Performance Testing and Analysis to Storage Medium of Distributed File System (Unbekannt)
- Neue Suche nach: Xu, C.-C.
- Neue Suche nach: Xu, C.-C.
In:
CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION-
;
33
;
1873-1880
;
2010
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Performance Testing and Analysis to Storage Medium of Distributed File System
-
Beteiligte:Xu, C.-C. ( Autor:in )
-
Erschienen in:CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION- ; 33 ; 1873-1880
-
Verlag:
- Neue Suche nach: SCIENCE PRESS
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:8 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Unbekannt
- Neue Suche nach: 004
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 004 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 33
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A Temporal and Spatial Correlation Based Missing Values Imputation Algorithm in Wireless Sensor NetworksPan, L.-Q. et al. | 2010
- 12
-
Energy-Hole Avoidance for WSN Based on Adjust Transmission PowerZeng, Z.-W. et al. | 2010
- 23
-
Performance Analysis of a Network-Layer Soft Vertical Handoff Scheme Without Packet ReorderingShu, T. et al. | 2010
- 36
-
Delay Optimization Based Overlay Routing StrategyYe, P. et al. | 2010
- 45
-
Modeling Botnets' Similarity Based on Communication Feature Extraction and IP AssemblyLi, R.-H. et al. | 2010
- 55
-
On the Complexity of Optimal Scheduling Multi-Rate Nested Periodic Traffic in an Input-Queued SwitchWu, J. et al. | 2010
- 63
-
Virtual Network with High Performance: VegaNetChen, W.-L. et al. | 2010
- 74
-
A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing PlatformZhang, X. et al. | 2010
- 82
-
The System Architecture and Security Structure of Trusted PDAZhao, B. et al. | 2010
- 93
-
A Distributed Usage Control System Based on Trusted ComputingChu, X.-B. et al. | 2010
- 103
-
Identity-Based Multi-Signcryption Scheme without Random OraclesZhang, B. et al. | 2010
- 111
-
The Three-Party Password-Authenticated Key Exchange Protocol with Stronger SecurityDing, X.-F. et al. | 2010
- 119
-
Methodology for Automatic Inference of Task Hierarchies in Complex SystemsGao, C.-N. et al. | 2010
- 128
-
Research on Privacy-Protection Policy for Pervasive ComputingWei, Z.-Q. et al. | 2010
- 139
-
Research on Trust Framework in Multi-Agent System from the Cognitive ViewWang, J.-F. et al. | 2010
- 152
-
An Identity (ID)-Based and Self-Certified Secret Sharing SchemePei, Q.-Q. et al. | 2010
- 157
-
Research on the Framework of Morphological Associative MemoriesFeng, N.-Q. et al. | 2010
- 167
-
Geometry Knowledge Acquisition and Representation on OntologyZhong, X.-Q. et al. | 2010
- 175
-
An Efficient Genuine-Video Identification Algorithm: TDIAZhou, G.-R. et al. | 2010
- 184
-
Adaptive Lifting Wavelet Transform and Image Compression Via TextureZhang, J. et al. | 2010
- 193
-
Resource Constrained Web ServicesLi, G. et al. | 2010
- 208
-
A Survey of Membrane Computing as a New Branch of Natural ComputingZhang, G.-X. et al. | 2010
- 215
-
Top-K Graph Patterns Mining Based on Some Joint Significance MeasureLiu, Y. et al. | 2010
- 231
-
A Novel Algorithm for Attribute Reduction Based on Consistency CriterionYang, M. et al. | 2010
- 240
-
A Structure Matching Method Based on Partial Functional DependenciesLi, G.-H. et al. | 2010
- 251
-
Learning First-Order Rules for Derived Predicates from Plan ExamplesRao, D.-N. et al. | 2010
- 267
-
Semantic Annotation of Web Data Based on Ensemble Learning and 2D Correlative-Chain Conditional Random FieldsDing, Y.-H. et al. | 2010
- 279
-
Research on Extreme Learning of Neural NetworksDeng, W.-Y. et al. | 2010
- 288
-
A Reachability Determining Algorithm of Petri Net Based on Process VerificationYu, F. et al. | 2010
- 300
-
The Decision-Making Neural Networks Model for Solving the Graph Isomorphism ProblemNan, J.-H. et al. | 2010
- 305
-
Sticker Model for Maximum Clique Problem and Maximum Independent SetFan, Y.-K. et al. | 2010
- 311
-
The Optimization of DNA Encodings Based on Modified PSO/GA AlgorithmCui, G.-Z. et al. | 2010
- 317
-
Research of Collectives Optimization on Modern Multicore ClustersZhang, P.-Y. et al. | 2010
- 326
-
A Kind of Hierarchical Ring Interconnection Networks-on-ChipWang, W. et al. | 2010
- 335
-
An Efficient and Provably Secure IBE Scheme Under The Standard ModelXu, P. et al. | 2010
- 345
-
A Novel Super-Peer Based Trust Model for Peer-to-Peer NetworksTian, C.-Q. et al. | 2010
- 356
-
A Hierarchical Network Distance Prediction MechanismXing, C.-Y. et al. | 2010
- 365
-
Elitist Pool Evolutionary Algorithm for On-Line Evolution of Digital CircuitsHe, G.-L. et al. | 2010
- 373
-
A Survey on Management of Data ProvenanceGao, M. et al. | 2010
- 390
-
Research on Trust Mechanism for Peer-to-Peer NetworkLi, Y.-J. et al. | 2010
- 406
-
A Model Checking Approach for Solving Epistemic RiddlesLuo, X.-Y. et al. | 2010
- 415
-
An Algorithm for Extracting Minimal Unsatisfiable Subformulae in First-Order Logic Based on Refutation ImplicationZhang, J.-M. et al. | 2010
- 427
-
An Abstract Domain of One-Variable Interval Linear InequalitiesChen, L.-Q. et al. | 2010
- 440
-
Software Stability Analysis Based on Change Impact SimulationZhang, L. et al. | 2010
- 452
-
An Approach of Software Reliability Evaluation in the Open EnvironmentLu, W. et al. | 2010
- 463
-
Detecting Memory Leak Via VMMWang, X.-L. et al. | 2010
- 473
-
A Monadic Slicing Algorithm for a Program with PointersZhang, Y.-Z. et al. | 2010
- 483
-
A Breakpoint Debugging Method for LR(k) GrammarsXu, F. et al. | 2010
- 493
-
Exploring Multiple Execution Paths Based on Dynamic Lazy AnalysisChen, K. et al. | 2010
- 504
-
Studies of Network Coordinative Forensics ComputingZhang, Y.-D. et al. | 2010
- 514
-
Grid Security Interoperation and Its ApplicationZou, D.-Q. et al. | 2010
- 526
-
A Multi-QoS Based Local Optimal Model of Service SelectionHu, J.-Q. et al. | 2010
- 535
-
A Generating System to Generate Legitimate and Reasonable SentencesHu, Y. et al. | 2010
- 545
-
A New Manifold Reconstruction Method Based on IsomapMeng, D.-Y. et al. | 2010
- 556
-
A Novel Intelligent Single Particle OptimizerJi, Z. et al. | 2010
- 562
-
Formal Definition of Generalized Virus and Its Identifying AlgorithmHe, H.-J. et al. | 2010
- 569
-
A Novel General Steganalysis Technique Based on Cover Image DescribingMao, J.-F. et al. | 2010
- 580
-
Research on the Implement Mechanism of EPON VoD QoS Multicast Based on UtilityZhang, J.-Y. et al. | 2010
- 589
-
Symbolic Test Generation and Execution of Route ProtocolXing, Y. et al. | 2010
- 596
-
Method for Computing Minimal Siphons in Petri Nets and the Performance AnalysisZhang, J.-Q. et al. | 2010
- 603
-
A Technique of 3D Reconstruction of Blood Vessel's Skeleton Based on SnakesCao, Z.-G. et al. | 2010
- 613
-
P2P-Based Video-on-Demand Systems: A SurveyShen, S.-J. et al. | 2010
- 625
-
A New Methodology to Deal with Dynamical Uncertain Causalities (I): The Static Discrete DAG CaseZhang, Q. et al. | 2010
- 652
-
The d-Subtree Partition ProblemCai, Y.-G. et al. | 2010
- 666
-
Study on Complexity in Hyper Surface ClassificationHe, Q. et al. | 2010
- 672
-
Mining Chaotic Iterative Functions by Co-evolution over Heterogeneous PopulationsZheng, J.-L. et al. | 2010
- 687
-
Problems on Large-Scale Speech Corpus and the Applications in TTSZhang, S. et al. | 2010
- 697
-
Masquerade Detection Based on Shell Commands and Multiple Behavior Pattern MiningTian, X.-G. et al. | 2010
- 706
-
Research on Trusted Network ConnectionZhang, H.-G. et al. | 2010
- 718
-
ABC Supporting QoS Unicast Routing Scheme Based on the Artificial Fish SwarmWang, X.-W. et al. | 2010
- 726
-
Distributed Partner Selection Algorithm for Decode-and-Forward Cooperative DiversityQu, C.-H. et al. | 2010
- 736
-
Combined Static and Dynamic Immutability Analysis of Java ProgramYu, L.-Q. et al. | 2010
- 747
-
An Adaptive Suffix Tree Based Algorithm for Repeats Identification in a DNA SequenceHuo, H.-W. et al. | 2010
- 755
-
Geometric Thermodynamical Selection for Evolutionary Multi-Objective OptimizationYing, W.-Q. et al. | 2010
- 768
-
Reusing Partially Synthesized Textures for Real-Time Synthesis of Large TexturesChen, X. et al. | 2010
- 776
-
Human Interaction Recognition Using Spatio-Temporal WordsHan, L. et al. | 2010
- 785
-
Polynomial-Time Algorithm for Sorting Genomes by Generalized TranslocationsYin, X. et al. | 2010
- 797
-
Fine-Grained Parallel RNA Secondary Structure Prediction Using SCFGs on FPGAXia, F. et al. | 2010
- 813
-
A Dynamic Partitioning Algorithm Based on Approximate Local Search for Optimistic Parallel Discrete Event SimulationZhang, Y.-X. et al. | 2010
- 822
-
Topological Properties of Biswapped Networks(BSNs): Node Symmetry and Maximal Fault ToleranceChen, W.-D. et al. | 2010
- 833
-
A Parallel Scheduling Algorithm for Solving Transport EquationsZhou, D.-Y. et al. | 2010
- 841
-
A Newton Algorithm for Nonlinear RegressionHan, M. et al. | 2010
- 847
-
Research on Concurrent Dynamic Logic of Knowledge, Belief and Certainty for Multi-Agent SystemsSu, J.-S. et al. | 2010
- 855
-
A Novel Constrained Optimization Evolutionary Algorithm Based on Orthogonal Experimental DesignCai, Z.-X. et al. | 2010
- 865
-
Locality Preserving Multi-Projection Vector Fisher Discriminant AnalysisZhang, Z. et al. | 2010
- 877
-
An Extended Non-Interference Security Model (ENISM) and Its CSP-Based Description and Verification MethodCui, J. et al. | 2010
- 890
-
An Algebraic Model of Service Oriented Trustworthy Software ArchitectureZhao, H.-Q. et al. | 2010
- 900
-
A Time Petri Net Model Based on Uniform DistributionPan, L. et al. | 2010
- 908
-
Workflow Performance Analysis Based on Invariant Decomposition AlgorithmPang, S.-C. et al. | 2010
- 919
-
Pencil Sketch Painting with Virtual Point Light Source on Image PlaneTong, Q. et al. | 2010
- 927
-
Developability Optimization Algorithm for 3D Mesh SurfacesXu, P.-F. et al. | 2010
- 935
-
A Novel Local Invariant Feature Detection and Description AlgorithmYang, H. et al. | 2010
- 945
-
H. 264 Video Encryption Algorithm Based on Region of InterestYu, J.-Q. et al. | 2010
- 955
-
Data Field Based Large Scale Ontology MappingZhong, Q. et al. | 2010
- 966
-
High Performance Lossless Compression of Scientific Floating DataHe, K.-J. et al. | 2010
- 977
-
An Efficient Random Access Block Inverted File Self-Index TechnologyLiu, X.-Z. et al. | 2010
- 988
-
P2P Super-Peer Topology Construction Based on Hierarchical Quadrant SpaceFeng, J.-X. et al. | 2010
- 1004
-
Research on Flow Distribution Technology for Multimode Terminals in Heterogeneous NetworksSun, Y. et al. | 2010
- 1014
-
A Novel Page Ranking Algorithm Based on Social AnnotationsLiu, K.-P. et al. | 2010
- 1024
-
An Improved Color Coding Algorithm Based on Hybrid ArchitectureWang, J.-X. et al. | 2010
- 1032
-
Two-Level Partition Scheduling in Hard Real Time System Under Strong Partition ConstraintsLi, X.-Y. et al. | 2010
- 1040
-
General Multi-Party Protocol for Computing Inverses Over a Shared Secret ModulusHu, H.-M. et al. | 2010
- 1050
-
The Bit Security of Two Variants of Paillier Trapdoor FunctionSu, D. et al. | 2010
- 1060
-
Detection of PS and Stego Images Based on Noise Models and Features IntegrationLuo, X.-Y. et al. | 2010
- 1073
-
A Survey on Exact Algorithms for Dominating Set Related Problems in Arbitrary GraphsLu, G. et al. | 2010
- 1088
-
Line Feature Based Man-Made Object Recognition with InvarianceWei, H. et al. | 2010
- 1100
-
Research on On-Line Two-Way Adaptive Pen Gesture Interface FrameworkXu, L.-S. et al. | 2010
- 1110
-
Soft Body Simulation with Multiple Local Fracturing EffectsZeng, L. et al. | 2010
- 1115
-
Survey on Lie Group Machine LearningLi, F.-Z. et al. | 2010
- 1127
-
The Local Search Algorithms for Maximum 3-Satisfiability ProblemZhu, D.-M. et al. | 2010
- 1140
-
Fixed Parameter Enumeration Algorithm for Feedback Vertex Set in Weighted Undirected GraphsWang, J.-X. et al. | 2010
- 1153
-
Research on Access Driven Cache Timing Attacks Against CamelliaZhao, X.-J. et al. | 2010
- 1165
-
Security Analysis on Trust Chain of Trusted Computing PlatformXu, M.-D. et al. | 2010
- 1177
-
Improvement and Efficient Implementation of Differential Attack Algorithm to MDx on GPGPUZhou, L. et al. | 2010
- 1183
-
A Division-of-Labor Based Threshold Authenticated Encryption SchemeTan, Z.-W. et al. | 2010
- 1195
-
PaSeM: Parallel and Conflict-Free Network Traffic Session ManagementZhang, J.-Y. et al. | 2010
- 1213
-
Output-Oriented Queued Switch Architecture with Input Conflict-Free AlgorithmXia, Y. et al. | 2010
- 1226
-
RulerRep: Filtering out Inaccurate Ratings in Reputation Systems Based on Departure DegreeShan, M.-H. et al. | 2010
- 1236
-
An Index Based Efficient k-Dominant Skyline AlgorithmYin, J. et al. | 2010
- 1246
-
Research of Key-Phrase Extraction Based on Lexical ChainLiu, M. et al. | 2010
- 1256
-
Biomedical Named Entity Recognition through a Multi-Agent Meta-Learning FrameworkWang, H.-C. et al. | 2010
- 1263
-
A New Software Reliability Model Considering Warps Between Different Software Failure ProcessesLou, J.-G. et al. | 2010
- 1272
-
A Novel Eye Gaze Tracking Technique Based on Pupil Center Cornea Reflection TechniqueZhang, C. et al. | 2010
- 1286
-
A Unified Particle-Based Method for Newtonian and Viscoelastic Fluids AnimationChang, Y.-Z. et al. | 2010
- 1295
-
Texture Image Segmentation Using Level Set Function Evolved by Gaussian Mixture ModelXiao, C.-X. et al. | 2010
- 1305
-
An Adaptive Compensation Timing Synchronization Algorithm for DOCSIS Up ChannelWang, Q. et al. | 2010
- 1315
-
Privacy Preservation Algorithm for Service-Oriented Information SearchZhu, Q. et al. | 2010
- 1324
-
A Service-Oriented Adaptive Search Method over Encrypted Data in Trusted DatabaseSong, W. et al. | 2010
- 1339
-
Purpose Fusion: The Risk Purpose Based Privacy-Aware Data Access ControlLiu, Y.-M. et al. | 2010
- 1349
-
A Data Model Anomalies Detection Method for Business Process ModelLiu, Z.-Q. et al. | 2010
- 1359
-
A Continuous Nearest Neighbor Query Method for Uncertain Data in Obstructed SpacesLi, C.-W. et al. | 2010
- 1369
-
Uncertain Neighbors' Collaborative Filtering Recommendation AlgorithmHuang, C.-G. et al. | 2010
- 1378
-
Answering Probabilistic Reachability Queries over Uncertain GraphsYuan, Y. et al. | 2010
- 1387
-
RAKING: An Efficient K-Maximal Frequent Pattern Mining Algorithm on Uncertain Graph DatabaseHan, M. et al. | 2010
- 1396
-
Continuous K Nearest Neighbor Queries of Moving Objects in Road NetworksZhao, L. et al. | 2010
- 1405
-
TKEP: An Efficient Top-K Query Processing Algorithm on Massive DataHan, X.-X. et al. | 2010
- 1418
-
A Multi-Label Classification Algorithm Based on Random Walk ModelZheng, W. et al. | 2010
- 1427
-
An Approximate Non-Derivable Itemset Mining Algorithm over Data StreamsHuang, C.-Z. et al. | 2010
- 1437
-
The Effect of Similarity Support in K-Nearest-Neighborhood Based Collaborative FilteringLuo, X. et al. | 2010
- 1446
-
An Index Structure for Efficient Query Processing in Object Deputy DatabseHuang, Z.-Q. et al. | 2010
- 1460
-
FClock: An Adaptive Buffer Replacement Algorithm for SSDTang, X. et al. | 2010
- 1472
-
A Data Placement Strategy for Data-Intensive Applications in CloudZheng, P. et al. | 2010
- 1481
-
SPQ: A Scalable Pattern Query Method over Data StreamsLi, F.-F. et al. | 2010
- 1492
-
MTPower: A Parallel Database Storage Engine for Batch InsertionChen, H. et al. | 2010
- 1500
-
DBCC-Join: A Novel Cache-Conscious Disk-Based Join AlgorithmHan, X.-X. et al. | 2010
- 1512
-
The Performance Analysis of Main Memory Database Indices on Multi-Core ProcessorsGuo, C. et al. | 2010
- 1523
-
Sector-Based Compression and Compression Strategy Selection Method for Column StoresWang, Z.-X. et al. | 2010
- 1533
-
Research on Construction Methods of Logical Carrying NetworkQi, N. et al. | 2010
- 1541
-
A Novel Structured Overlay Network with Constant Degree and Small-World FeaturesLiang, H.-M. et al. | 2010
- 1548
-
Wireless Sensor Network-Based Topology Structures for the Internet of Things LocalizationGu, J.-J. et al. | 2010
- 1557
-
Construction and Reconfiguration Scheme of the Hierarchical Reconfiguration Network Based on the ComponentsLiu, Q. et al. | 2010
- 1569
-
Dynamic Load Balance Scheme Based on Mobility and Service Cognition in Integrated 3G/WLAN NetworksLiu, Q. et al. | 2010
- 1580
-
A Load Balancing Method in Superlayer of Hierarchical DHT-Based P2P NetworkZhang, Y.-X. et al. | 2010
- 1591
-
Distributed Control Plane: Adaptive Load Balancing for Parallel BGP Route ComputingJiang, X.-Z. et al. | 2010
- 1602
-
Federation-Based Global Network Performance MeasurementWang, J.-L. et al. | 2010
- 1611
-
The Survey of Service Nodes Placement Theories for Content NetworksYin, H. et al. | 2010
- 1621
-
An Approach of Model Checking Time or Space PerformanceNiu, J. et al. | 2010
- 1634
-
An Efficient Low-Delay Routing Algorithm for Opportunistic Networks Based on Exchange of Increments in Packet IndexesRen, Z. et al. | 2010
- 1643
-
Game-Theoretic Approach for Network Access Selection in Heterogeneous Integrated NetworksChen, Q.-B. et al. | 2010
- 1653
-
Performance Evaluation of Real-Time QoS Guarantee Based on Schedulability of PacketsWang, G.-C. et al. | 2010
- 1663
-
A Cooperative Game Model for Traffic Engineering and Overlay Routing Based on Trustworthy and Controllable NetworkWang, P. et al. | 2010
- 1675
-
Security Integration of WAPI Based WLAN and 3GJiang, Q. et al. | 2010
- 1686
-
A Controllable and Trusted Anonymous Communication SchemeWu, Z.-Q. et al. | 2010
- 1703
-
Research of Platform Anonymous Identity Management Based on Trusted ChipYu, A.-M. et al. | 2010
- 1713
-
Defend Against Application-Layer Distributed Denial-of-Service Attacks Based on Session Suspicion Probability ModelXiao, J. et al. | 2010
- 1725
-
A Distributed Trust Model for Peer-to-Peer Networks Based on Multi-Dimension-History VectorTan, Z.-H. et al. | 2010
- 1736
-
A Source-Location Privacy Preservation Protocol in Wireless Sensor Networks Using Source-Based Restricted FloodingChen, J. et al. | 2010
- 1748
-
Analysis for Network Attack-Defense Based on Stochastic Game ModelWang, Y.-Z. et al. | 2010
- 1763
-
Trust Degree Based Inter-Domain Routing MechanismTan, J. et al. | 2010
- 1777
-
On Synchronization and Evaluation Method of Chipped Many-Core ProcessorXu, W.-Z. et al. | 2010
- 1788
-
Parallel Data Cube Computation on Graphic Processing UnitsZhou, G.-L. et al. | 2010
- 1799
-
Distributed Dynamic Fault-Tolerant Routing in Fat TreeHu, N.-D. et al. | 2010
- 1809
-
An Application-Level Checkpointing Based on Extended Data Flow Analysis for OpenMP ProgramsFu, H.-Y. et al. | 2010
- 1823
-
Ontology Induction Based on Social AnnotationsLiu, K.-P. et al. | 2010
- 1835
-
Generative Model Based Atomic Video Primitives PursuingZhao, Y.-D. et al. | 2010
- 1845
-
Semantic Trajectory Based Video Event DetectionWang, X.-F. et al. | 2010
- 1859
-
Reliable Resource Provision Policy for Cloud ComputingTian, G.-H. et al. | 2010
- 1873
-
Performance Testing and Analysis to Storage Medium of Distributed File SystemXu, C.-C. et al. | 2010
- 1881
-
Performance Management for Multi-Tenant Web ApplicationsLin, H.-L. et al. | 2010
- 1896
-
Test Data Generation Algorithms of Combinatorial Testing and Comparison Based on Cross-Entropy and Particle Swarm Optimization MethodZha, R.-J. et al. | 2010
- 1909
-
Mining and Analyzing Behavioral Characteristic of Developers in Open Source SoftwareYuan, L. et al. | 2010
- 1919
-
Approximate Join Aggregate on Massive DataHan, X.-X. et al. | 2010
- 1934
-
ISU-Tree: A Uncertain High-Dimensional Indexing Algorithm for Probabilistic k Nearest Neighbor QueryZhuang, Y. et al. | 2010
- 1943
-
Visible k Nearest Neighbor Queries over Uncertain DataWang, Y.-Q. et al. | 2010
- 1953
-
The Adaptive Fragmentation for XML Stream DisseminationHuo, H. et al. | 2010
- 1963
-
A Method of Detecting Phishing Web Pages Based on Hungarian Matching AlgorithmZhang, W.-F. et al. | 2010
- 1976
-
An Efficient Regular Expression Matching Algorithm for Network Security InspectionZhang, S.-Z. et al. | 2010
- 1987
-
An Attack Graph-Based Probabilistic Computing Approach of Network SecurityYe, Y. et al. | 2010
- 1997
-
YASS Steganalysis Based on Local RandomnessLei, Y. et al. | 2010
- 2003
-
A Secure Communication Model for Defending Against Insider Packet Dropping AttacksZhang, Z.-K. et al. | 2010
- 2015
-
Content-Aware Image Resizing Based on Hybrid EnergyLei, L.-X. et al. | 2010
- 2022
-
Graphics Hardware Accelerated Continuous Collision Detection Between Deformable ObjectsTang, M. et al. | 2010
- 2033
-
A SaaS-Friendly Service Community Model and Its Application in the Nationwide Service Network for Sharing Science and Technology InformationWang, Z.-H. et al. | 2010
- 2044
-
Research on Data Combination Privacy Preservation Mechanism for SaaSZhang, K. et al. | 2010
- 2055
-
TLA Based Customization and Verification Mechanism of Business Process for SaaSShi, Y.-L. et al. | 2010
- 2068
-
Service Relations and Its Application in Services-Oriented ComputingChen, S.-Z. et al. | 2010
- 2084
-
Framework of Context-Aware Based Service SystemMo, T. et al. | 2010
- 2093
-
A Service Discovery Method Based on Referral Network and Ant-Colony AlgorithmXie, X.-Q. et al. | 2010
- 2104
-
A Profit Optimization Oriented Service Selection Method for Dynamic Service CompositionWang, X.-Z. et al. | 2010
- 2116
-
A Service Selection Model Using Mixed Intelligent OptimizationChen, Y.-P. et al. | 2010
- 2126
-
Research on Context-Awareness Mobile SNS Service Selection MechanismWang, Y.-X. et al. | 2010
- 2136
-
QoS-Skyline Based Dynamic Service SelectionWu, J. et al. | 2010
- 2147
-
An Active and Opportunistic Service Replacement Algorithm Orienting Transactional Composite Service Dynamic AdaptationYin, Y. et al. | 2010
- 2163
-
Requirements Semantics-Driven Aggregated Production for On-Demand ServiceWen, B. et al. | 2010
- 2177
-
A Process Algebra Based Method for Value Analysis on Service Process ModelMa, C. et al. | 2010
- 2190
-
An Approach to Improve the Service Availability on the Basis of Business Service AbstractionWen, Y. et al. | 2010
- 2202
-
A Methodological Study of Evaluating the Dependability of SOA Software SystemZhao, H.-Q. et al. | 2010
- 2211
-
Kernelization Algorithm of Maximum Leaf Spanning TreeGao, W.-Y. et al. | 2010
- 2219
-
Answering Threshold-Based Reachability Queries Over Probabilistic GraphsYuan, Y. et al. | 2010
- 2229
-
GRkNN: Group Reverse k-Nearest-Neighbor Query in Spatial DatabasesSong, X.-Y. et al. | 2010
- 2239
-
Research on Index of Multi-Tenant Based on Key-Values for SaaS ApplicationKong, L.-J. et al. | 2010
- 2248
-
Representation and Reasoning of the Spatial Relations of the Spatial NetworksHao, Z.-X. et al. | 2010
- 2258
-
HV-Recovery: A High Efficient Recovery Technique for Flash-Based DatabaseLu, Z.-P. et al. | 2010
- 2267
-
Using a Joint Link Similarity Evaluation Based Method for Crawling the Resources on WebZhang, N.-Z. et al. | 2010
- 2281
-
Reasoning about Structural Integrity Constraints for XMLZhang, J.-M. et al. | 2010
- 2291
-
An Algorithms for Learning the Structure of Utility Graph Based on Nearest-Biclusters Collaborative FilteringWang, L.-M. et al. | 2010
- 2300
-
An Integrated Metrics Based Routing Protocol for Wireless Mesh NetworksShen, C. et al. | 2010
- 2312
-
Modifying Guest OS to Optimize I/O Virtualization in KVMZhang, B.-B. et al. | 2010
- 2321
-
Toward a Software Architectural Design Approach for Trusted Software Based on MonitoringWen, J. et al. | 2010
- 2335
-
Spectra-Based Fault Localization by Increasing Marginal WeightTan, D.-G. et al. | 2010
- 2343
-
An Analogic Selection Sorting Algorithm for Synthesis of Reversible Logic CircuitsWan, S.-S. et al. | 2010
- 2353
-
SAN-EBON: A Novel P2P Location Network Based on Structured Overlay Network for P2P Workflow SystemGao, L. et al. | 2010
- 2364
-
Scheduling for Security-Critical Real-Time Applications on Heterogeneous ClustersZhu, X.-M. et al. | 2010
- 2378
-
Bayes Causal Network Based Method for Role Identification in Multi-Camera SurveillanceMing, A.-L. et al. | 2010
- 2387
-
A Fourier Shape Descriptor Based on Multi-Level Chord Length FunctionWang, B. et al. | 2010
- 2397
-
Study on a New Algorithm for Gray Image RepresentationZheng, Y.-P. et al. | 2010
- 2407
-
A Line Generation Algorithm on 3D Face-Centered Cubic GridHe, L.-J. et al. | 2010