


default search action
Frontiers of Computer Science in China, Volume 4
Volume 4, Number 1, March 2010
- Lu Yang, Chaochen Zhou, Naijun Zhan, Bican Xia:

Recent advances in program verification through computer algebra. 1-16 - Mingsong Lv

, Nan Guan
, Qingxu Deng, Ge Yu, Wang Yi:
Static worst-case execution time analysis of the µC/OS-II real-time kernel. 17-27 - Shuling Wang, Qin Shu, Yijing Liu, Zongyan Qiu:

A semantic model of confinement and Locality theorem. 28-46 - Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai Zhang, Hongyong Zang, Yaqiong Li, Yajun Yang, Ran Ao, Yongbing Huang:

TRainbow: a new trusted virtual machine based platform. 47-64 - Ming Fu, Yu Zhang, Yong Li:

Formal verification of concurrent programs with read-write locks. 65-77 - Jiaqi Zhu, Hanpin Wang, Zhongyuan Xu, Chunxiang Xu:

A new model for model checking: cycle-weighted Kripke structure. 78-88 - Chaofeng Sha, Jian Gong, Aoying Zhou:

Mining non-redundant diverse patterns: an information theoretic perspective. 89-99 - Feng Wang, Jie Tang, Juanzi Li, Kehong Wang:

A constraint-based topic modeling approach for name disambiguation. 100-111 - Xuesong Feng, Junyi Zhang

, Akimasa Fujiwara, Yoshitsugu Hayashi, Hirokazu Kato:
Improved feedback modeling of transport in enlarging urban areas of developing countries. 112-122 - Qiyuan Zhang, Xuehai Zhou:

Efficient distributed location verification in wireless sensor networks. 123-134 - Zheng Liu, Heng Dai, Farouk Y. M. Alkadhi, Jufeng Dai:

An effective scheduling scheme for multi-hop multicast in wireless mesh networks. 135-142 - Xin Li, Zhe Li:

A MANET accessing Internet routing algorithm based on dynamic gateway adaptive selection. 143-150
Volume 4, Number 2, June 2010
- Zhiying Liu, David Lorge Parnas, Baltasar Trancón y Widemann:

Documenting and verifying systems assembled from components. 151-161 - Ying Jin, Jing Zhang, Weiping Hao, Pengfei Ma, Yan Zhang, Haiyan Zhao, Hong Mei:

A concern-based approach to generating formal requirements specifications. 162-172 - Mircea Marin

, Temur Kutsia
:
On the computation of quotients and factors of regular languages. 173-184 - Shuo Bai, Shouyang Wang

, Lean Yu, Aoying Zhou:
Financial information processing and development of emerging financial markets. 185-186 - Wai-Ki Ching, Ho-Yin Leung, Zhenyu Wu, Hao Jiang:

Modeling default risk via a hidden Markov model of multiple sequences. 187-195 - Lean Yu, Shouyang Wang

, Kin Keung Lai
:
Developing an SVM-based ensemble learning system for customer risk identification collaborating with customer relationship management. 196-203 - Niannian Jia, Changqing Jia, Wei Qiu:

A class of life insurance reserve model and risk analysis in a stochastic interest rate environment. 204-211 - Rui Liang, Yueshan Yu, Jinwu Gao, Zhi-Qiang Liu:

N-person credibilistic strategic game. 212-219 - Ling Zhang, Edward I. Altman, Jerome Yen:

Corporate financial distress diagnosis model and application in credit rating for listing firms in China. 220-236 - Xiujuan Zhao, Jianmin Shi:

Evaluation of mutual funds using multi-dimensional information. 237-253 - Dabin Zhang, Lean Yu, Shouyang Wang

, Haibin Xie:
Neural network methods for forecasting turning points in economic time series: an asymmetric verification to business cycles. 254-262 - Guoxing Zhang, Ju'e Guo, Guorong Chai, Li Gong, Xuejun Wang:

Using jump-diffusion modeling for valuing real options in infrastructure projects. 263-270 - Zaigui Yang:

Partially funded public pension, human capital and endogenous growth. 271-279 - Ali Daud

, Juanzi Li, Lizhu Zhou, Faqir Muhammad:
Knowledge discovery through directed probabilistic topic models: a survey. 280-301 - Xixiang Lv, Hui Li:

ID-based authenticated group key agreement from bilinear maps. 302-307
Volume 4, Number 3, September 2010
- Lionel M. Ni, Zhang Xiong:

Cognitive sense of China. 309-310 - Feng Zhu

, Matt W. Mutka
, Anish Bivalkar, Abdullah Demir, Yue Lu, Chockalingam Chidambaram:
Toward secure and private service discovery anywhere anytime. 311-323 - Qiang Yang:

Three challenges in data mining. 324-333 - Yunhao Liu, Guomo Zhou, Jizhong Zhao, Guojun Dai

, Xiang-Yang Li, Ming Gu, Huadong Ma, Lufeng Mo, Yuan He, Jiliang Wang:
Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs. 334-338 - Jiannong Cao

, Hejun Wu, Xuefeng Liu, Yi Lai:
iSensNet: an infrastructure for research and development in wireless sensor networks. 339-353 - An Lu, Wenbin Fang, Chang Xu, Shing-Chi Cheung

, Yu Liu:
Data-driven testing methodology for RFID systems. 354-364 - Ye Li, Honggang Li, Yuwei Zhang, Dengyu Qiao:

Packet transmission policies for battery operated wireless sensor networks. 365-375 - Lei Chen

, Mitchell M. Tseng, Xiang Lian
:
Development of foundation models for Internet of Things. 376-385 - Zhenyong Chen, Wei Fan, Zhang Xiong, Pingan Zhang, Lixin Luo:

Visual data security and management for smart cities. 386-393 - Biao Leng, Zhang Xiong, Xiangwei Fu:

A 3D shape retrieval framework for 3D smart cities. 394-404 - Ming C. Lin, Dinesh Manocha

:
Virtual cityscapes: recent advances in crowd modeling and traffic simulation. 405-416 - Weifeng Lv, Bowen Du, Dianfu Ma, Tongyu Zhu

, Chen Wang:
Applied research of data sensing and service to ubiquitous intelligent transportation system. 417-426
Volume 4, Number 4, December 2010
- Guoliang Chen:

Petaflop supercomputers of China. 427 - Xianghui Xie, Xing Fang, Sutai Hu, Dong Wu:

Evolution of supercomputers. 428-436 - Yunquan Zhang, Jiachang Sun, Guoxing Yuan, Linbo Zhang

:
Perspectives of China's HPC system development: a view from the 2009 China HPC TOP100 list. 437-444 - Xuejun Yang, Xiangke Liao, Weixia Xu, Junqiang Song, Qingfeng Hu, Jinshu Su

, Liquan Xiao
, Kai Lu, Qiang Dou, Juping Jiang, Canqun Yang:
TH-1: China's first petaflop supercomputer. 445-455 - Fei Chen, Zheng Cao

, Kai Wang, Xuejun An, Ninghui Sun:
HPP controller: a system controller for high performance computing. 456-465 - Qiang Li, Bo Li, Zhigang Huo

, Ninghui Sun:
Design and implementation of communication system of the Dawning 6000 supercomputer. 466-474 - Mingfa Zhu, Limin Xiao, Li Ruan, Qinfen Hao:

DeepComp: towards a balanced system design for high performance computer systems. 475-479 - Zeyao Mo, Aiqing Zhang, Xiaolin Cao, Qingkai Liu, Xiaowen Xu, Hengbin An, Wenbing Pei, Shaoping Zhu:

JASMIN: a parallel software infrastructure for scientific computing. 480-488 - Jianxi Fan, Kenli Li, Shukui Zhang, Wujun Zhou, Baolei Cheng:

One-to-one communication in twisted cubes under restricted connectivity. 489-499 - Ye Tian

, Bangchuan Liu, Zhenhua He:
PopCap: popularity oriented proxy caching for peer-assisted Internet video-on-demand streaming services. 500-515 - Jiqiang Liu, Xun Chen, Zhen Han:

Full and partial deniability for authentication schemes. 516-521 - Xinguang Tian, Xueqi Cheng, Miyi Duan, Rui Liao, Hong Chen, Xiaojuan Chen:

Network intrusion detection based on system calls and data mining. 522-528 - Zhixiong Chen, Xiaoni Du:

Linear complexity and autocorrelation values of a polyphase generalized cyclotomic sequence of length pq. 529-535 - Ruochen Liu, Licheng Jiao

, Yangyang Li, Jing Liu:
An immune memory clonal algorithm for numerical and combinatorial optimization. 536-559 - Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:

An enhanced swarm intelligence clustering-based RBFNN classifier and its application in deep Web sources classification. 560-570 - Zhipin Deng, Kebin Jia, Yui-Lam Chan

, Chang-Hong Fu
, Wan-Chi Siu:
Fast motion and disparity estimation for multiview video coding. 571-579 - Jiangtao Wang, Debao Chen

, Jingyu Yang:
Human behavior classification by analyzing periodic motions. 580-588

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














