计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2005 Vol. 42, No. 11
Published: 15 November 2005

   
 
       Paper
1833 Symbolic Dempster-Shafer Theory
Mu Kedian and Lin Zuoquan
2005 Vol. 42 (11): 1833-1842 [Abstract] ( 459 ) HTML (1 KB)  PDF (564 KB)  ( 372 )
1843 A Description-Logic Based Agent Organization
Zhang Xinliang and Shi Chunyi
2005 Vol. 42 (11): 1843-1848 [Abstract] ( 273 ) HTML (1 KB)  PDF (353 KB)  ( 387 )
1849 A Multistage-Based Framework for Multi-Agent Multi-Issue Negotiation
Wang Liming, and Huang Houkuan
2005 Vol. 42 (11): 1849-1855 [Abstract] ( 160 ) HTML (1 KB)  PDF (414 KB)  ( 396 )
1856 Modeling and Heuristic for Winner Determination in Combinatorial Auctions
Bai Jiancong, Chang Huiyou, and Yi Yang
2005 Vol. 42 (11): 1856-1861 [Abstract] ( 196 ) HTML (1 KB)  PDF (301 KB)  ( 478 )
1862 Journal Text Categorization with the Combination of Local Linearity and One-Class
Yao Liqun and Tao Qing
2005 Vol. 42 (11): 1862-1869 [Abstract] ( 275 ) HTML (1 KB)  PDF (406 KB)  ( 420 )
1870 A New Hand Shape Biometric Verification Method Based on Curve Fitting
Guo Zhenbin and Qiu Zhengding
2005 Vol. 42 (11): 1870-1875 [Abstract] ( 195 ) HTML (1 KB)  PDF (332 KB)  ( 471 )
1876 A New Adaptive Lagrange Multiplier Selection Model in Hybrid Video Coder Control
Zhou Shumin, Li Jintao, Huang Chao, and Song Lei
2005 Vol. 42 (11): 1876-1881 [Abstract] ( 261 ) HTML (1 KB)  PDF (380 KB)  ( 519 )
1889 Low-Power and High-Speed VLSI Architecture Design of 2-D DWT/IDWT
Lan Xuguang, Zheng Nanning, Xue Jianru, Wang Fei, and Liu Yuehu
2005 Vol. 42 (11): 1889-1895 [Abstract] ( 250 ) HTML (1 KB)  PDF (469 KB)  ( 389 )
1896 An Image Authentication Algorithm Based on Feature of Original Image and Hyperchaotic Iteration
Wang Xingyuan and Shi Qijiang
2005 Vol. 42 (11): 1896-1902 [Abstract] ( 233 ) HTML (1 KB)  PDF (785 KB)  ( 480 )
1903 A Fast Image Retrieval Method Based on Weighted Chromaticity Histogram
Xing Qiang, Yuan Baozong, and Tang Xiaofang
2005 Vol. 42 (11): 1903-1910 [Abstract] ( 311 ) HTML (1 KB)  PDF (721 KB)  ( 612 )
1911 A Novel Real-Time Doppler Centroid Estimating Algorithm
Liu Bo, , Wang Zhensong, Yao Ping, and Li Mingfeng
2005 Vol. 42 (11): 1911-1917 [Abstract] ( 368 ) HTML (1 KB)  PDF (416 KB)  ( 531 )
1918 Founding Computationally Secure Quantum Cryptography Protocols Based on Bit Commitment
Lü Xin, and Feng Dengguo
2005 Vol. 42 (11): 1918-1923 [Abstract] ( 437 ) HTML (1 KB)  PDF (335 KB)  ( 573 )
1924 Security Notes on Two Cheat-Proof Secret Sharing Schemes
Wang Guilin, and Qing Sihan
2005 Vol. 42 (11): 1924-1927 [Abstract] ( 229 ) HTML (1 KB)  PDF (245 KB)  ( 398 )
1928 A New Network Troubleshooting Method—FTFD
Li Qianmu, Xu Manwu, Yang Yun, Zhang Hong, and Liu Fengyu
2005 Vol. 42 (11): 1928-1933 [Abstract] ( 1298 ) HTML (1 KB)  PDF (401 KB)  ( 487 )
1934 An Autonomous Agent-Based Adaptive Distributed Intrusion Detection System
Wang Jin, Li Dequan, and Feng Dengguo
2005 Vol. 42 (11): 1934-1939 [Abstract] ( 240 ) HTML (1 KB)  PDF (250 KB)  ( 474 )
1940 Research on the Security of Initial Sequence Number Generation Arithmetic
Lü Yanli, Li Xiaojian, Xia Chunhe, and Liu Shuzhi
2005 Vol. 42 (11): 1940-1945 [Abstract] ( 448 ) HTML (1 KB)  PDF (353 KB)  ( 425 )
1946 A Workflow Authorization Model Based on Role and Task and Constraints Specification
Xing Guanglin and Hong Fan
2005 Vol. 42 (11): 1946-1953 [Abstract] ( 372 ) HTML (1 KB)  PDF (508 KB)  ( 437 )
1954 Error Protection Algorithms for Scalable Multimedia Transmission: A Survey
Huo Longshe, Gao Wen, Huang Qingming, and Xie Jianguo
2005 Vol. 42 (11): 1954-1961 [Abstract] ( 229 ) HTML (1 KB)  PDF (436 KB)  ( 373 )
1962 A Resource Reservation Scheme for PCF Handoff Station in WLAN
Yang Renzhong, Hou Zifeng, and Li Jingxia
2005 Vol. 42 (11): 1962-1968 [Abstract] ( 276 ) HTML (1 KB)  PDF (386 KB)  ( 370 )
1969 A Resource Optimizing Scheduling Algorithm of Differentiated Service of Double Minimum Balance in Web Clusters
Liu Anfeng, Chen Zhigang, Long Guoping, and Zeng Zhiwen
2005 Vol. 42 (11): 1969-1976 [Abstract] ( 283 ) HTML (1 KB)  PDF (472 KB)  ( 418 )
1977 An Algorithm for Checking Absolute Consistency of DTDs
Lu Yan, Hao Zhongxiao, and Zhang Liang
2005 Vol. 42 (11): 1977-1982 [Abstract] ( 251 ) HTML (1 KB)  PDF (315 KB)  ( 341 )
1983 Numbering Scheme Based Relational Storage of XML Documents
Lu Yan, Hao Zhongxiao, and Zhang Liang
2005 Vol. 42 (11): 1983-1988 [Abstract] ( 253 ) HTML (1 KB)  PDF (347 KB)  ( 323 )
1989 A Hierarchical Clustering Method on Semantic Cube
Yang Kehua, Dong Yisheng, and Hu Kongfa,
2005 Vol. 42 (11): 1989-1996 [Abstract] ( 249 ) HTML (1 KB)  PDF (506 KB)  ( 429 )
1997 DifX: A Dynamic Index Structure for Querying XML Data Efficiently
Qu Weimin, Zhang Junlin, Sun Le, and Sun Yufang
2005 Vol. 42 (11): 1997-2003 [Abstract] ( 256 ) HTML (1 KB)  PDF (457 KB)  ( 441 )
2004 Updates Dissemination in Mobile Real-Time Database Systems
Li Guohui, Wang Hongya, and Liu Yunsheng
2005 Vol. 42 (11): 2004-2009 [Abstract] ( 262 ) HTML (1 KB)  PDF (376 KB)  ( 410 )
2010 An Efficient Method for Multi-Table Joining in Data Warehouse
Wen Juan, Xue Yongsheng, Weng Wei, and Lin Ziyu,
2005 Vol. 42 (11): 2010-2017 [Abstract] ( 299 ) HTML (1 KB)  PDF (466 KB)  ( 479 )
2018 Modeling and Checking the Behavior of Software Architecture
He Jian, and Qin Zheng
2005 Vol. 42 (11): 2018-2024 [Abstract] ( 347 ) HTML (1 KB)  PDF (421 KB)  ( 458 )
2025 Schedulability Test Performance Analysis of Rate Monotonic Algorithm and Its Extended Ones
Xing Jiansheng, Liu Junxiang, and Wang Yongji,
2005 Vol. 42 (11): 2025-2032 [Abstract] ( 281 ) HTML (1 KB)  PDF (430 KB)  ( 482 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech