计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2015 Vol. 52, No. 3
Published: 01 March 2015

   
 
553 TML: A General High-Performance Text Mining Language
Li Jiajing, Li Xiaoming, Meng Tao
DOI: 10.7544/issn1000-1239.2015.20131546
2015 Vol. 52 (3): 553-560 [Abstract] ( 1240 ) HTML (1 KB)  PDF (1564 KB)  ( 1084 )
561 Smooth CHKS Twin Support Vector Regression
Huang Huajuan,, Ding Shifei, Shi Zhongzhi
DOI: 10.7544/issn1000-1239.2015.20131444
2015 Vol. 52 (3): 561-568 [Abstract] ( 689 ) HTML (1 KB)  PDF (1723 KB)  ( 613 )
569 Incremental FP_GROWTH Algorithm Based on Disk-resident 1-itemsets Counting
Shen Yan, Zhu Yuquan, Liu Chunhua
DOI: 10.7544/issn1000-1239.2015.20131436
2015 Vol. 52 (3): 569-578 [Abstract] ( 541 ) HTML (1 KB)  PDF (2334 KB)  ( 1049 )
579 A Heuristic Two-layer Reinforcement Learning Algorithm Based on BP Neural Networks
Liu Zhibin, Zeng Xiaoqin, Liu Huiyi, Chu Rong
DOI: 10.7544/issn1000-1239.2015.20131270
2015 Vol. 52 (3): 579-587 [Abstract] ( 865 ) HTML (1 KB)  PDF (3957 KB)  ( 1132 )
588 A Method of Computing Minimal Hitting Sets Using CSP
Wang Yiyuan, Ouyang Dantong, Zhang Liming, Zhang Yonggang
DOI: 10.7544/issn1000-1239.2015.20131478
2015 Vol. 52 (3): 588-595 [Abstract] ( 705 ) HTML (1 KB)  PDF (1093 KB)  ( 528 )
596 Patch Matching with Global Spatial Constraints for Person Re-Identification
Chen Puqiang, Guo Lijun, Zhang Rong, Zhao Jieyu
DOI: 10.7544/issn1000-1239.2015.20131481
2015 Vol. 52 (3): 596-605 [Abstract] ( 668 ) HTML (1 KB)  PDF (3387 KB)  ( 604 )
606 Graph Regularized Semi-Supervised Learning on Heterogeneous Information Networks
Liu Yufeng, Li Renfa
DOI: 10.7544/issn1000-1239.2015.20131147
2015 Vol. 52 (3): 606-613 [Abstract] ( 644 ) HTML (1 KB)  PDF (961 KB)  ( 891 )
614 Learning Behavior Analysis and Prediction Based on MOOC Data
Jiang Zhuoxuan, Zhang Yan, Li Xiaoming
DOI: 10.7544/issn1000-1239.2015.20140491
2015 Vol. 52 (3): 614-628 [Abstract] ( 2394 ) HTML (1 KB)  PDF (5895 KB)  ( 1836 )
629 Cross-Domain Text Sentiment Classification Based on Grouping-AdaBoost Ensemble
Zhao Chuanjun, Wang Suge, Li Deyu, Li Xin
DOI: 10.7544/issn1000-1239.2015.20140156
2015 Vol. 52 (3): 629-638 [Abstract] ( 669 ) HTML (1 KB)  PDF (2128 KB)  ( 663 )
639 Deceptive Reviews Detection Based on Positive and Unlabeled Learning
Ren Yafeng, Ji Donghong, Zhang Hongbin, Yin Lan
DOI: 10.7544/issn1000-1239.2015.20131473
2015 Vol. 52 (3): 639-648 [Abstract] ( 997 ) HTML (1 KB)  PDF (1322 KB)  ( 803 )
649 A Latent-Citation-Network Based Patent Value Evaluation Method
Feng Ling, Peng Zhiyong, Liu Bin, Che Dunren
DOI: 10.7544/issn1000-1239.2015.20131424
2015 Vol. 52 (3): 649-660 [Abstract] ( 610 ) HTML (1 KB)  PDF (1896 KB)  ( 592 )
661 TH-award:A Performance and Security Test Platform for Wireless Multi-Hop Networks
Zhu Lin, Meng Kun, Lin Chuang, Xu Kun
DOI: 10.7544/issn1000-1239.2015.20131320
2015 Vol. 52 (3): 661-670 [Abstract] ( 642 ) HTML (1 KB)  PDF (3344 KB)  ( 461 )
671 A Selection Method for User Authentication Protocols in Wireless Networks
Zhao Jing, Li Xin, Deng Lingjuan, Li Xinghua, Ma Jianfeng
DOI: 10.7544/issn1000-1239.2015.20131376
2015 Vol. 52 (3): 671-680 [Abstract] ( 658 ) HTML (1 KB)  PDF (3901 KB)  ( 604 )
681 Multi-Stride Regular Expression Matching Using Parallel Character Index
Ding Linxuan, Huang Kun, Zhang Dafang
DOI: 10.7544/issn1000-1239.2015.20131255
2015 Vol. 52 (3): 681-690 [Abstract] ( 591 ) HTML (1 KB)  PDF (3799 KB)  ( 506 )
691 Fully Secure Hierarchical Inner Product Encryption with Constant-Size Ciphertexts
Zhang Jie, Ge Aijun, Ma Chuangui
DOI: 10.7544/issn1000-1239.2015.20131413
2015 Vol. 52 (3): 691-701 [Abstract] ( 650 ) HTML (1 KB)  PDF (1043 KB)  ( 488 )
702 Light-Weight Integrity Monitoring Based on Hashing Time Validity
Xu Qingui, Qin Yong, Yang Taolan
DOI: 10.7544/issn1000-1239.2015.20131382
2015 Vol. 52 (3): 702-717 [Abstract] ( 455 ) HTML (1 KB)  PDF (4558 KB)  ( 592 )
718 Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection
Tang Chenghua, Liu Pengcheng, Tang Shensheng, Xie Yi
DOI: 10.7544/issn1000-1239.2015.20130601
2015 Vol. 52 (3): 718-728 [Abstract] ( 811 ) HTML (1 KB)  PDF (1777 KB)  ( 1003 )
729 Recovering Traceability Links Using Syntactic Analysis
Wang Jinshui, Weng Wei, Peng Xin
DOI: 10.7544/issn1000-1239.2015.20131308
2015 Vol. 52 (3): 729-737 [Abstract] ( 483 ) HTML (1 KB)  PDF (1187 KB)  ( 483 )
738 Processing String Similarity Search in External Memory Efficiently
Wang Jinbao, Gao Hong, Li Jianzhong, Yang Donghua
DOI: 10.7544/issn1000-1239.2015.20130683
2015 Vol. 52 (3): 738-748 [Abstract] ( 600 ) HTML (1 KB)  PDF (3070 KB)  ( 481 )
749 Strong Neighborhood Pair Query in Dynamic Dataset
Li Song, Zhang Liping, Hao Zhongxiao
DOI: 10.7544/issn1000-1239.2015.20131390
2015 Vol. 52 (3): 749-759 [Abstract] ( 477 ) HTML (1 KB)  PDF (1656 KB)  ( 511 )
760 Fault-Tolerant Real-Time Scheduling Algorithm with Pre-Allocation in Primary/Alternate Model
Liu Xian, Guo Ruifeng, Deng Changyi
DOI: 10.7544/issn1000-1239.2015.20130677
2015 Vol. 52 (3): 760-768 [Abstract] ( 441 ) HTML (1 KB)  PDF (1794 KB)  ( 502 )
769 Balanced k-Way Partitioning for Weighted Graphs
Zheng Lili, Wu Jigang, Chen Yong, Zhu Meixia
DOI: 10.7544/issn1000-1239.2015.20131508
2015 Vol. 52 (3): 769-776 [Abstract] ( 822 ) HTML (1 KB)  PDF (904 KB)  ( 577 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech