• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

A Mobile Strategy for Mobile Full-Coverage Issue
Zhang Le, Li Dong, Cui Li
2013, 50(5): 901-911.
Abstract PDF
An Adaptive Soft Frequency Reuse Scheme for LTE Systems
Qian Manli, Li Yonghui, Huang Yi, Zhou Yiqing, Shi Jinglin, Yang Xuezhi
2013, 50(5): 912-920.
Abstract PDF
A New Evidential Trust Model Based on Graph Theory for Open Computing Systems
Jiang Liming, Zhang Kun, Xu Jian, Zhang Hong
2013, 50(5): 921-931.
Abstract PDF
Logic-Based Dynamical Security Policy Language and Verification
Bao Yibao, Yin Lihua, Fang Binxing, Guo Li
2013, 50(5): 932-941.
Abstract PDF
Steganalysis of LSB Matching Based on the Measurement of the Region Randomness
Xiong Gang, Ping Xijian, Zhang Tao, Li Kan
2013, 50(5): 942-950.
Abstract PDF
Hybrid Role Mining Methods with Minimal Perturbation
Zhai Zhigang, Wang Jiandong, Cao Zining, Mao Yuguang
2013, 50(5): 951-960.
Abstract PDF
An Adaptive Shared Filter Ordering Algorithm for Data Stream Systems
Li Jun, Zhang Peng, Guo Li, Zhou Xiaofei
2013, 50(5): 961-968.
Abstract PDF
Storage Model and Implementation of the Dynamic Ordered Tree
Te Rigen, Li Wei, and Li Xiongfei
2013, 50(5): 969-985.
Abstract PDF
Efficient Top-k Query Processing on Mutual Skyline
Jiang Tao, Zhang Bin, Gao Yunjun, Yue Guangxue
2013, 50(5): 986-997.
Abstract PDF
Fuzzy Associative Memories Based on Triangular Norms
Zeng Shuiling, Xu Weihong, Yang Jingyu
2013, 50(5): 998-1004.
Abstract PDF
On Cellular Homology Boundary Learning Algorithms
Yang Jiwen, Li Zheshuo, He Shuping, Xian Min
2013, 50(5): 1005-1011.
Abstract PDF
Approximate Degree Reduction Method by Blending of Multi-Triangular Bézier Surfaces with GC\+1 Constraint
Wang Xianghai, Huang Junying, Li Ming
2013, 50(5): 1012-1020.
Abstract PDF
Solving the Stereo Matching in Disparity Image Space Using the Hopfield Neural Network
Xu Sheng, Ye Ning, Zhu Fa, Xu Shanshan, and Zhou Liuliu
2013, 50(5): 1021-1029.
Abstract PDF
A Technique of Multiple Fault Localization Based on Conditioned Execution Slicing Spectrum
Wen Wanzhi, Li Bixin, Sun Xiaobing, Qi Shanshan
2013, 50(5): 1030-1043.
Abstract PDF
An Automatic Program Verifier for PointerC: Design and Implementation
Zhang Zhitian, Li Zhaopeng, Chen Yiyun, and Liu Gang
2013, 50(5): 1044-1054.
Abstract PDF
An Agent-Based Requirements Monitoring Framework for Internetware
Fu Lingxiao, Peng Xin, and Zhao Wenyun
2013, 50(5): 1055-1065.
Abstract PDF
A Personalized Web Service Quality Prediction Approach Based on Invoked Feature Model
Zhang Li, Zhang Bin, Huang Liping, Zhu Zhiliang
2013, 50(5): 1066-1075.
Abstract PDF
A Collaborative Filtering Recommendation Algorithm Based on Double Neighbor Choosing Strategy
Jia Dongyan and Zhang Fuzhi
2013, 50(5): 1076-1084.
Abstract PDF
Error Detection by Redundant Transaction in Transactional Memory System
Song Wei, Yang Xuejun
2013, 50(5): 1085-1099.
Abstract PDF
An Approach for Monitoring Memory Address Traces with Functional Semantic Information
Chen Licheng, Cui Zehan, Bao Yungang, Chen Mingyu, Shen Linfeng, Liang Qi
2013, 50(5): 1100-1109.
Abstract PDF
Parallel Simulation of Many-Core Processor and Many-Core Clusters
Lü Huiwei, Cheng Yuan, Bai Lu, Chen Mingyu, Fan Dongrui, Sun Ninghui
2013, 50(5): 1110-1117.
Abstract PDF
TDDS:Task Deployment and Scheduling Based on Virtual Cluster System
Feng Lin, Fu Yong, Chen Kang, Zheng Weimin
2013, 50(5): 1118-1124.
Abstract PDF