


default search action
Frontiers of Computer Science (in China), Volume 6
Volume 6, Number 1, February 2012
- Shaoying Liu:

Formal engineering methods for software quality assurance. 1-2 - David Lorge Parnas:

The use of mathematics in software quality assurance. 3-16 - Wei Ke

, Xiaoshan Li, Zhiming Liu, Volker Stolz:
rCOS: a formal model-driven engineering method for component-based software. 17-39 - Hong Zhu:

An institution theory of formal meta-modelling in graphically extended BNF. 40-56 - Anh Tuan Luu, Jun Sun

, Yang Liu
, Jin Song Dong, Xiaohong Li, Thanh Tho Quan:
SeVe: automatic tool for verification of security protocols. 57-75 - Zhiyuan Liu

, Xinxiong Chen, Maosong Sun:
Mining the interests of Chinese microbloggers via keyword extraction. 76-87 - Jiliang Tang, Xufei Wang, Huiji Gao, Xia Hu, Huan Liu:

Enriching short text representation in microblog for clustering. 88-101 - Xiaochen Li, Wenji Mao, Daniel Zeng:

Forecasting complex group behavior via multiple plan recognition. 102-110 - Xiaolong Li, Gang Pan, Zhaohui Wu, Guande Qi, Shijian Li, Daqing Zhang, Wangsheng Zhang, Zonghui Wang:

Prediction of urban human mobility using large-scale taxi traces and its applications. 111-121 - Tao Wang, Qingpeng Zhang

, Zhong Liu, Wenli Liu, Ding Wen:
On social computing research collaboration patterns: a social network perspective. 122-130
Volume 6, Number 2, April 2012
- Robert Gwadera:

Multi-stream join answering for mining significant cross-stream correlations. 131-142 - Nicolas Cebron:

Active improvement of hierarchical object features under budget constraints. 143-153 - Jingrui He, Hanghang Tong

, Jaime G. Carbonell:
An effective framework for characterizing rare categories. 154-165 - Fabian Gieseke, Gabriel Moruz, Jan Vahrenhold:

Resilient k-d trees: k-means in space revisited. 166-178 - Tantan Liu, Fan Wang, Gagan Agrawal:

Stratified sampling for data mining on the deep web. 179-196 - Suhrid Balakrishnan, Sumit Chopra

:
Two of a kind or the ratings game? Adaptive pairwise preferences and latent factor models. 197-208 - Sertan Girgin, Jérémie Mary, Philippe Preux, Olivier Nicol:

Managing advertising campaigns - an approximate planning approach. 209-229 - Tim Schlüter, Stefan Conrad

:
An approach for automatic sleep stage scoring and apnea-hypopnea detection. 230-241
Volume 6, Number 3, June 2012
- Rada Chirkova, Leonid Libkin

, Juan L. Reutter
:
Tractable XML data exchange via relations. 243-263 - Min Xie, Laks V. S. Lakshmanan, Peter T. Wood

:
Composite recommendations: from items to packages. 264-277 - Jaffer Gardezi, Leopoldo E. Bertossi, Iluju Kiringa:

Matching dependencies: semantics and query answering. 278-292 - Pei Li, Xin Luna Dong, Andrea Maurino, Divesh Srivastava:

Linking temporal records. 293-312 - Wenfei Fan

, Jianzhong Li, Shuai Ma, Nan Tang, Yinghui Wu:
Adding regular expressions to graph reachability and pattern queries. 313-338
Volume 6, Number 4, August 2012
- Zhiwei Xu:

How much power is needed for a billion-thread high-throughput server? 339-346 - Chunjie Luo, Jianfeng Zhan, Zhen Jia, Lei Wang, Gang Lu, Lixin Zhang, Cheng-Zhong Xu

, Ninghui Sun:
CloudRank-D: benchmarking and ranking cloud computing systems for data processing applications. 347-362 - Xiaolin Wang, Xiang Wen, Yechen Li, Zhenlin Wang, Yingwei Luo, Xiaoming Li:

Dynamic cache partitioning based on hot page migration. 363-372 - Hui Chen, Ping Lu, Pengcheng Xiong

, Cheng-Zhong Xu
, Zhiping Wang:
Energy-aware application performance management in virtualized data centers. 373-387 - Gang Huang, Xing Chen, Ying Zhang, Xiaodong Zhang:

Towards architecture-based management of platforms in the cloud. 388-397 - Wei Gao, Hai Jin, Song Wu, Xuanhua Shi, Jinyan Yuan:

Effectively deploying services on virtualization infrastructure. 398-408 - Yubao Liu, Xiuwei Chen, Zhan Li, Zhijie Li, Raymond Chi-Wing Wong

:
An efficient method for privacy preserving location queries. 409-420 - Rajeev Anand Sahu

, Sahadeo Padhye
:
Efficient ID-based proxy multi-signature scheme secure in random oracle. 421-428 - Boyang Wang, Hui Li, Jin Cao:

An efficient MAC scheme for secure network coding with probabilistic detection. 429-441 - Xiaojun Bi, Jing Xiao:

Classification-based self-adaptive differential evolution and its application in multi-lateral multi-issue negotiation. 442-461 - Yu Jiang, Shuli Gong:

Bus holding strategy based on shuffled complex evolution method. 462-468 - Shangfei Wang, Rui Ding:

A qualitative and quantitative study of color emotion using valence-arousal. 469-476 - Xingyi Zhang, Xiangxiang Zeng

, Bin Luo
, Zheng Zhang:
A uniform solution to the independent set problem through tissue P systems with cell separation. 477-488
Volume 6, Number 5, October 2012
- Bo Yuan

, Wenhuang Liu:
Measure oriented training: a targeted approach to imbalanced classification problems. 489-497 - Kuo-Wei Hsu, Jaideep Srivastava

:
Improving bagging performance through multi-algorithm ensembles. 498-512 - Jing Wang, Zhijing Liu, Hui Zhao:

A probabilistic model with multi-dimensional features for object extraction. 513-526 - Hao Sheng, Chao Li, Yuanxin Ouyang, Zhang Xiong:

A precise approach to tracking dim-small targets using spectral fingerprint features. 527-536 - Zhaoxiang Zhang, Yunhong Wang:

Automatic object classification using motion blob based local feature fusion for traffic scene surveillance. 537-546 - Guangtao Xue, Ke Zhang, Qi He, Hongzi Zhu:

Real-time urban traffic information estimation with a limited number of surveillance cameras. 547-559 - Qi Li, Wei Ba

:
A group priority earliest deadline first scheduling algorithm. 560-567 - Anca Maria Ivanescu, Marc Wichterich, Christian Beecks, Thomas Seidl

:
The ClasSi coefficient for the evaluation of ranking quality in the presence of class similarities. 568-580 - Jie Wen, Xiaofeng Meng, Xing Hao, Jianliang Xu

:
An efficient approach for continuous density queries. 581-595 - Kaishun Wu

, Jiang Xiao, Lionel M. Ni:
Rethinking the architecture design of data center networks. 596-603 - Wei Duan

, Xiaogang Qiu:
Fostering artificial societies using social learning and social control in parallel emergency management systems. 604-610 - Xiaolong Zheng

, Yongguang Zhong, Daniel Zeng, Fei-Yue Wang:
Social influence and spread dynamics in social networks. 611-620 - Dion Detterer, Paul Wing Hing Kwan

, Cedric Gondro
:
A co-evolving memetic wrapper for prediction of patient outcomes in TCM informatics. 621-629
Volume 6, Number 6, December 2012
- Quan Liu, Xudong Yang, Ling Jing, Jin Li, Jiao Li:

A parallel scheduling algorithm for reinforcement learning in large state space. 631-646 - Yongqing Wang, Wenji Mao, Daniel Zeng, Fen Xia:

Listwise approaches based on feature ranking discovery. 647-659 - Wei Fan, Zhenyong Chen, Zhang Xiong, Hui Chen:

The Internet of data: a new idea to extend the IOT in the digital world. 660-667 - Min Jiao, Yansong Zhang, Zhanwei Wang, Shan Wang:

MiNT-OLAP cluster: minimizing network transmission cost in OLAP cluster for main memory analytical database. 668-676 - Xiaoming Wang, Guoxiang Yao:

Access control scheme with tracing for outsourced databases. 677-685 - Cheqing Jin, Jingwei Zhang, Aoying Zhou:

Continuous ranking on uncertain streams. 686-699 - Lianying Jia

, Jianqing Xi, Mengjuan Li
, Yong Liu, Decheng Miao:
ETI: an efficient index for set similarity queries. 700-712 - Tulika Pandey, Deepak Garg

, Manoj Madhava Gore:
Publish/subscribe based information dissemination over VANET utilizing DHT. 713-724 - Ying Zhang, Gang Huang, Wei Zhang, Xuanzhe Liu

, Hong Mei:
Towards module-based automatic partitioning of Java applications. 725-740 - Shuyi Zhu, Xiaochun Cao, Handong Zhao:

Photographic composite detection using circles. 741-755 - Jia Liu, Zhiguo Jiang, Hongjun Li, Xiaopeng Zhang:

Easy modeling of realistic trees from freehand sketches. 756-768 - Jinjiang Li, Hanyi Ge:

New progress in geometric computing for image and video processing. 769-775

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














