• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

A Normalized Structure Selection Algorithm Based on Coupling for Gaussian Mean Fields
Chen Yarui and Liao Shizhong
2010, 47(9): 1497-1503.
Abstract PDF
A Pareto Coevolutionary Algorithm Integrated with Dimension Extraction
Yang Liping, Huang Houkuan
2010, 47(9): 1504-1513.
Abstract PDF
Finite Basis for gfp-Model of Description Logic FLε
Tang Suqin, Cai Zixing, Wang Ju, Jiang Yuncheng
2010, 47(9): 1514-1521.
Abstract PDF
Theorem Proving Algorithm Based on Semi-Extension Rule
Zhang Liming, Ouyang Dantong, and Bai Hongtao
2010, 47(9): 1522-1529.
Abstract PDF
A Novel Neural Network Ensemble Method and Its Application in Precision Fertilization
Yu Helong, Liu Jie, Jin Di, Yang Yupeng, Liu Dayou
2010, 47(9): 1530-1538.
Abstract PDF
VOTCL and the Study of Its Application on Cross-Selling Problems
Zhou Guangtong, Yin Yilong, Guo Xinjian, and Dong Cailing
2010, 47(9): 1539-1547.
Abstract PDF
Research on a Common Feature Selection Method for Multiple Supervised Models
Wang Bo, Huang Jiuming, Jia Yan, and Yang Shuqiang
2010, 47(9): 1548-1557.
Abstract PDF
Information Pattern Analysis of Maneuvering Target Interceptor
Fan Hongqi, Lu Zaiqi, Wang Sheng, and Fu Qiang
2010, 47(9): 1558-1566.
Abstract PDF
Extended Domain Model Based Named Attribute Extraction
Wang Yu, Tan Songbo, Liao Xiangwen, Zeng Yiling
2010, 47(9): 1567-1573.
Abstract PDF
Research on Network-Warning Model Based on Dynamic Peer-to-Peer Overlay Hierarchy
Xu Jia, Feng Dengguo, Su Purui
2010, 47(9): 1574-1586.
Abstract PDF
Certificateless Signcryption Scheme Without Pairing
Zhu Hui, Li Hui, and Wang Yumin
2010, 47(9): 1587-1594.
Abstract PDF
Reversible Data Hiding Using Full-Context Prediction and Error Expansion
Zeng Xiao, Chen Zhenyong, Chen Ming, and Xiong Zhang
2010, 47(9): 1595-1603.
Abstract PDF
Identity-Based Authenticated Key Agreement Protocols in the Standard Model
Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi
2010, 47(9): 1604-1610.
Abstract PDF
The Trust Expansion and Control in Social Network Service
Kang Le, Jing Jiwu, and Wang Yuewu
2010, 47(9): 1611-1621.
Abstract PDF
Performance Evaluation of Adaptive Spray Routing for Opportunistic Networks
Xu Jia, Li Qianmu, Zhang Hong, Liu Fengyu
2010, 47(9): 1622-1632.
Abstract PDF
dK Series Analysis on Annotated AS Topology Graph
Yang Guoqiang, Dou Qiang, and Dou Wenhua
2010, 47(9): 1633-1642.
Abstract PDF
The Architecture and the Programming Model of a Data-Flow-Like Driven Tiled Stream Processor
Xu Guang, An Hong, Xu Mu, Liu Gu, Yao Ping, Ren Yongqing, and Wang Fang
2010, 47(9): 1643-1653.
Abstract PDF
A Method on Analyzing Performance Sensitivity of Applications Based on Partial Derivatives of Non-linear Regression Equation
Li Shengmei, Cheng Buqi, Gao Xingyu, Qiao Lin, Tang Zhizhong
2010, 47(9): 1654-1662.
Abstract PDF
Mean Shift Object Tracking Based on Adaptive Multi-Features Fusion
Yuan Guanglin, Xue Mogen, Han Yusheng, Zhou Pucheng
2010, 47(9): 1663-1671.
Abstract PDF