计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2008 Vol. 45, No. 10
Published: 15 October 2008

   
 
       Paper
1631 Confusion Detection Based on Petri-Net
Zhao Mingfeng, Song Wen, and Yang Yixian
2008 Vol. 45 (10): 1631-1637 [Abstract] ( 433 ) HTML (1 KB)  PDF (700 KB)  ( 393 )
1638 Counterexample Generation for Probabilistic Timed Automata Model Checking
Zhang Junhua, Huang Zhiqiu, and Cao Zining
2008 Vol. 45 (10): 1638-1645 [Abstract] ( 397 ) HTML (1 KB)  PDF (756 KB)  ( 498 )
1646 A Scheme of Test Data Compression Based on Sharing-Run-Length Code
Zhan Wenfa, , Liang Huaguo, Shi Feng, Huang Zhengfeng, and Ouyang Yiming
2008 Vol. 45 (10): 1646-1653 [Abstract] ( 348 ) HTML (1 KB)  PDF (880 KB)  ( 417 )
1654 An Avatar Migration Mechanism Based on Cell Buffer
Zhou Zhong, Wang Shaofeng, and Wu Wei
2008 Vol. 45 (10): 1654-1661 [Abstract] ( 311 ) HTML (1 KB)  PDF (1776 KB)  ( 486 )
1662 A Clustering Control Algorithm of Wireless Sensor Networks in Low Probability Event Scenario
Liu Linfeng, and Jin Shan,
2008 Vol. 45 (10): 1662-1668 [Abstract] ( 336 ) HTML (1 KB)  PDF (853 KB)  ( 493 )
1669 Study of Grid Locality and Its Optimization
Ai Lihua and Luo Siwei
2008 Vol. 45 (10): 1669-1675 [Abstract] ( 294 ) HTML (1 KB)  PDF (1077 KB)  ( 385 )
1676 TXACML—An Access Control Policy Framework Based on Trusted Platform
Nie Xiaowei and Feng Dengguo,
2008 Vol. 45 (10): 1676-1686 [Abstract] ( 321 ) HTML (1 KB)  PDF (887 KB)  ( 594 )
1687 An Efficient and Provably Secure IBE Scheme Without Bilinear Map
Xu Peng, Cui Guohua, and Lei Fengyu
2008 Vol. 45 (10): 1687-1695 [Abstract] ( 372 ) HTML (1 KB)  PDF (857 KB)  ( 522 )
1696 Steganalysis on Synonym Substitution Steganography
Luo Gang, Sun Xingming, Xiang Lingyun, Liu Yuling, and Gan Can
2008 Vol. 45 (10): 1696-1703 [Abstract] ( 554 ) HTML (1 KB)  PDF (1030 KB)  ( 625 )
1704 Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks
Luo Junhai and Fan Mingyu
2008 Vol. 45 (10): 1704-1710 [Abstract] ( 430 ) HTML (1 KB)  PDF (1358 KB)  ( 482 )
1711 A Security Proof Method for Multilevel Security Models
Si Tiange, Tan Zhiyong, and Dai Yiqi
2008 Vol. 45 (10): 1711-1717 [Abstract] ( 330 ) HTML (1 KB)  PDF (659 KB)  ( 418 )
1718 A Risk Detection and Fault Analysis Method for the Strategic Internet
Li Qianmu and Liu Fengyu
2008 Vol. 45 (10): 1718-1723 [Abstract] ( 399 ) HTML (1 KB)  PDF (822 KB)  ( 503 )
1724 Combination of Multiple Features for Object/Background Segmentation Using Graph Cut
Deng Yu and Li Hua
2008 Vol. 45 (10): 1724-1730 [Abstract] ( 403 ) HTML (1 KB)  PDF (1458 KB)  ( 491 )
1731 A Point Based LargeScale Crowds RealTime 3D Visualization Method
Shu Bo, Mao Tianlu, Xu Wenbin, and Wang Zhaoqi,
2008 Vol. 45 (10): 1731-1738 [Abstract] ( 332 ) HTML (1 KB)  PDF (2203 KB)  ( 490 )
1739 Extracting Bottom-Up Attention Information Based on Local Complexity and Early Visual Features
Tian Mei, Luo Siwei, Huang Yaping, and Zhao Jiali
2008 Vol. 45 (10): 1739-1746 [Abstract] ( 303 ) HTML (1 KB)  PDF (2157 KB)  ( 555 )
1747 Effectiveness Analysis of AdaBoost
Fu Zhongliang
2008 Vol. 45 (10): 1747-1755 [Abstract] ( 425 ) HTML (1 KB)  PDF (1010 KB)  ( 522 )
1756 An Anytime Coalition Structure Generation Algorithm Based on Cardinality Structure
Su Shexiong, Hu Shanli, Zheng Shengfu, Lin Chaofeng, and Luo Jianbin
2008 Vol. 45 (10): 1756- [Abstract] ( 218 ) HTML (1 KB)  PDF (680 KB)  ( 438 )
1763 A Policy-and Value- Iteration Algorithm for POMDP
Sun Yong, Wu Bo, and Feng Yanpeng
2008 Vol. 45 (10): 1763-1768 [Abstract] ( 679 ) HTML (1 KB)  PDF (551 KB)  ( 467 )
1769 A Fast On-Line Index Construction Method Based on Dynamic Balancing Tree
Guo Ruijie, Cheng Xueqi, Xu Hongbo, Wang Bin, and Ding Guodong
2008 Vol. 45 (10): 1769-1775 [Abstract] ( 338 ) HTML (1 KB)  PDF (1335 KB)  ( 602 )
1776 An Approximate Matching Algorithm for Large Scale Lexicons
Gong Caichun, Huang Yulan, Xu Hongbo, and Bai Shuo
2008 Vol. 45 (10): 1776-1781 [Abstract] ( 399 ) HTML (1 KB)  PDF (746 KB)  ( 556 )
1782 An O(1.414\+n) Volume Molecular Solutions for the Exact Cover Problem on DNA-Based Supercomputing
Li Kenli, Liu Jie, Yang Lei, and Liu Wenbin
2008 Vol. 45 (10): 1782-1788 [Abstract] ( 285 ) HTML (1 KB)  PDF (741 KB)  ( 536 )
1789 Using Graph Match Method to Resolve Multi-Way Branch in Binary Translation
Chen Long, Wu Chenggang, Xie Haibin, Cui Huimin, and Zhang Zhaoqing,
2008 Vol. 45 (10): 1789-1798 [Abstract] ( 326 ) HTML (1 KB)  PDF (1089 KB)  ( 481 )
1799 An Approach for Implementing Service-Oriented and Event-Driven Information Integration Platform
Yang Zhiyi, Yang Gang, and Zhang Haihui
2008 Vol. 45 (10): 1799-1806 [Abstract] ( 300 ) HTML (1 KB)  PDF (1118 KB)  ( 619 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech