计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2005 Vol. 42, No. 2
Published: 15 February 2005

   
 
       Paper
3D Human Motion Simulation and a Video Analysis System for Sports Training
Wang Zhaoqi, Zhang Yongdong, and Xia Shihong
2005 Vol. 42 (2): - [Abstract] ( 547 ) HTML (1 KB)  PDF (425 KB)  ( 777 )
An MDP Public-Key Digital Signature Scheme
Zheng Jiande
2005 Vol. 42 (2): - [Abstract] ( 244 ) HTML (1 KB)  PDF (331 KB)  ( 435 )
179 Structure Optimization of Radial Basis Probabilistic Neural Networks by the Maximum Absolute Error Combined with the Micro-Genetic Algorithm
Zhao Wenbo, Wang Liming, and Huang Deshuang
2005 Vol. 42 (2): 179-187 [Abstract] ( 264 ) HTML (1 KB)  PDF (572 KB)  ( 445 )
188 Self-Organizing Isometric Embedding
Hou Yuexian, Ding Zheng, and He Pilian
2005 Vol. 42 (2): 188-195 [Abstract] ( 338 ) HTML (1 KB)  PDF (575 KB)  ( 369 )
196 Support Vector Machines Based on Posteriori Probability
Wu Gaowei, Tao Qing, and Wang Jue
2005 Vol. 42 (2): 196-202 [Abstract] ( 563 ) HTML (1 KB)  PDF (427 KB)  ( 540 )
203 A Multi-Agent Reinforcement Learning Method Based on Role Tracking
Zhang Shuangmin and Shi Chunyi
2005 Vol. 42 (2): 203-209 [Abstract] ( 288 ) HTML (1 KB)  PDF (371 KB)  ( 429 )
210 An Enhanced Approach for Mining Local Outlier
Jiang Shengyi, Li Qinghua, Wang Hui, and Meng Zhonglou
2005 Vol. 42 (2): 210-216 [Abstract] ( 376 ) HTML (1 KB)  PDF (464 KB)  ( 513 )
217 SFP-Max—A Sorted FP-Tree Based Algorithm for Maximal Frequent Patterns Mining
Qin Liangxi, and Shi Zhongzhi
2005 Vol. 42 (2): 217-223 [Abstract] ( 491 ) HTML (1 KB)  PDF (445 KB)  ( 531 )
224 Knowledge Increase Ability of Artificial Neural Network
Huang Hua, Luo Siwei, Liu Yunhui, and Li Aijun
2005 Vol. 42 (2): 224-229 [Abstract] ( 361 ) HTML (1 KB)  PDF (292 KB)  ( 423 )
230 Mining Frequent Patterns Based on Graph Theory
Wang Wei, Zhou Haofeng, Yuan Qingqing, Lou Yubo, and Sui Baile
2005 Vol. 42 (2): 230-235 [Abstract] ( 508 ) HTML (1 KB)  PDF (344 KB)  ( 1033 )
236 Research on Visibility for Large-Scale and Complex Scenes
Pu Jiantao and Zha Hongbin
2005 Vol. 42 (2): 236-246 [Abstract] ( 299 ) HTML (1 KB)  PDF (575 KB)  ( 621 )
247 Remote Sensing Image Processing Using Wavelet Fractal Interpolation
Zhang Can, Tu Guofang, and Liu Xiaozhou
2005 Vol. 42 (2): 247-251 [Abstract] ( 464 ) HTML (1 KB)  PDF (376 KB)  ( 594 )
252 Anycast Routing Algorithm with Special Composite Distance
Zhang Li, Jia Weijia, Yan Wei, and Li Xiaoming
2005 Vol. 42 (2): 252-258 [Abstract] ( 281 ) HTML (1 KB)  PDF (374 KB)  ( 371 )
259 Performance Analysis of a Double-Layered Satellite Network
Wu Fengge, Sun Fuchun, Sun Zengqi, Yu Ke, and Li Lei
2005 Vol. 42 (2): 259-265 [Abstract] ( 455 ) HTML (1 KB)  PDF (437 KB)  ( 661 )
266 Clustered-Loss Retransmission Protocol over Wireless TCP
Sun Fanglei and Zeng Ping
2005 Vol. 42 (2): 266-272 [Abstract] ( 321 ) HTML (1 KB)  PDF (426 KB)  ( 367 )
273 ANLMCC—An Active Network-Based Layered Multicast Congestion Control Scheme
Ye Xiaoguo, Jiang Aiquan, and Wu Jiagao
2005 Vol. 42 (2): 273-279 [Abstract] ( 327 ) HTML (1 KB)  PDF (399 KB)  ( 376 )
286 Achievements and Prospects of Smoothed Analysis of Algorithms
Yang Zhiying, Zhu Hong, and Lei Xiangxin
2005 Vol. 42 (2): 286-293 [Abstract] ( 494 ) HTML (1 KB)  PDF (467 KB)  ( 640 )
294 Research on Chinese Postman Problem Decision Process Algorithm
Fei Rong and Cui Duwu
2005 Vol. 42 (2): 294-299 [Abstract] ( 932 ) HTML (1 KB)  PDF (307 KB)  ( 1817 )
300 An Execution Semantics of UML Activity View for Workflow Modeling
Zhao Zhikun, Sheng Qiujian, and Shi Zhongzhi
2005 Vol. 42 (2): 300-307 [Abstract] ( 350 ) HTML (1 KB)  PDF (426 KB)  ( 423 )
308 QC Model Based Materialized View Selection in Web Data Integration
Gao Jun, Tang Shiwei, Yang Dongqing, and Wang Tengjiao
2005 Vol. 42 (2): 308-314 [Abstract] ( 330 ) HTML (1 KB)  PDF (370 KB)  ( 402 )
315 A Dynamic Real-Time Scheduling Algorithm with Software Fault-Tolerance
Han Jianjun, Li Qinghua, and Abbas A.Essa
2005 Vol. 42 (2): 315-321 [Abstract] ( 367 ) HTML (1 KB)  PDF (411 KB)  ( 490 )
322 Research on an Application Class Communication Security Model on Operating System Security Framework
Zheng Zhirong, Cai Yi, and Shen Changxiang
2005 Vol. 42 (2): 322-328 [Abstract] ( 329 ) HTML (1 KB)  PDF (436 KB)  ( 407 )
329 Two Condition Code Optimization Approaches in Binary Translation
Ma Xiangning, Wu Chenggang, Tang Feng, Feng Xiaobing, and Zhang Zhaoqing
2005 Vol. 42 (2): 329-337 [Abstract] ( 350 ) HTML (1 KB)  PDF (455 KB)  ( 446 )
338 The Distributed Lock Scheme in SAN
Yao Nianmin, Shu Jiwu, and Zheng Weimin
2005 Vol. 42 (2): 338-343 [Abstract] ( 416 ) HTML (1 KB)  PDF (290 KB)  ( 456 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech