计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2006 Vol. 43, No. 7
Published: 15 July 2006

   
 
       Paper
1135 An Ascending Bid Multi-Attribute Auction Method
Jin Xing and Shi Chunyi
2006 Vol. 43 (7): 1135-1141 [Abstract] ( 224 ) HTML (1 KB)  PDF (372 KB)  ( 592 )
1142 A Winner Determine Algorithm for Combinatorial Auctions with Decreasing Marginal Utilities
Jin Xing and Shi Chunyi
2006 Vol. 43 (7): 1142-1148 [Abstract] ( 235 ) HTML (1 KB)  PDF (399 KB)  ( 469 )
1149 Persuasive Multi-Agent Multi-Issue Negotiation
Yang Pei, Gao Yang, and Chen Zhaoqian
2006 Vol. 43 (7): 1149-1154 [Abstract] ( 219 ) HTML (1 KB)  PDF (313 KB)  ( 434 )
1155 A Multi-Agent Negotiation Model Based on Acquaintance Coalition and Extended Contract Net Protocol
Tao Haijun, Wang Yadong, Guo Maozu, and Wang Hanlun
2006 Vol. 43 (7): 1155-1160 [Abstract] ( 270 ) HTML (1 KB)  PDF (332 KB)  ( 446 )
1161 Study of a Neural Network Ensemble Algorithm for Small Data Sets
Li Kai and Huang Houkuan
2006 Vol. 43 (7): 1161-1166 [Abstract] ( 276 ) HTML (1 KB)  PDF (362 KB)  ( 588 )
1167 A Non-Lineal Time-Varying System Simulation Modeling Method Based on Neural Networks
Wang Xuefei
2006 Vol. 43 (7): 1167-1172 [Abstract] ( 267 ) HTML (1 KB)  PDF (343 KB)  ( 463 )
1173 Manifold Learning Algorithms Based on Spectral Graph Theory
Luo Siwei and Zhao Lianwei
2006 Vol. 43 (7): 1173-1179 [Abstract] ( 725 ) HTML (1 KB)  PDF (374 KB)  ( 1102 )
1180 A Reverse Triple I Algorithm for Fuzzy Reasoning Based on Maximum Fuzzy Entropy Principle
Hou Jian, Peng Jiayin, Zhang Yuzhuo, and Zhang Chengyi
2006 Vol. 43 (7): 1180-1185 [Abstract] ( 256 ) HTML (1 KB)  PDF (344 KB)  ( 385 )
1186 Iris Recognition Based on Wavelet Transform with Shift Invariance Preprocessing
Ming Xing, Liu Yuanning, Zhu Xiaodong, and Xu Tao
2006 Vol. 43 (7): 1186-1193 [Abstract] ( 278 ) HTML (1 KB)  PDF (483 KB)  ( 661 )
1194 Adaptive Skin Detection in JPEG Compressed Images
Zheng Qingfang, and Gao Wen,
2006 Vol. 43 (7): 1194-1200 [Abstract] ( 266 ) HTML (1 KB)  PDF (456 KB)  ( 488 )
1201 A New Feature Extraction Method Based on Fisher Discriminant Minimal Criterion
Zheng Yujie, Yang Jingyu, Xu Yong, and Yu Dongjun
2006 Vol. 43 (7): 1201-1206 [Abstract] ( 350 ) HTML (1 KB)  PDF (365 KB)  ( 412 )
1207 Playfield Detection Using Adaptive GMM and Its Application in Sports Video Analysis
Liu Yang, Huang Qingming, Gao Wen, and Ye Qixiang
2006 Vol. 43 (7): 1207-1215 [Abstract] ( 346 ) HTML (1 KB)  PDF (741 KB)  ( 462 )
1216 Constructing Convexity-Preserving Interpolation Curves of Hyperbolic Polynomial B-Splines Using a Shape Parameter
Chen Jun and Wang Guojin
2006 Vol. 43 (7): 1216-1224 [Abstract] ( 299 ) HTML (1 KB)  PDF (553 KB)  ( 368 )
1225 A Dual Round-Robin Algorithm for Combined Input-Crosspoint-Queued Switches
Zheng Yanfeng, Sun Shutao, He Simin, and Gao Wen,
2006 Vol. 43 (7): 1225-1232 [Abstract] ( 307 ) HTML (1 KB)  PDF (495 KB)  ( 358 )
1233 EDCP—A Duplication Checking Process Used in Duplication Based Resource Allocation Policies
Yang Juan, Bai Yun, and Qiu Yuhui,
2006 Vol. 43 (7): 1233-1239 [Abstract] ( 380 ) HTML (1 KB)  PDF (440 KB)  ( 468 )
1240 A Joint-Entropy-Based Anonymity Metrics Model with Multi-Property
Wu Zhenqiang, and Ma Jianfeng
2006 Vol. 43 (7): 1240-1245 [Abstract] ( 245 ) HTML (1 KB)  PDF (360 KB)  ( 545 )
1246 New Braid Intractable Problems and Cryptographical Applications
Tang Xueming, Hong Fan, and Cui Guohua
2006 Vol. 43 (7): 1246-1251 [Abstract] ( 322 ) HTML (1 KB)  PDF (344 KB)  ( 590 )
1252 An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning
Yang Wu, Yun Xiaochun, and Li Jianhua,
2006 Vol. 43 (7): 1252-1259 [Abstract] ( 384 ) HTML (1 KB)  PDF (470 KB)  ( 737 )
1260 A Security Protocols' Analytic Approach of Reconciling Two Views
Zhao Huawei and Li Daxing
2006 Vol. 43 (7): 1260-1266 [Abstract] ( 341 ) HTML (1 KB)  PDF (405 KB)  ( 474 )
1267 Study on Membership Problem with Respect to Temporal Functional Dependencies and Temporal Multivalued Dependencies
Hao Zhongxiao, and Li Yanjuan
2006 Vol. 43 (7): 1267-1272 [Abstract] ( 251 ) HTML (1 KB)  PDF (361 KB)  ( 343 )
1273 A Framework for Supporting Extended Transaction Models in J2EE Platform
Zhang Xin, Ding Xiaoning, Jin Beihong, and Li Jing
2006 Vol. 43 (7): 1273-1279 [Abstract] ( 208 ) HTML (1 KB)  PDF (387 KB)  ( 479 )
1280 A Serializable Concurrency Control Protocol in Wireless Broadcast Enviroments
Dang Depeng, and Zhou Lizhu
2006 Vol. 43 (7): 1280-1284 [Abstract] ( 294 ) HTML (1 KB)  PDF (287 KB)  ( 519 )
1285 Interval\++—An Index Structure on Compressed XML Data Based on Interval Tree
Bao Xiaoyuan, Tang Shiwei, and Yang Dongqing
2006 Vol. 43 (7): 1285-1290 [Abstract] ( 321 ) HTML (1 KB)  PDF (394 KB)  ( 446 )
1291 A Partition Fuzzy Checkpointing Strategy for Real-Time Main Memory Databases
Liao Guoqiong, Liu Yunsheng, and Xiao Yingyuan
2006 Vol. 43 (7): 1291-1296 [Abstract] ( 286 ) HTML (1 KB)  PDF (372 KB)  ( 362 )
1297 Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems
Li Xiangjun, Meng Luoming, and Jiao Li
2006 Vol. 43 (7): 1297-1303 [Abstract] ( 229 ) HTML (1 KB)  PDF (311 KB)  ( 423 )
1304 Denotational Semantics Transform from Continuation to Direct
Lü Jianghua, Ma Shilong, Pan Jing, and Jin Chengzhi
2006 Vol. 43 (7): 1304-1308 [Abstract] ( 316 ) HTML (1 KB)  PDF (281 KB)  ( 383 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech