Wireless Sensor Networks
REN Feng-Yuan,HUANG Hai-Ning and LIN Chuang
2003,14(7):1282-1291 Click(37738)
Genetic Algorithm and Its Implementation of Automatic Generation of Chinese SONGCI
Chang-Le ZHOU,Wei YOU and Xiao-Jun Ding
2010,21(3):427-437 Click(33322)
Research Progress on Android Security
QING Si-Han
2016,27(1):45-71 Click(30431)
Study on Cloud Computing Security
FENG Deng-Guo,ZHANG Min,ZHANG Yan and XU Zhen
2011,22(1):71-83 Click(30430)
Clustering Algorithms Research
SUN Ji-Gui,LIU Jie1 and ZHAO Lian-Yu
2008,19(1):48-61 Click(28819)
Cloud Computing: System Instances and Current Research
CHEN Kang and ZHENG Wei-Min
2009,20(5):1337-1348 Click(28544)
Research on Evolutionary Multi-Objective Optimization Algorithms
GONG Mao-Guo,JIAO Li-Cheng,YANG Dong-Dong and MA Wen-Ping
2009,20(2):271-289 Click(27597)
Thinking on the Development of Software Engineering Technology
YANG Fu-Qing
2005,16(1):1-7 Click(22704)
Sentiment Analysis
ZHAO Yan-Yan,QIN Bing and LIU Ting
2010,21(8):1834-1848 Click(21430)
Underlying Techniques for Web Services: A Survey
YUE Kun,WANG Xiao-Ling and ZHOU Ao-Ying
2004,15(3):428-442 Click(20876)
Self-Localization Systems and Algorithms for Wireless Sensor Networks
WANG Fu-Bao,SHI Long and REN Feng-Yuan
2005,16(5):857-868 Click(20005)
Complex Network Clustering Algorithms
YANG Bo,LIU Da-You,LIU Jiming,JIN Di and MA Hai-Bin
2009,20(1):54-66 Click(19978)
Key Technologies of Distributed Storage for Cloud Computing
WANG Yi-Jie,SUN Wei-Dong,ZHOU Song,PEI Xiao-Qiang and LI Xiao-Yong
2012,23(4):962-986 Click(19155)
Big Data Analysis—Competition and Symbiosis of RDBMS and MapReduce
QIN Xiong-Pai,WANG Hui-Ju,DU Xiao-Yong and WANG Shan
2012,23(1):32-45 Click(18888)
Systematic Review of Software Process Modeling and Analysis
LI Ming-Shu,YANG Qiu-Song and ZHAI Jian
2009,20(3):524-545 Click(17610)
Opportunistic Networks
XIONG Yong-Ping,SUN Li-Min,NIU Jian-Wei and LIU Yan
2009,20(1):124-137 Click(17238)
State-of-the-Art Survey on Software-Defined Networking (SDN)
ZHANG Chao-Kun,CUI Yong,TANG He-Yi and WU Jian-Ping
2015,26(1):62-81 Click(16768)
Comparison Study of Internet Recommendation System
XU Hai-Ling,WU Xiao,LI Xiao-Dong and YAN Bao-Ping
2009,20(2):350-362 Click(16704)
Research and Development of Internet Worms
WEN Wei-Ping,QING Si-Han,JIANG Jian-Chun and WANG Ye-Jun
2004,15(8):1208-1219 Click(16693)
Mining Frequent Subgraph Patterns from Uncertain Graphs
ZOU Zhao-Nian,LI Jian-Zhong,GAO Hong and ZHANG Shuo
2009,20(11):2965-2976 Click(16626)
Artificial Intelligence Planning Methods Based on Automated Reasoning Techniques
Lü Shuai,LIU Lei,SHI Lian and LI Ying
2009,20(5):1226-1240 Click(16563)
Concepts, Issues and Advance of Sensor Networks and Data Management of Sensor Networks
LI Jian-Zhong,LI Jin-Bao and SHI Sheng-Fei
2003,14(10):1717-1727 Click(16413)
Big Data Stream Computing:Technologies and Instances
SUN Da-Wei,ZHANG Guang-Yan and ZHENG Wei-Min
2014,25(4):839-862 Click(15736)
Context-Aware Recommender Systems
WANG Li-Cai,MENG Xiang-Wu and ZHANG Yu-Jie
2012,23(1):1-20 Click(14826)
ACO-Based Algorithm for Solving Energy Hole Problems in Wireless Sensor Networks
SONG Chao,LIU Ming,GONG Hai-Gang,CHEN Gui-Hai and WANG Xiao-Min
2009,20(10):2729-2743 Click(14582)
Research on Cloud Databases
LIN Zi-Yu,LAI Yong-Xuan,LIN Chen,XIE Yi and ZOU Quan
2012,23(5):1148-1166 Click(14547)
A Survey of Intrusion Detection Research on Network Security
JIANG Jian-chun,MA Heng-tai,REN Dang-en and QING Si-han
2000,11(11):1460-1466 Click(14524)
Survey on Transfer Learning Research
ZHUANG Fu-Zhen,LUO Ping,HE Qing and SHI Zhong-Zhi
2015,26(1):26-39 Click(14477)
Overviews on Software Architecture Research
SUN Chang-ai,JIN Mao-zhong and LIU Chao
2002,13(7):1228-1237 Click(14312)
Survey on NoSQL for Management of Big Data
SHEN De-Rong,YU Ge,WANG Xi-Te,NIE Tie-Zheng and KOU Yue
2013,24(8):1786-1803 Click(14207)
Cluster-Based Routing Protocols for Wireless Sensor Networks
SHEN Bo,ZHANG Shi-Yong and ZHONG Yi-Ping
2006,17(7):1588-1600 Click(13950)
Survey and Analysis on the Internet Traffic Model
ZHANG Bin,YANG Jia-Hai and WU Jian-Ping
2011,22(1):115-131 Click(13950)
A Recommendation-Based Peer-to-Peer Trust Model
DOU Wen,WANG Huai-Min,JIA Yan and ZOU Peng
2004,15(4):571-583 Click(13904)
Constrained Optimization Evolutionary Algorithms
WANG Yong,CAI Zi-Xing,ZHOU Yu-Ren and XIAO Chi-Xin
2009,20(1):11-29 Click(13803)
A Multipath on-Demand Routing with Path Selection Entropy for Ad Hoc Networks
SUN Bao-Lin,GUI Chao,ZHANG Qi-Fei,YAN Bing and YE Xue-Jun
2008,19(zk):112-120 Click(13645)
Progress and Challenges of Distributed Caching Techniques in Cloud Computing
QIN Xiu-Lei,ZHANG Wen-Bo,WEI Jun,WANG Wei,ZHONG Hua and HUANG Tao
2013,24(1):50-66 Click(13645)
A Survey of Personalization Technology
ZENG Chun,XING Chun-xiao and ZHOU Li-zhu
2002,13(10):1952-1961 Click(13462)
A Collaborative Filtering Recommendation Algorithm Based on Item Rating Prediction
DENG Ai-Lin,ZHU Yang-Yong and SHI Bai-Le
2003,14(9):1621-1628 Click(13431)
Computer Forensics and Its Future Trend
WANG Ling and QIAN Hua-Lin
2003,14(9):1635-1644 Click(13315)
Software Defect Prediction
WANG Qing,WU Shu-Jian and LI Ming-Shu
2008,19(7):1565-1580 Click(13263)
Research on Botnet Mechanisms and Defenses
JIANG Jian,ZHUGE Jian-Wei,DUAN Hai-Xin and WU Jian-Ping
2012,23(1):82-96 Click(13160)
A Model Driven Development Method for Interactive Information Visualization
REN Lei,WANG Wei-Xin,ZHOU Ming-Jun,TENG Dong-Xing,MA Cui-Xia,DAI Guo-Zhong and WANG Hong-An
2008,19(8):1947-1964 Click(13143)
Visual Language Techniques for Software Development
KONG Jun and ZHAO Chun-Ying
2008,19(8):1902-1919 Click(13066)
Advances in Machine Learning Based Text Categorization
SU Jin-Shu,ZHANG Bo-Feng and XU Xin
2006,17(9):1848-1859 Click(12906)
Fault Diagnosis and Handling for Service Composition Based on Petri Nets
FAN Gui-Sheng,YU Hui-Qun,CHEN Li-Qiong and LIU Dong-Mei
2010,21(2):231-247 Click(12836)
Evolutionary Algorithms for Knapsack Problems
WANG Xi-Zhao and HE Yi-Chao
2017,28(1):1-16 Click(12747)
Broadcasting Methods in Vehicular Ad Hoc Networks
LI Li-Jun,LIU Hong-Fei,YANG Zu-Yuan,GE Li-Jia and HUANG Xi-Yue
2010,21(7):1620-1634 Click(12644)
Data Deduplication Techniques
AO Li,SHU Ji-Wu and LI Ming-Qiang
2010,21(5):916-929 Click(12602)
Combinatorial Testing: Principles and Methods
YAN Jun and ZHANG Jian
2009,20(6):1393-1405 Click(12429)
P2P Web Search Technology
FANG Qi-Ming,YANG Guang-Wen,WU Yong-Wei and ZHENG Wei-Min
2008,19(10):2706-2719 Click(12286)