column
A Fast Hybrid Cache System for Pipelined Stream Processing
GE Jian-da, XIE Jing, TANG Zheng, WANG Qin, MAO Zhi-gang,
2015, 32(2):1-4,9.
Abstract PDF
A Distributed Firewall Rules Validity Detection Algorithm
TANG Ang-ang, CHEN Yong-bo, JI Dong-hong,
2015, 32(2):5-9.
Abstract PDF
An Evidence Collection System Based on Dynamic Window
XIAO Xia, CHEN Lan, LI Ying,
2015, 32(2):10-14,19.
Abstract PDF
An SSUT Network Security Situation Awareness Method Based on Supporting Extended Index System
LI Ji-zhen, MENG Xiang-ru, YANG Dong, KANG Qiao-yan,
2015, 32(2):15-19.
Abstract PDF
A Finger-Touching Detection Method Using Stripes and Shadow
ZHENG Yi, SONG Wei, XIE Xiang,
2015, 32(2):20-23,27.
Abstract PDF
DPA Resistance of Linear Component in Block Ciphers
QIU Shuang, BAI Guo-qiang, CHEN Hong-yi,
2015, 32(2):24-27.
Abstract PDF
An Accurate and Flexible Calibration Method for Projector-Camera
SONG Wei, ZHENG Yi, XIE Xiang, LI Guo-lin,
2015, 32(2):28-32.
Abstract PDF
A Low Noise Readout Circuit for Astronomical Telescope
CHEN Cheng-ying, HU Xiao-yu, HEI Yong,
2015, 32(2):33-36.
Abstract PDF
Design and Implementation of Long Integer Modular Exponentiation Unit of Asymmetric Encryption in Smart Card
SHAO Jia-jia, WU Li-ji, ZHANG Xiang-min,
2015, 32(2):37-41.
Abstract PDF
Design of CAM Controller in High Performance Routers
YU Hao, FU Fang-fa, LU Yu, WANG Jin-xiang,
2015, 32(2):42-46.
Abstract PDF
A Reduction Algorithm of Positive Domain for Decision Table Based on Values Coarsening
JING Yun-Ge,
2015, 32(2):47-51,55.
Abstract PDF
Vulnerability Analysis and Verification of OSPF DD Packet
AN Ning-gang, LI Guo-dong, QIN Zun-ying, LI Wei, HUANG Xu-chang,
2015, 32(2):52-55.
Abstract PDF
Physical and Timing Modeling of DAC IP Core Based on 40 nm CMOS Process
WANG Dong, CHEN Lan, LIU Zhen-chao, FENG Yan,
2015, 32(2):56-59,64.
Abstract PDF
Crosstalk Effects Caused by Single Event Transient in Deep Submicron Technology
JIANG Jian-hua, LU Yi-cen, ZHOU Yu-mei,
2015, 32(2):60-64.
Abstract PDF
Single Sample Face Recognition Based on QR Decomposition and 2DLDA
QIN Lei, LI De-hua, ZHOU Kang,
2015, 32(2):65-68.
Abstract PDF
A Parallel Webpage Duplicate Removal Algorithm Based on Character String
XIE Yao-bing,
2015, 32(2):69-72.
Abstract PDF
A Collaborative Filtering Algorithm Based on Latent Factor Model
LU Lu, WEI Deng-yue,
2015, 32(2):73-75.
Abstract PDF
Design of DMA Controller Supporting Full-duplex Data Transmission and Multi-channel
SHI Wen-xia, WU Long-sheng, SHEGN Ting-yi, AI Diao, CHEN Qing-yu,
2015, 32(2):76-79,83.
Abstract PDF
A Method of Image Segmentation Based on Combination of Improved Fast ICA and Mathematical Morphology
DUAN Xian-zhi, DING Ya-jun, QIAN Sheng-you, LI Yong, ZOU Xiao,
2015, 32(2):80-83.
Abstract PDF
Image Segmentation Based on the Region of Color Space and LBP Algorithm
ZHANG Zhu-wei, ZHOU Hai-ying,
2015, 32(2):84-87.
Abstract PDF
Application of Improved AdaBoost.M2-SVM Algorithm in Low SNR Speech Recognition
LIU Hong-fen, LIU Xiao-feng, ZHANG Xue-ying, HUANG Li-xia, WANG Zi-zhong,
2015, 32(2):88-91.
Abstract PDF
A New Method to Eliminate the CPU Context Switching Cost by the Effects of any Length of Time Slice
ZHANG Yang, ZHANG Yi-zhong,
2015, 32(2):92-96.
Abstract PDF
Particle Swarm OptimizationAlgorithm with Pattern Search Operator
XIE Chao-zheng, FAN Xiao-guang, ZHUO Zhen-fu,
2015, 32(2):97-99,104.
Abstract PDF
Unequal Clustering Routing Protocol Based on the Sector in Wireless Sensor Network
LIU Tong-lai, LIU Wei-qiang,
2015, 32(2):100-104.
Abstract PDF
Research on Cross-Platform and Distributed Components Deployment Based on DAnCE
WANG Han, LI Jing, LI Shi-jun,
2015, 32(2):105-109,114.
Abstract PDF
Simulation Model of 3D Reconstruction of License Plate Image in Missing Frame Environment
GUO Hui-ling, QIAO Rui, YANG Jun,
2015, 32(2):110-114.
Abstract PDF
Design of Valley Detection Circuitover a Full Load Range
GUO Jun, HAN Yu-heng, HE Ze-wei, LI Wei,
2015, 32(2):115-118.
Abstract PDF
Secure Detection of Android System by Jointly Selecting Features and Classifier Design
CHEN Ze-en,
2015, 32(2):119-123.
Abstract PDF
The Independent Design of RISC Pipeline CPU
YUAN Ting, LIU Yi-jun,
2015, 32(2):124-128.
Abstract PDF
Node Optimization Localization Model Simulation of Complex Biological Sensor Network
YAN Yan-xia, CUI Jian-hua,
2015, 32(2):129-132,137.
Abstract PDF
Enhancement Algorithm of Image Texture Details with Reverse Interpolation Grid Index
LU Dong-xing,
2015, 32(2):133-137.
Abstract PDF
Study on the Analog Circuit Multi-fault Diagnosis Based on Node Voltage Increments
XU Jun, ZHANG Yao-hui, CHEN Sheng-jian,
2015, 32(2):138-141,147.
Abstract PDF
Document Features Extraction Based on DBM
ZHANG Li-min, LIU Kai,
2015, 32(2):142-147.
Abstract PDF
A Message-Sharing-Based Privacy Preserving Algorithm for Location-Based Service
ZHAO Yun-hua, BAI Guang-wei, SHEN Hang,
2015, 32(2):148-152.
Abstract PDF
Boundary Recognition Algorithm in Wireless Sensor Networks Based on Polygon Surrounding
LIN Jing, PAN Guang-zhen,
2015, 32(2):153-155,160.
Abstract PDF
BPDSR:MANET Bi-directional Routing Model Based on Chord algorithm
LONG Jian-hui, CHEN Jing, ZHU Qing-chao, GAO Pei-yong,
2015, 32(2):156-160.
Abstract PDF