


default search action
Frontiers of Computer Science in China, Volume 5
Volume 5, Number 1, March 2011
- Zheng Fu, Graeme Smith

:
Property transformation under specification change. 1-13 - Conghua Zhou, Bo Sun, Zhifeng Liu:

Abstraction for model checking multi-agent systems. 14-25 - Xiaoqin Fan, Xianwen Fang, Zhijun Ding:

Indeterminacy-aware service selection for reliable service composition. 26-36 - Jia Wen, Chao Li, Zhang Xiong:

Behavior pattern extraction by trajectory analysis. 37-44 - Feng Zhao, Licheng Jiao

, Hanqiang Liu:
Fuzzy c-means clustering with non local spatial information for noisy image segmentation. 45-56 - Yunping Zheng, Mudar Sarem:

A fast algorithm for computing moments of gray images based on NAM and extended shading approach. 57-65 - Jianhua Jia, Bingxiang Liu, Licheng Jiao

:
Soft spectral clustering ensemble applied to image segmentation. 66-78 - Liangxiao Jiang

:
Learning random forests for ranking. 79-86 - Yanni Han, Deyi Li, Teng Wang:

Identifying different community members in complex networks based on topology potential. 87-99 - Xuesong Yin, Enliang Hu:

Distance metric learning guided adaptive subspace semi-supervised clustering. 100-108 - Hao Bai, Kunsheng Wang, Changzhen Hu, Gang Zhang, Xiao-chuan Jing:

Boosting performance in attack intention recognition by integrating multiple techniques. 109-118 - Yujian Li, Chenguang Zhang:

A metric normalization of tree edit distance. 119-125 - Jian Wang, Yubai Li, Chang Wu:

An analytical model for Network-on-Chip with finite input buffer. 126-134
Volume 5, Number 2, June 2011
- Bailing Liu, Feng Xiao, Ke Deng:

Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation. 135-147 - Eryun Liu, Heng Zhao, Fangfei Guo, Jimin Liang

, Jie Tian:
Fingerprint segmentation based on an AdaBoost classifier. 148-157 - Wenfeng Yang, Yupu Hu:

A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions. 158-162 - Defa Hu, Qiaoliang Li:

A simple fingerprinting scheme for large user groups. 163-168 - Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei:

Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. 169-180 - Guojun Wang, Jie Wu:

FlowTrust: trust inference with network flows. 181-194 - Xibei Yang, Ming Zhang:

Dominance-based fuzzy rough approach to an interval-valued decision system. 195-204 - Ruixuan Li, Kunmei Wen, Xiwu Gu, Yuhua Li, Xiaolin Sun, Bing Li:

Type-2 fuzzy description logic. 205-215 - Wei Wang, Zhiliang Wang, Siyi Zheng, Xuejing Gu:

Individual difference of artificial emotion applied to a service robot. 216-226 - Yehu Shen:

Efficient normalized cross correlation calculation method for stereo vision based robot navigation. 227-235 - Yansong Zhang, Shan Wang, Jiaheng Lu

:
Improving performance by creating a native join-index for OLAP. 236-249 - Lan Li, Wenjun Xiao:

Psu: a novel low-latency constant-degree overlay network. 250-258
Volume 5, Number 3, September 2011
- Xiubo Geng, Xueqi Cheng:

Learning multiple metrics for ranking. 259-267 - Xianchao Zhang, Quanzeng You

:
An improved spectral clustering algorithm based on random walk. 268-278 - Xudong Zhu, Zhijing Liu:

Human behavior clustering for anomaly detection. 279-289 - Jiuyue Hao, Chao Li, Zhang Xiong, Ejaz Hussain:

A temporal-spatial background modeling of dynamic scenes. 290-299 - Defu Chen, Zhengsu Tao:

An adaptive polling interval and short preamble media access control protocol for wireless sensor networks. 300-307 - Jun Xu, Xuehai Zhou, Feng Yang:

Traceback in wireless sensor networks with packet marking and logging. 308-315 - Stephen F. Bush

:
Toward in vivo nanoscale communication networks: utilizing an active network architecture. 316-326 - Haizheng Yu, Jianfeng Ma, Hong Bian:

Reasonable routing in delay/disruption tolerant networks. 327-334 - Chao Lv, Hui Li, Jianfeng Ma, Meng Zhao:

Security analysis of two recently proposed RFID authentication protocols. 335-340 - Shaoying Liu:

Pre-post notation is questionable in effectively specifying operations of object-oriented systems. 341-352 - Yuzhong Sun, Yiqiang Zhao, Ying Song, Yajun Yang, Haifeng Fang, Hongyong Zang, Yaqiong Li, Yunwei Gao:

Green challenges to system software in data centers. 353-368 - Baojian Hua:

Static typing for a substructural lambda calculus. 369-380
Volume 5, Number 4, December 2011
- Wei Zhao, Ye San:

RBF neural network based on q-Gaussian function in function approximation. 381-386 - Yongjian Zhao, Boqiang Liu, Sen Wang:

A robust extraction algorithm for biomedical signals from noisy mixtures. 387-394 - Weimin Wang, Jingchun Zhang, Cong Cao

, Tao Hou, Yue Liu
, Keji Chen:
An efficient approach to representing and mining knowledge from Qing court medical records. 395-404 - Dongsheng Wang

:
Answering contextual questions based on ontologies and question templates. 405-418 - Pu Huang, Zhenmin Tang

, Cai-Kou Chen
, Xintian Cheng:
Nearest-neighbor classifier motivated marginal discriminant projections for face recognition. 419-428 - Mingfen Wu:

Approximation operators based on vague relations and roughness measures of vague sets. 429-441 - Xixiang Lv, Hui Li, Baocang Wang:

Identity-based key distribution for mobile Ad Hoc networks. 442-447 - Sheng Gao, Wenping Ma, Zepeng Zhuo, Fenghe Wang:

On cross-correlation indicators of an S-box. 448-453 - Yanfang Ma, Min Zhang, Yixiang Chen, Liang Chen

:
Two-thirds simulation indexes and modal logic characterization. 454-471 - Wei Wang:

Certifying assembly programs with trails. 472-485 - Zijian Guo, Wenyuan Wang, Guolei Tang

, Jun Huang:
A recursive model for static empty container allocation. 486-495 - Yutaka Okaie, Tadashi Nakano:

Non-cooperative optimization games in market-oriented overlay networks: an integrated model of resource pricing and network formation. 496-505 - Shuguo Yang:

Research on resource allocation for multi-tier web applications in a virtualization environment. 506-512 - Kenli Li, Zhao Tong

, Dan Liu, Teklay Tesfazghi
, Xiangke Liao:
A PTS-PGATS based approach for data-intensive scheduling in data grids. 513-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














