计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2016 Vol. 53, No. 11
Published: 01 November 2016

   
 
2431 Security Analysis and Enhancement of Third-Party Android Push Service
Lu Yemian, Li Yifu, Ying Lingyun, Gu Yacong, Su Purui, Feng Dengguo
DOI: 10.7544/issn1000-1239.2016.20150528
2016 Vol. 53 (11): 2431-2445 [Abstract] ( 718 ) HTML (1 KB)  PDF (2832 KB)  ( 542 )
2446 Authentication and Key Agreement Protocol for Multi-Server Architecture
Wan Tao, Liu Zunxiong, Ma Jianfeng
DOI: 10.7544/issn1000-1239.2016.20150107
2016 Vol. 53 (11): 2446-2453 [Abstract] ( 521 ) HTML (1 KB)  PDF (876 KB)  ( 554 )
2454 A Privacy Protection Mechanism for Dynamic Data Based on Partition-Confusion
Zhang Honglei, Shi Yuliang, Zhang Shidong, Zhou Zhongmin, Cui Lizhen
DOI: 10.7544/issn1000-1239.2016.20150553
2016 Vol. 53 (11): 2454-2464 [Abstract] ( 409 ) HTML (1 KB)  PDF (2687 KB)  ( 396 )
2465 A White-Box-Cryptography-Based Scheme for the Secure Chip of DCAS Terminal
Xu Tao, Wu Chuankun, Zhang Weiming
DOI: 10.7544/issn1000-1239.2016.20150546
2016 Vol. 53 (11): 2465-2474 [Abstract] ( 431 ) HTML (1 KB)  PDF (3114 KB)  ( 285 )
2475 An Efficient 1-out-of-n Oblivious Transfer Protocol with Full Simulation
Wei Xiaochao, Jiang Han, Zhao Chuan
DOI: 10.7544/issn1000-1239.2016.20150505
2016 Vol. 53 (11): 2475-2481 [Abstract] ( 586 ) HTML (1 KB)  PDF (837 KB)  ( 322 )
2482 An Identity-Based Authenticated Key Exchange Protocol from RLWE
Zhao Xiufeng, Gao Haiying, Wang Ailan
DOI: 10.7544/issn1000-1239.2016.20150547
2016 Vol. 53 (11): 2482-2490 [Abstract] ( 610 ) HTML (1 KB)  PDF (910 KB)  ( 390 )
2491 Reputation-Based Defense Scheme Against Pollution Attacks on Network Coding
Wang Tiefeng, Cai Ying, Zhang Yujie
DOI: 10.7544/issn1000-1239.2016.20150502
2016 Vol. 53 (11): 2491-2499 [Abstract] ( 442 ) HTML (1 KB)  PDF (1620 KB)  ( 500 )
2500 MapReduce-Based Network Property Verification Technique for OpenFlow Network
Liu Yi, Lei Cheng, Zhang Hongqi, Yang Yingjie
DOI: 10.7544/issn1000-1239.2016.20150521
2016 Vol. 53 (11): 2500-2511 [Abstract] ( 461 ) HTML (1 KB)  PDF (2577 KB)  ( 457 )
2512 Survey of MPTCP-Based Multipath Transmission Optimization Hot!
Xue Kaiping, Chen Ke, Ni Dan, Zhang Hong, Hong Peilin
DOI: 10.7544/issn1000-1239.2016.20150589
2016 Vol. 53 (11): 2512-2529 [Abstract] ( 1261 ) HTML (1 KB)  PDF (3260 KB)  ( 586 )
2530 A Multi-Level Fault Tolerance Mechanism for Disk-Resident Pregel-Like Systems
Bi Yahui, Jiang Suyang, Wang Zhigang, Leng Fangling, Bao Yubin, Yu Ge, Qian Ling
DOI: 10.7544/issn1000-1239.2016.20150619
2016 Vol. 53 (11): 2530-2541 [Abstract] ( 392 ) HTML (1 KB)  PDF (3162 KB)  ( 251 )
2542 Caption Generation from Product Image Based on Tag Refinement and Syntactic Tree
Zhang Hongbin, Ji Donghong, Yin Lan, Ren Yafeng, Niu Zhengyu
DOI: 10.7544/issn1000-1239.2016.20150906
2016 Vol. 53 (11): 2542-2555 [Abstract] ( 490 ) HTML (1 KB)  PDF (2820 KB)  ( 325 )
2556 Algorithm of Computing Minimal Hitting Set Based on the Structural Feature of SE-Tree
Liu Siguang, Ouyang Dantong, Wang Yiyuan, Jia Fengyu, Zhang Liming
DOI: 10.7544/issn1000-1239.2016.20150396
2016 Vol. 53 (11): 2556-2566 [Abstract] ( 409 ) HTML (1 KB)  PDF (3268 KB)  ( 255 )
2567 Kernel Sparse Representation Classification with Group Weighted Constraints
Zheng Jianwei, Yang Ping, Wang Wanliang, Bai Cong
DOI: 10.7544/issn1000-1239.2016.20150743
2016 Vol. 53 (11): 2567-2582 [Abstract] ( 477 ) HTML (1 KB)  PDF (4779 KB)  ( 377 )
2583 The DNA Self-Assembly Computing Model for Solving Perfect Matching Problem of Bipartite Graph
Lan Wenfei, Xing Zhibao, Huang Jun, Qiang Xiaoli
DOI: 10.7544/issn1000-1239.2016.20150312
2016 Vol. 53 (11): 2583-2593 [Abstract] ( 388 ) HTML (1 KB)  PDF (3782 KB)  ( 431 )
2594 Multiobjective Clustering Algorithm with Fuzzy Centroids for Categorical Data
Zhou Zhiping, Zhu Shuwei, Zhang Daowen
DOI: 10.7544/issn1000-1239.2016.20150467
2016 Vol. 53 (11): 2594-2606 [Abstract] ( 470 ) HTML (1 KB)  PDF (3152 KB)  ( 366 )
2607 Analysis of Concept Drifting and Uncertainty in an Information Table
Deng Dayong, Miao Duoqian, Huang Houkuan
DOI: 10.7544/issn1000-1239.2016.20150803
2016 Vol. 53 (11): 2607-2612 [Abstract] ( 439 ) HTML (1 KB)  PDF (658 KB)  ( 300 )
2613 Under-Sampling Method Based on Sample Weight for Imbalanced Data
Xiong Bingyan, Wang Guoyin, Deng Weibin
DOI: 10.7544/issn1000-1239.2016.20150593
2016 Vol. 53 (11): 2613-2622 [Abstract] ( 650 ) HTML (1 KB)  PDF (1155 KB)  ( 622 )
2623 Uncorrelated Locality Preserving Discriminant Analysis Based on Bionics
Ning Xin, Li Weijun , Li Haoguang, Liu Wenjie
DOI: 10.7544/issn1000-1239.2016.20150630
2016 Vol. 53 (11): 2623-2629 [Abstract] ( 398 ) HTML (1 KB)  PDF (1283 KB)  ( 288 )
2630 A Method for Social Network User Identity Feature Recognition
Hu Kaixian, Liang Ying, Xu Hongbo, Bi Xiaodi, Zuo Yao
DOI: 10.7544/issn1000-1239.2016.20150219
2016 Vol. 53 (11): 2630-2644 [Abstract] ( 584 ) HTML (1 KB)  PDF (5372 KB)  ( 425 )
2645 Multi-User Location Proximity Prediction in Offline Ephemeral Social Networks
Liao Guoqiong, Wang Tingli, Deng Kun, Wan Changxuan
DOI: 10.7544/issn1000-1239.2016.20150388
2016 Vol. 53 (11): 2645-2653 [Abstract] ( 380 ) HTML (1 KB)  PDF (2307 KB)  ( 426 )
2654 Collaboration Algorithm in Social Networks Based on Tasks with Partial Relation
Liu Yong, Han Xue, Li Jinbao, Ren Qianqian, Wang Nan
DOI: 10.7544/issn1000-1239.2016.20150617
2016 Vol. 53 (11): 2654-2665 [Abstract] ( 374 ) HTML (1 KB)  PDF (2898 KB)  ( 383 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech