计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2005 Vol. 42, No. 9
Published: 15 September 2005

   
 
       Paper
1461 Research on Incremental Learning of Bayesian Network Structure Based on Genetic Algorithms
Wang Fei, Liu Dayou, and Wang Songxin,
2005 Vol. 42 (9): 1461-1466 [Abstract] ( 377 ) HTML (1 KB)  PDF (316 KB)  ( 490 )
1467 MLSVM4—An SVM Fast Training Algorithm Based on Multi-Lagrange Multiplier
Ye Ning, Sun Ruixiang, and Dong Yisheng
2005 Vol. 42 (9): 1467-1471 [Abstract] ( 306 ) HTML (1 KB)  PDF (303 KB)  ( 410 )
1472 Layer Allocation Algorithms in Layered Peer-to-Peer Streaming with Source Server's Participation
Liu Yajie and Dou Wenhua
2005 Vol. 42 (9): 1472-1477 [Abstract] ( 346 ) HTML (1 KB)  PDF (325 KB)  ( 490 )
1478 A Temporal Logic Semantics for UML Activity Diagrams
Zhu Xueyang and Tang Zhisong
2005 Vol. 42 (9): 1478-1484 [Abstract] ( 366 ) HTML (1 KB)  PDF (438 KB)  ( 529 )
1485 Research on Decomposition Problem of Temporal Elementary Key Normal form and Temporal Simple Normal Form in Temporal Database with Multiple Time Granularities
Hao Zhongxiao, and Li Yanjuan
2005 Vol. 42 (9): 1485-1492 [Abstract] ( 320 ) HTML (1 KB)  PDF (557 KB)  ( 441 )
1493 An Effective Distributed k-Means Clustering Algorithm Based on the Pretreatment of Vectors' Inner-Product
Ni Weiwei, Lu Jieping, and Sun Zhihui
2005 Vol. 42 (9): 1493-1497 [Abstract] ( 275 ) HTML (1 KB)  PDF (349 KB)  ( 726 )
1498 Finding Outliers in Distributed Data Streams Based on Kernel Density Estimation
Yang Yidong, Sun Zhihui, and Zhang Jing,
2005 Vol. 42 (9): 1498-1504 [Abstract] ( 271 ) HTML (1 KB)  PDF (497 KB)  ( 658 )
1505 Bisecting Grid-Based Clustering Approach and Its Validity
Yue Shihong and Wang Zhengyou
2005 Vol. 42 (9): 1505-1510 [Abstract] ( 243 ) HTML (1 KB)  PDF (374 KB)  ( 497 )
1511 pepReap: A Peptide Identification Algorithm Using Support Vector Machines
Wang Haipeng, Fu Yan, Sun Ruixiang, He Simin, Zeng Rong, and Gao Wen,
2005 Vol. 42 (9): 1511-1518 [Abstract] ( 395 ) HTML (1 KB)  PDF (505 KB)  ( 432 )
1519 Multimodal Particle Swarm Optimization for Neural Network Ensemble
Liu Yu, Qin Zheng, Lu Jiang, and Shi Zhewen
2005 Vol. 42 (9): 1519-1526 [Abstract] ( 372 ) HTML (1 KB)  PDF (478 KB)  ( 528 )
1527 Research on Explanation Function for Reason Conclusions with Bayesian Network
Wang Ronggui, Zhang Yousheng, Gao Jun, and Peng Qingsong
2005 Vol. 42 (9): 1527-1532 [Abstract] ( 313 ) HTML (1 KB)  PDF (431 KB)  ( 408 )
1533 Ensemble-Based Manifold Learning for Visualization
Zhan Dechuan and Zhou Zhihua
2005 Vol. 42 (9): 1533-1537 [Abstract] ( 431 ) HTML (1 KB)  PDF (324 KB)  ( 590 )
1538 A Method of Autonomous Robot Navigation in Dynamic Unknown Environment
Meng Wei, Huang Qingcheng, Han Xuedong, and Hong Bingrong
2005 Vol. 42 (9): 1538-1543 [Abstract] ( 290 ) HTML (1 KB)  PDF (354 KB)  ( 465 )
1544 Study of Key Techniques of the Inference Machine Model for Function-Structure Project of the New Instrument Product Development Based on Genetic Algorithm(GA)
Shang Jiandong
2005 Vol. 42 (9): 1544-1549 [Abstract] ( 297 ) HTML (1 KB)  PDF (346 KB)  ( 398 )
1550 Adaptive RSVP Path Fast Handoff Scheme in Wireless/Mobile Networks
Jiang Aiquan, Wu Jiagao, and Ye Xiaoguo
2005 Vol. 42 (9): 1550-1557 [Abstract] ( 263 ) HTML (1 KB)  PDF (582 KB)  ( 486 )
1558 Secure Access Control for Group Communication on Multi-Autonomous Domains Collaborative Environment
Zhang Yu, Zhang Wenyi, Li Xianxian, and Huai Jinpeng
2005 Vol. 42 (9): 1558-1563 [Abstract] ( 190 ) HTML (1 KB)  PDF (396 KB)  ( 446 )
1564 Forwarding State Reduction Scheme Based on Interface Format for Sparse Mode Multicast
Huang Kui, Wu Yichuan, Zheng Jianping, and Wu Zhimei
2005 Vol. 42 (9): 1564-1570 [Abstract] ( 193 ) HTML (1 KB)  PDF (419 KB)  ( 400 )
1571 Modeling and Analysis of Non-Repudiation Protocols by Using Petri Nets
Li Botao and Luo Junzhou
2005 Vol. 42 (9): 1571-1577 [Abstract] ( 334 ) HTML (1 KB)  PDF (437 KB)  ( 396 )
1578 Network Intrusion Detection and Attack Analysis Based on SOFM with Fast Nearest-Neighbor Search
Zheng Jun, Hu Mingzeng, Yun Xiaochun, and Zhang Hongli
2005 Vol. 42 (9): 1578-1586 [Abstract] ( 364 ) HTML (1 KB)  PDF (584 KB)  ( 422 )
1587 Security Protocol and Scheme for Inter-Realm Information Accessing
Peng Shuanghe, Han Zhen, and Shen Changxiang
2005 Vol. 42 (9): 1587-1593 [Abstract] ( 282 ) HTML (1 KB)  PDF (381 KB)  ( 437 )
1594 A DDoS Attack Detection Method Based on Hidden Markov Model
Zhou Dongqing, Zhang Haifeng, Zhang Shaowu, and Hu Xiangpei
2005 Vol. 42 (9): 1594-1599 [Abstract] ( 370 ) HTML (1 KB)  PDF (332 KB)  ( 531 )
1600 A Learning-Based Peer-to-Peer Search Algorithm
Chen Haitao, Gong Zhenghu, and Huang Zunguo
2005 Vol. 42 (9): 1600-1604 [Abstract] ( 198 ) HTML (1 KB)  PDF (257 KB)  ( 467 )
1605 Digital Audio Watermarking Based on Support Vector Machine (SVM)
Wang Jian and Lin Fuzong
2005 Vol. 42 (9): 1605-1611 [Abstract] ( 501 ) HTML (1 KB)  PDF (455 KB)  ( 567 )
1612 A Multi-View Face Detection Based on Real Adaboost Algorithm
Wu Bo, Huang Chang, Ai Haizhou, and Lao Shihong
2005 Vol. 42 (9): 1612-1621 [Abstract] ( 506 ) HTML (1 KB)  PDF (752 KB)  ( 1045 )
1622 Fingerprint Matching Based on Delaunay Triangulation
Yin Yilong, Zhang Hongwei, and Liu Ning
2005 Vol. 42 (9): 1622-1627 [Abstract] ( 391 ) HTML (1 KB)  PDF (419 KB)  ( 681 )
1628 Matrix-Pattern-Oriented Ho-Kashyap Classifier with Regularization Learning
Tian Yongjun and Chen Songcan
2005 Vol. 42 (9): 1628-1632 [Abstract] ( 608 ) HTML (1 KB)  PDF (307 KB)  ( 493 )
1633 Strategy of Combining Multiple Models Based on Image Sequence
Cao Zhiqing, Shi Jiaoying, Zhang Shiming, Sun Xin, and Liu Peijun
2005 Vol. 42 (9): 1633-1639 [Abstract] ( 322 ) HTML (1 KB)  PDF (443 KB)  ( 520 )
1640 Feature Fusion Based on the Average Precision in Image Retrieval
Ru Liyun, Ma Shaoping, and Lu Jing
2005 Vol. 42 (9): 1640-1646 [Abstract] ( 335 ) HTML (1 KB)  PDF (367 KB)  ( 495 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech