计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2007 Vol. 44, No. 4
Published: 15 April 2007

   
 
545 Survey of Security Technology for Large Scale MANET
Hu Huaping, Hu Guangming, Dong Pan, and Chen Xin
2007 Vol. 44 (4): 545-552 [Abstract] ( 305 ) HTML (1 KB)  PDF (358 KB)  ( 485 )
       Paper
553 Research on Reliability Evaluation of Cache Based on Instruction Behavior
Zhou Xuehai, Yu Jie, Li Xi, and Wand Zhigang
2007 Vol. 44 (4): 553-559 [Abstract] ( 332 ) HTML (1 KB)  PDF (338 KB)  ( 335 )
560 A Dynamic Mix Anonymity Algorithm for Wireless Ad Hoc Networks
Wu Zhenqiang, and Ma Jianfeng
2007 Vol. 44 (4): 560-566 [Abstract] ( 270 ) HTML (1 KB)  PDF (382 KB)  ( 431 )
567 A Trust-Scheme-Based DRM Model for P2P System
Xiao Shangqin, Lu Zhengding, Ling Hefei, and Zou Fuhao
2007 Vol. 44 (4): 567-573 [Abstract] ( 288 ) HTML (1 KB)  PDF (378 KB)  ( 392 )
574 A Forward Secure Threshold Signature Scheme from Bilinear Pairing
Peng Huaxi and Feng Dengguo
2007 Vol. 44 (4): 574-580 [Abstract] ( 303 ) HTML (1 KB)  PDF (372 KB)  ( 506 )
581 A Novel Algorithm of Soft Fast Correlation Attack and Applications
Zou Yan, Lu Peizhong, and Zhu Xueling
2007 Vol. 44 (4): 581-588 [Abstract] ( 325 ) HTML (1 KB)  PDF (527 KB)  ( 407 )
589 BPCRISM: A New Intrusion Scenario Building Model
Liu Yuling, Du Ruizhong, Zhao Weidong, and Cai Hongyun
2007 Vol. 44 (4): 589-597 [Abstract] ( 166 ) HTML (1 KB)  PDF (509 KB)  ( 473 )
598 The Trust Model and Its Analysis in TDDSS
Tian Junfeng, Xiao Bing, Ma Xiaoxue, and Wang Zixian
2007 Vol. 44 (4): 598-605 [Abstract] ( 259 ) HTML (1 KB)  PDF (436 KB)  ( 283 )
606 A Group Key Management Scheme Based on Distributed Rekeying Authority in Sensor Networks
Zeng Weini, Lin Yaping, Hu Yupeng, Yi Yeqing, and Li Xiaolong
2007 Vol. 44 (4): 606-614 [Abstract] ( 240 ) HTML (1 KB)  PDF (535 KB)  ( 456 )
615 Implementing Chinese Wall Policies on RBAC
He Yongzhong, Li Xiaofeng, and Feng Dengguo
2007 Vol. 44 (4): 615-622 [Abstract] ( 443 ) HTML (1 KB)  PDF (446 KB)  ( 413 )
623 A TCP Friendly Multicast Rate Control Mechanism for Internet DTV
Li Fei, Wang Xin, and Xue Xiangyang
2007 Vol. 44 (4): 623-629 [Abstract] ( 281 ) HTML (1 KB)  PDF (406 KB)  ( 418 )
630 Probabilistic Character for Localization Problem in Sensor Networks
Cui Xunxue, Fang Hongyu, and Zhu Xulai
2007 Vol. 44 (4): 630-635 [Abstract] ( 278 ) HTML (1 KB)  PDF (355 KB)  ( 429 )
636 Mobile Robot Hierarchical Simultaneous Localization and Mapping Based on Active Loop Closure Constraint
Huang Qingcheng, Hong Bingrong, Li Maohai, and Luo Ronghua
2007 Vol. 44 (4): 636-642 [Abstract] ( 333 ) HTML (1 KB)  PDF (628 KB)  ( 393 )
643 Agent-Based Automatic Composition of Semantic Web Services
Qiu Lirong, Shi Zhongzhi, Lin Fen, and Chang Liang,
2007 Vol. 44 (4): 643-650 [Abstract] ( 288 ) HTML (1 KB)  PDF (460 KB)  ( 424 )
651 An Algorithm for Clustering of Outliers Based on Key Attribute Subspace
Jin Yifu, Zhu Qingsheng, and Xing Yongkang
2007 Vol. 44 (4): 651-659 [Abstract] ( 195 ) HTML (1 KB)  PDF (576 KB)  ( 337 )
660 A Quick Emergency Response Plan Generation System Combining CBR and RBR
Luo Jiewen, Shi Zhiping, He Qing, and Shi Zhongzhi
2007 Vol. 44 (4): 660-666 [Abstract] ( 327 ) HTML (1 KB)  PDF (446 KB)  ( 419 )
667 Optimal Decomposition of Decision Table Systems Based on Bayesian Networks
Hu Xiaojian, Yang Shanlin, Hu Xiaoxuan, and Fang Fang
2007 Vol. 44 (4): 667-673 [Abstract] ( 373 ) HTML (1 KB)  PDF (408 KB)  ( 451 )
674 A Direct Clustering Algorithm Based on Generalized Information Distance
Ding Shifei, Shi Zhongzhi, Jin Fengxiang, and Xia Shixiong
2007 Vol. 44 (4): 674-679 [Abstract] ( 206 ) HTML (1 KB)  PDF (324 KB)  ( 390 )
680 A Secure Multi-Attribute Auction Model
Chen Xiang, Hu Shanli, and Shi Manyin
2007 Vol. 44 (4): 680-685 [Abstract] ( 222 ) HTML (1 KB)  PDF (311 KB)  ( 558 )
686 PKUMoDEL: A Model-Driven Development Environment for Languages Family
Ma Haohai, Xie Bing, Ma Zhiyi, Zhang Nengbin, and Shao Weizhong
2007 Vol. 44 (4): 686-692 [Abstract] ( 258 ) HTML (1 KB)  PDF (493 KB)  ( 521 )
693 Dynamic Role Assignment for Multi-Agent System with Parallel Constraints Among Goals
Wang Hongbing, Fan Zhihua, and She Chundong
2007 Vol. 44 (4): 693-700 [Abstract] ( 268 ) HTML (1 KB)  PDF (451 KB)  ( 345 )
701 Irregular Patch for Texture Synthesis
Xiong Changzhen, Huang Jing, and Qi Dongxu,
2007 Vol. 44 (4): 701-706 [Abstract] ( 239 ) HTML (1 KB)  PDF (399 KB)  ( 416 )
707 A Performance Model of I/O-Intensive Parallel Applications
Chen Yongran, Qi Xingyun, and Dou Wenhua
2007 Vol. 44 (4): 707-713 [Abstract] ( 419 ) HTML (1 KB)  PDF (474 KB)  ( 397 )
714 Design of Application Specific Instruction-Set Processors Directed by Configuration Stream Driven Computing Architecture
Li Yong, Wang Zhiying, Zhao Xuemi, and Yue Hong
2007 Vol. 44 (4): 714-721 [Abstract] ( 262 ) HTML (1 KB)  PDF (484 KB)  ( 339 )
722 Research on Reliability of a Reconfigurable Data Processing System Based on JBits
Ren Xiaoxi, Li Renfa, Jin Shengzhen, Zhang Kehuan, and Wu Qiang
2007 Vol. 44 (4): 722-728 [Abstract] ( 285 ) HTML (1 KB)  PDF (403 KB)  ( 332 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech