学术杂志网

中国计算机科学前沿杂志(订阅)

主管单位:中华人民共和国教育部
主办单位:高等教育出版社 
国内刊号:
国际刊号:ISSN 1673-7350

业务类型:杂志征订
杂志人气:
杂志类型:计算机自动化类杂志-TP

中国计算机科学前沿杂志简介
本刊涉及领域包括(但不限于)软件工程,计算机体系结构,程序设计理论,算法,人工智能,计算机图形学与虚拟现实,因特网,安全与密码学,生物信息,中文信息处理,智能人机接口,数据库以及相关新兴学科和交叉学科。
中国计算机科学前沿收录情况/影响因子
国家新闻出版总署收录 万方数据—数字化期刊群收录期刊。
中国计算机科学前沿栏目设置
本刊涉及领域包括(但不限于)软件工程,计算机体系结构,程序设计理论,算法,人工智能,计算机图形学与虚拟现实,因特网,安全与密码学,生物信息,中文信息处理,智能人机接口,数据库以及相关新兴学科和交叉学科。
中国计算机科学前沿杂志社介绍
一、摘要与关键词:文章要提供100-200字的摘要,客观反映论文的主要内容;提供3-5个关键词,用分号隔开;撰写的文章字数以2500-4500字为宜。

二、作者简介:姓名(出生年月)、性别、工作单位、邮政编码、职称、职务、学历、主要研究方向等(研究生须注明博士研究生或硕士研究生)。

三、注释:注释序号(上标)用带圆圈的阿拉伯数字表示,附于文末。

四、非正式出版物(如博士或硕士学位论文)、未正式发表的讲话等不能作为参考文献引用。

五、参考文献的格式:

1、参考专著:[序号]作者.书名.出版地:出版社,出版年。

2、参考报纸、期刊:[序号]作者.文题.报刊名,出版年,卷(期、版次),其止页码(具体情况可以参照国家GB7714-87“文后参考文献著录规则”)。

六、资助项目需注明资助者、项目编号。

七、体例要求:以“一”、“1”、“(1)”作为文章层次,(1)之下以小标题方式提炼主要观点。

八、图表要求:表格:将表名置于表上方居中;图:将图名置于图下方居中。表、图内文字统一用楷体。

九、为便于稿件的修改及联络,请作者提供联系方式:通信地址:邮编、电话、手机、电子信箱等。

十、来稿一律通过电子邮件(WORD文档附件)发送,严禁抄袭,文责自负,来稿必复。

中国计算机科学前沿相关期刊

网站介绍 期刊查询 常见问题 联系我们

学术杂志网是专业学术杂志网站,本站持有《出版物经营许可证》和《增值电信业务经营许可证》,依法从事国内所有合法期刊订阅及增值电信业务中的信息服务业务(互联网信息服务),本站不是中国计算机科学前沿杂志官网,直投稿件的朋友建议联系杂志社编辑部。

学术杂志网公告
1、速度快:内部订阅通道快速下单,大大缩短了时间;
2、发刊快:凡是在本站下的订单,可享受快速见刊;
3、沟通好:专业老师和你一对一及时沟通,有问题可随时修改订单;
4、有保障:有专业团队,为您修改需要返修的订单;

学术杂志网声明:
1、为国家承认、正规、合法、双刊号期刊
2、中国期刊网可查询,并全文收录
3、国家新闻出版总署可查询,收录期刊
4、本站只收取最低限度的订阅费用,如果还有比本站订阅价格更低,一周之内可以退出多收款项。
5、本站成功率高,没有成功的全额退还一切费用。

学术杂志网订阅流程:
1.提出要求 → 2.推荐刊物→ 3.支付订金 → 4.确认订单 → 5.发通知书 → 6.快递杂志

新闻出版总署期刊查询系统

本系统主要用于期刊、报纸正规性的检测,一般不在国家新闻出版总署数据库收录的,为非法刊物。



中国知网期刊检索系统

主要用于查询期刊及相关内容稿件在中国知网数据库的收录情况



1.《中国计算机科学前沿》订阅订阅价格能不能更便宜一些?

答:由客户确定类型,由本站为客户根据期刊排版日期、收费情况来推荐给客户,订阅价格可以适当下调,并且出稿的速度会更快。

2.信用有保证吗?

答:学术杂志网建站7年以来,各方面取得了非常的业绩,开通了支付宝信认商家服务,可以担保交易;网银在线支付是首批2005年用户;所有的银行卡号都是2004年注册的;付款可以支付到对工帐户(工商银行)。如果有欺骗行为,所有的收款方式都早就被注销了。

3.你们的网站有退款服务吗?

答:请客户保留汇款凭证。不成功全额退还客户。

4.什么是国家级、省级、核心期刊

答:“国家级”期刊,即由党中央、国务院及所属各部门,或中国科学院、中国社会科学院、各民主党派和全国性人民团体主办的期刊及国家一级专业学会主办的会刊。“省级”期刊即由各省、自治区、直辖市及其所属部、委办、厅、局主办的期刊以及由各本、专科院校主办的学报(刊)。核心期刊是学术界通过一整套科学的方法,对于期刊质量进行跟踪评价,并以情报学理论为基础,将期刊进行分类定级,把最为重要的一级称之为核心期刊。

5.一般多长时间?

答:根据客户的要求和选择的期刊类型不同,而且编辑部也有时间安排,不排除有更长久的时间,建议有需求的用户一般提前2个月就开始提交订单比较理想。

6.我可以随时跟踪进展情况吗?

答:当然,我们的每一位客户,都会分配一名专职的客服为你全程负责,随时通报进展情况。

7.是否可以真的做到100%?

答:一般来说,可以做到98%以上,如果编辑手里的文章已经比较多的时候,就会推迟一些。该期刊特别忙的话,在征得客户你的同意后,可以免费更换同级期刊。

8.可以通过那些方式付款?

答:目前,我们支持工商银行、建设银行、农业银行、中国银行、邮政储蓄等银行的柜台汇款;网银在线付款;支付宝、淘宝在线付款;企业的对工帐户付款。对工帐户是“四川博文网络科技有限责任公司”,有疑问请联系投诉与建议中心杨老师:13378216660。

因篇幅限制,更多问题请进入专题了解>>

学术杂志网有订阅合作的均为正规期刊,可在新闻出版总署网站查询到相关信息。
《中国计算机科学前沿》范例

1.Cognitive Sense of ChinaLionel M. NI,Zhang XIONG
2.Toward secure and private service discovery anywhere anytimeFeng ZHU,Matt MUTKA,Anish BIVALKAR,Abdullah DEMIR,Yue LU,Chockalingam CHIDAMBARM
3.Three challenges in data miningQiang YANG
4.Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbsYunhao LIU,Guomo ZHOU,Jizhong ZHAO,Guojun DAI,Xiang-Yang LI,Ming GU,Huadong MA,Lufeng MO,Yuan HE,Jiliang WANG,Mo LI,Kebin LIU,Wei DONG,Wei XI
5.iSensNet: an infrastructure for research and development in wireless sensor networksJiannong CAO,Hejun WU,Xuefeng LIU,Yi LAI
6.Data-driven testing methodology for RFID systemsAn LU,Wenbin FANG,Chang XU,Shing-Chi CHEUNG,Yu LIU
7.Packet transmission policies for battery operated wireless sensor networksYe LI,Honggang LI,Yuwei ZHANG,Dengyu QIAO
8.Development of foundation models for Internet of ThingsLei CHEN,Mitchell TSENG,Xiang LIAN
9.Visual data security and management for smart citiesZhenyong CHEN,Wei FAN,Zhang XIONG,Pingan ZHANG,Lixin LUO
10.A 3D shape retrieval framework for 3D smart citiesBiao LENG,Zhang XIONG,Xiangwei FU
11.Virtual cityscapes: recent advances in crowd modeling and traffic simulationMing C. LIN,Dinesh MANOCHA
12.Applied research of data sensing and service to ubiquitous intelligent transportation systemWeifeng LV,Bowen DU,Dianfu MA,Tongyu ZHU,Chen WANG
1.Documenting and verifying systems assembled from componentsZhiying LIU,David Lorge PARNAS,Baltasar Trancon y WIDEMANN
2.A concern-based approach to generating formal requirements specificationsYing JIN,Jing ZHANG,Weiping HAO,Pengfei MA,Yan ZHANG,Haiyan ZHAO,Hong MEI
3.On the computation of quotients and factors of regular languagesMircea MARIN,Temur KUTSIA
4.Financial information processing and development of emerging financial marketsShuo BAI,Shouyang WANG,Lean YU,Aoying ZHOU
5.Modeling default risk via a hidden Markov model of multiple sequencesWai-Ki Ching,Ho-Yin LEUNG,Zhenyu WU,Hao JIANG
6.Developing an SVM-based ensemble learning system for customer risk identification collaborating with customer relationship managementLean YU,Shouyang WANG,Kin Keung LAI
7.A class of life insurance reserve model and risk analysis in a stochastic interest rate environmentNiannian JIA,Changqing JIA,Wei QIU
8.N-person credibilistic strategic gameRui LIANG,Yueshan YU,Jinwu GAO,Zhi-Qiang LIU
9.Corporate financial distress diagnosis model and application in credit rating for listing firms in ChinaLing ZHANG,Edward I. ALTMAN,Jerome YEN
10.Evaluation of mutual funds using multi-dimensional informationXiujuan ZHAO,Jianmin SHI
11.Neural network methods for forecasting turning points in economic time series:an asymmetric verification to business cyclesDabin ZHANG,Lean YU,Shouyang WANG,Haibin XIE
12.Using jump-diffusion modeling for valuing real options in infrastructure projectsGuoxing ZHANG,Ju'e GUO,Guorong CHAI,Li GONG,Xuejun WANG
13.Partially funded public pension, human capital and endogenous growthZaigui YANG
14.Knowledge discovery through directed probabilistic topic models: a surveyAli DAUD,Juanzi LI,Lizhu ZHOU,Faqir MUHAMMAD
15.ID-based authenticated group key agreement from bilinear mapsXixiang LV,Hui LI
1.Socially inspired search and ranking in mobile social networking: concepts and challengesYufeng WANG,Akihiro NAKAO,Jianhua MA
2.Detecting academic experts by topic-sensitive link analysisHao WU,Yijian PEI,Jiang YU
3.Knowledge fusion framework based on Web page textsSikang HU,Yuanda CAO
4.Measurement of refinement and correctnessHengyang WU
5.Geometric algorithm for point projection and inversion onto Bézier surfacesJinting XU,Weijun LIU,Jianhuang WU,Hongyou BIAN,Lun LI
6.Validation indices for projective clusteringLifei CHEN,Shanjun HE,Qingshan JIANG
7.On the equal-weight symmetric Boolean functionsYu ZHOU,Guozhen XIAO
8.Security evaluation against differential and linear cryptanalyses for Feistel ciphersNianping WANG,Chenhui JIN
9.A bipartite model for load balancing in grid computing environmentsWenchao JIANG,Matthias BAUMGARTEN,Yanhong ZHOU,Hai JIN
10.Approximation algorithm for constructing data aggregation trees for wireless sensor networksDeying LI,Jiannong CAO,Qinghua ZHU
11.Virtual node based adaptive routing in wireless ad hoc networksGang LI,Hongmei SUN
12.Research of localization approach for the new comer in wireless sensor networksWei QU,Zhe LI
13.A new parallel scheduling system for multiple radio wireless mesh networkYun HU,Shoubao YANG,Qi ZHANG,Dapeng WANG,Qinwei SHEN
14.Algorithm and axiomatization of rough fuzzy sets based finite dimensional fuzzy vectorsMingfen WU
1.Challenges and possible approaches: towards the petaflops computersDepei QIAN,Danfeng ZHU
2.Four styles of parallel and net programmingZhiwei XU,Yongqiang HE,Wei LIN,Li ZHA
3.Cluster based parallel database management system for data intensive computingJianzhong LI,Wei ZHANG
4.Minimizing interconnect length on reconfigurable meshesJigang WU,Thambipillai SRIKANTHAN,Kai WANG
5.Complex networks and computingShuigeng ZHOU,Zhongzhi ZHANG
6.An alternative approach to characterize the topology of complex networks and its application in epidemic spreadingZonghua LIU,Xiaoyan WU,Pak-Ming HUI
7.Multidimensional views on mobile call networkShengqi YANG,Bin WU,Bai WANG
8.Correlation in mobile call networks from structure perspectiveBin WU,Deyong HU,Qi YE,Bai WANG
9.A new centrality measure based on sub-treeLili RONG,Tianzhu GUO,Jiyong ZHANG
10.SIS model of epidemic spreading on dynamical networks with communityChengyi XIA,Shiwen SUN,Feng RAO,Junqing SUN,Jinsong WANG,Zengqiang CHEN
11.Detecting community structure in networks by representative energyJi LIU,Guishi DENG
12.Scale-free network models with accelerating growthHuan LI
13.Hybrid information retrieval policies based on cooperative cache in mobile P2P networksQuanqing XU,Hengtao SHEN,Zaiben CHEN,Bin CUI,Xiaofang ZHOU,Yafei DAI
14.Class structure refactoring of object-oriented softwares using community detection in dependency networksWeifeng PAN,Bing LI,Yutao MA,Jing LIU,Yeyi QIN
15.A fast iterative-clique percolation method for identifying functional modules in protein interaction networksPenggang SUN,Lin GAO
16.Evaluation of subgraph searching algorithms for detecting network motifs in biological networksJialu HU,Lin GAO,Guimin QIN
17.Improved collaborative filtering algorithm based on heat conductionQiang GUO,Jianguo LIU,Binghong WANG
18.Generalized collaboration networks in software systems: a case study of Linux kernelsShiwen SUN,Chengyi XIA,Zhenhai CHEN,Junqing SUN,Zengqiang CHEN
19.SWER: small world-based efficient routing for wireless sensor networks with mobile sinksXuejun LIU,Jihong GUAN,Guangwei BAI,Haiming LU
1.Financial information processingShuo BAI,Shouyang WANG,Lean YU,Aoying ZHOU
2.Stock prediction: an event-driven approach based on bursty keywordsDi WU,Gabriel Pui Cheong FUNG,Jeffrey Xu YU,Qi PAN
3.Risk aversion and agents' survivability in a financial marketSerge HAYWARD
4.Forecasting foreign exchange rates with an improved back-propagation learning algorithm with adaptive smoothing momentum termsLean YU,Shouyang WANG,Kin Keung LAI
5.Daily prediction of short-term trends of crude oil prices using neural networks exploiting multimarket dynamicsHeping PAN,Imad HAIDAR,Siddhivinayak KULKARNI
6.A class of classification and regression methods by multiobjective programmingDongling ZHANG,Yong SHI,Yingjie TIAN,Meihong ZHU
7.Benchmarking binary classification models on data sets with different degrees of imbalanceLigang ZHOU,Kin Keung LAI
8.A novel PPGA-based clustering analysis method for business cycle indicator selectionDabin ZHANG,Lean YU,Shouyang WANG,Yingwen SONG
9.Macro finance early warning systemGuihuan ZHENG,Xun ZHANG,Wei SHANG,Shanying XU
10.Algorithmic trading system: design and applicationsFeng WANG,Keren DONG,Xiaotie DENG
11.APF-guided adaptive immune network algorithm for robot path planningMingxin YUAN,Sunan WANG,Canyang WU,Kunpeng LI
12.Outage analysis of interference-limited systems using STBC with co-channel MIMO interferersYongzhao LI,Leonard J.CIMINI,JR.,Nageen HIMAYAT
13.Energy-efficient cooperative routing in BER constrained multihop networksBehrouz MAHAM,Mérouane DEBBAH,Are HJ(φ)RUNGNES
1.From nature to computing and backKe TANG,Xin YAO
2.Pareto analysis of evolutionary and learning systemsYaochu JIN,Robin GRUNA,Bernhard SENDHOFF
3.Evolutionary multi-objective optimization: some current research trends and topics that remain to be exploredCarlos A. COELLO COELLO
4.Monitoring of particle swarm optimizationYuhui SHI,Russ EBERHART
5.A hybrid multi-swarm particle swarm optimization to solve constrained optimization problemsYong WANG,Zixing CAI
6.Forecasting- where computational intelligence meets the stock marketEdward TSANG
7.Runtime analysis of search heuristics on software engineering problemsPer Kristian LEHRE,Xin YAO
8.Evolving Nash-optimal poker strategies using evolutionary computationHanyang QUEK,Chunghoong WOO,Kaychen TAN,Arthur TAY
9.Integrative biological systems modeling:challenges and opportunitiesJialiang WU,Eberhard VOIT
10.Optimisation of algorithm control parameters in cultural differential evolution applied to molecular crystallographyMaryjane TREMAYNE,Samantha Y. CHONG,Duncan BELL
11.Incorporating prior knowledge into learning by dividing training dataBaoliang LU,Xiaolin WANG,Masao UTIYAMA
12.Evolutionary algorithm based on schemata theoryTakashi MARUYAMA,Eisuke KITA
13.Symbolic model checking APSLWanwei LIU,Ji WANG,Huowang CHEN,Xiaodong MA,Zhaofei WANG
1.Pushing requirements changes through to changes in specificationsLan LIN,Jesse H. POORE
2.Verifying BPEL-like programs with Hoare logicChenguang LUO,Shengcbao QIN,Zongyan QIU
3.On automatic verification of self-stabilizing population protocolsJun PANG,Zhengqin LUO,Yuxin DENG
4.Compositional encoding for bounded model checkingJun SUN,Yang LIU,Jin Song DONG,Jing SUN
5.Automated verification of pointer programs in pointer logicZhifang WANG,Yiyun CHEN,Zhenming WANG,Baojian HUA
6.Workflow-based semantics for peer-to-peer specificationsAntonio BROGI,Razvan POPESCU
7.A Petri net-based approach for supporting aspect-oriented modelingLianwei GUAN,Xingyu LI,Hao HU,Jian LU
8.Style transformation in natural languagesYue HU,Xiaoyu GAO,Li LI,Qingshi GAO
9.An improved algorithm for gray image representation using non-symmetry and anti-packing model with triangles and rectanglesYunping ZHENG,Chuanbo CHEN,Mudar SAREM
10.A robust localization algorithm in wireless sensor networksXin LI,Bei HUA,Yi SHANG,Yan XIONG
11.Types, structures and theories in NKIXiaoru ZHANG,Zaiyue ZHANG,Yuefei SUI
1.Introduction to the special section on peer-to-peer computing and web data managementAoying ZHOU
2.Using Wide Table to manage web data: a surveyBin YANG,Weining QIAN,Aoying ZHOU
3.Decentralized architecture for resource management of group-based distributed systemsRong ZHANG,Koji ZETTSU,Yutaka KIDAWARA,Yasushi KIYOKI
4.Supporting K nearest neighbors query on high-dimensional data in P2P systemsMei LI,Wang-Chien LEE,Anand SIVASUBRAMANIAM,Jizhong ZHAO
5.Distributed query processing in flash-based sensor networksJianliang XU,Xueyan TANG,Wang-Chien LEE
6.Traceable P2P record exchange: a database-oriented approachFengrong LI,Takuya IIDA,Yoshiharu ISHIKAWA
7.Status of pattern recognition with wavelet analysisYuanyan TANG
8.Median Fisher Discriminator: a robust feature extraction method with applications to biometricsJian YANG,Jingyu YANG,David ZHANG hHTTp://wWW.ZhAZhI.CoM
9.Dynamic description logic model for data integrationGuoshun HAO,Shilong MA,Yuefei SUI,Jianghua LV
1.Basic research in computer science and software engineering at SKLCSJian ZHANG,Wenhui ZHANG,Naijun ZHAN,Yidong SHEN,Haiming CHEN,Yunquan ZHANG,Yongji WANG,Enhua WU,Hongan WANG,Xueyang ZHU
2.Calculi of meta-variablesMasahiko SATO,Takafumi SAKURAI,Yukiyoshi KAMEYAMA,Atsushi IGARASH 3.Human factors in continuous time-concerned cooperative systems represented by NΣ-labeled calculusTetsuya MIZUTANI,Shigeru IGARASH,Masayuki SHIO,Yasuwo IKEDA
4.Semantics of sub-probabilistic programsYixing CHEN,Hengyang WU
5.Computational origami environment on the webAsem KASEM,Tetsuo IDA
6.On the verification of polynomial system solversChangbo CHEN,Marc MORENO MAZA,Wei PAN,Yuzhen XI
7.Fraction-free matrix factors: new forms for LU and QR factorsWenqin ZHOU,Davidj.JEFFREY
8.An extended EM algorithm for subspace clusteringLifei CHEN,Qingshan JIANG
9.Gibbs artifact reduction for POCS super-resolution image reconstructionChuangbai XIAO,Jing YU,Kaina SU
10.Arnetminer: expertise oriented search using social networksJuanzi LI,Jie TANG,Jing ZHANG,Qiong LUO,Yunhao LIU,Mingcai HONG
11.ID-based deniable ring authentication with constant-size signatureLingling WANG,Guoyin ZHANG,Chunguang MA


本文地址:http://www.zhazhi.com/qikan/gyjs/jsjzdh/6398.html

CNKI原创检测杂志在线咨询

本站采用的是中国知网cnki学术不端行为学位论文检测系统VIP版,检测对比库最全,这是其他检测方式所无法比拟的。国内几乎所有高校和杂志社采用的都是知网(cnki)的检测系统。

中国杂志网创建于2010年,本站和370余期刊建立合作伙伴关系,如果你有需要在线订阅的杂志请告诉我们,我将帮你推荐到正规杂志社,另赠送你一本期刊。

学术杂志网收录7500余种杂志,种类遍及
时政、文学、生活、娱乐、教育、学术等
诸多门类等进行了详细的介绍。

中国计算机科学前沿杂志订阅
@2008-2012 学术杂志网
出版物经营许可证
增值电信业务经营许可证
国家备案:蜀ICP备09010985号-9
值班电话
0825-6697555
0825-6698000

夜间值班
400-888-7501

投诉中心
13378216660
咨询电话
唐老师:13982502101
涂老师:18782589406
文老师:15882538696
孙老师:15982560046
何老师:15828985996
江老师:15228695391
易老师:15228695316
其它老师...
咨询QQ
89937509
89937310
89903980
89937302
89937305
89937307
89937308
业务
综合介绍
在线咨询
支付方式
常见问题
会员评价
官网授权
经营许可
关于我们
网站简介
版权声明
友情链接
人员招聘
联系我们