Journal: Journal of Computer Research and Development

Volume 43, Issue 12

2033 -- 2040Yong Lee 0003, Junzhou Luo, Jun Wu 0002. A High-Throughput Scheduling Algorithm with Small Crosspoint Buffers for CICQ Switches
2041 -- 2047Yadong Yang, Chengke Wu, Song Xiao, Jianchao Du. A Fast Hybrid Loss Protection Method with Quality of Service Provision for Image Transmission
2048 -- 2055ShiNing Li, Junming Guan, Zheng Qin. KIR : A New Algorithm to Improve the Fairness of TCP Congestion Avoidance
2056 -- 2061Zhen-guo Gao, Shao-Bin Cai, Yunlong Zhao. Analytical Expressions of Properties of MANETs Uniformly Distributed in Rectangular Area
2062 -- 2068Huanbao Wang, Yousheng Zhang, Yuan Li. A Diagram of Strand Spaces for Security Protocols
2069 -- 2075Yunfa Li, Deqing Zou, Zongfen Han, Weizhong Qiang. Research on Group Signature Scheme with Forward Security
2076 -- 2081Yongliang Liu, Wen Gao, Hongxun Yao, Tiejun Huang. Security on Aydos et al s Elliptic Curve Cryptography Based Wireless Authentication Protocol
2082 -- 2087Zhiping Wu, Dingfeng Ye, Weiju Ma. Perturbed Variant of TTM Cryptosystem
2088 -- 2095Shaohua Xu, Xingui He, Bing Wang. A Structural Formula Process Neural Networks and Its Applications
2096 -- 2103Bo Yang, Yadong Wang, Xiaohong Su, Xianglong Tang. Neural Networks Distributed Cooperative Learning Strategy Based on Agent and Chips
2104 -- 2109Ming Ma, Chunguang Zhou, Libiao Zhang, Jie Ma. Fuzzy Neural Network Optimization by a Multi-Objective Particle Swarm Optimization Algorithm
2110 -- 2116Yuliang Shi, Guang an Huang, Wei Ye, Liang Zhang, Baile Shi. Automatic Composition of Web Services Based on Task Dependency Specification
2117 -- 2123Yong Zhong, Xiaolin Qin, Lei Bao. An Association Rule Mining Algorithm of Multidimensional Sets
2124 -- 2130Jianyu Cai, Quanyuan Wu, Yan Jia, Peng Zou. Research on Aggregate Query Matching in Semantic Cache
2131 -- 2137Chengxian Shi, Hongyuan Wang, Ping an Wang, Deshen Xia. A Parametric Active Contour Model for Medical Image Segmentation Using Priori Shape Force Field
2138 -- 2143Xingming Zhang, Heheng Li. A Face Verification Algorithm Based on Negative Independent Sample Set and SVM
2144 -- 2151Zhongping Ji, Ligang Liu, Guojin Wang. Feature Preserving Mesh Simplification Based on Corner Cutting
2152 -- 2157Yong Li, Lei Wang, Rui Gong, Kui Dai, Zhiying Wang. Research and Implementation of a 32-Bit Asynchronous Multiplier
2158 -- 2165Yiran Wang, Li Chen, Xiaobing Feng 0002, Zhaoqing Zhang. Global Partial Replicate Computation Partitioning
2166 -- 2173Feng Tang, Chenggang Wu, Zhaoqing Zhang, Hao Yang. Exception Handling in Application Level Binary Translation
2174 -- 2179Hao Yang, Feng Tang, Haibin Xie, Chenggang Wu, Xiaobing Feng. Library Function Disposing Approach in Binary Translation
2180 -- 2186Ying Wang, Kenli Li, Lang Li 0002, Renfa Li. A Vertical and Horizontal Multiway Algorithm for Parallel-Merging
2187 -- 2192Guibin Zheng, Jiqing Han. Automatic Music Transcription Based on Harmonic Structure Information

Volume 43, Issue 11

1855 -- 1862Weizhe Zhang, Mingzeng Hu, Hongli Zhang, Kaipeng Liu. A Multiobjective Evolutionary Algorithm for Grid Job Scheduling of Multi-QoS Constraints
1863 -- 1869Ying Chen, Shoubao Yang, Leitao Guo, Kai Shen. A Dynamic Access Control Scheme Across Multi-Domains in Grid Environment
1870 -- 1875Dong Tian, Shuyu Chen, Feng Chen. A Dynamic Fault Detection Algorithm under Grid Environments
1876 -- 1885Yi Zhuang, Yueting Zhuang, Fei Wu. k Nearest Neighbor Queries Based on Data Grid
1886 -- 1894Guangsheng Zhang, Changjun Jiang, Zhijun Ding. Service Discovery Framework Using Fuzzy Petri Net
1895 -- 1903Yanbo Han, Hongcui Wang, Jianwu Wang, Shuying Yan, Cheng Zhang. An End-User-Oriented Approach to Exploratory Service Compostion
1904 -- 1913Xiaojian Li, Xinping Zhao. A Protocol of Bidirectional Authentication and Authorization for IP Multicast
1914 -- 1919Hongyan Peng, Xiaojian Li, Chunhe Xia, Jianfeng Deng, Xiaofa Zhou. A Non-Repudiation Protocol for E-Mail and Its Formal Analysis
1920 -- 1926Zhongwei Sun, Dengguo Feng, Chuankun Wu. DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory
1927 -- 1932Wei Ren, Tenghong Liu, Hai Jin. Congestion-Based RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks
1933 -- 1938Guodong Yuan, Kaihuai Qin, Wei Hu. A Geometric Method of Camera Calibration Based on Single Perspective Image
1939 -- 1946Peng Liu, Yan Zhang, Zhigang Mao. A Restoration Algorithm for Images Contaminated by Impulse Noise
1947 -- 1952YuQing Song, Conghua Xie, Yuquan Zhu, Cunhua Li, Jianmei Chen, Lijun Wang. Research on Medical Image Clustering Based on Approximate Density Function
1953 -- 1958Jing Zhang, Hong Lu, Xiangyang Xue. Efficient Sports Video Retrieval Based on Index Structure
1959 -- 1964Gang Chen, Zimeng Chen. An Audio Feature Extraction Method Taking Class Information into Account
1965 -- 1971Qian Xie, Li Jiang, Jian Wu, Yufang Sun. Research on Chinese Linux Input Method Engine Standard
1972 -- 1979Lei Deng, Wen Gao, Mingzeng Hu, Zhenzhou Ji. A High Efficient Architecture for Motion Estimation Based on AVC/AVS Coding Standard
1980 -- 1984Liqiang He, Zhiyong Liu. A QoS Capable Fetch Policy for SMT Processors
1985 -- 1992Tinggang Xiong, Zhong Ma, Youguang Yuan. Research on Synchronization Technology of Fault-Tolerant Computer System Based on Operating System Calls
1993 -- 1998Bei Wang, Linjun Yang, Hong Lu, Xiangyang Xue. Post-Refinement of Shot Boundary Detection Based on Manifold Feature
1999 -- 2004Lin Yan, Congpin Zhang. Semantic Analyses of Rough Truth for Axioms in Modal Logic
2005 -- 2011Xiaoyun Zhou, Zhihui Sun, Baili Zhang, Yidong Yang. Research on Clustering and Evolution Analysis of High Dimensional Data Stream
2012 -- 2019Xiaolin Zhang, Guoren Wang, Huilin Liu. Logical Foundation for Object-Oriented XML Database
2020 -- 2026Mengluo Ji, Huaimin Wang, Mengjun Li, Wei Dong, Zhichang Qi. An Value Range Analysis Based on Abstract Interpretation and Generalized Monotone Data Flow Framework
2027 -- 2032Zhong Li, Gang Wang, Jing Liu. Quality of Service Aware Dynamic Priority Scheduling Scheme for the Mixed Class Multimedia Workloads in the Storage Systems