue, Liu Jianjun, and Fan Xiumei
2009 Vol. 46 (3): 425-433 [Abstract] ( 280 ) HTML (1 KB)  PDF (1502 KB)  ( 505 )
434 Traffic Prediction Models of Traffics at Application Layer in Metro Area Network
Yuan Xiaofang, , Chen Nannan, Wang Dong, Xie Gaogang, and Zhang Dafang
2009 Vol. 46 (3): 434- [Abstract] ( 561 ) HTML (1 KB)  PDF (1075 KB)  ( 472 )
443 An Ontology Learning Method Based on Double VSM and Fuzzy FCA
Xing Jun, and Han Min
2009 Vol. 46 (3): 443-451 [Abstract] ( 245 ) HTML (1 KB)  PDF (1274 KB)  ( 420 )
452 Study of an Epistemic Description Logic with Transitive Roles
Cao Yi, Xu Dezhi, Chen Jianer, and Guan Qinghua
2009 Vol. 46 (3): 452-458 [Abstract] ( 371 ) HTML (1 KB)  PDF (613 KB)  ( 376 )
459 Model Counting and Planning Using Extension Rule
Lai Yong, Ouyang Dantong, Cai Dunbo, and Lü Shuai
2009 Vol. 46 (3): 459-469 [Abstract] ( 275 ) HTML (1 KB)  PDF (1015 KB)  ( 540 )
470 Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral
Zhai Junhai, Wang Xizhao, and Zhang Sufang
2009 Vol. 46 (3): 470-477 [Abstract] ( 462 ) HTML (1 KB)  PDF (616 KB)  ( 512 )
478 An Affine-Invariant Objects Recognition Method Employing Features in Frequency Domain
Lü Wenxian, Peng Qimin, Lü Yuzeng , and Li Jun,
2009 Vol. 46 (3): 478-484 [Abstract] ( 280 ) HTML (1 KB)  PDF (2182 KB)  ( 330 )
485 A Register Pressure Sensitive Instruction Speculative Scheduling Technology
Huang Lei, Feng Xiaobing, and Lü Fang
2009 Vol. 46 (3): 485-491 [Abstract] ( 321 ) HTML (1 KB)  PDF (849 KB)  ( 418 )
492 A Mapping Algorithm for Replicated Data in LargeScale Storage System
Mu Fei, Xue Wei, Shu Jiwu, and Zheng Weimin
2009 Vol. 46 (3): 492-497 [Abstract] ( 283 ) HTML (1 KB)  PDF (789 KB)  ( 396 )
498 A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy
Ni Weiwei, Xu Lizhen, Chong Zhihong, Wu Yingjie, Liu Tengteng, and Sun Zhihui
2009 Vol. 46 (3): 498-504 [Abstract] ( 382 ) HTML (1 KB)  PDF (896 KB)  ( 427 )
505 A Dynamic-Fit Heuristic Algorithm for the Rectangular Strip Packing Problem
Jiang Xingbo, Lü Xiaoqing, Liu Chengcheng, and Li Monan
2009 Vol. 46 (3): 505-512 [Abstract] ( 591 ) HTML (1 KB)  PDF (680 KB)  ( 419 )
513 Equivalence Verification of High-Level Datapaths Based on Polynomial Symbolic Algebra
Yang Zhi, Ma Guangsheng, and Zhang Shu
2009 Vol. 46 (3): 513-520 [Abstract] ( 254 ) HTML (1 KB)  PDF (783 KB)  ( 366 )
521 Segmentation of Brain MR Images Based on the Measurement of Difference of Mutual Information and Gauss-Markov Random Field Model
Wang Wenhui, Feng Qianjin, and Chen Wufan
2009 Vol. 46 (3): 521-527 [Abstract] ( 407 ) HTML (1 KB)  PDF (1011 KB)  ( 441 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech