计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2015 Vol. 52, No. 8
Published: 01 August 2015

   
 
1707 Online Learning Algorithms for Big Data Analytics: A Survey Hot!
Li Zhijie,Li Yuanxiang,Wang Feng,He Guoliang,Kuang Li
DOI: 10.7544/issn1000-1239.2015.20150185
2015 Vol. 52 (8): 1707-1721 [Abstract] ( 2907 ) HTML (1 KB)  PDF (1700 KB)  ( 2744 )
1722 Generalized Kernel Polarization Criterion for Optimizing Gaussian Kernel
Tian Meng, Wang Wenjian
DOI: 10.7544/issn1000-1239.2015.20150110
2015 Vol. 52 (8): 1722-1734 [Abstract] ( 707 ) HTML (1 KB)  PDF (3966 KB)  ( 611 )
1735 Temporal Link Prediction Based on Dynamic Heterogeneous Information Network
Zhao Zeya,Jia Yantao,Wang Yuanzhuo,Jin Xiaolong,Cheng Xueqi
DOI: 10.7544/issn1000-1239.2015.20150183
2015 Vol. 52 (8): 1735-1741 [Abstract] ( 629 ) HTML (1 KB)  PDF (1251 KB)  ( 736 )
1742 Feature Selection Algorithm Based on the Multi-Colony Fairness Model
Yang Tan,Feng Xiang,Yu Huiqun
DOI: 10.7544/issn1000-1239.2015.20150245
2015 Vol. 52 (8): 1742-1756 [Abstract] ( 586 ) HTML (1 KB)  PDF (3509 KB)  ( 559 )
1757 Manifold Clustering and Visualization with Commute Time Distance
Shao Chao, Zhang Xiaojian
DOI: 10.7544/issn1000-1239.2015.20150247
2015 Vol. 52 (8): 1757-1767 [Abstract] ( 596 ) HTML (1 KB)  PDF (5430 KB)  ( 725 )
1768 FSMBUS: A Frequent Subgraph Mining Algorithm in Single Large-Scale Graph Using Spark
Yan Yuliang,Dong Yihong,He Xianmang,Wang Wei
DOI: 10.7544/issn1000-1239.2015.20150256
2015 Vol. 52 (8): 1768-1783 [Abstract] ( 1499 ) HTML (1 KB)  PDF (6675 KB)  ( 1146 )
1784 A Graph Clustering Method for Detecting Protein Complexes
Wang Jie,Liang Jiye,Zheng Wenping
DOI: 10.7544/issn1000-1239.2015.20150180
2015 Vol. 52 (8): 1784-1793 [Abstract] ( 531 ) HTML (1 KB)  PDF (1457 KB)  ( 545 )
1794 Recognizing the Same Commodity Entities in Big Data
Hu Yahui,Li Shijun,Yu Wei,Yang Sha,Gan Lin,Wang Kai,Fang Qiqing
DOI: 10.7544/issn1000-1239.2015.20150252
2015 Vol. 52 (8): 1794-1805 [Abstract] ( 698 ) HTML (1 KB)  PDF (1811 KB)  ( 924 )
1806 Sentiment Uncertainty Measure and Classification of Negative Sentences
Zhang Zhifei, Miao Duoqian, Nie Jianyun,Yue Xiaodong
DOI: 10.7544/issn1000-1239.2015.20150253
2015 Vol. 52 (8): 1806-1816 [Abstract] ( 683 ) HTML (1 KB)  PDF (3554 KB)  ( 535 )
1817 Weight-Aware Multicast Routing Algorithm in Cognitive Wireless Mesh Networks
Yang Yiqing,Chen Zhigang,Kuang Zhufang,LiuHui
DOI: 10.7544/issn1000-1239.2015.20148255
2015 Vol. 52 (8): 1817-1830 [Abstract] ( 470 ) HTML (1 KB)  PDF (4094 KB)  ( 466 )
1831 Multi-Objective Channel Assignment and Gateway Deployment Optimizer for Wireless Mesh Network
Zhao Chuanxin,Chen Fulong,Wang Ruchuan,Zhao Cheng,Luo Yonglong
DOI: 10.7544/issn1000-1239.2015.20140675
2015 Vol. 52 (8): 1831-1841 [Abstract] ( 493 ) HTML (1 KB)  PDF (3240 KB)  ( 585 )
1842 Fuzzy Support Vector Regression-Based Link Quality Prediction Model for Wireless Sensor Networks
Shu Jian,Tang Jin,Liu Linlan,Hu Gang,Liu Song
DOI: 10.7544/issn1000-1239.2015.20140670
2015 Vol. 52 (8): 1842-1851 [Abstract] ( 444 ) HTML (1 KB)  PDF (2796 KB)  ( 469 )
1852 A Source Data Congestion Control Based on Sleep Schedule
Huang Junjie,Chen Xiaojiang,Liu Chen,Fang Dingyi,Wang Wei,Yin Xiaoyan,Wu Yueshan
DOI: 10.7544/issn1000-1239.2015.20140668
2015 Vol. 52 (8): 1852-1861 [Abstract] ( 514 ) HTML (1 KB)  PDF (3330 KB)  ( 380 )
1862 A Method of Provable Data Integrity Based on Lattice in Cloud Storage
Tan Shuang,He Li,Chen Zhikun,Jia Yan
DOI: 10.7544/issn1000-1239.2015.20140610
2015 Vol. 52 (8): 1862-1872 [Abstract] ( 511 ) HTML (1 KB)  PDF (1629 KB)  ( 715 )
1873 Game Optimization for Internal DDoS Attack Detection in Cloud Computing
Wang Yichuan, Ma Jianfeng, Lu Di,Zhang Liumei,Meng Xianjia
DOI: 10.7544/issn1000-1239.2015.20140608
2015 Vol. 52 (8): 1873-1882 [Abstract] ( 742 ) HTML (1 KB)  PDF (2790 KB)  ( 501 )
1883 A Novel Privacy Aware Secure Routing Protocol for HWMN
Lin Hui,Tian Youliang,Xu Li, Hu Jia
DOI: 10.7544/issn1000-1239.2015.20140606
2015 Vol. 52 (8): 1883-1892 [Abstract] ( 476 ) HTML (1 KB)  PDF (3146 KB)  ( 434 )
1893 A Fully Secure KP-ABE Scheme in the Standard Model
Zhang Minqing,Du Weidong,Yang Xiaoyuan,HanYiliang
DOI: 10.7544/issn1000-1239.2015.20140605
2015 Vol. 52 (8): 1893-1901 [Abstract] ( 541 ) HTML (1 KB)  PDF (987 KB)  ( 479 )
1902 Using Code Mobility to Obfuscate Control Flow in Binary Codes
Chen Zhe,Wang Zhi,Wang Xiaochu,Jia Chunfu
DOI: 10.7544/issn1000-1239.2015.20140607
2015 Vol. 52 (8): 1902-1909 [Abstract] ( 653 ) HTML (1 KB)  PDF (1519 KB)  ( 545 )
1910 Texture-Based Multiresolution Flow Visualization
Lu Daying,Zhu Dengming, Wang Zhaoqi
DOI: 10.7544/issn1000-1239.2015.20140417
2015 Vol. 52 (8): 1910-1920 [Abstract] ( 584 ) HTML (1 KB)  PDF (5700 KB)  ( 617 )
1921 Activity Anomaly Detection Based on Vehicle Trajectory of Automatic Number Plate Recognition System
Sun Yuyan,Sun Limin,Zhu Hongsong,Zhou Xinyun
DOI: 10.7544/issn1000-1239.2015.20140673
2015 Vol. 52 (8): 1921-1929 [Abstract] ( 1008 ) HTML (1 KB)  PDF (3694 KB)  ( 705 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech