Advanced Search

    column
    A Normalized Structure Selection Algorithm Based on Coupling for Gaussian Mean Fields
    Chen Yarui and Liao Shizhong
    2010, 47(9): 1497-1503.
    Abstract PDF
    A Pareto Coevolutionary Algorithm Integrated with Dimension Extraction
    Yang Liping, Huang Houkuan
    2010, 47(9): 1504-1513.
    Abstract PDF
    Finite Basis for gfp-Model of Description Logic FLε
    Tang Suqin, Cai Zixing, Wang Ju, Jiang Yuncheng
    2010, 47(9): 1514-1521.
    Abstract PDF
    Theorem Proving Algorithm Based on Semi-Extension Rule
    Zhang Liming, Ouyang Dantong, and Bai Hongtao
    2010, 47(9): 1522-1529.
    Abstract PDF
    A Novel Neural Network Ensemble Method and Its Application in Precision Fertilization
    Yu Helong, Liu Jie, Jin Di, Yang Yupeng, Liu Dayou
    2010, 47(9): 1530-1538.
    Abstract PDF
    VOTCL and the Study of Its Application on Cross-Selling Problems
    Zhou Guangtong, Yin Yilong, Guo Xinjian, and Dong Cailing
    2010, 47(9): 1539-1547.
    Abstract PDF
    Research on a Common Feature Selection Method for Multiple Supervised Models
    Wang Bo, Huang Jiuming, Jia Yan, and Yang Shuqiang
    2010, 47(9): 1548-1557.
    Abstract PDF
    Information Pattern Analysis of Maneuvering Target Interceptor
    Fan Hongqi, Lu Zaiqi, Wang Sheng, and Fu Qiang
    2010, 47(9): 1558-1566.
    Abstract PDF
    Extended Domain Model Based Named Attribute Extraction
    Wang Yu, Tan Songbo, Liao Xiangwen, Zeng Yiling
    2010, 47(9): 1567-1573.
    Abstract PDF
    Research on Network-Warning Model Based on Dynamic Peer-to-Peer Overlay Hierarchy
    Xu Jia, Feng Dengguo, Su Purui
    2010, 47(9): 1574-1586.
    Abstract PDF
    Certificateless Signcryption Scheme Without Pairing
    Zhu Hui, Li Hui, and Wang Yumin
    2010, 47(9): 1587-1594.
    Abstract PDF
    Reversible Data Hiding Using Full-Context Prediction and Error Expansion
    Zeng Xiao, Chen Zhenyong, Chen Ming, and Xiong Zhang
    2010, 47(9): 1595-1603.
    Abstract PDF
    Identity-Based Authenticated Key Agreement Protocols in the Standard Model
    Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi
    2010, 47(9): 1604-1610.
    Abstract PDF
    The Trust Expansion and Control in Social Network Service
    Kang Le, Jing Jiwu, and Wang Yuewu
    2010, 47(9): 1611-1621.
    Abstract PDF
    Performance Evaluation of Adaptive Spray Routing for Opportunistic Networks
    Xu Jia, Li Qianmu, Zhang Hong, Liu Fengyu
    2010, 47(9): 1622-1632.
    Abstract PDF
    dK Series Analysis on Annotated AS Topology Graph
    Yang Guoqiang, Dou Qiang, and Dou Wenhua
    2010, 47(9): 1633-1642.
    Abstract PDF
    The Architecture and the Programming Model of a Data-Flow-Like Driven Tiled Stream Processor
    Xu Guang, An Hong, Xu Mu, Liu Gu, Yao Ping, Ren Yongqing, and Wang Fang
    2010, 47(9): 1643-1653.
    Abstract PDF
    A Method on Analyzing Performance Sensitivity of Applications Based on Partial Derivatives of Non-linear Regression Equation
    Li Shengmei, Cheng Buqi, Gao Xingyu, Qiao Lin, Tang Zhizhong
    2010, 47(9): 1654-1662.
    Abstract PDF
    Mean Shift Object Tracking Based on Adaptive Multi-Features Fusion
    Yuan Guanglin, Xue Mogen, Han Yusheng, Zhou Pucheng
    2010, 47(9): 1663-1671.
    Abstract PDF