Advanced Search

    column
    A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment
    Zhang Weiwei, Feng Gui, Liu Jianyi, Yang Yixian
    2015, 52(12): 2659-2668. DOI: 10.7544/issn1000-1239.2015.20150749
    Abstract PDF
    A Real-Time Task Availability Improving Fault-Tolerant Scheduling Algorithm on Heterogeneous Platform
    Sun Jian, Zhang Xingjun, Dong Xiaoshe
    2015, 52(12): 2669-2683. DOI: 10.7544/issn1000-1239.2015.20150721
    Abstract PDF
    A Packet Loss Differentiation Algorithm for 4G-LTE Network
    Du Haipeng, Zheng Qinghua, Zhang Weizhan, Yan Jifeng
    2015, 52(12): 2684-2694. DOI: 10.7544/issn1000-1239.2015.20150726
    Abstract PDF
    Preemption Threshold Scheduling for Energy Harvesting Based Cyber-Physical Systems
    Ge Yongqi, Dong Yunwei, Gu Bin
    2015, 52(12): 2695-2706. DOI: 10.7544/issn1000-1239.2015.20150745
    Abstract PDF
    A Virtual Currency-Based Incentive-Aware Low Delay Routing for DTNs
    Jiang Qingfeng, Men Chaoguang, Li Xiang, He Zhongzheng
    2015, 52(12): 2707-2724. DOI: 10.7544/issn1000-1239.2015.20140566
    Abstract PDF
    A Kind of New Anti-Collision Approach Based on AID
    Zhang Degan, Song Xiaodong, Zheng Ke, Liang Yanpin
    2015, 52(12): 2725-2735. DOI: 10.7544/issn1000-1239.2015.20140560
    Abstract PDF
    EasiARS: Dynamic WiFi Link Access and Adaptive Networking Based on Multi-Mode Communication in Wireless Sensor Networks
    Peng Kang, Zhao Ze, Chen Haiming, Li Dong, Shi Hailong, Cui Li
    2015, 52(12): 2736-2749. DOI: 10.7544/issn1000-1239.2015.20140667
    Abstract PDF
    A Privacy Protection Algorithm Based on Network Voronoi Graph over Road Networks
    Pan Xiao, Wu Lei, Hu Zhaojun
    2015, 52(12): 2750-2763. DOI: 10.7544/issn1000-1239.2015.20140602
    Abstract PDF
    A Heuristic Dyna Optimizing Algorithm Using Approximate Model Representation
    Zhong Shan, Liu Quan, Fu Qiming, Zhang Zongzhang, Zhu Fei, Gong Shengrong
    2015, 52(12): 2764-2775. DOI: 10.7544/issn1000-1239.2015.20148160
    Abstract PDF
    Bare-Bones Differential Evolution Algorithm Based on Trigonometry
    Peng Hu, Wu Zhijian, Zhou Xinyu, Deng Changshou
    2015, 52(12): 2776-2788. DOI: 10.7544/issn1000-1239.2015.20140230
    Abstract PDF
    Frequent Sequential Pattern Mining under Differential Privacy
    Lu Guoqing, Zhang Xiaojian, Ding Liping, Li Yanfeng, Liao Xin
    2015, 52(12): 2789-2801. DOI: 10.7544/issn1000-1239.2015.20140516
    Abstract PDF
    A New Framework of Action Recognition: 3DHOGTCC and 3DHOOFG
    Tong Ming, Wang Fan, Wang Shuo, Ji Chenglong
    2015, 52(12): 2802-2812. DOI: 10.7544/issn1000-1239.2015.20140553
    Abstract PDF
    Constrained Multi-Objective Optimization Algorithm Based on Dual Populations
    Bi Xiaojun, Zhang Lei, Xiao Jing
    2015, 52(12): 2813-2823. DOI: 10.7544/issn1000-1239.2015.20148025
    Abstract PDF
    A Random Walk Based Iterative Weighted Algorithm for Sub-Graph Query
    Zhang Xiaochi, Yu Hua, Gong Xiujun
    2015, 52(12): 2824-2833. DOI: 10.7544/issn1000-1239.2015.20140801
    Abstract PDF
    A Method to Set Decay Factor Based on Gaussian Function
    Han Meng, Wang Zhihai, Yuan Jidong
    2015, 52(12): 2834-2843. DOI: 10.7544/issn1000-1239.2015.20131883
    Abstract PDF
    Frequent Graph Mining on Multi-Core Processor
    Luan Hua, Zhou Mingquan, Fu Yan
    2015, 52(12): 2844-2856. DOI: 10.7544/issn1000-1239.2015.20140598
    Abstract PDF
    An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database
    Miao Dongjing, Liu Xianmin, Li Jianzhong
    2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
    Abstract PDF
    Survey of Physics-Based Character Animation
    Zhao Jianjun, Wei Yi, Xia Shihong, Wang Zhaoqi
    2015, 52(12): 2866-2878. DOI: 10.7544/issn1000-1239.2015.20140634
    Abstract PDF
    Keyframe Extraction Method Based on Dominating Set
    Nie Xiushan, Chai Yan’e, Teng Cong
    2015, 52(12): 2879-2887. DOI: 10.7544/issn1000-1239.2015.20140701
    Abstract PDF