• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Regularization Path Algorithm of SVM via Positive Definite Matrix
Liao Shizhong, Wang Mei, Zhao Zhihui
2013, 50(11): 2253-2261.
Abstract PDF
A Co-Training Method Based on Teaching-Learning Model
Hu Juhua, Jiang Yuan, and Zhou Zhihua
2013, 50(11): 2262-2268.
Abstract PDF
An Adaptive Large Margin Nearest Neighbor Classification Algorithm
Yang Liu, Yu Jian, Jing Liping
2013, 50(11): 2269-2277.
Abstract PDF
An Intelligent Optimization Algorithm Based on Hybrid of GA and PSO
Ma Chao, Deng Chao, Xiong Yao, and Wu Jun
2013, 50(11): 2278-2286.
Abstract PDF
Incremental Learning Towards Scene Features in Independent Subspace
Xie Zhao, Ling Ran, and Wu Kewei
2013, 50(11): 2287-2294.
Abstract PDF
A Soft-Thresholding Coordinate Descent Algorithm for Solving Truncated Hinge Loss
Zhu Yelei, Wang Yujun, Luo Qiang, and Tao Qing
2013, 50(11): 2295-2303.
Abstract PDF
A Traversability Detection Method Dealing with Shaded Terrains
Gao Hua, Zhao Chunxia, and Zhang Haofeng
2013, 50(11): 2304-2314.
Abstract PDF
A Support Vector Machine Learning Method Based on Granule Shift Parameter
Guo Husheng, Wang Wenjian
2013, 50(11): 2315-2324.
Abstract PDF
Heuristic Optimization Algorithms of Multi-Carpooling Problem Based on Two-Stage Clustering
Shao Zengzhen, Wang Hongguo, Liu Hong, Song Chaochao, Meng Chunhua, Yu Hongling
2013, 50(11): 2325-2335.
Abstract PDF
Detecting Spammers with a Bidirectional Vote Algorithm Based on Statistical Features in Microblogs
Ding Zhaoyun, Zhou Bin, Jia Yan, Wang Xiang
2013, 50(11): 2336-2348.
Abstract PDF
An Active Collective Classification Method Combing Feature Selection and Link Filtering
Li Lina, Ouyang Jihong, Liu Dayou, Gao Wenjie
2013, 50(11): 2349-2357.
Abstract PDF
Analysis and Design of Distance-Bounding Protocols for RFID
Xin Wei, Sun Huiping, Chen Zhong
2013, 50(11): 2358-2366.
Abstract PDF
Study on Detection of Covert Channel in Flume System
Cao Hui, Xiong Shengchao, Zhang Huanguo, Yan Fei
2013, 50(11): 2367-2374.
Abstract PDF
A Method of Intrusion Detection Based on Semi-Supervised GHSOM
Yang Shilai, Yang Yahui, Shen Qingni, and Huang Haizhen
2013, 50(11): 2375-2382.
Abstract PDF
A Parallel Architecture for FPGA Based Hyperelliptic Curve Cryptoprocessor
Fang Yuejian, Shen Qingni, Wu Zhonghai
2013, 50(11): 2383-2388.
Abstract PDF
A High-Capability Scattered IP Watermarking Algorithm in FPGA Design
Xu Jianbo, Long Jing, and Peng Li
2013, 50(11): 2389-2396.
Abstract PDF
Dynamic Trustworthiness Evaluation Model of Software Based on Checkpoint's Classification Attributes
Li Zhen, Tian Junfeng, and Yang Xiaohui
2013, 50(11): 2397-2405.
Abstract PDF
An Approach to Runtime Memory Leak Detection Oriented to Xen Virtual Computing Environment
Xiao Ruliang, Jiang Jun, Hu Yao, Han Jia, Ni Youcong, Du Xin, and Cai Shengzhen
2013, 50(11): 2406-2417.
Abstract PDF
A Reconstruction Method of Type Abstraction in Binary Code
Ma Jinxin, Li Zhoujun, Hu Chaojian, Zhang Junxian, Guo Tao
2013, 50(11): 2418-2428.
Abstract PDF
An Idle Virtual CPU Scheduling Algorithm on Xen Virtual Machines
Wang Kai, Hou Zifeng
2013, 50(11): 2429-2435.
Abstract PDF
Performance Improvement for Irregular Data Intensive Hot-Slice with Low Computing Workload
Zheng Ninghan, Gu Zhimin, Sun Xianhe
2013, 50(11): 2436-2443.
Abstract PDF
Two Longest Common Substring Algorithms Based on Bi-Directional Comparison
Wang Kaiyun, Kong Siqi, Fu Yunsheng, Pan Zeyou, Ma Weidong, Zhao Qiang
2013, 50(11): 2444-2454.
Abstract PDF
Group Obstacle Nearest Neighbor Query in Spatial Database
Yang Zexue, Hao Zhongxiao
2013, 50(11): 2455-2462.
Abstract PDF
Parallel Accelerator Design for High-Throughput DNA Sequence Alignment with Hash-Index
Wang Wendi, Tang Wen, Duan Bo, Zhang Chunming, Zhang Peiheng, Sun Ninghui
2013, 50(11): 2463-2471.
Abstract PDF
Review on Liquid Acquisition and Modeling Techniques
Zou Ling, Qi Yue, and Zhao Qinping
2013, 50(11): 2472-2480.
Abstract PDF