计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2015 Vol. 52, No. 7
Published: 01 July 2015

   
 
1463 Mixture of Probabilistic Canonical Correlation Analysis
Zhang Bo, Hao Jie, Ma Gang, Yue Jinpeng, Zhang Jianhua, Shi Zhongzhi
DOI: 10.7544/issn1000-1239.2015.20140236
2015 Vol. 52 (7): 1463-1476 [Abstract] ( 986 ) HTML (1 KB)  PDF (4303 KB)  ( 890 )
1477 Second Order Newton’s Method for Training Radial Basis Function Neural Networks
Cai Xun, Chen Zhi, Kanishka Tyagi, Yu Kuan, Li Ziqiang, Zhu Bo
DOI: 10.7544/issn1000-1239.2015.20140373
2015 Vol. 52 (7): 1477-1486 [Abstract] ( 521 ) HTML (1 KB)  PDF (2692 KB)  ( 711 )
1487 An Algorithm of Robust Online Extreme Learning Machine for Dynamic Imbalanced Datasets
Zhang Jing, Feng Lin
DOI: 10.7544/issn1000-1239.2015.20140182
2015 Vol. 52 (7): 1487-1498 [Abstract] ( 437 ) HTML (1 KB)  PDF (5280 KB)  ( 666 )
1499 Word Semantic Similarity Measurement Based on Nave Bayes Model
Wang Junhua, Zuo Wanli, Yan Zhao
DOI: 10.7544/issn1000-1239.2015.20140383
2015 Vol. 52 (7): 1499-1509 [Abstract] ( 823 ) HTML (1 KB)  PDF (2262 KB)  ( 677 )
1510 An Overlapping Semantic Community Detection Algorithm Based on Local Semantic Cluster
Xin Yu, Yang Jing, Tang Chuheng, Ge Siqiao
DOI: 10.7544/issn1000-1239.2015.20140308
2015 Vol. 52 (7): 1510-1521 [Abstract] ( 783 ) HTML (1 KB)  PDF (6042 KB)  ( 1419 )
1522 A Cache Approach for Large Scale Data-Intensive Computing
Zhou Enqiang, Zhang Wei, Lu Yutong, Hou Hongjun, Dong Yong
DOI: 10.7544/issn1000-1239.2015.20148073
2015 Vol. 52 (7): 1522-1530 [Abstract] ( 606 ) HTML (1 KB)  PDF (2648 KB)  ( 618 )
1531 Concurrent Skiplist Based Double-Layer Index Framework for Cloud Data Processing
Zhou Wei, Lu Jin, Zhou Keren, Wang Shipu, Yao Shaowen
DOI: 10.7544/issn1000-1239.2015.20140358
2015 Vol. 52 (7): 1531-1545 [Abstract] ( 576 ) HTML (1 KB)  PDF (5223 KB)  ( 532 )
1546 Object-Based Data De-Duplication Method for OpenXML Compound Files
Yan Fang, Li Yuanzhang, Zhang Quanxin, Tan Yu’an
DOI: 10.7544/issn1000-1239.2015.20140093
2015 Vol. 52 (7): 1546-1557 [Abstract] ( 550 ) HTML (1 KB)  PDF (4054 KB)  ( 491 )
1558 File System Level Wear Leveling Mechanism for Non-Volatile Memory Based Storage
Cai Tao, Zhang Yongchun, Niu Dejiao, Ni Xiaorong, Liang Dongying
DOI: 10.7544/issn1000-1239.2015.20140019
2015 Vol. 52 (7): 1558-1566 [Abstract] ( 500 ) HTML (1 KB)  PDF (2110 KB)  ( 425 )
1567 Asyn-SimRank: An Asynchronous Large-Scale SimRank Algorithm
Wang Chunlei, Zhang Yanfeng, Bao Yubin, Zhao Changkuan, Yu Ge, Gao Lixin
DOI: 10.7544/issn1000-1239.2015.20140313
2015 Vol. 52 (7): 1567-1579 [Abstract] ( 807 ) HTML (1 KB)  PDF (2639 KB)  ( 502 )
1580 Abstract Modeling Formalisms in Software Model Checking Hot!
Wei Ou, Shi Yufeng, Xu Bingfeng, Huang Zhiqiu, Chen Zhe
DOI: 10.7544/issn1000-1239.2015.20140413
2015 Vol. 52 (7): 1580-1603 [Abstract] ( 907 ) HTML (1 KB)  PDF (3645 KB)  ( 937 )
1604 Modeling, Verification and Test of Interactive Behaviors in Distributed Software Systems
Zhang Chen, Duan Zhenhua, Tian Cong, Yu Bin
DOI: 10.7544/issn1000-1239.2015.20140244
2015 Vol. 52 (7): 1604-1619 [Abstract] ( 464 ) HTML (1 KB)  PDF (3760 KB)  ( 527 )
1620 Research on Flow Sensitive Demand Driven Alias Analysis
Pang Long, Su Xiaohong, Ma Peijun, Zhao Lingling
DOI: 10.7544/issn1000-1239.2015.20140336
2015 Vol. 52 (7): 1620-1630 [Abstract] ( 567 ) HTML (1 KB)  PDF (1785 KB)  ( 660 )
1631 A Generalized Non-interference Based on Refinement of Interfaces
Sun Cong, Xi Ning, Gao Sheng, Zhang Tao, Li Jinku, Ma Jianfeng
DOI: 10.7544/issn1000-1239.2015.20140306
2015 Vol. 52 (7): 1631-1641 [Abstract] ( 466 ) HTML (1 KB)  PDF (2594 KB)  ( 359 )
1642 Risk Evaluation of Complex Information System Based on Threat Propagation Sampling
Ma Gang, Du Yuge, An Bo, Zhang Bo, Wang Wei, Shi Zhongzhi
DOI: 10.7544/issn1000-1239.2015.20140184
2015 Vol. 52 (7): 1642-1659 [Abstract] ( 501 ) HTML (1 KB)  PDF (2664 KB)  ( 508 )
1660 Trust-Distributed-Based Authentication Mechanism Using Hierarchical Identity-Based Cryptography
Tian Junfeng, Sun Kehui
DOI: 10.7544/issn1000-1239.2015.20140295
2015 Vol. 52 (7): 1660-1671 [Abstract] ( 590 ) HTML (1 KB)  PDF (3492 KB)  ( 535 )
1672 A Multiple Replica Possession Proving Scheme Based on Public Key Partition
Fu Wei, Wu Xiaoping, Ye Qing, Xiao Nong, Lu Xicheng
DOI: 10.7544/issn1000-1239.2015.20140353
2015 Vol. 52 (7): 1672-1681 [Abstract] ( 509 ) HTML (1 KB)  PDF (1958 KB)  ( 486 )
1682 Segmentation of Color Overlapping Cells Image Based on Sparse Contour Point Model
Guan Tao, Zhou Dongxiang, Fan Weihong, Liu Yunhui
DOI: 10.7544/issn1000-1239.2015.20140324
2015 Vol. 52 (7): 1682-1691 [Abstract] ( 763 ) HTML (1 KB)  PDF (3305 KB)  ( 619 )
1692 Robust Fragments-Based Tracking with Multi-Feature Joint Kernel Sparse Representation
Hu Zhaohua, Yuan Xiaotong, Li Jun, He Jun
DOI: 10.7544/issn1000-1239.2015.20140152
2015 Vol. 52 (7): 1692-1704 [Abstract] ( 610 ) HTML (1 KB)  PDF (4749 KB)  ( 519 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech