Energy Efficient Physical Layer Design for Passive RFID System (Unknown)
- New search for: Wang, H.-G.
- New search for: Wang, H.-G.
In:
CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION-
;
32
;
1356-1364
;
2009
-
ISSN:
- Article (Journal) / Print
-
Title:Energy Efficient Physical Layer Design for Passive RFID System
-
Contributors:Wang, H.-G. ( author )
-
Published in:CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION- ; 32 ; 1356-1364
-
Publisher:
- New search for: SCIENCE PRESS
-
Publication date:2009-01-01
-
Size:9 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:Unknown
- New search for: 004
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 004 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 32
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Survey on the Management of Uncertain DataZhou, A.-Y. et al. | 2009
- 17
-
Emergence-Oriented Research on MAS with Quantifications Based on the Notions in Science of ComplexityJin, S.-Y. et al. | 2009
- 30
-
Hash Chain Based Random Keys Pre-Distribution Scheme in Wireless Sensor NetworksSu, Z. et al. | 2009
- 42
-
QoS Scheduling Based on Trust Relationship in Web Service WorkflowHu, C.-H. et al. | 2009
- 54
-
Non-Cooperative Game Based Research on Routing Schemes for Wireless NetworksWang, Y. et al. | 2009
- 69
-
Topology Evolution of Wireless Sensor Networks among Cluster Heads by Random WalkersChen, L.-J. et al. | 2009
- 77
-
Piecewise Support Vector MachinesRen, S.-Q. et al. | 2009
- 86
-
A Comparison of Semantics of Extended Goals Expressed in CTL and E~AG~L~EHuang, W. et al. | 2009
- 97
-
Applying Bigraph Theory to Self-Adaptive Software ArchitectureChang, Z.-M. et al. | 2009
- 107
-
Spatiotemporal Video Copy Detection Based on Visual Perception AnalysesPan, X.-F. et al. | 2009
- 115
-
A Method Based on the Degree of Object Attributes Attention for Transmission QoS ControlXie, K. et al. | 2009
- 124
-
A Design Method of Ahead Masking Associative Memory Model with Expecting Fault-Tolerant FieldYang, G.-W. et al. | 2009
- 132
-
Objective Increment Based Iterative Greedy Heuristic for No-Wait Flowshops with Total Flowtime MinimizationZhu, X. et al. | 2009
- 142
-
High-Bandwidth Memory Accessing Pipeline of General Purpose ProcessorZhang, H. et al. | 2009
- 152
-
Pipelined Template for Mapping Multiple Loop Nests on FPGA with Restricted ResourcesDong, Y.-Z. et al. | 2009
- 161
-
A Novel Kind of Architecture with High-Efficiency and Error-Tolerance of Universal Quantum ComputerWu, N. et al. | 2009
- 169
-
A Power Control Algorithm Based on Game Theory in Ad Hoc NetworksSun, Q. et al. | 2009
- 177
-
R-Tree Index Structure for Multi-Scale Representation of Spatial DataDeng, H.-Y. et al. | 2009
- 185
-
A Fast KD-Tree Construction Method by Probing the Optimal Splitting Plane HeuristicallyFan, W.-S. et al. | 2009
- 193
-
Orthogonal Reconstruction of 3D Model Based on V-System over Triangular DomainLi, J. et al. | 2009
- 203
-
Feature Preserving Mesh Simplification Algorithm Based on Square Volume MeasureZhou, Y.-F. et al. | 2009
- 213
-
Metamorphosis Based on the Level-Set MethodsPan, Q. et al. | 2009
- 221
-
Physically Based Simulation of Weathering Plant LeavesChi, X.-Y. et al. | 2009
- 231
-
GPU Based Real-Time Rendering of Spherical Depth ImageZhu, J. et al. | 2009
- 241
-
Upsampling Synthesized Texture Using Joint Bilateral FilterXiao, C.-X. et al. | 2009
- 252
-
Adaptive Symbol Recognition for Sketch-Based Interfaces Based on Template Matching and SVMJiang, Y.-Y. et al. | 2009
- 261
-
Real-Time Post-Processing for Online Video SegmentationZhong, F. et al. | 2009
- 268
-
A High-Accuracy Contour Extraction Algorithm for MR Images Based on Mumford-Shah ModelYuan, D. et al. | 2009
- 275
-
Discriminative Random Fields for Online Behavior RecognitionHung, T.-Y. et al. | 2009
- 282
-
An Image Segment Method Based on Color Invariance of Physical Reflection ModelCai, X. et al. | 2009
- 288
-
Constructing Biorthogonal Wavelets Using Lifting SchemeChen, Z.-N. et al. | 2009
- 299
-
Edge Detection Based on Density GradientSun, D. et al. | 2009
- 308
-
A Contourlet-Domain Watermarking Algorithm Against Geometric Attacks Based on Feature TemplateLou, O.-J. et al. | 2009
- 318
-
An Attacked Image Based Hidden Messages Blind Detect TechniqueMao, J.-F. et al. | 2009
- 328
-
Building Panoramas from Photographs Taken with An Uncalibrated Hand-Held CameraChen, H. et al. | 2009
- 336
-
Fast Adaboost Training Algorithm by Dynamic Weight TrimmingJia, H.-X. et al. | 2009
- 342
-
Automatic Fragment Re-Assembly Method Based on DDTW MatchGao, J. et al. | 2009
- 350
-
Fusion Method of Multi-Spectral Image and Panchromatic Image Based on Four Channels Non-Separable Additive WaveletsLiu, B. et al. | 2009
- 359
-
New Transport Layer Architecture for Pervasive ServiceYang, D. et al. | 2009
- 371
-
Research on Architecture of Universal Carrying NetworkWang, H.-X. et al. | 2009
- 377
-
Hidra: A Hierarchical Inter-Domain Routing ArchitectureWang, N. et al. | 2009
- 391
-
Trustworthy and Controllable Network Architecture and Protocol FrameworkLuo, J.-Z. et al. | 2009
- 405
-
Trust Quantitative Model with Multiple Decision Factors in Trusted NetworkLi, X.-Y. et al. | 2009
- 417
-
Virtualization Technology for Trustworthy Network ResearchZhang, Y. et al. | 2009
- 424
-
2-Terminal Reliability Computing Strategy for Backbone of Wireless Mesh NetworksZhao, Y.-L. et al. | 2009
- 432
-
QoS Architecture in Wireless Sensor NetworkWen, H. et al. | 2009
- 441
-
QoS Framework Design for WSN-Based Tracking of Moving TargetsYu, J. et al. | 2009
- 463
-
A Parallel QoS Routing Optimization Based on Pareto SubsetsQin, Y. et al. | 2009
- 473
-
Hybrid Content Distribution Network and Its Performance ModelingJiang, H. et al. | 2009
- 483
-
A Cooperation Protocol for Ad Hoc Networks with Selfish Nodes Based on Mechanism DesignGuo, J.-L. et al. | 2009
- 493
-
DTM: A Dynamic Trust Management Model for Internet Computing EnvironmentsLi, J.-X. et al. | 2009
- 506
-
GesBGP: A Good-Enough-Security BGPLi, Q. et al. | 2009
- 516
-
A Conflict and Redundancy Analysis Method for XACML RulesWang, Y.-Z. et al. | 2009
- 531
-
A Secured Access Router Mesh of Mobile Networks with Path Selection and Fast Handover SupportHuang, S.-H. et al. | 2009
- 543
-
The Key Management Mechanism of IBE SystemHu, L. et al. | 2009
- 552
-
Refining the Inter-Domain IP Spoofing PreventionLu, G.-F. et al. | 2009
- 564
-
Dynamic Hierarchical Multicast Routing with Delay-Bandwidth ConstraintsHu, H.-Y. et al. | 2009
- 576
-
A Survey of the Research on ALM Stability EnhancementSu, J.-S. et al. | 2009
- 595
-
A New Statistical Test on Block CiphersChen, H. et al. | 2009
- 602
-
EM Frequency Domain Template Analysis on Cipher ChipsDeng, G.-M. et al. | 2009
- 611
-
An Improved OAEP 3-Round Padding SchemeHu, Y.-P. et al. | 2009
- 618
-
Non-Malleability and Emulation Based Approach to Cryptographic Protocol AnalysisTian, Y. et al. | 2009
- 635
-
Testing on Trust Chain of Trusted Computing Platform Based on Labeled Transition SystemXu, M.-D. et al. | 2009
- 646
-
The Formal Analysis and Testing of Trusted Platform ModuleChen, X.-F. et al. | 2009
- 654
-
Research on Compliant Testing Method of Trusted Cryptography ModuleLi, H. et al. | 2009
- 664
-
Adaptive Dynamic Trust Measurement and Prediction Model Based on Behavior MonitoringLi, X.-Y. et al. | 2009
- 675
-
Research on Trustworthiness Evaluation Model for Digital Image in Blind EnvironmentHu, D.-H. et al. | 2009
- 688
-
A Trust Model Based on Behaviors Risk EvaluationZhang, R.-L. et al. | 2009
- 699
-
A Verification Method of Security Model Based on UML and Model CheckingCheng, L. et al. | 2009
- 709
-
A Information-Flow-Based Verification Solution with Security Sensitivity to Check Security Policy of SELinuxZhang, Y. et al. | 2009
- 721
-
Leakage Identification and Quantitative Evaluation Scheme for Confidential DatabasesXian, H.-Q. et al. | 2009
- 730
-
Static Analysis Based Correctness Verification for Mandatory Access Control FrameworkWu, X.-S. et al. | 2009
- 740
-
An Integrated Verification Model atsFPM Based on Functional, Time and Spatial ConstraintsNiu, J. et al. | 2009
- 751
-
A Measurement of Covert Channels ThreatWang, C.-D. et al. | 2009
- 763
-
A Network Security Situational Awareness Model Based on Log Audit and Performance CorrectionWei, Y. et al. | 2009
- 773
-
ProSPer: A Proactive Event Monitor for General PurposesLiu, J.-H. et al. | 2009
- 784
-
An Algorithm for Sensing Insider Threat Based on Cloud ModelZhang, H.-B. et al. | 2009
- 793
-
An Optimized Method for Real Time Network Security QuantificationLi, W.-M. et al. | 2009
- 805
-
Incomplete Information Nodes Risk Assessment in Mobile Ad Hoc NetworksFu, C. et al. | 2009
- 817
-
Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game ModelJiang, W. et al. | 2009
- 828
-
Evaluation Model of Information Security Technologies Based on Game TheoreticZhu, J.-M. et al. | 2009
- 835
-
A New Method for Interactive TCP Traffic Replay Based on Balance-Checking Between Transmitted and Received PacketsChu, W.-B. et al. | 2009
- 847
-
Privacy Preservation in Database Applications: A SurveyZhou, S.-G. et al. | 2009
- 862
-
Resampling Methods and Machine LearningBi, H. et al. | 2009
- 878
-
State-of-the-Art on Video-Based Face RecognitionYan, Y. et al. | 2009
- 887
-
Security Quantifying Method and Enhanced Mechanisms of TNCLuo, A.-A. et al. | 2009
- 899
-
A Static Vulnerabilities Detection Method Based on Security State Tracing and CheckingLiang, B. et al. | 2009
- 910
-
Safety Analysis of ARBAC Policy Based on GraphplanLiu, Q. et al. | 2009
- 922
-
A Phishing Web Pages Detection Algorithm Based on Nested Structure of Earth Mover's Distance (Nested-EMD)Cao, J.-X. et al. | 2009
- 930
-
A Dependable Worm Signature Generation System Based on Threshold SignatureXiang, J. et al. | 2009
- 940
-
A Method to Construct a Class of Certificateless Signature SchemesZhang, L. et al. | 2009
- 946
-
Combo-Dimensional Kernels for Graph ClassificationLi, Y.-F. et al. | 2009
- 953
-
A Data-Deficiency-Tolerated Method for Viewpoint Independent Sign Language RecognitionWang, Q. et al. | 2009
- 962
-
A New Simplification Method for Terrain Model Based on Divergence FunctionZhang, H.-J. et al. | 2009
- 974
-
A Trustworthy Index for Inserting Random SequencesLiu, F.-C. et al. | 2009
- 982
-
PAR-Based Formal Development of AlgorithmsShi, H.-H. et al. | 2009
- 992
-
Model Checking CTL Based on Complete Abstraction InterpretationQian, J.-Y. et al. | 2009
- 1002
-
Effectively Metamorphic Testing Based on Program Path AnalysisDong, G.-W. et al. | 2009
- 1014
-
An Optimization Model for Dynamic QoS-Aware Web Services Selection and CompositionJiang, Z.-Y. et al. | 2009
- 1026
-
Collision-Sequential Resolution Algorithm in IEEE 802.11 Wireless NetworksZhang, Q.-F. et al. | 2009
- 1037
-
A New Method for Rapid Detection of Fingerprints' Singular PointsMei, Y. et al. | 2009
- 1046
-
An Operating System for Hybrid Reconfigurable Systems: Design and ImplementationQiao, L. et al. | 2009
- 1055
-
A Robust Digital Watermarking Algorithm Based on Multiple-Level Discrete Cosine TransformXiao, J. et al. | 2009
- 1062
-
Fast Multi-Resolution Colorization of High-Resolution Gray ImagesHu, W. et al. | 2009
- 1069
-
A Survey of Content-Based 3D Model Retrieval with Semantic FeaturesPan, X. et al. | 2009
- 1080
-
The Implementation of Loop Self-Pipelining with Supports in Hardware for Coarse-Grained Reconfigurable PlatformXu, J.-H. et al. | 2009
- 1089
-
Loop Kernel Pipelining Mapping onto Coarse-Grained Reconfigurable ArchitecturesWang, D.-W. et al. | 2009
- 1100
-
Multi-Grain Parallel H.264 Encoder for Homogeneous Multi-Core ArchitecturesYu, J.-Q. et al. | 2009
- 1110
-
A Novel Circuit SAT Solver in Unbounded Model CheckingZhao, Y. et al. | 2009
- 1119
-
A New Property Verification Method for Code Security Based on Pointer LogicZhang, Y. et al. | 2009
- 1126
-
Multiple Node-Disjoint Paths Secure Source Routing for MANETFeng, T. et al. | 2009
- 1134
-
Joint k-Error 2-Adic Complexity for Binary Periodic Multi-SequencesDong, L.-H. et al. | 2009
- 1140
-
A Hybrid Static/Dynamic Energy-Aware Weakly-Hard Real-Time Scheduling Algorithm Based on Simple FeedbackWu, T. et al. | 2009
- 1147
-
Analysis of Coupling Capacitance among Interconnections Based on Defect's Uniform DistributionDuan, X.-C. et al. | 2009
- 1152
-
Error Resilient Video Transcoding Based on Layered Rate Distortion OptimizationHan, Z. et al. | 2009
- 1162
-
A Framework of Video Format Adaptation Based on Motion DescriptionShen, Q. et al. | 2009
- 1172
-
Ray Tracing of Dynamic Scenes by Managing Empty Regions in Adaptive BoxesLi, J. et al. | 2009
- 1183
-
A B-rep Model Decomposition Approach Based on Face Shell ShrinkingMa, L.-J. et al. | 2009
- 1196
-
Global Texture Optimization Incorporating with Image DetailXiao, C.-X. et al. | 2009
- 1206
-
A New Interactive Method for Controlling Implicit SurfacesZhou, Y.-F. et al. | 2009
- 1214
-
An Improved Scatter Search for Circles Packing Problem with the Equilibrium ConstraintWang, Y.-S. et al. | 2009
- 1222
-
Human Tracking in Infrared Images Based on Particles Mean-Shift Migration AlgorithmYun, T.-J. et al. | 2009
- 1229
-
A Survey on Rough Set Theory and ApplicationsWang, G.-Y. et al. | 2009
- 1247
-
Recent Advances in Image-Based Steganalysis ResearchWang, S.-Z. et al. | 2009
- 1264
-
Abstraction and Reuse of Diagnosing with Value PropagationZhang, X.-N. et al. | 2009
- 1280
-
Semantics and Reasoning of Description Logic μALCIOJiang, Y.-C. et al. | 2009
- 1291
-
A Fast Algorithm for Synthesis of Quantum Reversible Logic CircuitsLi, Z.-Q. et al. | 2009
- 1304
-
Study of Remote Automated Anonymous Attestation in Trusted ComputingLiu, J.-Q. et al. | 2009
- 1311
-
Pcanel/V2: A VMM Architecture Based on Intel VT-xChen, W.-Z. et al. | 2009
- 1320
-
Pseudorandomness and Super Pseudorandomness on the Unbalanced Feistel Networks with Contracting FunctionsZhang, L.-T. et al. | 2009
- 1331
-
Construction Algorithm of Bipartite Graphs for Right Regular Erasure CodesMu, J.-J. et al. | 2009
- 1337
-
Secure Computation Protocol for Testing the Inclusion Relation of SetsLi, R.-H. et al. | 2009
- 1346
-
Predicting Software Stage Effort with Sequence Changing RatioWang, Y. et al. | 2009
- 1356
-
Energy Efficient Physical Layer Design for Passive RFID SystemWang, H.-G. et al. | 2009
- 1365
-
Person Name Disambiguation of Searching Results Using Social NetworkLang, J. et al. | 2009
- 1375
-
Dynamic Region Matching Algorithm Based on Index-OrderYao, Y.-P. et al. | 2009
- 1382
-
SpMT WaveCache: Exploiting Speculative Multithreading for Dataflow ComputerPei, S.-W. et al. | 2009
- 1393
-
Evaluating GUI Systems Based on the Analysis of Process Execution BehaviorsSong, B. et al. | 2009
- 1404
-
Research of the Virtual Dependency Channel in Distributed Video CodingFang, S. et al. | 2009
- 1413
-
Design of Two-Channel Neville-Lagrange Lifting Wavelet Filter Banks with Linear PhaseChen, D. et al. | 2009
- 1424
-
Pose and Illumination Invariant Face Recognition Based on HMM with One Sample Per PersonHu, F.-S. et al. | 2009
- 1434
-
Clonal Selection Remote Sensing Image Fusion Based on CP and Multiwavelet HMT ModelsJin, H.-Y. et al. | 2009
- 1443
-
A Heuristic Path-Estimating Algorithm by Using Vector-Based RecognitionLu, W.-F. et al. | 2009
- 1451
-
Research Progress of Digital Geometry ProcessingHu, S.-M. et al. | 2009
- 1470
-
Fast Diagnosing Through Diagnostic Graph AnalysisChen, A.-X. et al. | 2009
- 1486
-
Searching Algorithm for Attribute Reduction Based on Power GraphChen, Y.-M. et al. | 2009
- 1493
-
Quick Attribute Reduction Algorithm with HashLiu, Y. et al. | 2009
- 1500
-
Computing Most Specific Concept in Description Logic with n-Ary Existential QuantifierJiang, Y.-C. et al. | 2009
- 1511
-
Fuzzy Description Logic F-SHOIQ(G) Supporting Representation of Fuzzy Data TypesWang, H.-L. et al. | 2009
- 1525
-
Clonal Selection Land-Based Satellite Tracking Telemetry and Command(TT&C) Resources Scheduling Based on the Mission Oriented ModelHou, C.-Q. et al. | 2009
- 1536
-
Bilinear Form-Based Non-Negative Matrix Set FactorizationLi, L. et al. | 2009
- 1550
-
Research on Balancing Clustered Dot Density for Hybrid Halftone Dithering AlgorithmXu, G.-L. et al. | 2009
- 1560
-
Velocity Driven Levels of Detail Haptic Rendering Algorithm for Complex ScenesZhou, W.-L. et al. | 2009
- 1571
-
A Uniform Hardware-Accelerated Adaptive EWA Splatting AlgorithmChen, W. et al. | 2009
- 1582
-
Smooth Line Drawing on Graphics HardwareZhao, H.-L. et al. | 2009
- 1589
-
A OutofCore Algorithm for Interactive Rigid Body Operation of 3D ModelTian, F.-L. et al. | 2009
- 1595
-
An Automatic Generation Method of Multi-Styles Portraits Based on the And-Or Graph RepresentationMin, F. et al. | 2009
- 1603
-
Improved Inter Prediction Based on Structural Similarity for H264Yang, C.-L. et al. | 2009
- 1611
-
Medical Image Registration Using Equivalent Meridian Plane and Mutual InformationLu, Z.-T. et al. | 2009
- 1618
-
Architecture Supported Synchronization-Based Cache Coherence Protocol for Many-Core ProcessorsHuang, H. et al. | 2009
- 1631
-
An Optimal Algorithm for Normal Scheduling on P~4 |fix| C~m~a~xHuang, J.-G. et al. | 2009
- 1637
-
Research on Parameterized Algorithms of the Individual Haplotyping ProblemXie, M.-Z. et al. | 2009
- 1651
-
Sense Recognition Research of Hyponymy Based on Concept SpaceLiu, L. et al. | 2009
- 1662
-
Backbone Analysis and Heuristic Design for the Graph Partitioning ProblemJiang, H. et al. | 2009
- 1668
-
Dynamic Methods of Trust-Aware Composite Service SelectionWang, Y. et al. | 2009
- 1676
-
The Resource Access Mechanism in Grid Based on Fuzzy-TrustChen, J.-G. et al. | 2009
- 1683
-
A Graph Vertex-Covering Problem Decision-Making Neural Network ModelNan, J.-H. et al. | 2009
- 1687
-
Pattern Recognition Based on the Fuzzy Kernel Matching PursuitLi, Q. et al. | 2009
- 1697
-
Software Analysis: A Road MapMei, H. et al. | 2009
- 1711
-
Analysis on the Topological Properties of Software Network at Different Levels of Granularity and Its ApplicationHan, Y.-N. et al. | 2009
- 1722
-
An Aggressively Field-Sensitive Unification-Based Pointer AnalysisYu, H.-T. et al. | 2009
- 1736
-
Experiments on Detecting Program Deadlock with Ordinary Differential Equation ModelDing, Z.-H. et al. | 2009
- 1750
-
Infinite Loop Detection Based on Path AnalysisRuan, H. et al. | 2009
- 1759
-
Scenario-Based Analysis and Verification for Web Services Message FlowsYang, L. et al. | 2009
- 1773
-
Incremental Verification of Aspectual Feature Module Based on Hierarchical State MachineYe, J. et al. | 2009
- 1782
-
An Analysis Approach for Software Architectural ConcernsZhang, L.-L. et al. | 2009
- 1792
-
Using Static Analysis to Extract C++ 0x ConceptsChen, L. et al. | 2009
- 1804
-
A Service-Oriented Partitioning and Encapsulation Method for Java Legacy SystemsLi, X. et al. | 2009
- 1816
-
Instance Migration in Dynamic Evolution of Web Service CompositionsSong, W. et al. | 2009
- 1832
-
An Evolution Analysis Method Based on Fuzzy Concept Lattice and Source Code AnalysisXu, J.-Q. et al. | 2009
- 1845
-
A Polynomial Time Path-Sensitive Taint Analysis MethodLi, J.-J. et al. | 2009
- 1856
-
Static Checking of Security Related Behavior Model for Multithreaded Java ProgramsJin, Y. et al. | 2009
- 1869
-
Analysis and Optimization Method of Energy Consumption Characteristics in Embedded Software Based on Source-Code and Algorithm LevelLuo, G. et al. | 2009
- 1876
-
On Energy-Consumption Analysis and Evaluation for Component-Based Embedded System with CSPZhang, T.-T. et al. | 2009
- 1887
-
Smart Multihop Promotion for Non-Uniform Cache ArchitectureWu, J.-J. et al. | 2009
- 1896
-
An Implicitly Dynamic Shared Cache Isolation in Many-Core ArchitectureSong, F.-L. et al. | 2009
- 1905
-
An Asynchronous Remote Mirror System Based on Storage VirtualizationXiang, X.-J. et al. | 2009
- 1915
-
On-Demand Deployment of Virtual Machines Based on Optimized COW Virtual Block DeviceChen, B. et al. | 2009
- 1927
-
Adaptive Replication Management Algorithm Based on Location and File Popularity for Peer-to-Peer NetworkChen, K. et al. | 2009
- 1938
-
Selective Rejuvenation Framework for Multi-Tier ServicesTian, G.-H. et al. | 2009
- 1947
-
Multi-Constraint Load Balancing Based on Cell Breathing in WLANWang, S.-L. et al. | 2009
- 1957
-
A Self-Healing Algorithm without Location Information in Sensor NetworksSu, H. et al. | 2009
- 1971
-
A Two-Phase Sleep Scheduling Based Protocol for Target Tracking in Sensor NetworksRen, Q.-Q. et al. | 2009
- 1980
-
IRC Botnet Detection Based on Host BehaviorWang, W. et al. | 2009
- 1989
-
Parsimonious Semantic Trust NegotiationZhang, Y. et al. | 2009
- 2004
-
A Class of General Franklin Functions and Its ApplicationCai, Z.-C. et al. | 2009
- 2014
-
Feature Preserving Resizing of 3D Mesh ModelsHe, J. et al. | 2009
- 2023
-
Real-Time Image SketchHuang, H. et al. | 2009
- 2030
-
Research on Key Issues of Vision-Based Gesture InterfacesWu, H.-Y. et al. | 2009
- 2042
-
Parallel Collision Detection Between Deformable Objects Using SIMD InstructionsTang, M. et al. | 2009
- 2052
-
Study on Processing Probabilistic RFID Spatial Range Query Based on Mobile ReadersGu, Y. et al. | 2009
- 2066
-
Efficient Query Processing on Uncertain Graph DatabasesZhang, S. et al. | 2009
- 2080
-
HCSIM: An Indexing Method for Long-Lived Frequent Block-Level SnapshotWu, G.-J. et al. | 2009
- 2091
-
Logical Properties on Translations between LogicsShen, Y.-M. et al. | 2009
- 2099
-
Multi-Modal Web Search Query Refinement Based on Semi-Supervised LearningJiang, Y. et al. | 2009
- 2107
-
Underlying Techniques of Efficient Similarity Search on Time SeriesFeng, Y.-C. et al. | 2009
- 2123
-
Logic for Knowledgebase SystemsXu, W.-Y. et al. | 2009
- 2130
-
An Efficient and Provably Secure Identity-Based Signature Scheme in the Standard ModelLi, J.-G. et al. | 2009
- 2137
-
A Self-Adaptive Hybrid Particle Swarm Optimization Algorithm for Flow Shop Scheduling ProblemZhang, C.-S. et al. | 2009
- 2147
-
A Hybrid Simulated Annealing Algorithm for the Three-Dimensional Packing ProblemZhang, D.-F. et al. | 2009
- 2157
-
Parallelization of LU Decomposition on the Godson-Tv1 Many-Core ArchitectureLong, G.-P. et al. | 2009
- 2168
-
Optimizing the SIMD Parallelism Through Bitwidth AnalysisZhang, W.-H. et al. | 2009
- 2178
-
A New Scheduling Algorithm for Digraph-Based Parallel ComputingZhang, A.-Q. et al. | 2009
- 2187
-
Grid Dynamic Authorization Model Based on Feedback MechanismLi, M.-C. et al. | 2009
- 2200
-
An Efficient Checkpointing Scheme for Update Intensive Applications in Main Memory Database SystemsQin, X.-P. et al. | 2009
- 2211
-
Inertial Product Energy and Edge DetectionWang, Z.-H. et al. | 2009
- 2221
-
Image Retrieval by Convex Hulls of Interest Points and SVM-Based Weighted FeedbackSu, X.-H. et al. | 2009
- 2229
-
Multisensor Image Adaptive Fusion Based on Nonsubsampled ContourletChang, X. et al. | 2009
- 2239
-
A Novel Secure Video Watermarking for Broadcast MonitoringLiu, L. et al. | 2009
- 2247
-
A New Visual Hiding Scheme Using One Secret ImageLiu, D. et al. | 2009
- 2252
-
A Fast Object Extraction Method Based on Color and Texture InformationMu, Y.-D. et al. | 2009
- 2260
-
Hybrid Linear Model Based Image DenoisingCao, Y. et al. | 2009
- 2265
-
Design of the Simultaneous Multithreading Godson-2 ProcessorLi, Z.-S. et al. | 2009
- 2274
-
Research on Dynamic Memory Faults Testing Method Based on Pointer Mapping SetsZhang, W. et al. | 2009
- 2283
-
DNA Computer Principle, Advances and Difficulties (V): Immobilization Technology of DNA MoleculeXu, J. et al. | 2009
- 2300
-
Development and Application of Fluorescence Technology in DNA ComputingZhang, C. et al. | 2009
- 2311
-
The Redefinition and Some Discussion of Green ComputingGuo, B. et al. | 2009
- 2320
-
The Parallel Type of DNA Computing Model for Solving Ramsey Number ProblemXu, J. et al. | 2009
- 2325
-
A Biomolecular Computing Model in Vivo for Minimum Dominating Set ProblemLiu, X.-R. et al. | 2009
- 2332
-
A DNA Computing Model for Graph Vertex Coloring ProblemQiang, X.-L. et al. | 2009
- 2338
-
Implementation of Binary Subtraction and Multiplication Based on DNA Push-Down AutomatonCheng, Z. et al. | 2009
- 2347
-
Boolean Logic Computation Based on Dan Tiles Self-AssemblyHuang, Y.-F. et al. | 2009
- 2355
-
Binary String Languages Generated by Spiking Neural P Systems with Exhaustive Use of RulesJiang, Y. et al. | 2009
- 2362
-
A Spiking Neural P System for Performing Multiplication of Two Arbitrary Natural NumbersZhang, X.-Y. et al. | 2009
- 2373
-
A Molecular Solution for Routing Satisfying Explicit Node Constraint on DNA-Based SupercomputingYang, L. et al. | 2009
- 2382
-
Research on Grid-Based Genetic Algorithm and Its Application in Public Transport Operation Plan SchedulingChen, C. et al. | 2009
- 2389
-
The Statistical Analyses for Computational Performance of the Genetic AlgorithmsYue, Q. et al. | 2009
- 2393
-
Energy Prediction and Reliable Clustering Routing Protocol for Multilevel Energy Heterogeneous Wireless Sensor NetworksCai, H.-B. et al. | 2009
- 2403
-
A Voltage Allocation Technique with Checkpoint-Based Schedulability Test in Embedded Real-Time SystemsLi, G.-H. et al. | 2009
- 2411
-
A Matrix Interpretation of Network CalculusFan, B.-H. et al. | 2009
- 2420
-
Symbolic Reachability Analysis of Petri Nets Using ZBDDsLi, F.-Y. et al. | 2009
- 2429
-
Analyzing Compatibility and Similarity of Web Service ProcessesLi, X.-T. et al. | 2009
- 2438
-
Establishment, Realization and Effectiveness Verification for Phonological Representation of Chinese Sign LanguageNi, X.-B. et al. | 2009
- 2454
-
A Novel Color Based Particle Filter Algorithm for Object TrackingLi, P.-H. et al. | 2009
- 2464
-
A Variational Level Set Method of Multiphase Segmentation for 3D ImagesPan, Z.-K. et al. | 2009
- 2475
-
An Efficient Architecture Method for Improving Energy Efficiency: Parallel ProcessingYi, H.-Z. et al. | 2009
- 2482
-
Approximation Method of Multivariate Polynomials by Feedforward Neural NetworksWang, J.-J. et al. | 2009