Search

Showing total 50 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Topic computer science Remove constraint Topic: computer science Language chinese Remove constraint Language: chinese
50 results

Search Results

1. 计算机领域概念隐喻的特点及对人类思维的影响.

2. Clustering data gathering scheme based on hybrid CS in WSN.

3. Vulnerability assessment based on correlation.

4. Rational fairness exchange protocols based on maximum entropy principle.

5. Electronic cash system with multiple banks based on TPM for cloud computing.

6. Application of data model for guidance system in deploying guide signs.

7. Spread model and application of shortage of supplies for emergency logistics network.

8. Real-time system simulation and verification approach based on STeC to Stateflow transformation system.

9. Research on space-time accessibility considering direction of travel.

10. Supernetwork-based method on division of community structure in complex network.

11. 校外实践基地在学生实践能力培养中的作用.

12. 谈计算机专业实践教学中计算思维能力的培养.

13. Global comparatively optimum static task scheduling algorithm.

14. Research of classification method for natural images based on adaptive feature-weighted K-nearest neighbors.

15. Recognition of control chart patterns based on feature fusion with support vector machine.

16. Assessment of vulnerability threat based on fuzzy theory.

17. Pseudoinverse solution to construction of cubic splines.

18. Packet delay based binding method of label to data stream.

19. Improved multi-source heterogeneous alert aggregation scheme.

20. Safety transition system and its application.

21. Express information protection application based on K-anonymity.

22. Connectivity on one-dimensional flight route in aeronautical Ad hoc network.

23. Multi-authority attribute based signature scheme suitable for distributed system.

24. Malware detection by monitoring host's activities.

25. User behavior analysis based on segmentation, clustering and timing relationship analysis.

26. New secure cetificateless signcryption scheme without pairing.

27. IACO resources search algorithm in unstructured P2P network.

28. Improvement of Chord search algorithm research in P2P network.

29. High-accuracy phase estimation of single-tone based on restricted phase unwrapping.

30. Wireless broadcasting retransmission scheme based on Fourier matrix.

31. Uplink CSI based adaptive predicted repeat GBN-HARQ scheme.

32. Research on sociality routing algorithms in mobile social networks.

33. Research of event-based continuous data protection system.

34. Spectrum allocation mechanism based on group buying.

35. Research of logistics park service resource sharing and configuration mode based on cloud logistics services.

36. Adaptive fault detection method for reliable cloud computing.

37. Research on PageRank algorithm optimization based on MapReduce.

38. Study on ranking keyword search results in relational database based on data graph.

39. Description of domain requirement based on limited language.

40. e-Learning resource ontology matching algorithm based on subgraph approximate isomorphic.

41. Data replication and scheduling algorithm in data grids.

42. Ubiquitous knowledge cloud model based on Cloud-P2P network platform.

43. Finite-domain representations of conformant planning tasks based on single logic program.

44. Collaborative filtering recommendation algorithm based on user characteristics and item attributes.

45. Community discovery in multi-layered social network based on edge clustering.

46. Novel Methods for Roundness Error Evaluation Based on Computational Geometry.

47. 3D model steganalysis based on geometry characteristics.

48. Analysis and improvement of a certificateless proxy blind signature.

49. Research on evolution information modeling and acquisition for component-based software.

50. Hybrid discrete bacterial colony optimization algorithm.