计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2006 Vol. 43, No. 2
Published: 15 February 2006

   
 
       Paper
187 A Distributed Energy-Efficient Location-Independent Coverage Protocol in Wireless Sensor Networks
Mao Yingchi, Liu Ming, Chen Lijun, Chen Daoxu, and Xie Li,
2006 Vol. 43 (2): 187-195 [Abstract] ( 303 ) HTML (1 KB)  PDF (604 KB)  ( 539 )
196 A Packet Classification Algorithm Based on Self-Adaptive Cache
Zhang Jianyu, Wei Tao, and Zou Wei
2006 Vol. 43 (2): 196-203 [Abstract] ( 350 ) HTML (1 KB)  PDF (455 KB)  ( 516 )
204 PFED: A Prediction-Based Fair Active Queue Management Algorithm
Gao Wenyu, Wang Jianxin, and Chen Songqiao
2006 Vol. 43 (2): 204-210 [Abstract] ( 395 ) HTML (1 KB)  PDF (393 KB)  ( 555 )
211 TBSF: A Two-Phase Bluetooth Scatternet Formation Algorithm
Li Xiang and Yang Xiaozong
2006 Vol. 43 (2): 211-217 [Abstract] ( 393 ) HTML (1 KB)  PDF (346 KB)  ( 462 )
218 A Bidirectional Path Re-Selection Based Load-Balanced Routing Protocol for Ad-Hoc Networks
Zhang Xiangquan, and Guo Wei
2006 Vol. 43 (2): 218-223 [Abstract] ( 336 ) HTML (1 KB)  PDF (298 KB)  ( 383 )
224 Modeling of Autonomous Network Information Service
Dong Wenyu, Sun Donghong, Xu Ke, and Li Xuedong
2006 Vol. 43 (2): 224-230 [Abstract] ( 395 ) HTML (1 KB)  PDF (369 KB)  ( 495 )
231 An Algorithm Based on Mobility Prediction and Probability for Energy-Efficient Multicasting in Ad Hoc Networks
Luo Yuhong, Chen Songqiao, and Wang Jianxin
2006 Vol. 43 (2): 231-237 [Abstract] ( 359 ) HTML (1 KB)  PDF (426 KB)  ( 505 )
238 A Cluster Based Security Scheme in Wireless Ad Hoc Networks
Zhang Xiaoning and Feng Dengguo
2006 Vol. 43 (2): 238-243 [Abstract] ( 239 ) HTML (1 KB)  PDF (359 KB)  ( 442 )
244 Blind Source Separation Based on Genetic Algorithm
Yi Yeqing, Lin Yaping, Lin Mu, Li Xiaolong, and Wang Lei
2006 Vol. 43 (2): 244-252 [Abstract] ( 367 ) HTML (1 KB)  PDF (558 KB)  ( 472 )
253 Spatial Reasoning Combining Topological and Cardinal Directional Relation Information
Sun Haibin and Li Wenhui
2006 Vol. 43 (2): 253-259 [Abstract] ( 343 ) HTML (1 KB)  PDF (461 KB)  ( 446 )
260 Perceptron for Language Modeling
Yu Hao, Bu Fenglin, and Gao Jianfeng
2006 Vol. 43 (2): 260-267 [Abstract] ( 475 ) HTML (1 KB)  PDF (498 KB)  ( 647 )
268 Fusion of Clustering Trigger-Pair Features for POS Tagging Based on Maximum Entropy Model
Zhao Yan, Wang Xiaolong, Liu Bingquan, and Guan Yi
2006 Vol. 43 (2): 268-274 [Abstract] ( 502 ) HTML (1 KB)  PDF (407 KB)  ( 584 )
275 A Web Search Result Clustering Based on Tolerance Rough Set
Yi Gaoxiang and Hu Heping
2006 Vol. 43 (2): 275-280 [Abstract] ( 253 ) HTML (1 KB)  PDF (387 KB)  ( 482 )
281 An Efficient Algorithm for Computing an Irreducible Rule Set in Active Database
Hao Zhongxiao, and Xiong Zhongmin
2006 Vol. 43 (2): 281-287 [Abstract] ( 330 ) HTML (1 KB)  PDF (362 KB)  ( 399 )
288 Using Histograms to Estimate the Selectivity of XPath Expression with Value Predicates
Wang Yu, Meng Xiaofeng, and Wang Shan
2006 Vol. 43 (2): 288-294 [Abstract] ( 242 ) HTML (1 KB)  PDF (455 KB)  ( 433 )
295 ASGT: An Approach to Concurrency Control in Mobile Transaction Management Based on Prediction and Adaptation
Li Xiaorong, and Shi Baile
2006 Vol. 43 (2): 295-300 [Abstract] ( 361 ) HTML (1 KB)  PDF (382 KB)  ( 418 )
301 Modeling Irregular Dimensions in OLAP
Li Zehai, Sun Jigui, Zhao Jun, and Yu Haihong,
2006 Vol. 43 (2): 301-306 [Abstract] ( 306 ) HTML (1 KB)  PDF (370 KB)  ( 367 )
307 A Norm-Driven Grid Workflow State Machine Model
Zhang Shichao, Xu Yinjun, Gu Ning, and Shi Baile
2006 Vol. 43 (2): 307-313 [Abstract] ( 316 ) HTML (1 KB)  PDF (393 KB)  ( 494 )
314 A Negotiation-Based Approach for Software Process Collaboration
Zhao Xinpei, Li Mingshu, Chan Keith, and Wang Qing
2006 Vol. 43 (2): 314-320 [Abstract] ( 265 ) HTML (1 KB)  PDF (370 KB)  ( 399 )
321 A Simplified Method for Generating Test Path Cases in Branch Testing
Mao Chengying and Lu Yansheng
2006 Vol. 43 (2): 321-328 [Abstract] ( 191 ) HTML (1 KB)  PDF (519 KB)  ( 483 )
329 Static Data-Race Detection for Multithread Programs
Wu Ping, Chen Yiyun, and Zhang Jian
2006 Vol. 43 (2): 329-335 [Abstract] ( 619 ) HTML (1 KB)  PDF (431 KB)  ( 704 )
336 Mapping Cobol Data to Java Type System with Functional Equivalence
Shi Xuelin, Zhang Zhaoqing, and Wu Chenggang
2006 Vol. 43 (2): 336-342 [Abstract] ( 564 ) HTML (1 KB)  PDF (384 KB)  ( 465 )
343 A BIST Scheme Based on Selecting State Transition of Folding Counters
Liang Huaguo, Fang Xiangsheng, Jiang Cuiyun, Ouyang Yiming, and Yi Maoxiang
2006 Vol. 43 (2): 343-349 [Abstract] ( 305 ) HTML (1 KB)  PDF (404 KB)  ( 352 )
350 Approach to Analyze the Relationship of High-Level Fault Models
Yang Xiutao, Lu Wei, and Li Xiaowei
2006 Vol. 43 (2): 350-355 [Abstract] ( 343 ) HTML (1 KB)  PDF (294 KB)  ( 311 )
356 An Algorithm for Collision Detection and Response Between Human Body Model and Cloth in 3D Garment Simulation
Mao Tianlu, Wang Zhaoqi, and Xia Shihong
2006 Vol. 43 (2): 356-361 [Abstract] ( 315 ) HTML (1 KB)  PDF (331 KB)  ( 470 )
362 R-tree Method of Matching Algorithm for Data Distribution Management
Jiang Xiajun, Wu Huizhong, and Li Weiqing
2006 Vol. 43 (2): 362-367 [Abstract] ( 398 ) HTML (1 KB)  PDF (338 KB)  ( 492 )
368 Human Motion Recognition and Simulation Based on Retrieval
Zhao Guoying, Li Zhenbo, Deng Yu, and Li Hua
2006 Vol. 43 (2): 368-373 [Abstract] ( 304 ) HTML (1 KB)  PDF (395 KB)  ( 417 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech