


default search action
FCST 2008: Nagasahi, Japan
- Japan-China Joint Workshop on Frontier of Computer Science and Technology, FCST 2008, Nagasahi, Japan, 27-28 December, 2008. IEEE Computer Society 2008, ISBN 978-1-4244-3418-3

- Hassen Redwan, Ki-Hyung Kim:

Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks. 3-9 - Youwen Zhu, Liusheng Huang, Wei Yang, Zhili Chen, Lingjun Li, Zhenshan Yu, Yonglong Luo:

Privacy-Preserving Practical Convex Hulls Protocol. 10-16 - Dong Li, Liusheng Huang, Wei Yang, Youwen Zhu, Yonglong Luo, Zhili Chen, Lingjun Li, Yun Ye:

A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol. 17-23 - Inwhee Joe, Seonbong Son:

Dynamic Spectrum Allocation MAC Protocol Based on Cognitive Radio for QoS Support. 24-29 - Lu Cheng, Depei Qian, Weiguo Wu:

An Energy Efficient Weight-Clustering Algorithm in Wireless Sensor Networks. 30-35 - Meiyi Xie, Hong Zhu

, Yucai Feng, Guanrong Hu:
Tracking and Repairing Damaged Databases Using Before Image Table. 36-41 - Xiaochun Xiao, Huan Wang, Gendu Zhang:

Access Graph Based Risk Assessment Model for Network Information System. 42-48 - Changsong Ding, Zhoujun Hu, Zhigang Hu, Xi Li:

A Distributed Workflow Management System Model and Its Scheduling Algorithm. 51-58 - Sheng Jiang, Yansheng Lu:

Evolutionary Testing of Unstructured Programs Using a Testability Transformation Approach. 59-66 - Dmitry A. Vazhenin, Alexander Vazhenin:

MP-Templates Operating Toolkit in Movie-Based Programming. 67-74 - Haruhiko Takada, Incheon Paik:

Design of General User Interface for Automatic Web Service Composition. 75-78 - Yuzhen Li, Takashi Imaizumi, Shiro Sakata, Hiroo Sekiya

, Jihong Guan:
Spatial Data Compression Techniques for GML. 79-84 - Lingfang Zeng

, Dan Feng, Bharadwaj Veeravalli, Qingsong Wei:
An Energy Efficient, Low Cost, Hybrid Storage System Based on Utility. 87-95 - Jingning Liu, Tianming Yang, Zuoheng Li, Ke Zhou:

TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline Strategy. 96-102 - Liang Xiao, Qiang Cao, Changsheng Xie, Chuanwen Wu:

Study and Optimize the Process of Batch Small Files Replication. 103-111 - Jianfeng Zhu, Leihua Qin, Dong Zeng, Jinli Zhou:

A Duplicate-Aware Data Replication. 112-117 - Zhong Gao, Guanming Lu, Daquan Gu:

A Novel Hybrid system for Large-Scale Chinese Text Classification Problem. 121-124 - Vitaly Klyuev:

An Approach to Implementing an Intelligent Web Search. 125-130 - Guo-Hui Li, Xiao-Kun Du, Fang-Xiao Hu, Jianqiang Du:

A Schema Matching Method Based on Partial Functional Dependencies. 131-138 - Xiaolei Gao, Huaikou Miao:

The Axiomatic Semantics of PDFD. 139-146 - Haikun Liu, Hai Jin, Xiaofei Liao, Zhengqiu Pan:

XenLR: Xen-based Logging for Deterministic Replay. 149-154 - Xuanhua Shi, Haoyu Tan, Song Wu, Hai Jin:

VNIX: Managing Virtual Machines on Clusters. 155-162 - Shengtong Zhong, Fei Hao:

Hand Tracking by Particle Filtering with Elite Particles Mean Shift. 163-167 - Amin Mohamed Nassar, Ashraf Mohamed Ali:

A New Technique of Modeling Acoustic Echo and its Implementation Using FPGA. 168-180 - Nalin Chakoo, Rahul Gupta, Jayaprada Hiremath:

Towards Better Content Visibility in Video Recommender Systems. 181-185 - Takahiro Machino, Shin-ya Iwazaki, Yuichi Okuyama, Junji Kitamichi, Kenichi Kuroda, Ryuichi Oka:

Optimizing Two-Dimensional Continuous Dynamic Programming for Cell Broadband Engine Processors. 186-193 - Zhixun Wang, James Louey:

Economical Solution for an Easy to Use Interactive Whiteboard. 197-203 - Xinqiao Lu, Xiaojuan Liu, Guoqiang Xiao, Enmin Song, Ping Li, Qiaoling Luo:

A Segment Extraction Algorithm Based on Polygonal Approximation for On-Line Chinese Character Recognition. 204-207 - Zunyi Tang, Wenlong Liu, Shuxue Ding:

An Invariant Pattern Recognition System Using the Bayesian Inference on Hierarchical Sequences with Pre-processing. 208-213 - Jie Ji, Kei Sato, Naoki Tominaga, Qiangfu Zhao:

Head Pose Recognition with NNC-Trees. 214-219 - Hirotomo Hayashi, Qiangfu Zhao:

Inducing NNTrees Suitable for Hardware Implementation. 220-225

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














