计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2005 Vol. 42, No. 11
Published: 15 November 2005

   
 
       Paper
1833 Symbolic Dempster-Shafer Theory
Mu Kedian and Lin Zuoquan
2005 Vol. 42 (11): 1833-1842 [Abstract] ( 495 ) HTML (1 KB)  PDF (564 KB)  ( 390 )
1843 A Description-Logic Based Agent Organization
Zhang Xinliang and Shi Chunyi
2005 Vol. 42 (11): 1843-1848 [Abstract] ( 298 ) HTML (1 KB)  PDF (353 KB)  ( 403 )
1849 A Multistage-Based Framework for Multi-Agent Multi-Issue Negotiation
Wang Liming, and Huang Houkuan
2005 Vol. 42 (11): 1849-1855 [Abstract] ( 181 ) HTML (1 KB)  PDF (414 KB)  ( 417 )
1856 Modeling and Heuristic for Winner Determination in Combinatorial Auctions
Bai Jiancong, Chang Huiyou, and Yi Yang
2005 Vol. 42 (11): 1856-1861 [Abstract] ( 212 ) HTML (1 KB)  PDF (301 KB)  ( 497 )
1862 Journal Text Categorization with the Combination of Local Linearity and One-Class
Yao Liqun and Tao Qing
2005 Vol. 42 (11): 1862-1869 [Abstract] ( 306 ) HTML (1 KB)  PDF (406 KB)  ( 440 )
1870 A New Hand Shape Biometric Verification Method Based on Curve Fitting
Guo Zhenbin and Qiu Zhengding
2005 Vol. 42 (11): 1870-1875 [Abstract] ( 225 ) HTML (1 KB)  PDF (332 KB)  ( 485 )
1876 A New Adaptive Lagrange Multiplier Selection Model in Hybrid Video Coder Control
Zhou Shumin, Li Jintao, Huang Chao, and Song Lei
2005 Vol. 42 (11): 1876-1881 [Abstract] ( 290 ) HTML (1 KB)  PDF (380 KB)  ( 550 )
1889 Low-Power and High-Speed VLSI Architecture Design of 2-D DWT/IDWT
Lan Xuguang, Zheng Nanning, Xue Jianru, Wang Fei, and Liu Yuehu
2005 Vol. 42 (11): 1889-1895 [Abstract] ( 285 ) HTML (1 KB)  PDF (469 KB)  ( 406 )
1896 An Image Authentication Algorithm Based on Feature of Original Image and Hyperchaotic Iteration
Wang Xingyuan and Shi Qijiang
2005 Vol. 42 (11): 1896-1902 [Abstract] ( 267 ) HTML (1 KB)  PDF (785 KB)  ( 498 )
1903 A Fast Image Retrieval Method Based on Weighted Chromaticity Histogram
Xing Qiang, Yuan Baozong, and Tang Xiaofang
2005 Vol. 42 (11): 1903-1910 [Abstract] ( 359 ) HTML (1 KB)  PDF (721 KB)  ( 631 )
1911 A Novel Real-Time Doppler Centroid Estimating Algorithm
Liu Bo, , Wang Zhensong, Yao Ping, and Li Mingfeng
2005 Vol. 42 (11): 1911-1917 [Abstract] ( 416 ) HTML (1 KB)  PDF (416 KB)  ( 548 )
1918 Founding Computationally Secure Quantum Cryptography Protocols Based on Bit Commitment
Lü Xin, and Feng Dengguo
2005 Vol. 42 (11): 1918-1923 [Abstract] ( 510 ) HTML (1 KB)  PDF (335 KB)  ( 605 )
1924 Security Notes on Two Cheat-Proof Secret Sharing Schemes
Wang Guilin, and Qing Sihan
2005 Vol. 42 (11): 1924-1927 [Abstract] ( 261 ) HTML (1 KB)  PDF (245 KB)  ( 411 )
1928 A New Network Troubleshooting Method—FTFD
Li Qianmu, Xu Manwu, Yang Yun, Zhang Hong, and Liu Fengyu
2005 Vol. 42 (11): 1928-1933 [Abstract] ( 1334 ) HTML (1 KB)  PDF (401 KB)  ( 506 )
1934 An Autonomous Agent-Based Adaptive Distributed Intrusion Detection System
Wang Jin, Li Dequan, and Feng Dengguo
2005 Vol. 42 (11): 1934-1939 [Abstract] ( 279 ) HTML (1 KB)  PDF (250 KB)  ( 489 )
1940 Research on the Security of Initial Sequence Number Generation Arithmetic
Lü Yanli, Li Xiaojian, Xia Chunhe, and Liu Shuzhi
2005 Vol. 42 (11): 1940-1945 [Abstract] ( 494 ) HTML (1 KB)  PDF (353 KB)  ( 433 )
1946 A Workflow Authorization Model Based on Role and Task and Constraints Specification
Xing Guanglin and Hong Fan
2005 Vol. 42 (11): 1946-1953 [Abstract] ( 432 ) HTML (1 KB)  PDF (508 KB)  ( 440 )
1954 Error Protection Algorithms for Scalable Multimedia Transmission: A Survey
Huo Longshe, Gao Wen, Huang Qingming, and Xie Jianguo
2005 Vol. 42 (11): 1954-1961 [Abstract] ( 266 ) HTML (1 KB)  PDF (436 KB)  ( 381 )
1962 A Resource Reservation Scheme for PCF Handoff Station in WLAN
Yang Renzhong, Hou Zifeng, and Li Jingxia
2005 Vol. 42 (11): 1962-1968 [Abstract] ( 330 ) HTML (1 KB)  PDF (386 KB)  ( 375 )
1969 A Resource Optimizing Scheduling Algorithm of Differentiated Service of Double Minimum Balance in Web Clusters
Liu Anfeng, Chen Zhigang, Long Guoping, and Zeng Zhiwen
2005 Vol. 42 (11): 1969-1976 [Abstract] ( 323 ) HTML (1 KB)  PDF (472 KB)  ( 424 )
1977 An Algorithm for Checking Absolute Consistency of DTDs
Lu Yan, Hao Zhongxiao, and Zhang Liang
2005 Vol. 42 (11): 1977-1982 [Abstract] ( 317 ) HTML (1 KB)  PDF (315 KB)  ( 347 )
1983 Numbering Scheme Based Relational Storage of XML Documents
Lu Yan, Hao Zhongxiao, and Zhang Liang
2005 Vol. 42 (11): 1983-1988 [Abstract] ( 283 ) HTML (1 KB)  PDF (347 KB)  ( 328 )
1989 A Hierarchical Clustering Method on Semantic Cube
Yang Kehua, Dong Yisheng, and Hu Kongfa,
2005 Vol. 42 (11): 1989-1996 [Abstract] ( 286 ) HTML (1 KB)  PDF (506 KB)  ( 436 )
1997 DifX: A Dynamic Index Structure for Querying XML Data Efficiently
Qu Weimin, Zhang Junlin, Sun Le, and Sun Yufang
2005 Vol. 42 (11): 1997-2003 [Abstract] ( 290 ) HTML (1 KB)  PDF (457 KB)  ( 447 )
2004 Updates Dissemination in Mobile Real-Time Database Systems
Li Guohui, Wang Hongya, and Liu Yunsheng
2005 Vol. 42 (11): 2004-2009 [Abstract] ( 284 ) HTML (1 KB)  PDF (376 KB)  ( 415 )
2010 An Efficient Method for Multi-Table Joining in Data Warehouse
Wen Juan, Xue Yongsheng, Weng Wei, and Lin Ziyu,
2005 Vol. 42 (11): 2010-2017 [Abstract] ( 342 ) HTML (1 KB)  PDF (466 KB)  ( 489 )
2018 Modeling and Checking the Behavior of Software Architecture
He Jian, and Qin Zheng
2005 Vol. 42 (11): 2018-2024 [Abstract] ( 389 ) HTML (1 KB)  PDF (421 KB)  ( 465 )
2025 Schedulability Test Performance Analysis of Rate Monotonic Algorithm and Its Extended Ones
Xing Jiansheng, Liu Junxiang, and Wang Yongji,
2005 Vol. 42 (11): 2025-2032 [Abstract] ( 317 ) HTML (1 KB)  PDF (430 KB)  ( 493 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech