All
Title
Author
Keyword
Abstract
DOI
Category
Address
Fund
Advanced Search
Home
About Journal
About the Journal
Index in
Editorial Board
Journal Online
In Press
Current Issue
Cover and Content
Archive
Top View
Top Download
Top Cited
Advance Search
Author Center
Author Guidelines
Academic Ethics
Submission or Manuscript
Download
FAQ
Review Center
Peer Review
Editor-in-Chief
Area Editor-in-Chief
Editorial Office
Self Recommendation
Contact Us
Subscribe
Contact Us
中文
All
Title
Author
Keyword
Abstract
DOI
Category
Address
Fund
Home
About Journal
About the Journal
Index in
Editorial Board
Journal Online
In Press
Current Issue
Cover and Content
Archive
Top View
Top Download
Top Cited
Advance Search
Author Center
Author Guidelines
Academic Ethics
Submission or Manuscript
Download
FAQ
Review Center
Peer Review
Editor-in-Chief
Area Editor-in-Chief
Editorial Office
Self Recommendation
Contact Us
Subscribe
Contact Us
中文
column
Select articles
Binary Representation of Similarity
Yu Jian
2010, 47(12)
Abstract
PDF
(
)
A Simulation Approach Based on the Notion of Emergence for Analyzing MAS Trust Model
Ren Chuanjun, Huang Hongbing, and Jin Shiyao
2010, 47(12)
Abstract
PDF
(
)
A Privacy-Preserving Data Publishing Algorithm for Clustering Application
Chong Zhihong, Ni Weiwei, Liu Tengteng, and Zhang Yong
2010, 47(12)
Abstract
PDF
(
)
Efficient AttributeBased Ring Signature Schemes
Chen Shaozhen
,
Wang Wenqiang
,
Peng Shujuan
2010, 47(12)
Abstract
PDF
(
)
Algorithm Analysis and Efficient Parallelization of the Single Particle Reconstruction Software Package: EMAN
Fan Liya
,
Zhang Fa
,
Wang Gongming
,
Liu Zhiyong
2010, 47(12)
Abstract
PDF
(
)
A Method to Adjust Minutiae Location and Direction in Nonlinear Distorted Fingerprint Image
Chen Hui, Yin Jianping, and Zhu En
2010, 47(12)
Abstract
PDF
(
)
A Survey of Web Page Cleaning Research
Mao Xianling, He Jing, and Yan Hongfei
2010, 47(12)
Abstract
PDF
(
)
Resource Assignment Algorithm Under Multi-Agent for P2P MMOG
Luo Jia
,
Chang Huiyou
,
Yi Yang
2010, 47(12)
Abstract
PDF
(
)
Overview of Botnet Detection
Wang Hailong, Gong Zhenghu, and Hou Jie
2010, 47(12)
Abstract
PDF
(
)
A Fast Motion Detection Method Based on Improved Codebook Model
Xu Cheng, Tian Zheng, and Li Renfa
2010, 47(12)
Abstract
PDF
(
)
Construction of Local Adjustable C2 Parametic Quartic Interpolation Curve
He Ping
,
Zhang Caiming
,
Zhou Jingbo
2010, 47(12)
Abstract
PDF
(
)
Focused Web Entity Search Using the Linked-Path Prediction Model
Huang Jianbin
,
Sun Heli
2010, 47(12)
Abstract
PDF
(
)
A Density-Based Local Outlier Detecting Algorithm
Hu Caiping and Qin Xiaolin
2010, 47(12)
Abstract
PDF
(
)
A Template Technology for Transplanting from Single-GPU Programs to Multi-GPU Programs
Li Jianjiang
,
Li Xinggang
,
Lu Chuan
,
Fan Shaoming
2010, 47(12)
Abstract
PDF
(
)
The Information Model for a Class of Imperfect Information Game
Ma Xiao, Wang Xuan, and Wang Xiaolong
2010, 47(12)
Abstract
PDF
(
)
Improved Single Image Dehazing Using Dark Channel Prior
Hu Wei
,
Yuan Guodong
,
Dong Zhao
,
Shu Xueming
2010, 47(12)
Abstract
PDF
(
)
High Precision Timestamps in Network Measurement
Xie Yingke
,
Wang Jiandong
,
Zhu Chao
,
Zhao Zili
,
Han Chengde
2010, 47(12)
Abstract
PDF
(
)
Writing Mechanism in Digital Organism File System
Qiu Yuanjie and Liu Xinsong
2010, 47(12)
Abstract
PDF
(
)
CrossDomain Opinion Analysis Based on RandomWalk Model
Wu Qiong
,
Tan Songbo
,
Xu Hongbo
,
Duan Miyi
,
Cheng Xueqi
2010, 47(12)
Abstract
PDF
(
)
Recovering the Use Case from Object-Oriented Programs by Static Analysis
Ye Pengfei, Peng Xin, and Zhao Wenyun
2010, 47(12)
Abstract
PDF
(
)
×
Close
Export File
Citation
Format
RIS(for EndNote,Reference Manager,ProCite)
BibTex
Txt
Content
Citation Only
Citation and Abstract
×
Close
Citation