Advanced Search

    column
    A Survey of Network Information Content Audit
    Sun Qindong, Guan Xiaohong, Zhou Yadong
    2009, 46(8): 1241-1250.
    Abstract PDF
    A Cooperative Mechanism for Inter-Domain Routing Management
    Hu Ning, Zou Peng, and Zhu Peidong
    2009, 46(8): 1251-1259.
    Abstract PDF
    IPSBSAR: An Incremental P2P Search Algorithm Based on Social Acquaintance Relationship
    Zhu Guiming, Jin Shiyao, Guo Deke
    2009, 46(8): 1260-1269.
    Abstract PDF
    Delay /Disruption-Tolerant Network Study
    Li Xiangqun, Liu Lixiang, Hu Xiaohui, Zeng Kaixiang
    2009, 46(8): 1270-1277.
    Abstract PDF
    Coarse-Grained Dataflow Network Processor:Architecture and Prototype Design
    Li Tao, Zhang Xiaoming, and Sun Zhigang
    2009, 46(8): 1278-1284.
    Abstract PDF
    A QoS-Oriented Approach for Web Service Group Testing
    Deng Xiaopeng, Xing Chunxiao, Zhang Yong, Cai Lianhong
    2009, 46(8): 1285-1293.
    Abstract PDF
    Extension of Model Checking Tool of Colored Petri Nets and Its Applications in Web Service Composition
    Men Peng and Duan Zhenhua
    2009, 46(8): 1294-1303.
    Abstract PDF
    An Adaptive Alert Correlation Method Based on Pattern Mining and Clustering Analysis
    Tian Zhihong, Zhang Yongzheng, Zhang Weizhe, Li Yang, Ye Jianwei
    2009, 46(8): 1304-1315.
    Abstract PDF
    Research on Neural Cryptographic Protocols
    Chen Tieming, Samuel H. Huang, Liu Duo, Cai Jiamei
    2009, 46(8): 1316-1324.
    Abstract PDF
    An Approach to Data Sealing Based on Trusted Virtualization Platform
    Wang Dan, Feng Dengguo, and Xu Zhen
    2009, 46(8): 1325-1333.
    Abstract PDF
    Detecting Distributed Denial of Service Attack Based on Address Correlation Value
    Cheng Jieren, Yin Jianping, Liu Yun, Cai Zhiping, Li Min
    2009, 46(8): 1334-1340.
    Abstract PDF
    A Fast and Exact Single Pattern Matching Algorithm
    Fan Hongbo, Yao Nianmin
    2009, 46(8): 1341-1348.
    Abstract PDF
    Image Copy Detection with Rotation and Scaling Tolerance
    Zou Fuhao, Li Xiaowei, Xu Zhihua, Ling Hefei, and Li Ping
    2009, 46(8): 1349-1356.
    Abstract PDF
    Coalition Structure Generation with Worst-Case Finite Bound from the Optimal Guarantees
    Hu Shanli, Li Shaofang, Shi Chunyi
    2009, 46(8): 1357-1363.
    Abstract PDF
    Prediction and Abnormal Behavior Detection of Agent Dynamic Interaction Trust
    Tong Xiangrong, Huang Houkuan, Zhang Wei
    2009, 46(8): 1364-1370.
    Abstract PDF
    An Automated Test Data Generation Algorithm Based on Selective Redundancy
    Li Junyi, Li Renfa, Sun Jiaguang
    2009, 46(8): 1371-1377.
    Abstract PDF
    Operating and Analyzing the Reproducibility of Empty Marking Nets
    Ye Jianhong, Song Wen, Sun Shixin
    2009, 46(8): 1378-1385.
    Abstract PDF
    Transactional Memory System
    Peng Lin, Xie Lunguo, and Zhang Xiaoqiang
    2009, 46(8): 1386-1398.
    Abstract PDF
    A Novel Method Containing the Radial Error Propagation in Self-Servowriting in Hard Disk
    Zhao Xiaogang, Wang Haiwei, and Xie Changsheng
    2009, 46(8): 1399-1407.
    Abstract PDF
    Replica Placement and Update Mechanism for Individual QoS-Restricted Requirement in Data Grids
    Fu Wei, Xiao Nong, and Lu Xicheng
    2009, 46(8): 1408-1415.
    Abstract PDF