Advanced Search

    column
    Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion
    Li Shundong, Si Tiange, and Dai Yiqi
    2005, 42(10): 1647-1653.
    Abstract PDF
    Research on a Fuzzy Logic-Based Subjective Trust Management Model
    Tang Wen, Hu Jianbin, and Chen Zhong
    2005, 42(10): 1654-1659.
    Abstract PDF
    Secret Sharing-Based Rerouting in Rerouting-Based Anonymous Communication Systems
    Sui Hongfei, Chen Jian'er, Chen Songqiao, and Zhu Nafei
    2005, 42(10): 1660-1666.
    Abstract PDF
    Stationarity and Balance—Strategies and Methods of Elliptic Curve Cryptosystem Against Side Channel Attacks
    Liu Duo, Dai Yiqi, and Wang Daoshun
    2005, 42(10): 1667-1672.
    Abstract PDF
    A Dynamic Defense Against Denial of Service in Two-Party Security Protocols
    Wei Jianfan, Duan Yunsuo, Tang Liyong, Chen Zhong
    2005, 42(10): 1673-1678.
    Abstract PDF
    Intrusion-Detection Alerts Processing Based on Fuzzy Comprehensive Evaluation
    Mu Chengpo, Huang Houkuan, Tian Shengfeng, Lin Youfang, and Qin Yuanhui
    2005, 42(10): 1679-1685.
    Abstract PDF
    An Optimistic Payment Protocol Based on Mobile Agents
    Liu Yi, Pang Liaojun, and Wang Yumin
    2005, 42(10): 1686-1691.
    Abstract PDF
    The Combined Use of FAPKC Without Compromising the Security of the Cryptosystem
    Han Xiaoxi, Yao Gang
    2005, 42(10): 1692-1697.
    Abstract PDF
    A Queue Management Algorithm Fit for Network Processors
    Zheng Bo, Lin Chuang, and Li Yin
    2005, 42(10): 1698-1705.
    Abstract PDF
    On Retrieval System Evaluation of Search Engines
    Peng Bo and Yan Hongfei
    2005, 42(10): 1706-1711.
    Abstract PDF
    An Adaptive Initiative Predictive Handoff Mechanism for Mobile IPv6
    Ou Yingfeng, Li Renfa, and Xia Shunhui
    2005, 42(10): 1712-1717.
    Abstract PDF
    Face Image Super-Resolution Reconstruction Based on Recognition and Projection onto Convex Sets
    Huang Hua, Fan Xin, Qi Chun, and Zhu Shihua
    2005, 42(10): 1718-1725.
    Abstract PDF
    Moving Object Tracking Based on Location and Confidence of Pixels
    Shi Hua, Li Cuihua, Wei Fengmei, Wang Huawei
    2005, 42(10): 1726-1732.
    Abstract PDF
    Multiple Reference Minutiae Based Fingerprint Matching
    Zhu En, Yin Jianping, and Zhang Guomin
    2005, 42(10): 1733-1739.
    Abstract PDF
    Tracking Cardiac MRI Tag by Markov Random Field Theory
    Tang Min, Wang Yuanquan, Pheng Ann Heng, Xia Deshen
    2005, 42(10): 1740-1745.
    Abstract PDF
    Different Complex Wavelet Transforms for Texture Retrieval and Similarity Measure
    Shang Zhaowei, Zhang Mingxin, Zhao Ping, Shen Junyi
    2005, 42(10): 1746-1751.
    Abstract PDF
    A Cluster Algorithm of Automatic Key Frame Extraction Based on Adaptive Threshold
    Wang Fangshi, Xu De, and Wu Weixin
    2005, 42(10): 1752-1757.
    Abstract PDF
    A New Zero-Block Detection Method for H.264/AVC
    Cheng Yun, Dai Kui, Wang Zhiying, Shen Li, and Guo Jianjun
    2005, 42(10): 1758-1762.
    Abstract PDF
    An Efficient Matching Algorithm for RDF Graph Patterns
    Wang Jinling, Jin Beihong, and Li Jing
    2005, 42(10): 1763-1770.
    Abstract PDF
    Simultaneous Sliding Window Join Approach over Multiple Data Streams
    Qian Jiangbo, Xu Hongbing, Wang Yongli, Liu Xuejun, Dong Yisheng
    2005, 42(10): 1771-1778.
    Abstract PDF
    A Survey of Transaction Processing Technology
    Ren Yi, Wu Quanyuan, Jia Yan, Han Weihong, and Guan Jianbo
    2005, 42(10): 1779-1784.
    Abstract PDF
    Study of Some Key Techniques in Mining Association Rule
    Chen Geng, Zhu Yuquan, Yang Hebiao, Lu Jieping, Song Yuqing, Sun Zhihui
    2005, 42(10): 1785-1789.
    Abstract PDF
    The HJPS Training Algorithm for Multilayer Feedforward Neural Networks
    Li Yanlai, Wang Kuanquan, David Zhang
    2005, 42(10): 1790-1795.
    Abstract PDF
    Feature Selection for Cancer Classification Based on Support Vector Machine
    Li Yingxin and Ruan Xiaogang
    2005, 42(10): 1796-1801.
    Abstract PDF
    QuCOM: A QoS Management Model for Component System
    Liao Yuan, Huai Xiaoyong, Li Mingshu
    2005, 42(10): 1802-1808.
    Abstract PDF
    An Algorithm for Finding All Hamiltonian Cycles in Digraph via Hierarchical Correlation
    Wen Zhonghua, Jiang Yunfei
    2005, 42(10): 1809-1814.
    Abstract PDF
    On the Problem of How to Place the Observers in Passive Testing
    Zhao Baohua, Guo Xionghui, QianLan, and Qu Yugui
    2005, 42(10): 1815-1819.
    Abstract PDF
    Research on I/O Optimizations in Out-of-Core Computation
    Tang Jianqi, Fang binxing, Hu Mingzeng, and Wang Wei
    2005, 42(10): 1820-1825.
    Abstract PDF
    1.5Gbps High Speed Serial Data Recovery Circuit Made from Standard Cells
    Sun Yongming, Lin Qi
    2005, 42(10): 1826-1831.
    Abstract PDF