Advanced Search

    column
    A Survey of Research on Inter-Domain Authorization Interoperation
    Wang Yazhe and Feng Dengguo
    2010, 47(10): 1673-1689.
    Abstract PDF
    Event Matching Algorithm Based on the Judgment of Redundant Attributes in Publish/Subscribe Systems
    Liu Guo, Zhou Zhong, and Wu Wei
    2010, 47(10): 1690-1699.
    Abstract PDF
    t-PCRTT: An Adaptive Segmentation Algorithm of PCRTT
    Wang Zilei, Xu Shubin, and Xi Hongsheng
    2010, 47(10): 1700-1708.
    Abstract PDF
    An Approach to Mobile Position Tracking Based on Support Vector Regression and Game Theory
    Zeng Fanzi, Liang Zhenhua, and Li Renfa
    2010, 47(10): 1709-1713.
    Abstract PDF
    Research on Defense Strategies Selection Based on Attack-Defense Stochastic Game Model
    Jiang Wei, Fang Binxing, Tian Zhihong, Zhang Hongli
    2010, 47(10): 1714-1723.
    Abstract PDF
    Hierarchical Online Risk Assessment for Intrusion Scenarios
    Mu Chengpo, Huang Houkuan, Tian Shengfeng
    2010, 47(10): 1724-1732.
    Abstract PDF
    Weight Affinity Propagation and Its Application to Text Clustering
    Guan Renchu, Pei Zhili, Shi Xiaohu, Yang Chen, Liang Yanchun
    2010, 47(10): 1733-1740.
    Abstract PDF
    Implementation of a Meta-Property Based Quantity Attribute-Value Extraction System
    Lu Han, Cao Cungen, Wang Shi
    2010, 47(10): 1741-1748.
    Abstract PDF
    K-Modes Clustering Algorithm Based on a New Distance Measure
    Liang Jiye, Bai Liang, Cao Fuyuan
    2010, 47(10): 1749-1755.
    Abstract PDF
    A Propositional Planning Encoding Method by Reducing Action Variables
    Lü Shuai, Liu Lei, Jiang Hong, and Shi Jingjing
    2010, 47(10): 1756-1763.
    Abstract PDF
    Position Prediction Based on Adaptive Multi-Order Markov Model
    Lü Mingqi, Chen Ling, Chen Gencai
    2010, 47(10): 1764-1770.
    Abstract PDF
    Gridded Dominant Graph: A More Efficient Index Structure for top-k Queries Based on Reverse Dominant Point Set
    Gan Liang, Jin Xin, Jia Yan, Li Aiping, Pan Yangke
    2010, 47(10): 1771-1784.
    Abstract PDF
    An Algorithm for Sequence Similarity Query with Optimized Multiple Filtering
    Dai Dongbo, Tang Chunlei, Qiu Boren, Xiong Yun, and Zhu Yangyong
    2010, 47(10): 1785-1796.
    Abstract PDF
    Research on Database Transaction Recovery Log and Intrusion Response
    Chen Chi, Feng Dengguo, and Xu Zhen
    2010, 47(10): 1797-1804.
    Abstract PDF
    LHFR: A Hierarchical Failure Recovery Algorithm for Long Running Transactions
    Ren Yi, Guan Jianbo, Ao Qi, Dai Huadong, and Wu Qingbo
    2010, 47(10): 1805-1811.
    Abstract PDF
    A Robust Image Copy Detection Scheme Using Ordinal Measure of Full DCT Coefficients
    Ling Hefei, Xu Zhihua, Zou Fuhao, Lu Zhengding, and Li Ping
    2010, 47(10): 1812-1822.
    Abstract PDF
    Highlights Extraction for Soccer Video Based on Affection Arousal
    Yu Junqing, He Huanhuan, He Yunfeng
    2010, 47(10): 1823-1831.
    Abstract PDF
    Research on Object Storage Device End Data Management Strategy
    Liu Jingning, Xie Liming, Feng Dan, and Lü Man
    2010, 47(10): 1832-1839.
    Abstract PDF
    JUTA: An Automated Unit Testing Framework for Java
    Yan Jun, Guo Tao, Ruan Hui, Xuan Jifeng
    2010, 47(10): 1840-1848.
    Abstract PDF
    Context-Aware Recommendation Algorithm Based on Fuzzy C-Means Clustering
    Zhang Fuzhi, Chang Junfeng, and Zhou Quanqiang
    2010, 47(10): 2185-2194.
    Abstract PDF