callback( { "result":{ "query":":facetid:toc:\"db/journals/jcst/jcst23.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"73.73" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"88", "@dc":"88", "@oc":"88", "@id":"43454155", "text":":facetid:toc:db/journals/jcst/jcst23.bht" } }, "hits":{ "@total":"88", "@computed":"88", "@sent":"88", "@first":"0", "hit":[{ "@score":"1", "@id":"5276283", "info":{"authors":{"author":[{"@pid":"66/5051","text":"Fereshteh Amini"},{"@pid":"25/5333","text":"Moazzam Khan"},{"@pid":"m/JVMisic","text":"Jelena V. Misic"},{"@pid":"37/1869","text":"Hossein Pourreza"}]},"title":"Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"377-388","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/AminiKMP08","doi":"10.1007/S11390-008-9140-0","ee":"https://doi.org/10.1007/s11390-008-9140-0","url":"https://dblp.org/rec/journals/jcst/AminiKMP08"}, "url":"URL#5276283" }, { "@score":"1", "@id":"5276284", "info":{"authors":{"author":[{"@pid":"b/ChandrajitLBajaj","text":"Chandrajit L. Bajaj"},{"@pid":"75/1527","text":"Guoliang Xu"},{"@pid":"45/47-5","text":"Qin Zhang 0005"}]},"title":"Higher-Order Level-Set Method and Its Application in Biomolecular Surfaces Construction.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"1026-1036","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/BajajXZ08","doi":"10.1007/S11390-008-9184-1","ee":"https://doi.org/10.1007/s11390-008-9184-1","url":"https://dblp.org/rec/journals/jcst/BajajXZ08"}, "url":"URL#5276284" }, { "@score":"1", "@id":"5276285", "info":{"authors":{"author":[{"@pid":"58/2848","text":"Lam Thu Bui"},{"@pid":"21/4802","text":"Kalyanmoy Deb"},{"@pid":"a/HusseinAAbbass","text":"Hussein A. Abbass"},{"@pid":"e/DEssam","text":"Daryl Essam"}]},"title":"Interleaving Guidance in Evolutionary Multi-Objective Optimization.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"44-63","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/BuiDAE08","doi":"10.1007/S11390-008-9114-2","ee":"https://doi.org/10.1007/s11390-008-9114-2","url":"https://dblp.org/rec/journals/jcst/BuiDAE08"}, "url":"URL#5276285" }, { "@score":"1", "@id":"5276286", "info":{"authors":{"author":[{"@pid":"36/3933","text":"Kan Cai"},{"@pid":"f/MJFeeley","text":"Michael J. Feeley"},{"@pid":"33/6584","text":"Brendan Cully"},{"@pid":"26/574","text":"Sharath J. George"}]},"title":"Understanding Performance for Two 802.11 Competing Flows.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"365-376","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/CaiFCG08","doi":"10.1007/S11390-008-9139-6","ee":"https://doi.org/10.1007/s11390-008-9139-6","url":"https://dblp.org/rec/journals/jcst/CaiFCG08"}, "url":"URL#5276286" }, { "@score":"1", "@id":"5276287", "info":{"authors":{"author":[{"@pid":"96/930","text":"Tiziana Calamoneri"},{"@pid":"13/6909","text":"Saverio Caminiti"},{"@pid":"96/1282","text":"Rossella Petreschi"}]},"title":"A General Approach to L ( h, k )-Label Interconnection Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"652-659","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/CalamoneriCP08","doi":"10.1007/S11390-008-9161-8","ee":"https://doi.org/10.1007/s11390-008-9161-8","url":"https://dblp.org/rec/journals/jcst/CalamoneriCP08"}, "url":"URL#5276287" }, { "@score":"1", "@id":"5276288", "info":{"authors":{"author":[{"@pid":"89/5615","text":"Bo Chen"},{"@pid":"53/1151","text":"Hui He"},{"@pid":"73/273","text":"Jun Guo"}]},"title":"Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"231-239","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ChenHG08","doi":"10.1007/S11390-008-9125-Z","ee":"https://doi.org/10.1007/s11390-008-9125-z","url":"https://dblp.org/rec/journals/jcst/ChenHG08"}, "url":"URL#5276288" }, { "@score":"1", "@id":"5276289", "info":{"authors":{"author":[{"@pid":"13/5568-2","text":"Zhixiong Chen 0002"},{"@pid":"10/5753","text":"Shengqiang Li"}]},"title":"Some Notes on Generalized Cyclotomic Sequences of Length pq.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"843-850","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ChenL08","doi":"10.1007/S11390-008-9167-2","ee":"https://doi.org/10.1007/s11390-008-9167-2","url":"https://dblp.org/rec/journals/jcst/ChenL08"}, "url":"URL#5276289" }, { "@score":"1", "@id":"5276290", "info":{"authors":{"author":[{"@pid":"57/6104-8","text":"Nan Chen 0008"},{"@pid":"21/5967","text":"Lidan Shou"},{"@pid":"67/6383-1","text":"Gang Chen 0001"},{"@pid":"92/5443","text":"Jinxiang Dong"}]},"title":"Adaptive Indexing of Moving Objects with Highly Variable Update Frequencies.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"998-1014","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ChenSCD08","doi":"10.1007/S11390-008-9185-0","ee":"https://doi.org/10.1007/s11390-008-9185-0","url":"https://dblp.org/rec/journals/jcst/ChenSCD08"}, "url":"URL#5276290" }, { "@score":"1", "@id":"5276291", "info":{"authors":{"author":[{"@pid":"51/4987","text":"Dong-nian Cheng"},{"@pid":"10/2773","text":"Yuxiang Hu"},{"@pid":"79/1385","text":"Cai-xia Liu"}]},"title":"Parallel Algorithm Core: A Novel IPSec Algorithm Engine for Both Exploiting Parallelism and Improving Scalability.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"792-805","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ChengHL08","doi":"10.1007/S11390-008-9166-3","ee":"https://doi.org/10.1007/s11390-008-9166-3","url":"https://dblp.org/rec/journals/jcst/ChengHL08"}, "url":"URL#5276291" }, { "@score":"1", "@id":"5276292", "info":{"authors":{"author":[{"@pid":"07/1560","text":"Byron Choi"},{"@pid":"33/3180","text":"Gao Cong"},{"@pid":"94/2372","text":"Wenfei Fan"},{"@pid":"v/SViglas","text":"Stratis Viglas"}]},"title":"Updating Recursive XML Views of Relations.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"516-537","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ChoiCFV08","doi":"10.1007/S11390-008-9150-Y","ee":"https://doi.org/10.1007/s11390-008-9150-y","url":"https://dblp.org/rec/journals/jcst/ChoiCFV08"}, "url":"URL#5276292" }, { "@score":"1", "@id":"5276293", "info":{"authors":{"author":[{"@pid":"20/5213","text":"Lizhong Dai"},{"@pid":"04/4784","text":"Dongmei Zhao"}]},"title":"Uplink Scheduling for Supporting Real Time Voice Traffic in IEEE 802.16 Backhaul Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"806-814","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/DaiZ08","doi":"10.1007/S11390-008-9169-0","ee":"https://doi.org/10.1007/s11390-008-9169-0","url":"https://dblp.org/rec/journals/jcst/DaiZ08"}, "url":"URL#5276293" }, { "@score":"1", "@id":"5276294", "info":{"authors":{"author":[{"@pid":"68/558","text":"Grant Dick"},{"@pid":"71/2932","text":"Peter A. Whigham"}]},"title":"Spatially-Structured Sharing Technique for Multimodal Problems.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"64-76","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/DickW08","doi":"10.1007/S11390-008-9110-6","ee":"https://doi.org/10.1007/s11390-008-9110-6","url":"https://dblp.org/rec/journals/jcst/DickW08"}, "url":"URL#5276294" }, { "@score":"1", "@id":"5276295", "info":{"authors":{"author":[{"@pid":"d/FlorianDiedrich","text":"Florian Diedrich"},{"@pid":"56/2793","text":"Rolf Harren"},{"@pid":"j/KlausJansen","text":"Klaus Jansen"},{"@pid":"17/6022","text":"Ralf Thöle"},{"@pid":"51/1851","text":"Henning Thomas"}]},"title":"Approximation Algorithms for 3D Orthogonal Knapsack.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"749-762","year":"2008","type":"Journal Articles","access":"open","key":"journals/jcst/DiedrichHJTT08","doi":"10.1007/S11390-008-9170-7","ee":"https://doi.org/10.1007/s11390-008-9170-7","url":"https://dblp.org/rec/journals/jcst/DiedrichHJTT08"}, "url":"URL#5276295" }, { "@score":"1", "@id":"5276296", "info":{"authors":{"author":[{"@pid":"68/3975-2","text":"Nan Ding 0002"},{"@pid":"13/4758","text":"Shude Zhou"},{"@pid":"14/3685","text":"Zengqi Sun"}]},"title":"Histogram-Based Estimation of Distribution Algorithm: A Competent Method for Continuous Optimization.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"35-43","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/DingZS08","doi":"10.1007/S11390-008-9108-0","ee":"https://doi.org/10.1007/s11390-008-9108-0","url":"https://dblp.org/rec/journals/jcst/DingZS08"}, "url":"URL#5276296" }, { "@score":"1", "@id":"5276297", "info":{"authors":{"author":[{"@pid":"94/4818","text":"Jun-Wu Dong"},{"@pid":"49/2823","text":"Dingyi Pei"},{"@pid":"47/3567","text":"Xue-Li Wang"}]},"title":"A Class of Key Predistribution Schemes Based on Orthogonal Arrays.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"825-831","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/DongPW08","doi":"10.1007/S11390-008-9168-1","ee":"https://doi.org/10.1007/s11390-008-9168-1","url":"https://dblp.org/rec/journals/jcst/DongPW08"}, "url":"URL#5276297" }, { "@score":"1", "@id":"5276298", "info":{"authors":{"author":[{"@pid":"86/4539","text":"Nan Du"},{"@pid":"03/587-1","text":"Bai Wang 0001"},{"@pid":"98/4432-1","text":"Bin Wu 0001"}]},"title":"Community Detection in Complex Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"672-683","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/DuWW08","doi":"10.1007/S11390-008-9163-6","ee":"https://doi.org/10.1007/s11390-008-9163-6","url":"https://dblp.org/rec/journals/jcst/DuWW08"}, "url":"URL#5276298" }, { "@score":"1", "@id":"5276299", "info":{"authors":{"author":[{"@pid":"05/4484","text":"Murat Ekinci"},{"@pid":"94/5965","text":"Murat Aykut"}]},"title":"Palmprint Recognition by Applying Wavelet-Based Kernel PCA.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"851-861","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/EkinciA08","doi":"10.1007/S11390-008-9173-4","ee":"https://doi.org/10.1007/s11390-008-9173-4","url":"https://dblp.org/rec/journals/jcst/EkinciA08"}, "url":"URL#5276299" }, { "@score":"1", "@id":"5276300", "info":{"authors":{"author":[{"@pid":"214/4175","text":"Ehab Zaki Elfeky"},{"@pid":"s/RuhulASarker","text":"Ruhul A. Sarker"},{"@pid":"e/DEssam","text":"Daryl Essam"}]},"title":"Analyzing the Simple Ranking and Selection Process for Constrained Evolutionary Optimization.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"19-34","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ElfekySE08","doi":"10.1007/S11390-008-9109-Z","ee":"https://doi.org/10.1007/s11390-008-9109-z","url":"https://dblp.org/rec/journals/jcst/ElfekySE08"}, "url":"URL#5276300" }, { "@score":"1", "@id":"5276301", "info":{"authors":{"author":[{"@pid":"06/1984","text":"Xiaoyong Fang"},{"@pid":"02/2039","text":"Zhigang Luo"},{"@pid":"94/590","text":"Zhenghua Wang"}]},"title":"Predicting RNA Secondary Structure Using Profile Stochastic Context-Free Grammars and Phylogenic Analysis.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"582-589","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/FangLW08","doi":"10.1007/S11390-008-9154-7","ee":"https://doi.org/10.1007/s11390-008-9154-7","url":"https://dblp.org/rec/journals/jcst/FangLW08"}, "url":"URL#5276301" }, { "@score":"1", "@id":"5276302", "info":{"authors":{"author":[{"@pid":"43/6576","text":"Jianhua Feng"},{"@pid":"l/GuoliangLi","text":"Guoliang Li 0001"},{"@pid":"30/6340-1","text":"Na Ta 0001"}]},"title":"A Semantic Cache Framework for Secure XML Queries.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"988-997","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/FengLT08","doi":"10.1007/S11390-008-9187-Y","ee":"https://doi.org/10.1007/s11390-008-9187-y","url":"https://dblp.org/rec/journals/jcst/FengLT08"}, "url":"URL#5276302" }, { "@score":"1", "@id":"5276303", "info":{"authors":{"author":[{"@pid":"94/2172","text":"Michele Garetto"},{"@pid":"05/2603","text":"Marco Gribaudo"},{"@pid":"c/CFChiasserini","text":"Carla-Fabiana Chiasserini"},{"@pid":"19/4748","text":"Emilio Leonardi"}]},"title":"Sensor Deployment and Relocation: A Unified Scheme.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"400-412","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/GarettoGCL08","doi":"10.1007/S11390-008-9142-Y","ee":"https://doi.org/10.1007/s11390-008-9142-y","url":"https://dblp.org/rec/journals/jcst/GarettoGCL08"}, "url":"URL#5276303" }, { "@score":"1", "@id":"5276304", "info":{"authors":{"author":[{"@pid":"10/6184","text":"Chittabrata Ghosh"},{"@pid":"52/613-1","text":"Bin Xie 0001"},{"@pid":"a/DharmaPAgrawal","text":"Dharma P. Agrawal"}]},"title":"ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"413-425","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/GhoshXA08","doi":"10.1007/S11390-008-9143-X","ee":"https://doi.org/10.1007/s11390-008-9143-x","url":"https://dblp.org/rec/journals/jcst/GhoshXA08"}, "url":"URL#5276304" }, { "@score":"1", "@id":"5276305", "info":{"authors":{"author":[{"@pid":"95/2804","text":"Markus Hinkelmann"},{"@pid":"j/AndreasJakoby","text":"Andreas Jakoby"},{"@pid":"02/828","text":"Peer Stechert"}]},"title":"t-Private and t-Secure Auctions.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"694-710","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/HinkelmannJS08","doi":"10.1007/S11390-008-9174-3","ee":"https://doi.org/10.1007/s11390-008-9174-3","url":"https://dblp.org/rec/journals/jcst/HinkelmannJS08"}, "url":"URL#5276305" }, { "@score":"1", "@id":"5276306", "info":{"authors":{"author":[{"@pid":"75/5125","text":"Weiwu Hu"},{"@pid":"39/449","text":"Jian Wang"}]},"title":"Making Effective Decisions in Computer Architects' Real-World: Lessons and Experiences with Godson-2 Processor Designs.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"620-632","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/HuW08","doi":"10.1007/S11390-008-9158-3","ee":"https://doi.org/10.1007/s11390-008-9158-3","url":"https://dblp.org/rec/journals/jcst/HuW08"}, "url":"URL#5276306" }, { "@score":"1", "@id":"5276307", "info":{"authors":{"author":[{"@pid":"93/4808","text":"Xiaomin Hu"},{"@pid":"z/JunZhang3","text":"Jun Zhang 0003"},{"@pid":"87/6284-2","text":"Yun Li 0002"}]},"title":"Orthogonal Methods Based Ant Colony Search for Solving Continuous Optimization Problems.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"2-18","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/HuZL08","doi":"10.1007/S11390-008-9111-5","ee":"https://doi.org/10.1007/s11390-008-9111-5","url":"https://dblp.org/rec/journals/jcst/HuZL08"}, "url":"URL#5276307" }, { "@score":"1", "@id":"5276308", "info":{"authors":{"author":[{"@pid":"41/5697-5","text":"Zhenhua Huang 0005"},{"@pid":"19/1086","text":"Jiankui Guo"},{"@pid":"23/2272","text":"Sheng-Li Sun"},{"@pid":"w/WeiWang9","text":"Wei Wang 0009"}]},"title":"Efficient Optimization of Multiple Subspace Skyline Queries.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"103-111","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/HuangGSW08","doi":"10.1007/S11390-008-9112-4","ee":"https://doi.org/10.1007/s11390-008-9112-4","url":"https://dblp.org/rec/journals/jcst/HuangGSW08"}, "url":"URL#5276308" }, { "@score":"1", "@id":"5276309", "info":{"authors":{"author":[{"@pid":"11/539-1","text":"Gang Huang 0001"},{"@pid":"64/3322","text":"Lianshan Sun"}]},"title":"An Access Control Framework for Reflective Middleware.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"895-904","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/HuangS08","doi":"10.1007/S11390-008-9188-X","ee":"https://doi.org/10.1007/s11390-008-9188-x","url":"https://dblp.org/rec/journals/jcst/HuangS08"}, "url":"URL#5276309" }, { "@score":"1", "@id":"5276310", "info":{"authors":{"author":[{"@pid":"58/5215-1","text":"Qiong Huang 0001"},{"@pid":"85/5606","text":"Duncan S. Wong"},{"@pid":"48/1097-2","text":"Jin Li 0002"},{"@pid":"83/6856","text":"Yiming Zhao"}]},"title":"Generic Transformation from Weakly to Strongly Unforgeable Signatures.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"240-252","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/HuangWLZ08","doi":"10.1007/S11390-008-9126-Y","ee":"https://doi.org/10.1007/s11390-008-9126-y","url":"https://dblp.org/rec/journals/jcst/HuangWLZ08"}, "url":"URL#5276310" }, { "@score":"1", "@id":"5276311", "info":{"authors":{"author":[{"@pid":"i/FIngelrest","text":"François Ingelrest"},{"@pid":"s/DavidSimplotRyl","text":"David Simplot-Ryl"}]},"title":"Maximizing the Delivery of MPR Broadcasting Under Realistic Physical Layer Assumptions.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"451-460","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/IngelrestS08","doi":"10.1007/S11390-008-9146-7","ee":"https://doi.org/10.1007/s11390-008-9146-7","url":"https://dblp.org/rec/journals/jcst/IngelrestS08"}, "url":"URL#5276311" }, { "@score":"1", "@id":"5276312", "info":{"authors":{"author":[{"@pid":"59/2941","text":"Chengdong Jiang"},{"@pid":"14/2048-1","text":"Guo-Liang Chen 0001"}]},"title":"Double Barrier Coverage in Dense Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"154-165","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/JiangC08","doi":"10.1007/S11390-008-9113-3","ee":"https://doi.org/10.1007/s11390-008-9113-3","url":"https://dblp.org/rec/journals/jcst/JiangC08"}, "url":"URL#5276312" }, { "@score":"1", "@id":"5276313", "info":{"authors":{"author":[{"@pid":"22/6452","text":"Vasileios Karyotis"},{"@pid":"87/831","text":"Anastasios Kakalis"},{"@pid":"62/4765","text":"Symeon Papavassiliou"}]},"title":"Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"389-399","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/KaryotisKP08","doi":"10.1007/S11390-008-9141-Z","ee":"https://doi.org/10.1007/s11390-008-9141-z","url":"https://dblp.org/rec/journals/jcst/KaryotisKP08"}, "url":"URL#5276313" }, { "@score":"1", "@id":"5276314", "info":{"authors":{"author":[{"@pid":"16/726","text":"Toshio Kodama"},{"@pid":"k/TosiyasuLKunii","text":"Tosiyasu L. Kunii"},{"@pid":"00/5435","text":"Yoichi Seki"}]},"title":"WWW Business Applications Based on the Cellular Model.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"176-187","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/KodamaKS08","doi":"10.1007/S11390-008-9120-4","ee":"https://doi.org/10.1007/s11390-008-9120-4","url":"https://dblp.org/rec/journals/jcst/KodamaKS08"}, "url":"URL#5276314" }, { "@score":"1", "@id":"5276315", "info":{"authors":{"author":[{"@pid":"18/1695","text":"Daniel Kunkle"},{"@pid":"79/2619","text":"Donghui Zhang"},{"@pid":"c/GeneCooperman","text":"Gene Cooperman"}]},"title":"Mining Frequent Generalized Itemsets and Generalized Association Rules Without Redundancy.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"77-102","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/KunkleZC08","doi":"10.1007/S11390-008-9107-1","ee":"https://doi.org/10.1007/s11390-008-9107-1","url":"https://dblp.org/rec/journals/jcst/KunkleZC08"}, "url":"URL#5276315" }, { "@score":"1", "@id":"5276316", "info":{"authors":{"author":[{"@pid":"65/5319","text":"Yongxuan Lai"},{"@pid":"73/295","text":"Yilong Chen"},{"@pid":"52/4150-1","text":"Hong Chen 0001"}]},"title":"PEJA: Progressive Energy-Efficient Join Processing for Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"957-972","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LaiCC08","doi":"10.1007/S11390-008-9191-2","ee":"https://doi.org/10.1007/s11390-008-9191-2","url":"https://dblp.org/rec/journals/jcst/LaiCC08"}, "url":"URL#5276316" }, { "@score":"1", "@id":"5276317", "info":{"authors":{"author":[{"@pid":"62/998","text":"Yueh-Yi Lai"},{"@pid":"18/7043","text":"Wen-Kai Tai"}]},"title":"Transition Texture Synthesis.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"280-289","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LaiT08","doi":"10.1007/S11390-008-9130-2","ee":"https://doi.org/10.1007/s11390-008-9130-2","url":"https://dblp.org/rec/journals/jcst/LaiT08"}, "url":"URL#5276317" }, { "@score":"1", "@id":"5276318", "info":{"authors":{"author":[{"@pid":"59/537","text":"Jibao Lai"},{"@pid":"19/3380","text":"Huiqiang Wang"},{"@pid":"06/1886","text":"Xiaowu Liu"},{"@pid":"87/3166","text":"Ying Liang"},{"@pid":"28/6042","text":"Ruijuan Zheng"},{"@pid":"179/3265","text":"Guosheng Zhao"}]},"title":"WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"222-230","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LaiWLLZZ08","doi":"10.1007/S11390-008-9124-0","ee":"https://doi.org/10.1007/s11390-008-9124-0","url":"https://dblp.org/rec/journals/jcst/LaiWLLZZ08"}, "url":"URL#5276318" }, { "@score":"1", "@id":"5276319", "info":{"authors":{"author":[{"@pid":"71/6934","text":"Hao Lang"},{"@pid":"13/1898-4","text":"Bin Wang 0004"},{"@pid":"81/4050","text":"Gareth J. F. Jones"},{"@pid":"l/JintaoLi","text":"Jin-Tao Li"},{"@pid":"63/6027","text":"Fan Ding"},{"@pid":"38/2106","text":"Yi-Xuan Liu"}]},"title":"Query Performance Prediction for Information Retrieval Based on Covering Topic Score.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"590-601","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LangWJLDL08","doi":"10.1007/S11390-008-9155-6","ee":"https://doi.org/10.1007/s11390-008-9155-6","url":"https://dblp.org/rec/journals/jcst/LangWJLDL08"}, "url":"URL#5276319" }, { "@score":"1", "@id":"5276320", "info":{"authors":{"author":{"@pid":"55/1216","text":"Kangwoo Lee"}},"title":"Guiding Attention by Cooperative Cues.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"874-884","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/Lee08","doi":"10.1007/S11390-008-9171-6","ee":"https://doi.org/10.1007/s11390-008-9171-6","url":"https://dblp.org/rec/journals/jcst/Lee08"}, "url":"URL#5276320" }, { "@score":"1", "@id":"5276321", "info":{"authors":{"author":[{"@pid":"07/6728-1","text":"Xiaolin Li 0001"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"}]},"title":"Coordinated Workload Scheduling in Hierarchical Sensor Networks for Data Fusion Applications.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"355-364","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LiC08","doi":"10.1007/S11390-008-9138-7","ee":"https://doi.org/10.1007/s11390-008-9138-7","url":"https://dblp.org/rec/journals/jcst/LiC08"}, "url":"URL#5276321" }, { "@score":"1", "@id":"5276322", "info":{"authors":{"author":[{"@pid":"34/4803","text":"Zusong Li"},{"@pid":"13/3699","text":"Dandan Huan"},{"@pid":"75/5125","text":"Weiwu Hu"},{"@pid":"63/749","text":"Zhimin Tang"}]},"title":"Chip Multithreaded Consistency Model.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"298-305","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LiHHT08","doi":"10.1007/S11390-008-9132-0","ee":"https://doi.org/10.1007/s11390-008-9132-0","url":"https://dblp.org/rec/journals/jcst/LiHHT08"}, "url":"URL#5276322" }, { "@score":"1", "@id":"5276323", "info":{"authors":{"author":[{"@pid":"50/3993-1","text":"Xiaodong Li 0001"},{"@pid":"82/5868","text":"Wenjian Luo"},{"@pid":"26/3646","text":"Xin Yao 0001"}]},"title":"Preface.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"1","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LiLY08","doi":"10.1007/S11390-008-9116-0","ee":"https://doi.org/10.1007/s11390-008-9116-0","url":"https://dblp.org/rec/journals/jcst/LiLY08"}, "url":"URL#5276323" }, { "@score":"1", "@id":"5276324", "info":{"authors":{"author":[{"@pid":"23/6950","text":"Jia Li"},{"@pid":"25/811","text":"Liyong Shen"},{"@pid":"13/3109","text":"Xiao-Shan Gao"}]},"title":"Proper Reparametrization of Rational Ruled Surface.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"290-297","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LiSG08","doi":"10.1007/S11390-008-9131-1","ee":"https://doi.org/10.1007/s11390-008-9131-1","url":"https://dblp.org/rec/journals/jcst/LiSG08"}, "url":"URL#5276324" }, { "@score":"1", "@id":"5276325", "info":{"authors":{"author":[{"@pid":"16/5911","text":"Wei-Lin Li"},{"@pid":"21/1048-8","text":"Peng Zhang 0008"},{"@pid":"91/681","text":"Daming Zhu"}]},"title":"On Constrained Facility Location Problems.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"740-748","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LiZZ08","doi":"10.1007/S11390-008-9172-5","ee":"https://doi.org/10.1007/s11390-008-9172-5","url":"https://dblp.org/rec/journals/jcst/LiZZ08"}, "url":"URL#5276325" }, { "@score":"1", "@id":"5276326", "info":{"authors":{"author":[{"@pid":"97/7159","text":"Hua-Ming Liao"},{"@pid":"40/7158","text":"Guo-Shun Pei"}]},"title":"Cache-Based Aggregate Query Shipping: An Efficient Scheme of Distributed OLAP Query Processing.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"905-915","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LiaoP08","doi":"10.1007/S11390-008-9190-3","ee":"https://doi.org/10.1007/s11390-008-9190-3","url":"https://dblp.org/rec/journals/jcst/LiaoP08"}, "url":"URL#5276326" }, { "@score":"1", "@id":"5276327", "info":{"authors":{"author":[{"@pid":"30/2791","text":"Yubao Liu"},{"@pid":"33/3366","text":"Jiarong Cai"},{"@pid":"95/578-1","text":"Jian Yin 0001"},{"@pid":"f/AdaWaiCheeFu","text":"Ada Wai-Chee Fu"}]},"title":"Clustering Text Data Streams.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"112-128","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuCYF08","doi":"10.1007/S11390-008-9115-1","ee":"https://doi.org/10.1007/s11390-008-9115-1","url":"https://dblp.org/rec/journals/jcst/LiuCYF08"}, "url":"URL#5276327" }, { "@score":"1", "@id":"5276328", "info":{"authors":{"author":[{"@pid":"22/2080-1","text":"Shengli Liu 0001"},{"@pid":"c/XiaofengChen1","text":"Xiaofeng Chen 0001"},{"@pid":"52/2421","text":"Fangguo Zhang"}]},"title":"Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"265-269","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuCZ08","doi":"10.1007/S11390-008-9128-9","ee":"https://doi.org/10.1007/s11390-008-9128-9","url":"https://dblp.org/rec/journals/jcst/LiuCZ08"}, "url":"URL#5276328" }, { "@score":"1", "@id":"5276329", "info":{"authors":{"author":[{"@pid":"64/435-6","text":"Yanli Liu 0006"},{"@pid":"92/1375","text":"Jin Wang"},{"@pid":"16/3283","text":"Xi Chen"},{"@pid":"44/185-1","text":"Yanwen Guo 0001"},{"@pid":"27/6271-1","text":"Qunsheng Peng 0001"}]},"title":"A Robust and Fast Non-Local Means Algorithm for Image Denoising.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"270-279","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LiuWCGP08","doi":"10.1007/S11390-008-9129-8","ee":"https://doi.org/10.1007/s11390-008-9129-8","url":"https://dblp.org/rec/journals/jcst/LiuWCGP08"}, "url":"URL#5276329" }, { "@score":"1", "@id":"5276330", "info":{"authors":{"author":[{"@pid":"l/JaimeLloret","text":"Jaime Lloret 0001"},{"@pid":"91/3684","text":"Miguel Garcia 0001"},{"@pid":"98/845","text":"Jesús Tomás"},{"@pid":"35/3530","text":"Fernando Boronat"}]},"title":"GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"461-480","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LloretGTB08","doi":"10.1007/S11390-008-9147-6","ee":"https://doi.org/10.1007/s11390-008-9147-6","url":"https://dblp.org/rec/journals/jcst/LloretGTB08"}, "url":"URL#5276330" }, { "@score":"1", "@id":"5276331", "info":{"authors":{"author":[{"@pid":"96/4724","text":"Grigorios Loukides"},{"@pid":"18/5047-1","text":"Jianhua Shao 0001"}]},"title":"An Efficient Clustering Algorithm for k -Anonymisation.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"188-202","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LoukidesS08","doi":"10.1007/S11390-008-9121-3","ee":"https://doi.org/10.1007/s11390-008-9121-3","url":"https://dblp.org/rec/journals/jcst/LoukidesS08"}, "url":"URL#5276331" }, { "@score":"1", "@id":"5276332", "info":{"authors":{"author":[{"@pid":"97/6483","text":"Feng Lu"},{"@pid":"05/2952","text":"Liang-Tien Chia"},{"@pid":"56/4773","text":"Kok-Leong Tay"},{"@pid":"44/4084","text":"Wai-Hoe Chong"}]},"title":"NBgossip: An Energy-Efficient Gossip Algorithm for Wireless Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"426-437","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/LuCTC08","doi":"10.1007/S11390-008-9144-9","ee":"https://doi.org/10.1007/s11390-008-9144-9","url":"https://dblp.org/rec/journals/jcst/LuCTC08"}, "url":"URL#5276332" }, { "@score":"1", "@id":"5276333", "info":{"authors":{"author":[{"@pid":"84/6755","text":"Loris Nanni"},{"@pid":"l/AlessandraLumini","text":"Alessandra Lumini"}]},"title":"Cluster-Based Nearest-Neighbour Classifier and Its Application on the Lightning Classification.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"573-581","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/NanniL08","doi":"10.1007/S11390-008-9153-8","ee":"https://doi.org/10.1007/s11390-008-9153-8","url":"https://dblp.org/rec/journals/jcst/NanniL08"}, "url":"URL#5276333" }, { "@score":"1", "@id":"5276334", "info":{"authors":{"author":[{"@pid":"05/1028","text":"Donggeon Noh"},{"@pid":"08/4789","text":"Heonshik Shin"}]},"title":"URECA: Efficient Resource Location Middleware for Ubiquitous Environment.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"929-943","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/NohS08","doi":"10.1007/S11390-008-9186-Z","ee":"https://doi.org/10.1007/s11390-008-9186-z","url":"https://dblp.org/rec/journals/jcst/NohS08"}, "url":"URL#5276334" }, { "@score":"1", "@id":"5276335", "info":{"authors":{"author":[{"@pid":"07/4720","text":"Shaoliang Peng"},{"@pid":"66/5479-1","text":"Shanshan Li 0001"},{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"},{"@pid":"42/2857-1","text":"Yuxing Peng 0001"},{"@pid":"42/2525","text":"Nong Xiao"}]},"title":"Scalable Base-Station Model-Based Multicast in Wireless Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"780-791","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/PengLCPX08","doi":"10.1007/S11390-008-9177-0","ee":"https://doi.org/10.1007/s11390-008-9177-0","url":"https://dblp.org/rec/journals/jcst/PengLCPX08"}, "url":"URL#5276335" }, { "@score":"1", "@id":"5276336", "info":{"authors":{"author":[{"@pid":"94/6901","text":"Baodong Qin"},{"@pid":"181/2821","text":"Ming Li"},{"@pid":"05/3013","text":"Fanyu Kong"}]},"title":"Cryptanalysis of a Type of CRT-Based RSA Algorithms.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"214-221","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/QinLK08","doi":"10.1007/S11390-008-9123-1","ee":"https://doi.org/10.1007/s11390-008-9123-1","url":"https://dblp.org/rec/journals/jcst/QinLK08"}, "url":"URL#5276336" }, { "@score":"1", "@id":"5276337", "info":{"authors":{"author":[{"@pid":"03/6779","text":"Vaishali P. Sadaphal"},{"@pid":"j/BijendraNJain","text":"Bijendra N. Jain"}]},"title":"Random and Periodic Sleep Schedules for Target Detection in Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"343-354","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/SadaphalJ08","doi":"10.1007/S11390-008-9137-8","ee":"https://doi.org/10.1007/s11390-008-9137-8","url":"https://dblp.org/rec/journals/jcst/SadaphalJ08"}, "url":"URL#5276337" }, { "@score":"1", "@id":"5276338", "info":{"authors":{"author":[{"@pid":"30/3186","text":"Juan A. Sánchez"},{"@pid":"48/3117","text":"Rafael Marín-Pérez"},{"@pid":"22/5330","text":"Pedro M. Ruiz"}]},"title":"Beacon-Less Geographic Routing in Real Wireless Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"438-450","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/SanchezMR08","doi":"10.1007/S11390-008-9145-8","ee":"https://doi.org/10.1007/s11390-008-9145-8","url":"https://dblp.org/rec/journals/jcst/SanchezMR08"}, "url":"URL#5276338" }, { "@score":"1", "@id":"5276339", "info":{"authors":{"author":[{"@pid":"16/5462","text":"Pisai Setthawong"},{"@pid":"55/4648","text":"Surat Tanterdtid"}]},"title":"Flood Avoidance Mechanisms for Bridged Resilient Packet Rings.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"815-824","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/SetthawongT08","doi":"10.1007/S11390-008-9176-1","ee":"https://doi.org/10.1007/s11390-008-9176-1","url":"https://dblp.org/rec/journals/jcst/SetthawongT08"}, "url":"URL#5276339" }, { "@score":"1", "@id":"5276340", "info":{"authors":{"author":[{"@pid":"74/3247-1","text":"Hong Shen 0001"},{"@pid":"50/671","text":"Yu Zhang"}]},"title":"Improved Approximate Detection of Duplicates for Data Streams Over Sliding Windows.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"973-987","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ShenZ08","doi":"10.1007/S11390-008-9192-1","ee":"https://doi.org/10.1007/s11390-008-9192-1","url":"https://dblp.org/rec/journals/jcst/ShenZ08"}, "url":"URL#5276340" }, { "@score":"1", "@id":"5276341", "info":{"authors":{"author":[{"@pid":"37/1971-1","text":"Xu Sun 0001"},{"@pid":"38/1358","text":"Houfeng Wang"},{"@pid":"72/6811-3","text":"Bo Wang 0003"}]},"title":"Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"602-611","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/SunWW08","doi":"10.1007/S11390-008-9156-5","ee":"https://doi.org/10.1007/s11390-008-9156-5","url":"https://dblp.org/rec/journals/jcst/SunWW08"}, "url":"URL#5276341" }, { "@score":"1", "@id":"5276342", "info":{"authors":{"author":[{"@pid":"59/2712","text":"Han-Xin Sun"},{"@pid":"53/3849","text":"Kun-Peng Yang"},{"@pid":"64/6357-3","text":"Yulai Zhao 0003"},{"@pid":"56/464","text":"Dong Tong 0001"},{"@pid":"30/828-1","text":"Xu Cheng 0001"}]},"title":"CASA: A New IFU Architecture for Power-Efficient Instruction Cache and TLB Designs.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"141-153","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/SunYZTC08","doi":"10.1007/S11390-008-9117-Z","ee":"https://doi.org/10.1007/s11390-008-9117-z","url":"https://dblp.org/rec/journals/jcst/SunYZTC08"}, "url":"URL#5276342" }, { "@score":"1", "@id":"5276343", "info":{"authors":{"author":[{"@pid":"76/1178","text":"Xuehou Tan"},{"@pid":"34/2005-4","text":"Bo Jiang 0004"}]},"title":"Searching a Polygonal Region by Two Guards.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"728-739","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/TanJ08","doi":"10.1007/S11390-008-9179-Y","ee":"https://doi.org/10.1007/s11390-008-9179-y","url":"https://dblp.org/rec/journals/jcst/TanJ08"}, "url":"URL#5276343" }, { "@score":"1", "@id":"5276344", "info":{"authors":{"author":[{"@pid":"67/7788","text":"Lu-An Tang"},{"@pid":"55/5031","text":"Bin Cui 0001"},{"@pid":"62/5909-2","text":"Hongyan Li 0002"},{"@pid":"78/2746","text":"Gaoshan Miao"},{"@pid":"65/661","text":"Dongqing Yang"},{"@pid":"12/2521","text":"Xinbiao Zhou"}]},"title":"PGG: An Online Pattern Based Approach for Stream Variation Management.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"497-515","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/TangCLMYZ08","doi":"10.1007/S11390-008-9149-4","ee":"https://doi.org/10.1007/s11390-008-9149-4","url":"https://dblp.org/rec/journals/jcst/TangCLMYZ08"}, "url":"URL#5276344" }, { "@score":"1", "@id":"5276345", "info":{"authors":{"author":[{"@pid":"82/5333","text":"Haibo Tian"},{"@pid":"12/3447","text":"Willy Susilo"},{"@pid":"77/6674-1","text":"Yang Ming 0001"},{"@pid":"18/4675","text":"Yumin Wang"}]},"title":"A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"832-842","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/TianSMW08","doi":"10.1007/S11390-008-9178-Z","ee":"https://doi.org/10.1007/s11390-008-9178-z","url":"https://dblp.org/rec/journals/jcst/TianSMW08"}, "url":"URL#5276345" }, { "@score":"1", "@id":"5276346", "info":{"authors":{"author":{"@pid":"t/AvrahamTrakhtman","text":"Avraham Trakhtman"}},"title":"Some Aspects of Synchronization of DFA.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"719-727","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/Trakhtman08","doi":"10.1007/S11390-008-9165-4","ee":"https://doi.org/10.1007/s11390-008-9165-4","url":"https://dblp.org/rec/journals/jcst/Trakhtman08"}, "url":"URL#5276346" }, { "@score":"1", "@id":"5276347", "info":{"authors":{"author":[{"@pid":"67/3317","text":"Miaomiao Wang"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"},{"@pid":"181/2820-47","text":"Jing Li 0047"},{"@pid":"d/SajalKDas","text":"Sajal K. Das 0001"}]},"title":"Middleware for Wireless Sensor Networks: A Survey.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"305-326","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WangCLD08","doi":"10.1007/S11390-008-9135-X","ee":"https://doi.org/10.1007/s11390-008-9135-x","url":"https://dblp.org/rec/journals/jcst/WangCLD08"}, "url":"URL#5276347" }, { "@score":"1", "@id":"5276348", "info":{"authors":{"author":[{"@pid":"86/3464","text":"Weiming Wang"},{"@pid":"73/5179","text":"Ligang Dong"},{"@pid":"21/6681","text":"Bin Zhuge"}]},"title":"Analysis and Implementation of an Open Programmable Router Based on Forwarding and Control Element Separation.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"769-779","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WangDZ08","doi":"10.1007/S11390-008-9181-4","ee":"https://doi.org/10.1007/s11390-008-9181-4","url":"https://dblp.org/rec/journals/jcst/WangDZ08"}, "url":"URL#5276348" }, { "@score":"1", "@id":"5276349", "info":{"authors":{"author":[{"@pid":"10/3366","text":"Da Wang"},{"@pid":"08/6001-1","text":"Yu Hu 0001"},{"@pid":"70/576-1","text":"Huawei Li 0001"},{"@pid":"37/5372-1","text":"Xiaowei Li 0001"}]},"title":"Design-for-Testability Features and Test Implementation of a Giga Hertz General Purpose Microprocessor.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"1037-1046","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WangHLL08","doi":"10.1007/S11390-008-9193-0","ee":"https://doi.org/10.1007/s11390-008-9193-0","url":"https://dblp.org/rec/journals/jcst/WangHLL08"}, "url":"URL#5276349" }, { "@score":"1", "@id":"5276350", "info":{"authors":{"author":[{"@pid":"90/6339","text":"Yufeng Wang"},{"@pid":"88/576","text":"Yoshiaki Hori"},{"@pid":"16/3865","text":"Kouichi Sakurai"}]},"title":"Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"1","pages":"129-140","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WangHS08","doi":"10.1007/S11390-008-9118-Y","ee":"https://doi.org/10.1007/s11390-008-9118-y","url":"https://dblp.org/rec/journals/jcst/WangHS08"}, "url":"URL#5276350" }, { "@score":"1", "@id":"5276351", "info":{"authors":{"author":[{"@pid":"w/HaixunWang","text":"Haixun Wang"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"Clustering by Pattern Similarity.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"481-496","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WangP08","doi":"10.1007/S11390-008-9148-5","ee":"https://doi.org/10.1007/s11390-008-9148-5","url":"https://dblp.org/rec/journals/jcst/WangP08"}, "url":"URL#5276351" }, { "@score":"1", "@id":"5276352", "info":{"authors":{"author":[{"@pid":"75/2669-1","text":"Jianxin Wang 0001"},{"@pid":"72/5087","text":"Xiaoshuang Xu"},{"@pid":"c/JianerChen","text":"Jianer Chen"}]},"title":"Approximation Algorithm Based on Chain Implication for Constrained Minimum Vertex Covers in Bipartite Graphs.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"763-768","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WangXC08","doi":"10.1007/S11390-008-9180-5","ee":"https://doi.org/10.1007/s11390-008-9180-5","url":"https://dblp.org/rec/journals/jcst/WangXC08"}, "url":"URL#5276352" }, { "@score":"1", "@id":"5276353", "info":{"authors":{"author":[{"@pid":"13/1898-15","text":"Bin Wang 0015"},{"@pid":"86/2859-1","text":"Xiaochun Yang 0001"},{"@pid":"64/146","text":"Guoren Wang"},{"@pid":"49/6363","text":"Ge Yu 0001"},{"@pid":"c/LeiChen0002","text":"Lei Chen 0002"},{"@pid":"w/XiaoyangSeanWang","text":"Xiaoyang Sean Wang"},{"@pid":"l/LinXuemin","text":"Xuemin Lin 0001"}]},"title":"Continually Answering Constraint k - NN Queries in Unstructured P2P Systems.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"538-556","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WangYWYCWL08","doi":"10.1007/S11390-008-9151-X","ee":"https://doi.org/10.1007/s11390-008-9151-x","url":"https://dblp.org/rec/journals/jcst/WangYWYCWL08"}, "url":"URL#5276353" }, { "@score":"1", "@id":"5276354", "info":{"authors":{"author":[{"@pid":"97/743","text":"Chia-Chi Wu"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"73/3513","text":"Iuon-Chang Lin"}]},"title":"New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"253-264","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WuCL08","doi":"10.1007/S11390-008-9127-X","ee":"https://doi.org/10.1007/s11390-008-9127-x","url":"https://dblp.org/rec/journals/jcst/WuCL08"}, "url":"URL#5276354" }, { "@score":"1", "@id":"5276355", "info":{"authors":{"author":[{"@pid":"21/1136","text":"Jigang Wu"},{"@pid":"23/1694","text":"Thambipillai Srikanthan"},{"@pid":"43/6835","text":"Guang-Wei Zou"}]},"title":"New Model and Algorithm for Hardware/Software Partitioning.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"644-651","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WuSZ08","doi":"10.1007/S11390-008-9160-9","ee":"https://doi.org/10.1007/s11390-008-9160-9","url":"https://dblp.org/rec/journals/jcst/WuSZ08"}, "url":"URL#5276355" }, { "@score":"1", "@id":"5276356", "info":{"authors":{"author":[{"@pid":"w/JieWu1","text":"Jie Wu 0001"},{"@pid":"65/4115","text":"Shuhui Yang"}]},"title":"SmallWorld Model-Based Polylogarithmic Routing Using Mobile Nodes.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"3","pages":"327-342","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/WuY08","doi":"10.1007/S11390-008-9136-9","ee":"https://doi.org/10.1007/s11390-008-9136-9","url":"https://dblp.org/rec/journals/jcst/WuY08"}, "url":"URL#5276356" }, { "@score":"1", "@id":"5276357", "info":{"authors":{"author":[{"@pid":"01/3464","text":"Yong Xi"},{"@pid":"76/4140","text":"Kewei Sha"},{"@pid":"s/WeisongShi","text":"Weisong Shi"},{"@pid":"70/3653","text":"Loren Schwiebert"},{"@pid":"15/4777-5","text":"Tao Zhang 0005"}]},"title":"Probabilistic Adaptive Anonymous Authentication in Vehicular Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"916-928","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/XiSSSZ08","doi":"10.1007/S11390-008-9194-Z","ee":"https://doi.org/10.1007/s11390-008-9194-z","url":"https://dblp.org/rec/journals/jcst/XiSSSZ08"}, "url":"URL#5276357" }, { "@score":"1", "@id":"5276358", "info":{"authors":{"author":{"@pid":"40/3177","text":"Renyi Xiao"}},"title":"Survey on Anonymity in Unstructured Peer-to-Peer Systems.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"660-671","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/Xiao08","doi":"10.1007/S11390-008-9162-7","ee":"https://doi.org/10.1007/s11390-008-9162-7","url":"https://dblp.org/rec/journals/jcst/Xiao08"}, "url":"URL#5276358" }, { "@score":"1", "@id":"5276359", "info":{"authors":{"author":[{"@pid":"13/2543","text":"Chun-Lin Xin"},{"@pid":"39/217","text":"Wei-Min Ma"},{"@pid":"50/2484","text":"Lei Yang"}]},"title":"Competitive Analysis of Two Special Online Device Replacement Problems.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"203-213","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/XinMY08","doi":"10.1007/S11390-008-9122-2","ee":"https://doi.org/10.1007/s11390-008-9122-2","url":"https://dblp.org/rec/journals/jcst/XinMY08"}, "url":"URL#5276359" }, { "@score":"1", "@id":"5276360", "info":{"authors":{"author":[{"@pid":"21/1244-1","text":"Gang Xu 0001"},{"@pid":"55/977","text":"Guozhao Wang"},{"@pid":"97/3162","text":"Xiao-Diao Chen"}]},"title":"Free-Form Deformation with Rational DMS-Spline Volumes.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"862-873","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/XuWC08","doi":"10.1007/S11390-008-9182-3","ee":"https://doi.org/10.1007/s11390-008-9182-3","url":"https://dblp.org/rec/journals/jcst/XuWC08"}, "url":"URL#5276360" }, { "@score":"1", "@id":"5276361", "info":{"authors":{"author":[{"@pid":"30/4367-1","text":"Rui Xue 0001"},{"@pid":"l/NinghuiLi","text":"Ninghui Li"},{"@pid":"62/6011-1","text":"Jiangtao Li 0001"}]},"title":"Algebraic Construction for Zero-Knowledge Sets.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"166-175","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/XueLL08","doi":"10.1007/S11390-008-9119-X","ee":"https://doi.org/10.1007/s11390-008-9119-x","url":"https://dblp.org/rec/journals/jcst/XueLL08"}, "url":"URL#5276361" }, { "@score":"1", "@id":"5276362", "info":{"authors":{"author":[{"@pid":"76/6161-1","text":"Bing Yang 0001"},{"@pid":"27/4364-20","text":"Jing Chen 0020"},{"@pid":"98/5530","text":"Enyue Lu"},{"@pid":"z/SiQingZheng","text":"Si-Qing Zheng"}]},"title":"Design and Performance Evaluation of Sequence Partition Algorithms.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"5","pages":"711-718","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/YangCLZ08","doi":"10.1007/S11390-008-9183-2","ee":"https://doi.org/10.1007/s11390-008-9183-2","url":"https://dblp.org/rec/journals/jcst/YangCLZ08"}, "url":"URL#5276362" }, { "@score":"1", "@id":"5276363", "info":{"authors":{"author":[{"@pid":"40/6427","text":"Bailin Yang"},{"@pid":"39/193","text":"Frederick W. B. Li"},{"@pid":"83/8389","text":"Zhigeng Pan"},{"@pid":"82/1331","text":"Xun Wang"}]},"title":"An Effective Error Resilient Packetization Scheme for Progressive Mesh Transmission over Unreliable Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"1015-1025","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/YangLPW08","doi":"10.1007/S11390-008-9195-Y","ee":"https://doi.org/10.1007/s11390-008-9195-y","url":"https://dblp.org/rec/journals/jcst/YangLPW08"}, "url":"URL#5276363" }, { "@score":"1", "@id":"5276364", "info":{"authors":{"author":[{"@pid":"52/5812","text":"Jian Yu"},{"@pid":"34/632","text":"Yanbo Han"},{"@pid":"02/3721-4","text":"Jun Han 0004"},{"@pid":"76/289","text":"Yan Jin"},{"@pid":"91/5988","text":"Paolo Falcarin"},{"@pid":"m/MaurizioMorisio","text":"Maurizio Morisio"}]},"title":"Synthesizing Service Composition Models on the Basis of Temporal Business Rules.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"885-894","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/YuHHJFM08","doi":"10.1007/S11390-008-9196-X","ee":"https://doi.org/10.1007/s11390-008-9196-x","url":"https://dblp.org/rec/journals/jcst/YuHHJFM08"}, "url":"URL#5276364" }, { "@score":"1", "@id":"5276365", "info":{"authors":{"author":[{"@pid":"29/2362-1","text":"Xue Zhang 0001"},{"@pid":"46/2102","text":"Jue Hong"},{"@pid":"24/3318","text":"Sanglu Lu"},{"@pid":"40/6717-1","text":"Li Xie 0001"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"}]},"title":"Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"6","pages":"944-956","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhangHLXC08","doi":"10.1007/S11390-008-9197-9","ee":"https://doi.org/10.1007/s11390-008-9197-9","url":"https://dblp.org/rec/journals/jcst/ZhangHLXC08"}, "url":"URL#5276365" }, { "@score":"1", "@id":"5276366", "info":{"authors":{"author":[{"@pid":"56/5624-6","text":"Xian Zhang 0006"},{"@pid":"33/3270-1","text":"Yu Hao 0001"},{"@pid":"50/1222-1","text":"Xiaoyan Zhu 0001"},{"@pid":"l/MingLi1","text":"Ming Li 0001"}]},"title":"New Information Distance Measure and Its Application in Question Answering System.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"557-572","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhangHZL08","doi":"10.1007/S11390-008-9152-9","ee":"https://doi.org/10.1007/s11390-008-9152-9","url":"https://dblp.org/rec/journals/jcst/ZhangHZL08"}, "url":"URL#5276366" }, { "@score":"1", "@id":"5276367", "info":{"authors":{"author":[{"@pid":"25/1145","text":"Hai Zhao"},{"@pid":"48/3888","text":"Chunyu Kit"}]},"title":"Scaling Conditional Random Fields by One-Against-the-Other Decomposition.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"612-619","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhaoK08","doi":"10.1007/S11390-008-9157-4","ee":"https://doi.org/10.1007/s11390-008-9157-4","url":"https://dblp.org/rec/journals/jcst/ZhaoK08"}, "url":"URL#5276367" }, { "@score":"1", "@id":"5276368", "info":{"authors":{"author":[{"@pid":"41/3820","text":"Youjian Zhao"},{"@pid":"28/3092","text":"Zuhui Yue"},{"@pid":"82/4905","text":"Jianping Wu"}]},"title":"Research on Next-Generation Scalable Routers Implemented with H-Torus Topology.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"684-693","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhaoYW08","doi":"10.1007/S11390-008-9164-5","ee":"https://doi.org/10.1007/s11390-008-9164-5","url":"https://dblp.org/rec/journals/jcst/ZhaoYW08"}, "url":"URL#5276368" }, { "@score":"1", "@id":"5276369", "info":{"authors":{"author":[{"@pid":"53/4506","text":"Sheng Zhong"},{"@pid":"30/4367","text":"Rui Xue"}]},"title":"Preface.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"2","pages":"165","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ZhongX08","doi":"10.1007/S11390-008-9133-Z","ee":"https://doi.org/10.1007/s11390-008-9133-z","url":"https://dblp.org/rec/journals/jcst/ZhongX08"}, "url":"URL#5276369" }, { "@score":"1", "@id":"5276370", "info":{"authors":{"author":[{"@pid":"56/3804","text":"Qiong Zou"},{"@pid":"81/3637","text":"Xiao-Feng Li"},{"@pid":"31/4875","text":"Long-Bing Zhang"}]},"title":"Runtime Engine for Dynamic Profile Guided Stride Prefetching.","venue":"J. Comput. Sci. Technol.","volume":"23","number":"4","pages":"633-643","year":"2008","type":"Journal Articles","access":"closed","key":"journals/jcst/ZouLZ08","doi":"10.1007/S11390-008-9159-2","ee":"https://doi.org/10.1007/s11390-008-9159-2","url":"https://dblp.org/rec/journals/jcst/ZouLZ08"}, "url":"URL#5276370" } ] } } } )