计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2016 Vol. 53, No. 8
Published: 01 August 2016

   
 
1651 A Ranking Based Poisson Matrix Factorization Model for Point-of-Interest Recommendation
Yu Yonghong, Gao Yang,Wang Hao
DOI: 10.7544/issn1000-1239.2016.20160202
2016 Vol. 53 (8): 1651-1663 [Abstract] ( 987 ) HTML (1 KB)  PDF (3051 KB)  ( 756 )
1664 Collaborative Filtering Recommendation Algorithm Combining Community Structure and Interest Clusters
Guo Hongyi, Liu Gongshen, Su Bo,Meng Kui
DOI: 10.7544/issn1000-1239.2016.20160175
2016 Vol. 53 (8): 1664-1672 [Abstract] ( 628 ) HTML (1 KB)  PDF (2068 KB)  ( 692 )
1673 Online Consumptions Prediction via Modeling User Behaviors and Choices
Zeng Xianyu, Liu Qi, Zhao Hongke, Xu Tong, Wang Yijun,Chen Enhong
DOI: 10.7544/issn1000-1239.2016.20160103
2016 Vol. 53 (8): 1673-1683 [Abstract] ( 940 ) HTML (1 KB)  PDF (2515 KB)  ( 742 )
1684 Feature Selection Based on the Measurement of Correlation Information Entropy
Dong Hongbin, Teng Xuyang,Yang Xue
DOI: 10.7544/issn1000-1239.2016.20160172
2016 Vol. 53 (8): 1684-1695 [Abstract] ( 716 ) HTML (1 KB)  PDF (2019 KB)  ( 773 )
1696 Consistent Collective Entity Linking Algorithm
Liu Qiao, Zhong Yun, Liu Yao, Wu Zufeng,Qin Zhiguang
DOI: 10.7544/issn1000-1239.2016.20160192
2016 Vol. 53 (8): 1696-1708 [Abstract] ( 527 ) HTML (1 KB)  PDF (2387 KB)  ( 409 )
1709 Influence Maximization Across Multi-Channels in Social Network
Li Xiaokang, Zhang Xi, Sun Hao,Sun Guangzhong
DOI: 10.7544/issn1000-1239.2016.20160211
2016 Vol. 53 (8): 1709-1718 [Abstract] ( 651 ) HTML (1 KB)  PDF (2635 KB)  ( 498 )
1719 Self-Adaptive Clustering Based on Local Density by Descending Search
Xu Zhengguo, Zheng Hui, He Liang,Yao Jiaqi
DOI: 10.7544/issn1000-1239.2016.20160136
2016 Vol. 53 (8): 1719-1728 [Abstract] ( 608 ) HTML (1 KB)  PDF (4102 KB)  ( 530 )
1729 Tensor Representation Based Dynamic Outlier Detection Method in Heterogeneous Network
Liu Lu, Zuo Wanli,Peng Tao
DOI: 10.7544/issn1000-1239.2016.20160178
2016 Vol. 53 (8): 1729-1739 [Abstract] ( 579 ) HTML (1 KB)  PDF (3961 KB)  ( 994 )
1740 Mining Patent Knowledge for Automatic Keyword Extraction
Chen Yiqun, Zhou Ruqi, Zhu Weiheng, Li Mengting,Yin Jian
DOI: 10.7544/issn1000-1239.2016.20160195
2016 Vol. 53 (8): 1740-1752 [Abstract] ( 847 ) HTML (1 KB)  PDF (2962 KB)  ( 522 )
1753 Protein Function Prediction Using Positive and Negative Examples
Fu Guangyuan, Yu Guoxian, Wang Jun,Guo Maozu
DOI: 10.7544/issn1000-1239.2016.20160196
2016 Vol. 53 (8): 1753-1765 [Abstract] ( 589 ) HTML (1 KB)  PDF (1417 KB)  ( 495 )
1766 Petri Nets Based Recognition of Model Deviation Domains and Model Repair
Du Yuyue, Sun Ya’nan,Liu Wei
DOI: 10.7544/issn1000-1239.2016.20160099
2016 Vol. 53 (8): 1766-1780 [Abstract] ( 443 ) HTML (1 KB)  PDF (3172 KB)  ( 335 )
1781 Online Transfer Learning for Mining Recurring Concept in Data Stream Classification
Wen Yimin, Tang Shiqi, Feng Chao,Gao Kai
DOI: 10.7544/issn1000-1239.2016.20160223
2016 Vol. 53 (8): 1781-1791 [Abstract] ( 905 ) HTML (1 KB)  PDF (3187 KB)  ( 642 )
1792 HSSM: A Hierarchical Method for Streaming Submodular Maximization
Zhang Fenxiang, Chen Huahui, Qian Jiangbo,Dong Yihong
DOI: 10.7544/issn1000-1239.2016.20160140
2016 Vol. 53 (8): 1792-1805 [Abstract] ( 464 ) HTML (1 KB)  PDF (3551 KB)  ( 368 )
1806 IncPR: An Incremental Parallel PageRank Algorithm
Jiang Shuangshuang, Liao Qun, Yang Yulu,Li Tao
DOI: 10.7544/issn1000-1239.2016.20160210
2016 Vol. 53 (8): 1806-1818 [Abstract] ( 621 ) HTML (1 KB)  PDF (3278 KB)  ( 408 )
1819 SparkCRF: A Parallel Implementation of CRFs Algorithm with Spark
Zhu Jizhao, Jia Yantao, Xu Jun, Qiao Jianzhong, Wang Yuanzhuo,Cheng Xueqi
DOI: 10.7544/issn1000-1239.2016.20160197
2016 Vol. 53 (8): 1819-1828 [Abstract] ( 957 ) HTML (1 KB)  PDF (3386 KB)  ( 565 )
1829 Survey of Memory Address Leakage and Its Defense Hot!
Fu Jianming, Liu Xiuwen, Tang Yi,Li Pengwei
DOI: 10.7544/issn1000-1239.2016.20150526
2016 Vol. 53 (8): 1829-1849 [Abstract] ( 682 ) HTML (1 KB)  PDF (3696 KB)  ( 521 )
1850 Atomic Algorithm Against Simple Power Attack of SM2
Han Xiaowei, Wu Liji, Wang Beibei,Wang An
DOI: 10.7544/issn1000-1239.2016.20150052
2016 Vol. 53 (8): 1850-1856 [Abstract] ( 496 ) HTML (1 KB)  PDF (2706 KB)  ( 346 )
1857 XOR-Based Region Incrementing Visual Cryptography Scheme by Random Grids
Hu Hao, Shen Gang, Yu Bin,Mahao Junfu
DOI: 10.7544/issn1000-1239.2016.20150058
2016 Vol. 53 (8): 1857-1866 [Abstract] ( 411 ) HTML (1 KB)  PDF (2746 KB)  ( 263 )
1867 Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage
Ma Haiying, Zeng Guosun, Bao Zhihua, Chen Jianping, Wang Jinhua,Wang Zhanjun
DOI: 10.7544/issn1000-1239.2016.20140787
2016 Vol. 53 (8): 1867-1878 [Abstract] ( 429 ) HTML (1 KB)  PDF (1310 KB)  ( 324 )
1879 Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model
Chen MingYuan Shaoliang
DOI: 10.7544/issn1000-1239.2016.20150197
2016 Vol. 53 (8): 1879-1892 [Abstract] ( 371 ) HTML (1 KB)  PDF (1372 KB)  ( 368 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech