column
An Asynchronous Adaptive Priority Round-Robin Arbiter Based on Four-Phase Dual-rail Protocol
YANG Yintang, WU Ruizhen, ZHANG Li, ZHOU Duan
2015, 24(1): 1-7.
Abstract PDF
Load Balanced Coding Aware Multipath Routing for Wireless Mesh Networks
SHAO Xing, WANG Ruchuan, HUANG Haiping, SUN Lijuan
2015, 24(1): 8-12.
Abstract PDF
SE-FCA: A Model of Software Evolution with Formal Concept Analysis
SUN Xiaobing, LI Bixin, LI Bin, CHEN Ying
2015, 24(1): 13-19.
Abstract PDF
Failure Detection and Correction for Appearance Based Facial Tracking
WANG Lei, LIANG Yixiong, CAI Wangyang, ZOU Beiji
2015, 24(1): 20-25.
Abstract PDF
An Analysis and Proof on Self-Similarity Property of Flash P2P Internet Video Traffic
JI Yimu, YUAN Yongge, HAN Zhijie, WANG Hao, HAN Lei, SUN Yanfei, WANG Ruchuan
2015, 24(1): 26-32.
Abstract PDF
Deployment of Sensors in WSN: An Efficient Approach Based on Dynamic Programming
LI Yongyan, GAO Wen, WU Chunming, WANG Yansong
2015, 24(1): 33-37.
Abstract PDF
Integrating Evolutionary Testing with Reinforcement Learning for Automated Test Generation of Object-Oriented Software
HE Wei, ZHAO Ruilian, ZHU Qunxiong
2015, 24(1): 38-45.
Abstract PDF
Test Data Generation for Multiple Paths Based on Local Evolution
YAO Xiangjuan, GONG Dunwei, WANG Wenliang
2015, 24(1): 46-51.
Abstract PDF
Finding Deceptive Opinion Spam by Correcting the Mislabeled Instances
REN Yafeng, JI Donghong, YIN Lan, ZHANG Hongbin
2015, 24(1): 52-57.
Abstract PDF
The Browsing Pattern and Review Model of Online Consumers Based on Large Data Analysis
NING Lianju, WANG Haoyu, FENG Xin, DU Junping
2015, 24(1): 58-64.
Abstract PDF
A Matching Algorithm Based on Association Rules in Ontology Based Publish/Subscribe System
LIU Shufen, CHI Meng, YAO Zhilin
2015, 24(1): 65-70.
Abstract PDF
Design of a Low-Power 20Gb/s 1:4 Demultiplexer in 0.18μm CMOS
PAN Min, FENG Jun
2015, 24(1): 71-75.
Abstract PDF
Selectivity Estimation for String Predicates Based on Modified Pruned Count-Suffix Tree
LI Dong, ZHANG Qixu, LIANG Xiaochong, GUAN Jida, XU Yang
2015, 24(1): 76-82.
Abstract PDF
Statistical Interconnect Crosstalk Noise Model and Analysis for Process Variations
LI Jianwei, DONG Gang, WANG Zeng, YE Xiaochun
2015, 24(1): 83-87.
Abstract PDF
XY-Type GPU Cache: Exploiting Spatial Localities in both X and Y Directions to Avoid Conflict Miss
ZHANG Jun
2015, 24(1): 88-95.
Abstract PDF
Hyponymy Graph Model for Word Semantic Similarity Measurement
WANG Junhua, ZUO Wanli, PENG Tao
2015, 24(1): 96-101.
Abstract PDF
Linear Canonical Transform Related Operators and Their Applications to Signal Analysis—— Part I: Fundamentals
WANG Xiaobo, ZHANG Qiliang, ZHOU You, QIAN Jing, ZOU Hongxing
2015, 24(1): 102-109.
Abstract PDF
A New DS-SS Signal Detection Trial Algorithm for False Alarm Rejection Based on Motion Parameters Constraint
CUI Wei, WANG Fengyun, LI Zhenzhen, JIN Qianyu, ZHANG Yunhan
2015, 24(1): 110-114.
Abstract PDF
An Adaptive SVD Method for Solving the Pass-Region Problem in S-Transform Time-Frequency Filters
YIN Baiqiang, HE Yigang, LI Bing, ZUO Lei, YUAN Lifen
2015, 24(1): 115-123.
Abstract PDF
Distributional Escape Time Algorithm Based on Generalized Fractal Sets in Cloud Environment
LIU Miao, LIU Shuai, FU Weina, ZHOU Jiantao
2015, 24(1): 124-127.
Abstract PDF
An Incremental Algorithm to Feature Selection in Decision Systems with the Variation of Feature Set
QIAN Wenbin, SHU Wenhao, YANG Bingru, ZHANG Changsheng
2015, 24(1): 128-133.
Abstract PDF
Filtering Chinese Image Spam Using Pseudo-OCR
XU Bin, LI Ruiguang, LIU Yashu, YAN Hanbing, LI Siyuan, ZHANG Honggang
2015, 24(1): 134-139.
Abstract PDF
A Sequential Bayesian Algorithm for DOA Tracking in Time-Varying Environments
GAO Xunzhang, LI Xiang, Jason Filos, DAI Wei
2015, 24(1): 140-145.
Abstract PDF
Construction of Type-II QC LDPC Codes Based on Perfect Cyclic Difference Set
ZHANG Lijun, LI Bing, CHENG Leelung
2015, 24(1): 146-151.
Abstract PDF
A Doubly Parameterized Detector for Mismatched Signals
LIU Weijian, XIE Wenchong, ZHANG Qianping, LI Rongfeng, DUAN Keqing
2015, 24(1): 152-156.
Abstract PDF
An Approach of Steganography in G.729 Bitstream Based on Matrix Coding and Interleaving
WU Zhijun, CAO Haijuan, LI Douzhe
2015, 24(1): 157-165.
Abstract PDF
Some Properties of Correlation Function on Generalized Boolean Functions
ZHUO Zepeng, CHONG Jinfeng, WEI Shimin
2015, 24(1): 166-169.
Abstract PDF
A Cluster-Based Opportunistic Multicast in Multi-hop Wireless Networks
ZHANG Haiyang
2015, 24(1): 170-175.
Abstract PDF
A New DiffServ Edge Router with Controlled-UDP
XIAO Yang, QU Guangzhi, Kiseon Kim
2015, 24(1): 176-180.
Abstract PDF
Research on Network Malicious Code Immune Based on Imbalanced Support Vector Machines
LI Peng, WANG Ruchuan
2015, 24(1): 181-186.
Abstract PDF
A Novel Approach to Automatic Security Protocol Analysis Based on Authentication Event Logic
XIAO Meihua, MA Chenglin, DENG Chunyan, ZHU Ke
2015, 24(1): 187-192.
Abstract PDF
Dynamic Decode-and-Forward Relaying with Partial CSIT and Optimal Time Allocation
SU Yinjie, JIANG Lingge, HE Chen
2015, 24(1): 193-198.
Abstract PDF
Improved Known-Key Distinguisher on Round-Reduced 3D Block Cipher
ZHA Daren, WU Shuang, WANG Qiongxiao
2015, 24(1): 199-204.
Abstract PDF
SAR Image Despeckling Using Scale Mixtures of Gaussians in the Nonsubsampled Contourlet Domain
CHANG Xia, JIAO Licheng, LIU Fang, SHA Yuheng
2015, 24(1): 205-211.
Abstract PDF
The Accuracy Analysis of Zero-lag Correlation Coefficient of Dual-Polarization Radar
ZHANG Wenwen, YIN Fulian, JIA Yunfeng
2015, 24(1): 212-217.
Abstract PDF
A Comprehensive Estimation Method for Kernel Function of Radar Signal Classifier
XU Jing, HE Minghao, HAN Jun, CHEN Changxiao
2015, 24(1): 218-222.
Abstract PDF