• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

A DRM Scheme Supporting Attribute Revocation and Outsourced Decryption in the Cloud Computing Environment
Zhang Weiwei, Feng Gui, Liu Jianyi, Yang Yixian
2015, 52(12): 2659-2668. DOI: 10.7544/issn1000-1239.2015.20150749
Abstract PDF
A Real-Time Task Availability Improving Fault-Tolerant Scheduling Algorithm on Heterogeneous Platform
Sun Jian, Zhang Xingjun, Dong Xiaoshe
2015, 52(12): 2669-2683. DOI: 10.7544/issn1000-1239.2015.20150721
Abstract PDF
A Packet Loss Differentiation Algorithm for 4G-LTE Network
Du Haipeng, Zheng Qinghua, Zhang Weizhan, Yan Jifeng
2015, 52(12): 2684-2694. DOI: 10.7544/issn1000-1239.2015.20150726
Abstract PDF
Preemption Threshold Scheduling for Energy Harvesting Based Cyber-Physical Systems
Ge Yongqi, Dong Yunwei, Gu Bin
2015, 52(12): 2695-2706. DOI: 10.7544/issn1000-1239.2015.20150745
Abstract PDF
A Virtual Currency-Based Incentive-Aware Low Delay Routing for DTNs
Jiang Qingfeng, Men Chaoguang, Li Xiang, He Zhongzheng
2015, 52(12): 2707-2724. DOI: 10.7544/issn1000-1239.2015.20140566
Abstract PDF
A Kind of New Anti-Collision Approach Based on AID
Zhang Degan, Song Xiaodong, Zheng Ke, Liang Yanpin
2015, 52(12): 2725-2735. DOI: 10.7544/issn1000-1239.2015.20140560
Abstract PDF
EasiARS: Dynamic WiFi Link Access and Adaptive Networking Based on Multi-Mode Communication in Wireless Sensor Networks
Peng Kang, Zhao Ze, Chen Haiming, Li Dong, Shi Hailong, Cui Li
2015, 52(12): 2736-2749. DOI: 10.7544/issn1000-1239.2015.20140667
Abstract PDF
A Privacy Protection Algorithm Based on Network Voronoi Graph over Road Networks
Pan Xiao, Wu Lei, Hu Zhaojun
2015, 52(12): 2750-2763. DOI: 10.7544/issn1000-1239.2015.20140602
Abstract PDF
A Heuristic Dyna Optimizing Algorithm Using Approximate Model Representation
Zhong Shan, Liu Quan, Fu Qiming, Zhang Zongzhang, Zhu Fei, Gong Shengrong
2015, 52(12): 2764-2775. DOI: 10.7544/issn1000-1239.2015.20148160
Abstract PDF
Bare-Bones Differential Evolution Algorithm Based on Trigonometry
Peng Hu, Wu Zhijian, Zhou Xinyu, Deng Changshou
2015, 52(12): 2776-2788. DOI: 10.7544/issn1000-1239.2015.20140230
Abstract PDF
Frequent Sequential Pattern Mining under Differential Privacy
Lu Guoqing, Zhang Xiaojian, Ding Liping, Li Yanfeng, Liao Xin
2015, 52(12): 2789-2801. DOI: 10.7544/issn1000-1239.2015.20140516
Abstract PDF
A New Framework of Action Recognition: 3DHOGTCC and 3DHOOFG
Tong Ming, Wang Fan, Wang Shuo, Ji Chenglong
2015, 52(12): 2802-2812. DOI: 10.7544/issn1000-1239.2015.20140553
Abstract PDF
Constrained Multi-Objective Optimization Algorithm Based on Dual Populations
Bi Xiaojun, Zhang Lei, Xiao Jing
2015, 52(12): 2813-2823. DOI: 10.7544/issn1000-1239.2015.20148025
Abstract PDF
A Random Walk Based Iterative Weighted Algorithm for Sub-Graph Query
Zhang Xiaochi, Yu Hua, Gong Xiujun
2015, 52(12): 2824-2833. DOI: 10.7544/issn1000-1239.2015.20140801
Abstract PDF
A Method to Set Decay Factor Based on Gaussian Function
Han Meng, Wang Zhihai, Yuan Jidong
2015, 52(12): 2834-2843. DOI: 10.7544/issn1000-1239.2015.20131883
Abstract PDF
Frequent Graph Mining on Multi-Core Processor
Luan Hua, Zhou Mingquan, Fu Yan
2015, 52(12): 2844-2856. DOI: 10.7544/issn1000-1239.2015.20140598
Abstract PDF
An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database
Miao Dongjing, Liu Xianmin, Li Jianzhong
2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
Abstract PDF
Survey of Physics-Based Character Animation
Zhao Jianjun, Wei Yi, Xia Shihong, Wang Zhaoqi
2015, 52(12): 2866-2878. DOI: 10.7544/issn1000-1239.2015.20140634
Abstract PDF
Keyframe Extraction Method Based on Dominating Set
Nie Xiushan, Chai Yan’e, Teng Cong
2015, 52(12): 2879-2887. DOI: 10.7544/issn1000-1239.2015.20140701
Abstract PDF