default search action
Frontiers of Computer Science in China, Volume 5
Volume 5, Number 1, March 2011
- Zheng Fu, Graeme Smith:
Property transformation under specification change. 1-13 - Conghua Zhou, Bo Sun, Zhifeng Liu:
Abstraction for model checking multi-agent systems. 14-25 - Xiaoqin Fan, Xianwen Fang, Zhijun Ding:
Indeterminacy-aware service selection for reliable service composition. 26-36 - Jia Wen, Chao Li, Zhang Xiong:
Behavior pattern extraction by trajectory analysis. 37-44 - Feng Zhao, Licheng Jiao, Hanqiang Liu:
Fuzzy c-means clustering with non local spatial information for noisy image segmentation. 45-56 - Yunping Zheng, Mudar Sarem:
A fast algorithm for computing moments of gray images based on NAM and extended shading approach. 57-65 - Jianhua Jia, Bingxiang Liu, Licheng Jiao:
Soft spectral clustering ensemble applied to image segmentation. 66-78 - Liangxiao Jiang:
Learning random forests for ranking. 79-86 - Yanni Han, Deyi Li, Teng Wang:
Identifying different community members in complex networks based on topology potential. 87-99 - Xuesong Yin, Enliang Hu:
Distance metric learning guided adaptive subspace semi-supervised clustering. 100-108 - Hao Bai, Kunsheng Wang, Changzhen Hu, Gang Zhang, Xiao-chuan Jing:
Boosting performance in attack intention recognition by integrating multiple techniques. 109-118 - Yujian Li, Chenguang Zhang:
A metric normalization of tree edit distance. 119-125 - Jian Wang, Yubai Li, Chang Wu:
An analytical model for Network-on-Chip with finite input buffer. 126-134
Volume 5, Number 2, June 2011
- Bailing Liu, Feng Xiao, Ke Deng:
Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation. 135-147 - Eryun Liu, Heng Zhao, Fangfei Guo, Jimin Liang, Jie Tian:
Fingerprint segmentation based on an AdaBoost classifier. 148-157 - Wenfeng Yang, Yupu Hu:
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions. 158-162 - Defa Hu, Qiaoliang Li:
A simple fingerprinting scheme for large user groups. 163-168 - Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei:
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. 169-180 - Guojun Wang, Jie Wu:
FlowTrust: trust inference with network flows. 181-194 - Xibei Yang, Ming Zhang:
Dominance-based fuzzy rough approach to an interval-valued decision system. 195-204 - Ruixuan Li, Kunmei Wen, Xiwu Gu, Yuhua Li, Xiaolin Sun, Bing Li:
Type-2 fuzzy description logic. 205-215 - Wei Wang, Zhiliang Wang, Siyi Zheng, Xuejing Gu:
Individual difference of artificial emotion applied to a service robot. 216-226 - Yehu Shen:
Efficient normalized cross correlation calculation method for stereo vision based robot navigation. 227-235 - Yansong Zhang, Shan Wang, Jiaheng Lu:
Improving performance by creating a native join-index for OLAP. 236-249 - Lan Li, Wenjun Xiao:
Psu: a novel low-latency constant-degree overlay network. 250-258
Volume 5, Number 3, September 2011
- Xiubo Geng, Xueqi Cheng:
Learning multiple metrics for ranking. 259-267 - Xianchao Zhang, Quanzeng You:
An improved spectral clustering algorithm based on random walk. 268-278 - Xudong Zhu, Zhijing Liu:
Human behavior clustering for anomaly detection. 279-289 - Jiuyue Hao, Chao Li, Zhang Xiong, Ejaz Hussain:
A temporal-spatial background modeling of dynamic scenes. 290-299 - Defu Chen, Zhengsu Tao:
An adaptive polling interval and short preamble media access control protocol for wireless sensor networks. 300-307 - Jun Xu, Xuehai Zhou, Feng Yang:
Traceback in wireless sensor networks with packet marking and logging. 308-315 - Stephen F. Bush:
Toward in vivo nanoscale communication networks: utilizing an active network architecture. 316-326 - Haizheng Yu, Jianfeng Ma, Hong Bian:
Reasonable routing in delay/disruption tolerant networks. 327-334 - Chao Lv, Hui Li, Jianfeng Ma, Meng Zhao:
Security analysis of two recently proposed RFID authentication protocols. 335-340 - Shaoying Liu:
Pre-post notation is questionable in effectively specifying operations of object-oriented systems. 341-352 - Yuzhong Sun, Yiqiang Zhao, Ying Song, Yajun Yang, Haifeng Fang, Hongyong Zang, Yaqiong Li, Yunwei Gao:
Green challenges to system software in data centers. 353-368 - Baojian Hua:
Static typing for a substructural lambda calculus. 369-380
Volume 5, Number 4, December 2011
- Wei Zhao, Ye San:
RBF neural network based on q-Gaussian function in function approximation. 381-386 - Yongjian Zhao, Boqiang Liu, Sen Wang:
A robust extraction algorithm for biomedical signals from noisy mixtures. 387-394 - Weimin Wang, Jingchun Zhang, Cong Cao, Tao Hou, Yue Liu, Keji Chen:
An efficient approach to representing and mining knowledge from Qing court medical records. 395-404 - Dongsheng Wang:
Answering contextual questions based on ontologies and question templates. 405-418 - Pu Huang, Zhenmin Tang, Cai-Kou Chen, Xintian Cheng:
Nearest-neighbor classifier motivated marginal discriminant projections for face recognition. 419-428 - Mingfen Wu:
Approximation operators based on vague relations and roughness measures of vague sets. 429-441 - Xixiang Lv, Hui Li, Baocang Wang:
Identity-based key distribution for mobile Ad Hoc networks. 442-447 - Sheng Gao, Wenping Ma, Zepeng Zhuo, Fenghe Wang:
On cross-correlation indicators of an S-box. 448-453 - Yanfang Ma, Min Zhang, Yixiang Chen, Liang Chen:
Two-thirds simulation indexes and modal logic characterization. 454-471 - Wei Wang:
Certifying assembly programs with trails. 472-485 - Zijian Guo, Wenyuan Wang, Guolei Tang, Jun Huang:
A recursive model for static empty container allocation. 486-495 - Yutaka Okaie, Tadashi Nakano:
Non-cooperative optimization games in market-oriented overlay networks: an integrated model of resource pricing and network formation. 496-505 - Shuguo Yang:
Research on resource allocation for multi-tier web applications in a virtualization environment. 506-512 - Kenli Li, Zhao Tong, Dan Liu, Teklay Tesfazghi, Xiangke Liao:
A PTS-PGATS based approach for data-intensive scheduling in data grids. 513-525
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.