• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Joint TOA/AOA Localization Based on UWB for Wireless Sensor Networks
Xiao Zhu, Tan Guanghua, Li Renfa, and Zhang Xiaoming
2013, 50(3): 453-460.
Abstract PDF
Extending the Network Lifetime Using Topology Control in Ad Hoc Networks
Li Xiaohong, Wang Wenyan, and Wang Dong
2013, 50(3): 461-471.
Abstract PDF
An Adaptive Beacon Exchange Algorithm Based on Link Broken Probability
Zhang Hengyang, Zheng Bo, Chen Xiaoping, and Yu Jia
2013, 50(3): 472-480.
Abstract PDF
An Adaptive Dynamic Redundant Reservation Strategy in Grid Computing
Xiao Peng, Hu Zhigang
2013, 50(3): 481-489.
Abstract PDF
Secure and Efficient Top-k Query Processing in Two-Tier Sensor Network
Liao Xiaojing, Li Jianzhong, and Yu Lei
2013, 50(3): 490-497.
Abstract PDF
Network Intrusion Detection Model Based on Context Verification
Tian Zhihong, Wang Bailing, Zhang Weizhe, Ye Jianwei, and Zhang Hongli
2013, 50(3): 498-508.
Abstract PDF
TIV and Access Delay in the Internet Delay Space
Wang Zhanfeng, Chen Ming, Xing Changyou, Bai Huali, and Wei Xianglin
2013, 50(3): 509-516.
Abstract PDF
Centralized-Calculating-Based 2-Disjoint Multipath Routing Algorithm for Wireless Sensor Networks
Yu Leilei, Chen Dongyan, Liu Yuemei, Huang Xu
2013, 50(3): 517-523.
Abstract PDF
A Line of Sight Fingerprint Localization Algorithm Resisting Multipath and Shadow
Chen Yongle, Zhu Hongsong, Sun Limin
2013, 50(3): 524-531.
Abstract PDF
A New Key Hiding Scheme Based on Fingerprint
Li Ximing, Yang Bo, Guo Yubin, Yao Jintao
2013, 50(3): 532-539.
Abstract PDF
An End-to-End Authentication Protocol for Satellite Communication Network
Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui
2013, 50(3): 540-547.
Abstract PDF
A Membership Degree Refinement-Based Evolutionary Clustering Algorithm
Hou Wei, Dong Hongbin, Yin Guisheng
2013, 50(3): 548-558.
Abstract PDF
Measuring Ontology Inconsistency Based on Dempster-Shafer Theory
Li Dongmei, Lin Youfang, Huang Houkuan, Tian Xuan
2013, 50(3): 559-567.
Abstract PDF
An In-Building Localization Algorithm Based on Wi-Fi Signal Fingerprint
Niu Jianwei, Liu Yang, Lu Banghui, and Song Wenfang
2013, 50(3): 568-577.
Abstract PDF
A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing
Wu Yingjie, Tang Qingming, Ni Weiwei, Sun Zhihui, Liao Shangbin
2013, 50(3): 578-593.
Abstract PDF
A Column-Store Based Bucket Partition Algorithm for Range Queries
Li Yefeng, Le Jiajin, and Wang Mei
2013, 50(3): 594-601.
Abstract PDF
Hylomorphisms with Parameters and Its Associated Calculational Laws
Yu Shanshan, Li Shixian, Su Jindian
2013, 50(3): 602-618.
Abstract PDF
Application of Artificial Neural Network in Software Multi-Faults Location
He Jialang, Zhang Hong
2013, 50(3): 619-625.
Abstract PDF
Formal Description of Software Dynamic Correctness
Ma Yanfang, Zhang Min, Chen Yixiang
2013, 50(3): 626-635.
Abstract PDF
A Data Placement Approach for Workflow in Cloud
Zhang Peng, Wang Guiling, Xu Xuehui
2013, 50(3): 636-647.
Abstract PDF
Auto-Tuning of SpMV for Diagonal Sparse Matrices
Sun Xiangzheng, Zhang Yunquan, Wang Ting, Li Yan, Yuan Liang
2013, 50(3): 648-656.
Abstract PDF
A Polynomial Time Approximation Scheme for the Traveling Salesman Problem in Curved Surfaces
Wang Gang and Luo Zhigang
2013, 50(3): 657-665.
Abstract PDF
An Algorithm in Tile Assembly Model for Maximum Clique Problem
Li Kenli, Luo Xing, Wu Fan, Zhou Xu, and Huang Xin
2013, 50(3): 666-675.
Abstract PDF