


default search action
Frontiers of Computer Science in China, Volume 1
Volume 1, Number 1, February 2007
- Wenjun Wu, Xiao-Shan Gao:

Mathematics mechanization and applications after thirty years. 1-8 - Jifeng He, Huibiao Zhu, Geguang Pu:

A model for BPEL-like languages. 9-19 - Ninghui Sun, Dan Meng:

Dawning4000A high performance computer. 20-25 - Jigui Sun, Minghao Yin

:
Recognizing the agent's goals incrementally: planning graph as a basis. 26-36 - Gheorghe Paun:

A quick overview of membrane computing with some details about spiking neural P systems. 37-49 - Donggang Cao, Hong Mei, Minghui Zhou:

Supporting crosscutting concern modelling in software architecture design. 50-57 - Qun Liu, Xiangdong Wang, Hong Liu, Le Sun, Sheng Tang, Deyi Xiong

, Hongxu Hou, Yuanhua Lv, Wenbo Li, Shouxun Lin, Yueliang Qian:
HTRDP evaluations on Chinese information processing and intelligent human-machine interface. 58-93 - Xuejun Yang, Huizhan Yi, Xiangli Qu, Haifang Zhou:

Compiler-directed power optimization of high-performance interconnection networks for load-balancing MPI applications. 94-105 - Réjean Plamondon, Xiaolin Li, Moussa Djioua:

Extraction of delta-lognormal parameters from handwriting strokes. 106-113 - Chunhe Xia, Yunping Shi, Xiaojian Li, Wei Gao:

P2P worm detection based on application identification. 114-122
Volume 1, Number 2, May 2007
- Yuanyan Tang:

Remarks on different reviews of Chinese character recognition. 123-125 - Ruwei Dai, Chenglin Liu, Baihua Xiao:

Chinese character recognition: history, status and prospects. 126-136 - Sargur N. Srihari, Xuanshen Yang, Gregory R. Ball:

Offline Chinese handwriting recognition: an assessment of current technology. 137-155 - Yunquan Zhang, Guoliang Chen, Guangzhong Sun, Qiankun Miao:

Models of parallel computation: a survey and classification. 156-165 - Weiqi Luo

, Zhenhua Qu, Feng Pan, Jiwu Huang:
A survey of passive technology for digital image forensics. 166-179 - Tielin Liang, Dongming Wang:

On the design and implementation of a geometric-object-oriented language. 180-190 - Kaile Su

, Yinyin Xiao, Qingliang Chen, Han Lin:
Semantic interpretation of compositional logic in instantiation space. 191-199 - Hai Jin, Chuanjiang Yi:

CMM: Credential migration management system based on trusted computing in CGSP. 200-207 - Renfa Li, Yunlong Xie, Jigang Wen, Guangxue Yue:

EMMP: a highly efficient membership management protocol. 208-212 - Weining Qian, Linhao Xu, Aoying Zhou, Minqi Zhou:

SONNET: subscription using path queries over structured overlay networks. 213-225 - Weiguo Zhang, Mian Cai, Guozhen Xiao:

On constructing disjoint linear codes. 226-230 - Xuejun Yang, Panfeng Wang, Yunfei Du

, Haifang Zhou:
A data-distributed parallel algorithm for wavelet-based fusion of remote sensing images. 231-240 - Chuanbo Chen, Yunping Zheng, Mudar Sarem:

A mesh-based automatic in-betweening algorithm in computer-assisted animation. 241-245
Volume 1, Number 3, July 2007
- Guilu Long, Yang Liu:

Search an unsorted database with quantum mechanics. 247-271 - YuZhong Zhao, Yun Xu, Qiangfeng Zhang, Guoliang Chen:

An overview of the haplotype problems and algorithms. 272-282 - Shilong Ma, Yuefei Sui, Ke Xu:

Well limit behaviors of term rewriting systems. 283-296 - Yiyun Chen, Lin Ge, Baojian Hua, Zhaopeng Li, Cheng Liu, Zhifang Wang:

A pointer logic and certifying compiler. 297-312 - Shi Zhang, Linpeng Huang:

Research on dynamic update transaction for Java classes. 313-321 - Keqing He, Peng Liang

, Rong Peng, Bing Li, Jing Liu:
Requirement emergence computation of networked software. 322-328 - Yuanzhuo Wang, Chuang Lin, Yang Yang, Zhiguang Shan:

Performance analysis of a dependable scheduling strategy based on a fault-tolerant grid model. 329-337 - Jianjin Jiang, Guangwen Yang:

An optimal replication strategy for data grid systems. 338-348 - Lingfang Zeng

, Dan Feng, Hong Jiang:
High TPO/TCO for data storage: policy, algorithm and early practice. 349-360 - Hui Wei:

A hierarchical model for structure learning based on the physiological characteristics of neurons. 361-372
Volume 1, Number 4, October 2007
- Ying Jiang, Guo-Qiang Zhang

:
Weakly distributive domains (II). 373-384 - Dengguo Feng, Chuankun Wu:

Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. 385-396 - Teijiro Isokawa, Shin'ya Kowada, Ferdinand Peper, Naotake Kamiura, Nobuyuki Matsui:

Online isolation of defects in cellular nanocomputers. 397-406 - Shuicheng Yan, Huan Wang, Jianzhuang Liu, Xiaoou Tang, Thomas S. Huang:

Ranking with uncertain labels and its applications. 407-412 - Tiejun Zhao, Yi Guan, Ting Liu, Qiang Wang:

Recent advances on NLP research in Harbin Institute of Technology. 413-428 - Limin Wang, Xuecheng Wang, Xiongfei Li:

Inference and learning in hybrid probabilistic network. 429-435 - Yijiao Yu, Hai Jin:

Discourage free riding in Peer-to-Peer file sharing systems with file migration and workload balancing approach. 436-449 - Kai Nan, Jianjun Yu, Hao Su, Shengmin Guo, Hui Zhang, Ke Xu:

Towards structural Web Services matching based on Kernel methods. 450-458 - Yingxin Guo, Ke Xu:

An improved algorithm for finding community structure in networks with an application to IPv6 backbone network. 459-467 - Cheqing Jin, Aoying Zhou, Jeffrey Xu Yu, Joshua Zhexue Huang, Feng Cao:

Adaptive scheduling for shared window joins over data streams. 468-477 - Lingfang Zeng

, Dan Feng, Zhan Shi, Jianxi Chen, Qingsong Wei, Zhixiang Li:
A high-speed and low-cost storage architecture based on virtual interface. 478-492 - Dong Xie, Luming Yang:

Study on consistent query answering in inconsistent databases. 493-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














